Chapter 15 Answers to Practice Exam 2

1. A

2. D

3. D

4. A, B, E

5. B

6. A, B

7. D

8. A, D

9. A

10. A, B

11. B

12. C

13. A, B

14. C, D

15. A, C

16. D

17. A, B

18. D

19. C

20. D

21. A

22. B, D

23. A

24. D

25. A

26. C, D

27. B

28. A

29. D

30. A, C

31. D

32. A

33. D

34. D

35. B, C, D

36. D

37. A

38. D

39. A

40. A

41. A

42. B

43. B

44. A

45. C

46. B

47. A

48. D

49. A, C

50. B

51. D

52. A

53. C

54. A

55. B, D

56. A, C

57. A, D

58. A, B, C

59. D

60. B

61. B

62. A

63. C

64. C, D

65. C

66. D

67. F

68. A, D

69. A, D

70. D

71. B, C

72. A, B

73. C

74. D

75. B, C

Answers to Exam Questions

1.  1. The label given to the Service Console port in the VirtualCenter 2.5 interface is vswif0. Answers B, C, and D are labels used in VirtualCenter 2.5 for interfaces other than the Service Console.

2.  D. The default size assigned to the swap partition during an ESX Server 3.5 installation is 544MB. Answers A, B, and C are incorrect because they are not the default size assigned.

3.  D. On an ESX Server 3.5, the partition written to when the system crashes is the vmkcore partition. Another term for this process is a core dump. Answers A, B, and C are incorrect. The / partition (the root partition of the operating system), the SWAP partition, and the VMFS3 partition are not written to during a core dump.

4.  A, B, E. In a default installation of VirtualCenter 2.5, numerous roles are created automatically. Each role has a default set of defined permissions. Based on the task required, some of these roles can accomplish the task, whereas others cannot. The roles that have the default permissions to remove an alarm are the Datacenter Administrator, Virtual Machine Administrator, and Resource Pool Administrator. Answers C and D are incorrect. They do not have necessary permissions to remove an alarm.

5.  B. A number of default roles are created during a VirtualCenter 2.5 installation. These roles provide an administrative way to efficiently assign one or more privileges to a user or group. One of the default roles is the Resource Pool Administrator. One privilege that a user assigned to the role of Resource Pool Administrator has by default is Create a Resource Pool. The other responses are not default privileges of the Resource Pool Administrator, so answers A, C, and D are incorrect. They are default privileges of other VirtualMachine 2.5 roles.

6.  A, B. When an ESX host is added to an HA cluster, several components are installed on the host. They include the AAM (Automated Availability Manager), VMap, and the vpxa. AAM is the engine for HA, and the vpxa service manages components of the HA cluster. Communication between the AAM and vpxa is managed by VMap. Esxtop and IQN are not HA components. They are used in other aspects of the VI3 enterprise. Therefore, answers C and D are incorrect.

7.  D. In VI3, a resource share is a way to prioritize which virtual machines have access to available resources, such as memory and CPU. When two virtual machines are contending for available resources, the share value determines how much resource is available to each VM. Answers A, B, and C are not correct because they are not a VI3 way to prioritize resources. They are used in a VI3 environment but with other features. A resource pool is a container created in Hosts and Clusters view used to limit the host CPU and memory utilization for a group of virtual machines.

8.  A, D. VI3’s Web Access utility is automatically installed when ESX Server is installed and can be installed from the VirtualCenter Server Windows setup package as an optional feature when you are installing the VirtualCenter Server. Answers B and C are incorrect because they do not correctly describe the Web Access installation options.

9.  A. One of the licensing models available when you are installing an ESX Server 3.5 host is the Host Based Model. In this model, each individual host is licensed separately. When you are licensing a host in this way, the license is uploaded to the host and configured using the VIC. The license can be found on the server at /etc/vmware/vmware.lic. Answers B, C, and D are incorrect because they do not reflect the correct location of a Host Based License file on an ESX Server 3.5 host.

10.  A, B. In the VI3 suite, a grace period exists during which all hosts will continue to function without interruption should a centralized license server fail. Certain features are available during this grace period, and some are available after the grace period if you are not able to restore the license server in the allotted time period. Some features are not available after the grace period if the license server has not been restored in time, including starting up a virtual machine and restarting virtual machines that are located on a failed host on a DRS cluster. Answers C and D are incorrect because these features are available after the grace period if the license server cannot be restarted in time.

11.  B. According to VMware, you can manage up to 2000 virtual machines from a single instance of VirtualCenter 2.5. Answers A, C, and D are incorrect because they do not correctly reflect the maximums defined by VMware.

12.  C. When creating and configuring a new virtual machine in a VI3 enterprise, you must know both the hardware requirements for a VM and the maximum hardware that you can configure for a VM. A virtual machine in this environment can have a maximum of four CPUs, 16GB RAM, four NICs, and two CD/DVD-ROM drives. Because this VM requires four DVD-ROM drives, it causes the creation and configuration to fail. Answers A, B, and D are not requirements that exceed the maximum hardware requirements for a VM.

13.  A, B. In the VI3 suite, alarms are used when monitoring resource usage and the state of defined systems. These alarms can alert an administrator to a condition that needs attention. Based on the configuration of the alarm, an automated follow-up action can be initialized. There are two generic alarm types; they are an alarm that monitors a host and one that monitors a virtual machine. Answers C and D are incorrect because they are not alarm types that can be configured.

14.  C, D. In the VI3 suite, alarms are used when monitoring resource usage and the state of defined systems. These alarms can alert an administrator to a condition that needs attention. Based on the configuration of the alarm, an automated follow-up action can be initialized. When configuring a virtual machine state alarm, you can configure two options on the Triggers tab. Because this is a state alarm, those options are Is Equal To or Is Not Equal To. Answers A and B are incorrect; they are not options available for a state alarm.

15.  A, C. In the VI3 suite, alarms are used when monitoring resource usage and the state of defined systems. These alarms can alert an administrator to a condition that needs attention. Based on the configuration of the alarm, an automated follow-up action can be initialized. When a virtual machine is being monitored, such as in this question, a notification email can be sent, a notification trap can be sent, a script can be run, a VM can be powered on or off, and a VM can be suspended or reset. Answers B and D are incorrect because they are not follow-up actions that can configure an alarm for a virtual machine.

16.  D. When creating and configuring a virtual network with vSwitches, you need to understand that ESX Server hosts have some limitations. They include the following:

       • No more than 4096 ports

       • No more than 1016 ports per vSwitch

       • No more than 512 virtual switch port groups

       • No more than 127 vSwitches

       Consequently, answer D is correct and answers A, B, and C are incorrect.

17.  A, B. A number of default roles created during an ESX Server 3.5 host installation are designed to assist in securing the host. These roles provide an administrative way to efficiently assign one or more privileges to a user or group. The default roles are Administrator, No Access, and Read-only. A Virtual Center 2.5 installation uses these same three roles with a host of others, including Virtual Machine Administrator and Virtual Machine User. Answers C and D are incorrect.

18. D. When you are installing VirtualCenter 2.5, it is important to have a database server that complies with the requirements of VC. VirtualCenter 2.5 supports the following databases: Microsoft SQL Server 2005 Express; Microsoft SQL Server 2000 Standard SP4 and Enterprise; Microsoft SQL Server 2005 Enterprise SP1, SP2, and Express; and Oracle 9iR2 or Oracle 10gR1 or R2. The only selection that meets one of these requirements is D. The other answers, A, B, and C, are not supported databases.

19.  C. A virtual machine in a VI3 environment can have one, two, or four virtual CPUs. It cannot have three virtual CPUs. Answers A, B, and C are possible and therefore incorrect.

20.  D. The only user who has full permissions to a newly installed ESX Server 3.5 host is the root user. Administrator is a role that you can assign users or groups postinstallation. Admin and the user who installed the host do not have any permission to the host by default. Answers A, B, and C are incorrect.

21.  A. The ESX Server and the virtual machines that are guests of the server are managed by the Service Console. The Service Console on an ESX Server is the equivalent of a server operating system. The VC, or VirtualCenter, is a Windows-based management tool for managing all enterprise ESX Servers. Answer B is incorrect. VMware’s Virtual Infrastructure Client, also known as VIC, lets you connect to a VirtualCenter Server or an ESX Server from a Windows workstation. VIC is a 32-bit Windows application. Answer C is incorrect. SMP, VMware’s Virtual Symmetric Multi-Processing, is a VMware solution for providing multiple virtual CPUs to virtual machines. Answer D is incorrect.

22.  B, D. When an ESX Server 3.5 is installed, two interacting components are installed. They are the Service Console and the VMkernel. The VMkernel provides the virtualization layer on bare metal hardware. The Service Console manages access to the physical hardware by installed virtual machines. Three functions of the VMkernel are virtual switch processing of data, scheduling CPU time, and management of memory. Answers A and C are incorrect. The VMkernel does not manage SSH or convert a physical machine to a virtual machine.

23.  A. When a virtual machine is created, a number of files are created that serve specific purposes. They include the configuration file, which has a .vmx extension. The other extensions listed represent files that are not configuration files for a VM. Answers B, C, and D are incorrect.

24.  D. The Alt+Ctrl+Del keystroke sequence can be sent to a VM using either a menu option or by using the Alt+Ctrl+Ins keystroke combination. This initiates the login process on a Windows VM. Answers A, B, and C do not accomplish this.

25.  A. RAID, Redundant Array of Independent (Inexpensive) Disks, is often used in a VI3 environment as the platform from which LUNs are defined. A number of RAID levels are common. One of the most common is RAID 0, which provides disk striping but no fault tolerance. The other answers—B, C, and D—provide a level of fault tolerance and so are incorrect.

26.  C, D. In the VI3 suite, a grace period exists during which all hosts will continue to function without interruption should a centralized license server fail. Certain features are available during this grace period, and some are available after the grace period if you are not able to restore the license server in the allotted time period. After the grace period, some capabilities are classified by VMware as restricted operations, if a license server is not restored. They include adding and removing a license key, adding and removing a host from a cluster, and adding an ESX Server 3.5 host. Answers A and B are not classified as restricted operations because they are tasks that can be performed during the grace period.

27.  B. RAID, Redundant Array of Independent (Inexpensive) Disks, is often used in a VI3 environment as the platform from which LUNs are defined. A number of RAID levels are common. One of the most common is RAID 1, which provides disk mirroring (mirrored arrays) and disk duplexing. In a RAID 1 environment, you typically have two drives that are mirrored. With these two mirrored drives, your practical storage is 50% of the total amount of disk space. In this question, that means that you have 1TB of practical storage. Answers A, C, and D are incorrect because they do not accurately reflect the practical storage capacity.

28.  A. A logical arrangement of disk space that is allocated from multiple physical disks is a LUN, a Logical Unit Number. Answers B, C, and D are not correct because they do not meet the definition.

29.  D. The two major components of the VI3 suite are the ESX Server and the VirtualCenter. The features that come with the suite are categorized under these two components. One of the features of the Virtual Center is HA. The other answers are features of the ESX Server. Therefore, answers A, B, and C are incorrect.

30.  A, C. A logical arrangement of disk space that is allocated from multiple physical disks is a LUN, a Logical Unit Number. VMware defines one of two schemes as an Adaptive Scheme. The benefits of the Adaptive Scheme are there is less need for an SAN Administrator, virtual disks can be easily resized, snapshot management is facilitated, and volume management is easier. The other options in answers B and D are incorrect because they are not benefits of the Adaptive Scheme.

31.  D. VC, the VirtualCenter 2.5, is a Windows-based management tool for managing all enterprise ESX Servers. There are several minimum requirements for installing the VC. The minimum platform requirement includes Windows Server 2003 SP1, Windows Server 2003 R2, Windows XP Pro SP2, and Windows 2000 Server with SP4. Answer D is the only correct response. Windows XP Home is not supported. Answers A, B, and C are incorrect; they do not meet the minimum platform requirements for installing the VirtualCenter 2.5.

32.  A. When the Performance tab is selected for a host or VM in VirtualCenter 2.5, the default view displayed is CPU consumption. The other choices are configurable options that can be displayed but are not the displayed in the default view. Answers B, C, and D are therefore incorrect.

33.  D. The default number of ports created with a virtual switch is 64. Only 56 ports are shown in the interface, and only 56 are available. Eight of the ports not shown are reserved for the VMkernel. Answers A, B, and C are not correct because they do not reflect the correct number of ports assigned by default to vSwitch.

34.  D. The maximum amount of memory that you can allocate to the Service Console on an ESX Server 3.5 host is 800MB. Answers A, B, C, E, and F are incorrect.

35.  B, C, D. A license built on the per processor basis activates a feature based on the number of processors on the host. According to VMware, a dual-core or quad-core processor counts as a single processor despite the fact that multiple processing units exist on each of these chips. Because, in this question, 8 licenses exist on a per processor basis, answers B, C, and D are correct because these configurations have a need for 8 or fewer licenses because 8 or fewer processors are installed. Answer A is incorrect because 16 processors are installed.

36.  D. One of the licensing models available when installing an ESX Server 3.5 host is the Server Based Model. In this model, licenses are centrally managed through a license server, and when a host needs a license, it looks to the license server, which allocates the necessary license from a license pool. The licenses stored on a license server are found in the file system at C:Program FilesVMWareVMWare License ServerLicenses. Answer A is correct if the Host Based Model for licensing is used. Answers B and C are incorrect for either Host Based or Server Based licensing.

37.  A. In a VI3 environment, the three types of virtual switches are Internal, Single Adapter, and Multiadapter types. There are no Loopback Switches. Answers B, C, and D are incorrect because they are types of switches.

38.  D. In a VI3 environment, the three types of virtual switches are Internal, Single Adapter, and Multiadapter types. Another name for Multiadapter virtual switches is NIC teaming. In NIC teaming, two or more physical NICs support a virtual switch. Answers A, B, and C are not NIC teaming configurations.

39.  A. By configuring a NIC team using the NIC Teaming tab, you configure the NIC team to use a Rolling Failover policy of NO. With this setting, the NIC team provides a failover policy and a failback policy. Answers B, C, and D are not true statements and are incorrect.

40.  A. VMware’s Virtual Infrastructure Client, also known as VIC, lets you connect to a VirtualCenter Server or an ESX Server from a Windows workstation. VIC is a 32-bit Windows application. Only answer A is correct. Answer B is a 64-bit Windows operating system. Answers C and D are Linux operating systems. Answers B, C, and D are therefore incorrect.

41.  A. Several key ports are important when configuring a firewall on an ESX Server; they include Port 902, which authenticates traffic from the VirtualCenter to an ESX Server 3.5. Port 22 controls transmission to the SSH client, so Answer B is incorrect. Port 443 controls secure web browser transmissions, so Answer C is incorrect. Port 27000 is a license server port that is used when the VirtualCenter is incorporated into the Enterprise, so Answer D is incorrect.

42.  B. When creating and configuring a virtual network with vSwitches, you need to understand that ESX Server hosts have some limitations. They include the following:

       • No more than 4096 ports

       • No more than 1016 ports per vSwitch

       • No more than 512 virtual switch port groups

       • No more than 127 vSwitches

       Consequently, answer B is correct and answers A, C, and D are incorrect.

43.  B. A vmxnet adapter is a high-performance network interface that is configured inside an ESX Server 3.5 virtual machine, such as a Windows XP SP2 guest that has VMware Tools installed. A NIC team is a single communication channel that is logical in nature. It is made up of multiple physical ports. Answer A is incorrect. A virtual switch is a switch found in the VMkernel used for managing virtual machine traffic. Answer C is incorrect. The VMkernel port is a special virtual switch port that is used for features such as VMotion. It is configured with an IP address. Answer D is incorrect.

44.  A. Four generic storage options are available to an ESX Server 3.5 host in a VI3 environment. They are Local Storage, iSCSI Storage, Fiber Channel Storage, and Network Attached Storage. Removable Disk Storage is not an option defined by VMware. Answers B, C, D, and E are incorrect because they are available options.

45.  C. The best, most efficient, and reliable storage area network solution for a VI3 environment is Fiber Channel. iSCSI and NAS are competitive, but they are still not rated as better, more efficient, and reliable than Fiber Channel. Local Storage in its purest form is not a storage area network.

46.  B. When a license is purchased for the VI3 suite, it can be built on either a per processor or per instance basis. A license built on the per processor basis activates a feature based on the number of processors on the host. A license built on the per instance basis activates an instance of a feature no matter how many processors are on the host. VI3 products available on a per processor basis are the ESX Server, VirtualCenter Agent, VMotion, Storage VMotion, Consolidate Backup, DRS, HA, and DPM. The only VI3 product available on a per instance basis is the VirtualCenter 2.5. Answers A, C, and D are features licensed on a per processor basis.

47.  A. The process of hiding specific LUNs from ESX Server 3.5 hosts is called LUN masking. LUN zoning is a different process used in Fiber Channel networks to facilitate communication. Answers B, C, and D are incorrect because either they are used for a different reason in a SAN or are not terms used in SAN configuration.

48.  D. ESX Server 3.5 supports a maximum of 16 host bus adapters per system and a maximum of 15 devices or targets per HBA in relationship to a Fiber Channel SAN solution in a VI3 environment. Answers A, B, and C are not true statements.

49.  A, C. In a VI3 environment, a SAN using multipathing has two types of multipathing available: Fixed and MRU (Most Recently Used). There is no Flexible or LRU multipathing types. Therefore, Answers B and D are incorrect.

50.  B. When you download a copy of ESX Server 3.5 for evaluation, you have the option of evaluating the software before purchasing a full license. You have access to all the features during the evaluation period. After the evaluation period is up, you must purchase a license if you want to continue running the server. The evaluation time frame is 60 days. In software sales, this is called a Time Bombed version of the software. Answers A, C, and D are incorrect. Many other software products give you 30, 90, or 120 days to evaluate the product. VMware gives you 60 days.

51.  D. When you are doing an installation of VirtualCenter 2.5 in an enterprise, the correct order of component installation is critical if you want to avoid as many issues as possible. The order recommended by VMware is 1-Database Server, 2-License Server, 3-VC Server, and finally 4-VIC. Answers A, B, and C do not reflect the order recommended by VMware to avoid installation issues.

52.  A. The maximum number of hosts that can be supported by a resource pool in a VI3 environment is 32. Answers B, C, and D are incorrect because they do not reflect the correct maximum.

53.  C. By default, the balloon driver on an ESX system is configured to consume 65% of the memory of a virtual machine. Answers A, B, D, and E are incorrect.

54.  A. In VirtualCenter 2.5, the system logs are held in the vpxd-index file. Answers B, C, and D are not files that hold the system logs for VirtualCenter 2.5 and are therefore not correct.

55.  B, D. There are two ways to create a template from a fully configured and installed VM. You can right-click on the VM and select either Clone to a Template or Convert to a Template. There are no options named Copy to a Template or Export to a Template. Therefore, answers A and C are incorrect.

56.  A, C. When you are configuring an alarm for an entity or resource in a VI3 environment, one of the configuration steps is to select the type of trigger the alarm will monitor. The two general types of triggers are State and Usage. Based on whether you select a State or Usage trigger, the available conditions change. There are no options for Dynamic or Static trigger types, so answers B and D are incorrect.

57.  A, D. VMware Converter Enterprise is a tool that extends the capabilities of VirtualCenter 2.5. With it, you can convert a physical machine to a virtual machine, and a virtual machine to a virtual machine. You can also export an ESX VM to another format. There are also other benefits to using Converter Enterprise. You cannot convert a virtual machine to a physical machine or move a VM from one host to another. That is task that is well managed by VMotion. Answers B and C are incorrect.

58.  A, B, C. There are four prerequisites for installing the VMware Converter Enterprise: Server, CLI, Agent, and Client Plug-in. There is no recommended RAM requirement for this add-on. Answer D is incorrect.

59.  D. The prerequisites for the source and destination hosts if you are going to use VMotion include compatible CPUs, gigabit network, access to the same physical networks, and virtual switches that are labeled the same. Answers A, B, and C do not meet the prerequisites and are incorrect.

60.  B. After you begin using VMotion, the wizard displays messages, which can be warnings or errors. Warnings address issues you need to consider but do not prevent the process from completing successfully, whereas errors prevent the migration from completing successfully and need to be addressed. The only message that falls under the error category in this question is B—a VM is connected to an internal vSwitch on the source host. The other messages are warnings. Answers A, C, and D are incorrect.

61.  B. When you are assigning shares to a VM, four options are available: High, Normal, Low, and Custom. Each option reflects a number of CPU or Memory shares derived by calculation. When you are calculating CPU shares, the Normal option is selected if your calculation is 1000 * (# of vCPUs). Answers A, C, and D are incorrect.

62.  A. You have DRS in your VI3 environment. Several DRS rules govern whether two VMs can exist on the same host at the same time. They include Affinity and Anti-Affinity. Affinity requires that two virtual machines be kept together on the same host, and Anti-Affinity requires that two virtual machines be kept on separate servers. Answers B, C, and D are incorrect. Availability and Anti-Availability are not DRS rules.

63.  C. In the VI3 suite, alarms are used when monitoring resource usage and the state of defined systems. These alarms can alert an administrator to a condition that needs attention. Based on the configuration of the alarm, an automated follow-up action can be initialized. When a virtual machine is being monitored, such as in this question, several actions can be taken based on one or more state changes. Alerts are red, warnings are yellow, and safe/normal operating state is green. The state changes that trigger an action are Green to Yellow, Yellow to Red, Red to Yellow, and Yellow to Green. There is no option for Red to Green. Answers A, B, and D are options available on the Actions tab.

64.  C, D. A resource pool in a VI3 environment is a container created in Hosts and Clusters view used to limit the host CPU and memory utilization for a group of virtual machines. The two entities that you can configure when you create a resource pool are CPU Resources and Memory Resources. You cannot configure I/O Resources or Network Resources. Answers A and B are incorrect.

65.  C. When an ESX Server 3.5 host is installed, it, by default, processes the first 128 LUNs that are present and to which it has access. Answers A, B, and D are not correct.

66.  D. In a Fiber Channel SAN, the host bus adapter has an address that is made up of 64 bits. Answers A, B, and C are incorrect.

67.  F. Three industry-accepted topologies for a Fiber Channel SAN are Point-to-Point, Switched Fabric, and Arbitrated Loop. The industry-accepted topology for a Fiber Channel SAN that is considered the most common and offers the most functionality is the Switched Fabric topology. All other answers are incorrect.

68.  A, D. There are differences between physical and virtual switches. They include the following: virtual switches do not support STP, and each virtual switch has a unique forwarding data table. Answers B and C are incorrect because they do not correctly reflect differences between physical and virtual switches.

69.  A, D. By default, the root user is not granted SSH access to an ESX Server 3.5 host. There are two ways to overcome this limitation. The first is to create a user account on the server that root can use for SSH access. The second is to modify the PermitRootLogin parameter in the appropriate configuration file from No to Yes. Answers B and C are incorrect because they are not ways to grant root SSH access or are false statements.

70.  D. The correct representation of an iSCSI node ID generically is iqn.year-month.<domain name reversed>:<alternate name>. The other choices do not follow the naming schema used for an iSCSI node ID. Answers A, B, C, E, and F are incorrect.

71.  B, C. In the VI3 suite, alarms are used when monitoring resource usage and the state of defined systems. These alarms can alert an administrator to a condition that needs attention. Based on the configuration of the alarm, an automated follow-up action can be initialized. One of the tabs that requires configuration when you are creating an alarm is the Reporting tab. On this tab, you can define an alarm’s Tolerance and Frequency. Tolerance is defined as a percentage, and Frequency is defined in seconds. Answers A and D are not options available on the Reporting tab.

72.  A, B. A resource pool in a VI3 environment is a container created in Hosts and Clusters view used to limit the host CPU and memory utilization for a group of virtual machines. A resource pool can be created on a standalone host or on a DRS cluster as a management object. A resource pool cannot be created on a VM or on a VC server. Answers C and D are incorrect.

73.  C. When you are planning an ESX Server 3.5 installation and deployment, it is important to know some of the maximums that you can configure. One important one is the maximum RAM you have per host. The maximum is 256GB. Answers A, B, and D are incorrect.

74.  D. Three ESX Server 3.5 editions are available: Enterprise, Standard, and Foundation. The VMware HA feature is available only on the Enterprise and Standard editions. Answers A, B, C, and E are incorrect because they do not correctly represent the editions on which VMware HA is available.

75.  B, C. To access the Web Access interface on a VirtualCenter Server, you need a Windows or Linux computer, an IP address, and a web browser. The required web browsers are IE 6.0 or later on a Windows computer, Netscape Navigator 7.0 or later, Mozilla 1.x or later, and Firefox 1.0.7 or later. The correct responses are an IP address and Firefox 1.0.7. The other responses do not meet the requirements. Therefore, answers A, D, and E are incorrect.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
52.14.76.12