Deck 8: Working With Vmware Vcenter Server

ملء الشاشة (f)
exit full mode
سؤال
What type of migration involves a virtual machine that is powered off to a different shared data store or data store that is accessible by only one host?

A) suspended migration
B) cold migration
C) Storage vMotion migration
D) Enhanced vMotion migration
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A VMFS iSCSI based data store can't be dynamically expanded due to the nature of the VMFS file system structure.
سؤال
What statement regarding the vpxa process is accurate?

A) The vpxa process is responsible for managing most of the operations on the ESXi host.
B) The vpxa process controls access to the virtual machines and storage volumes on an ESXi host.
C) The vpxa process serves as an intermediary between the vpxd process and the hostd process.
D) The vpxa process communicates commands from the vSphere client to the hostd process.
سؤال
You are attempting to migrate a virtual machine to a different host. The new host has an Intel processor, while the old host has an AMD processor. What type of migration must be performed?

A) cold migration
B) suspended migration
C) vMotion migration
D) Enhanced vMotion migration
سؤال
What guest operating system information does not typically require modification when creating a template?

A) The guest OS hostname
B) The guest OS network settings
C) The guest OS license settings
D) The guest OS partition layout
سؤال
What kind of migration allows a powered-on virtual machine to be moved to a new data store?

A) cold migration
B) suspended migration
C) Storage vMotion migration
D) Enhanced vMotion migrtion
سؤال
What statement regarding the use of iSCSI extents is accurate?

A) Extents can be added to any VMFS data store, up to 16 extents per data store.
B) An extent can be resized at will, provided there is adequate storage available.
C) A VMFS data store that is created on an extent cannot be resized.
D) A VMFS data store can be expanded as long as there is free space available in the extent.
سؤال
After removing a static software based iSCSI target, you discover hours later that the target has been returned to the list of targets. What is the most likely cause?

A) The static target was added via dynamic discovery, and a rescan operation has re-added it.
B) The static target cannot be removed without deleting all associated data stores utilized by the host.
C) You do not have the proper permissions to remove a static target, causing the job to remove the target to fail.
D) The iSCSI initiator cannot remove a target that has been configured by vCenter Server for use on the host.
سؤال
After a virtual machine that has been moved using vMotion comes online, what method is used to notify a network segment that the MAC address for the VM's IP address is now on a different port?

A) The MAC address aging timer must expire, after which a learning period occurs, and the MAC is registered on the new port.
B) A RARP request is sent to notify the network that the MAC is now on a new port.
C) The host forces the network switch to clear it's MAC address table so that the MAC is flooded out all ports.
D) A multicast packet is sent to notify the network of the change.
سؤال
Implementing vCenter Server as a stand-alone Linux appliance still requires an Active Directory domain controller.
سؤال
What is a valid step that should be taken to make using iSCSI technology on a network more secure?

A) The iSCSI traffic should be encrypted using CHAP.
B) The iSCSI traffic should be isolated to a dedicated and separate network.
C) The network should make use of hardware based iSCSI instead of software based iSCSI.
D) The network switches used for the SAN should be iSCSI aware such that they properly hide iSCSI traffic.
سؤال
The vCenter Server Linux appliance has a built-in PostgreSQL database that can be used instead of a Microsoft SQL server.
سؤال
Some VMware license keys can be split by applying them to multiple assets. For example, a four-CPU license can be split by applying it to 2 two-CPU hosts.
سؤال
When creating a cluster of ESXi hosts, what option can be used to increase performance of virtual machines on the cluster by balancing processing loads between hosts?

A) Clustered Computing Service (CCS)
B) Distributed Resource Scheduler (DRS)
C) Shared Process Threading (SPT)
D) Multi-Host Computing (MHC)
سؤال
You would like to migrate a powered on virtual machine to a new data store and a new host. What type of migration should you use?

A) cold migration
B) suspended migration
C) vMotion migration
D) enhanced vMotion
سؤال
What happens when ESXi hosts are put into lockdown mode?

A) No users are able to log into ESXi hosts, they must authenticate with vCenter Server.
B) No users are able to log into ESXi hosts through vCenter, they must log in directly.
C) The ESXi internal firewall is enabled, and only approved IPs in an access list can access the server.
D) The ESXi server no longer allows virtual machine modifications or changes in running state.
سؤال
What process is responsible for managing most of the operations on an ESXi host?

A) vpxa
B) hostd
C) vpxd
D) kernd
سؤال
What is a disadvantage of utilizing a Storage Area Network (SAN) over a Network Attached Storage (NAS)?

A) A typical NAS has better performance than a SAN.
B) A SAN lacks the more advanced features of a NAS.
C) A SAN is more costly to implement.
D) A SAN cannot make use of the iSCSI protocol.
سؤال
What is the maximum number of extents that can be added to any VMFS data store?

A) 8
B) 16
C) 32
D) 64
سؤال
When you are logged on to the vCenter Server system using the Web Client, vCenter Server passes commands to the ESXi host through the vpxa process.
سؤال
Match between columns
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
Challenge Handshake Authentication Protocol (CHAP)
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
dynamic discovery
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
Embedded Platform Services Controller
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
extent
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
External Platform Services Controller
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
host bus adapter (HBA)
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
software iSCSI initiator
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
static discover
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
thin-provisioned
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
role
A hardware based iSCSI initiator.
Challenge Handshake Authentication Protocol (CHAP)
A hardware based iSCSI initiator.
dynamic discovery
A hardware based iSCSI initiator.
Embedded Platform Services Controller
A hardware based iSCSI initiator.
extent
A hardware based iSCSI initiator.
External Platform Services Controller
A hardware based iSCSI initiator.
host bus adapter (HBA)
A hardware based iSCSI initiator.
software iSCSI initiator
A hardware based iSCSI initiator.
static discover
A hardware based iSCSI initiator.
thin-provisioned
A hardware based iSCSI initiator.
role
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
Challenge Handshake Authentication Protocol (CHAP)
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
dynamic discovery
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
Embedded Platform Services Controller
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
extent
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
External Platform Services Controller
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
host bus adapter (HBA)
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
software iSCSI initiator
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
static discover
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
thin-provisioned
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
role
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
Challenge Handshake Authentication Protocol (CHAP)
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
dynamic discovery
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
Embedded Platform Services Controller
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
extent
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
External Platform Services Controller
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
host bus adapter (HBA)
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
software iSCSI initiator
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
static discover
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
thin-provisioned
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
role
The name for when the platform services controller is installed on a separate server from the vCenter Server.
Challenge Handshake Authentication Protocol (CHAP)
The name for when the platform services controller is installed on a separate server from the vCenter Server.
dynamic discovery
The name for when the platform services controller is installed on a separate server from the vCenter Server.
Embedded Platform Services Controller
The name for when the platform services controller is installed on a separate server from the vCenter Server.
extent
The name for when the platform services controller is installed on a separate server from the vCenter Server.
External Platform Services Controller
The name for when the platform services controller is installed on a separate server from the vCenter Server.
host bus adapter (HBA)
The name for when the platform services controller is installed on a separate server from the vCenter Server.
software iSCSI initiator
The name for when the platform services controller is installed on a separate server from the vCenter Server.
static discover
The name for when the platform services controller is installed on a separate server from the vCenter Server.
thin-provisioned
The name for when the platform services controller is installed on a separate server from the vCenter Server.
role
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
Challenge Handshake Authentication Protocol (CHAP)
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
dynamic discovery
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
Embedded Platform Services Controller
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
extent
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
External Platform Services Controller
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
host bus adapter (HBA)
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
software iSCSI initiator
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
static discover
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
thin-provisioned
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
role
A way to make the most of your data store capacity by allowing for overallocation.
Challenge Handshake Authentication Protocol (CHAP)
A way to make the most of your data store capacity by allowing for overallocation.
dynamic discovery
A way to make the most of your data store capacity by allowing for overallocation.
Embedded Platform Services Controller
A way to make the most of your data store capacity by allowing for overallocation.
extent
A way to make the most of your data store capacity by allowing for overallocation.
External Platform Services Controller
A way to make the most of your data store capacity by allowing for overallocation.
host bus adapter (HBA)
A way to make the most of your data store capacity by allowing for overallocation.
software iSCSI initiator
A way to make the most of your data store capacity by allowing for overallocation.
static discover
A way to make the most of your data store capacity by allowing for overallocation.
thin-provisioned
A way to make the most of your data store capacity by allowing for overallocation.
role
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
Challenge Handshake Authentication Protocol (CHAP)
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
dynamic discovery
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
Embedded Platform Services Controller
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
extent
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
External Platform Services Controller
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
host bus adapter (HBA)
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
software iSCSI initiator
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
static discover
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
thin-provisioned
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
role
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
Challenge Handshake Authentication Protocol (CHAP)
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
dynamic discovery
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
Embedded Platform Services Controller
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
extent
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
External Platform Services Controller
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
host bus adapter (HBA)
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
software iSCSI initiator
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
static discover
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
thin-provisioned
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
role
A partition on a storage device (called a LUN in iSCSI terminology).
Challenge Handshake Authentication Protocol (CHAP)
A partition on a storage device (called a LUN in iSCSI terminology).
dynamic discovery
A partition on a storage device (called a LUN in iSCSI terminology).
Embedded Platform Services Controller
A partition on a storage device (called a LUN in iSCSI terminology).
extent
A partition on a storage device (called a LUN in iSCSI terminology).
External Platform Services Controller
A partition on a storage device (called a LUN in iSCSI terminology).
host bus adapter (HBA)
A partition on a storage device (called a LUN in iSCSI terminology).
software iSCSI initiator
A partition on a storage device (called a LUN in iSCSI terminology).
static discover
A partition on a storage device (called a LUN in iSCSI terminology).
thin-provisioned
A partition on a storage device (called a LUN in iSCSI terminology).
role
سؤال
How is authorization in vCenter Server handled?
سؤال
What term is used to describe the ability to perform a specific action or read a specific property in vCenter Server?

A) privilege
B) role
C) ability
D) trait
سؤال
What is NOT a part of the VMware platform services component of vCenter Server?

A) vCenter Single Sign On
B) License service
C) Lookup service
D) Inventory database service
سؤال
How do the hostd, vpxa, and vpxd processes interact with each other?
سؤال
Describe the differences between a hardware based initiator and a software based initiator.
سؤال
What are the steps undertaken by an initiator in order to connect to an iSCSI target?
سؤال
While adding a new ESXi host and configuring a NAT adapter, you receive a warning that one or more hosts have no assigned physical network adapters. What should be done?

A) The host has no compatible network adapters, so a dedicated supported adapter should be installed.
B) The "Assign uplink" icon should be selected after the NAT network adapter is added.
C) The vswitch0 virtual switch on the host has no configured adapters.
D) The host's vmnet8 interface is not configured.
سؤال
What term is used to describe the top most object in the vCenter Server inventory?

A) head node
B) root object
C) primary branch
D) top host
سؤال
Smaller organizations can use which of the following vCenter Server's built in database to manage data center objects?

A) Oracle DB
B) Microsoft SQL Server
C) PostgreSQL Server
D) MySQL Server
سؤال
What statement regarding the use of lockdown mode is accurate?

A) The root user is still able to log in via the DCUI console.
B) The vCLI and DCUI options are still available for use by any user.
C) A user may access ESXi hosts individually as long as they are members of the "Local Admins" role.
D) The lockdown mode only affects the use of the vCLI.
سؤال
During installation, the vCenter Server appliance sets up a Single Sign On account using what username?

A) root@domain_name
B) manager@domain_name
C) administrator@domain_name
D) admin@domain_name
سؤال
What is the difference between a privilege and a role?
سؤال
What statement regarding the vCenter Server hardware requirements is accurate?

A) vCenter Server requires a minimum of 8 GB of RAM.
B) vCenter Server requires two CPU cores minimum.
C) vCenter Server requires 240 GB IDE drive space
D) vCenter Server requires two 100 Mbps Ethernet controllers
سؤال
What are the two major components that make up the vCenter Server system?
سؤال
When using the VMware vSphere Web Client, what three items are used to display license information?
سؤال
What is used by CHAP to verify the identity of a host?

A) A three way handshake and private keys
B) host certificates
C) network MAC address database
D) Pre-approved host list
سؤال
What are the two supported methods of iSCSI target discovery on ESXi hosts?
سؤال
What are the two major ways in which the vCenter Server can be implemented?
سؤال
What is NOT a part of the VMware vCenter services component of vCenter Server?

A) Web Client
B) Inventory database service
C) Auto Deploy service
D) VMware Certificate Authority
سؤال
How is CHAP utilized to provide authentication for the iSCSI technology?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/41
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Working With Vmware Vcenter Server
1
What type of migration involves a virtual machine that is powered off to a different shared data store or data store that is accessible by only one host?

A) suspended migration
B) cold migration
C) Storage vMotion migration
D) Enhanced vMotion migration
B
2
A VMFS iSCSI based data store can't be dynamically expanded due to the nature of the VMFS file system structure.
False
3
What statement regarding the vpxa process is accurate?

A) The vpxa process is responsible for managing most of the operations on the ESXi host.
B) The vpxa process controls access to the virtual machines and storage volumes on an ESXi host.
C) The vpxa process serves as an intermediary between the vpxd process and the hostd process.
D) The vpxa process communicates commands from the vSphere client to the hostd process.
C
4
You are attempting to migrate a virtual machine to a different host. The new host has an Intel processor, while the old host has an AMD processor. What type of migration must be performed?

A) cold migration
B) suspended migration
C) vMotion migration
D) Enhanced vMotion migration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
5
What guest operating system information does not typically require modification when creating a template?

A) The guest OS hostname
B) The guest OS network settings
C) The guest OS license settings
D) The guest OS partition layout
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
6
What kind of migration allows a powered-on virtual machine to be moved to a new data store?

A) cold migration
B) suspended migration
C) Storage vMotion migration
D) Enhanced vMotion migrtion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
7
What statement regarding the use of iSCSI extents is accurate?

A) Extents can be added to any VMFS data store, up to 16 extents per data store.
B) An extent can be resized at will, provided there is adequate storage available.
C) A VMFS data store that is created on an extent cannot be resized.
D) A VMFS data store can be expanded as long as there is free space available in the extent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
8
After removing a static software based iSCSI target, you discover hours later that the target has been returned to the list of targets. What is the most likely cause?

A) The static target was added via dynamic discovery, and a rescan operation has re-added it.
B) The static target cannot be removed without deleting all associated data stores utilized by the host.
C) You do not have the proper permissions to remove a static target, causing the job to remove the target to fail.
D) The iSCSI initiator cannot remove a target that has been configured by vCenter Server for use on the host.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
9
After a virtual machine that has been moved using vMotion comes online, what method is used to notify a network segment that the MAC address for the VM's IP address is now on a different port?

A) The MAC address aging timer must expire, after which a learning period occurs, and the MAC is registered on the new port.
B) A RARP request is sent to notify the network that the MAC is now on a new port.
C) The host forces the network switch to clear it's MAC address table so that the MAC is flooded out all ports.
D) A multicast packet is sent to notify the network of the change.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
10
Implementing vCenter Server as a stand-alone Linux appliance still requires an Active Directory domain controller.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
11
What is a valid step that should be taken to make using iSCSI technology on a network more secure?

A) The iSCSI traffic should be encrypted using CHAP.
B) The iSCSI traffic should be isolated to a dedicated and separate network.
C) The network should make use of hardware based iSCSI instead of software based iSCSI.
D) The network switches used for the SAN should be iSCSI aware such that they properly hide iSCSI traffic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
12
The vCenter Server Linux appliance has a built-in PostgreSQL database that can be used instead of a Microsoft SQL server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
13
Some VMware license keys can be split by applying them to multiple assets. For example, a four-CPU license can be split by applying it to 2 two-CPU hosts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
14
When creating a cluster of ESXi hosts, what option can be used to increase performance of virtual machines on the cluster by balancing processing loads between hosts?

A) Clustered Computing Service (CCS)
B) Distributed Resource Scheduler (DRS)
C) Shared Process Threading (SPT)
D) Multi-Host Computing (MHC)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
15
You would like to migrate a powered on virtual machine to a new data store and a new host. What type of migration should you use?

A) cold migration
B) suspended migration
C) vMotion migration
D) enhanced vMotion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
16
What happens when ESXi hosts are put into lockdown mode?

A) No users are able to log into ESXi hosts, they must authenticate with vCenter Server.
B) No users are able to log into ESXi hosts through vCenter, they must log in directly.
C) The ESXi internal firewall is enabled, and only approved IPs in an access list can access the server.
D) The ESXi server no longer allows virtual machine modifications or changes in running state.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
17
What process is responsible for managing most of the operations on an ESXi host?

A) vpxa
B) hostd
C) vpxd
D) kernd
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
18
What is a disadvantage of utilizing a Storage Area Network (SAN) over a Network Attached Storage (NAS)?

A) A typical NAS has better performance than a SAN.
B) A SAN lacks the more advanced features of a NAS.
C) A SAN is more costly to implement.
D) A SAN cannot make use of the iSCSI protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
19
What is the maximum number of extents that can be added to any VMFS data store?

A) 8
B) 16
C) 32
D) 64
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
20
When you are logged on to the vCenter Server system using the Web Client, vCenter Server passes commands to the ESXi host through the vpxa process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
21
Match between columns
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
Challenge Handshake Authentication Protocol (CHAP)
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
dynamic discovery
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
Embedded Platform Services Controller
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
extent
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
External Platform Services Controller
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
host bus adapter (HBA)
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
software iSCSI initiator
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
static discover
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
thin-provisioned
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
role
A hardware based iSCSI initiator.
Challenge Handshake Authentication Protocol (CHAP)
A hardware based iSCSI initiator.
dynamic discovery
A hardware based iSCSI initiator.
Embedded Platform Services Controller
A hardware based iSCSI initiator.
extent
A hardware based iSCSI initiator.
External Platform Services Controller
A hardware based iSCSI initiator.
host bus adapter (HBA)
A hardware based iSCSI initiator.
software iSCSI initiator
A hardware based iSCSI initiator.
static discover
A hardware based iSCSI initiator.
thin-provisioned
A hardware based iSCSI initiator.
role
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
Challenge Handshake Authentication Protocol (CHAP)
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
dynamic discovery
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
Embedded Platform Services Controller
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
extent
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
External Platform Services Controller
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
host bus adapter (HBA)
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
software iSCSI initiator
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
static discover
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
thin-provisioned
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
role
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
Challenge Handshake Authentication Protocol (CHAP)
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
dynamic discovery
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
Embedded Platform Services Controller
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
extent
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
External Platform Services Controller
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
host bus adapter (HBA)
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
software iSCSI initiator
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
static discover
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
thin-provisioned
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
role
The name for when the platform services controller is installed on a separate server from the vCenter Server.
Challenge Handshake Authentication Protocol (CHAP)
The name for when the platform services controller is installed on a separate server from the vCenter Server.
dynamic discovery
The name for when the platform services controller is installed on a separate server from the vCenter Server.
Embedded Platform Services Controller
The name for when the platform services controller is installed on a separate server from the vCenter Server.
extent
The name for when the platform services controller is installed on a separate server from the vCenter Server.
External Platform Services Controller
The name for when the platform services controller is installed on a separate server from the vCenter Server.
host bus adapter (HBA)
The name for when the platform services controller is installed on a separate server from the vCenter Server.
software iSCSI initiator
The name for when the platform services controller is installed on a separate server from the vCenter Server.
static discover
The name for when the platform services controller is installed on a separate server from the vCenter Server.
thin-provisioned
The name for when the platform services controller is installed on a separate server from the vCenter Server.
role
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
Challenge Handshake Authentication Protocol (CHAP)
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
dynamic discovery
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
Embedded Platform Services Controller
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
extent
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
External Platform Services Controller
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
host bus adapter (HBA)
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
software iSCSI initiator
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
static discover
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
thin-provisioned
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
role
A way to make the most of your data store capacity by allowing for overallocation.
Challenge Handshake Authentication Protocol (CHAP)
A way to make the most of your data store capacity by allowing for overallocation.
dynamic discovery
A way to make the most of your data store capacity by allowing for overallocation.
Embedded Platform Services Controller
A way to make the most of your data store capacity by allowing for overallocation.
extent
A way to make the most of your data store capacity by allowing for overallocation.
External Platform Services Controller
A way to make the most of your data store capacity by allowing for overallocation.
host bus adapter (HBA)
A way to make the most of your data store capacity by allowing for overallocation.
software iSCSI initiator
A way to make the most of your data store capacity by allowing for overallocation.
static discover
A way to make the most of your data store capacity by allowing for overallocation.
thin-provisioned
A way to make the most of your data store capacity by allowing for overallocation.
role
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
Challenge Handshake Authentication Protocol (CHAP)
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
dynamic discovery
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
Embedded Platform Services Controller
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
extent
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
External Platform Services Controller
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
host bus adapter (HBA)
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
software iSCSI initiator
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
static discover
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
thin-provisioned
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
role
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
Challenge Handshake Authentication Protocol (CHAP)
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
dynamic discovery
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
Embedded Platform Services Controller
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
extent
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
External Platform Services Controller
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
host bus adapter (HBA)
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
software iSCSI initiator
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
static discover
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
thin-provisioned
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
role
A partition on a storage device (called a LUN in iSCSI terminology).
Challenge Handshake Authentication Protocol (CHAP)
A partition on a storage device (called a LUN in iSCSI terminology).
dynamic discovery
A partition on a storage device (called a LUN in iSCSI terminology).
Embedded Platform Services Controller
A partition on a storage device (called a LUN in iSCSI terminology).
extent
A partition on a storage device (called a LUN in iSCSI terminology).
External Platform Services Controller
A partition on a storage device (called a LUN in iSCSI terminology).
host bus adapter (HBA)
A partition on a storage device (called a LUN in iSCSI terminology).
software iSCSI initiator
A partition on a storage device (called a LUN in iSCSI terminology).
static discover
A partition on a storage device (called a LUN in iSCSI terminology).
thin-provisioned
A partition on a storage device (called a LUN in iSCSI terminology).
role
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
22
How is authorization in vCenter Server handled?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
23
What term is used to describe the ability to perform a specific action or read a specific property in vCenter Server?

A) privilege
B) role
C) ability
D) trait
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
24
What is NOT a part of the VMware platform services component of vCenter Server?

A) vCenter Single Sign On
B) License service
C) Lookup service
D) Inventory database service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
25
How do the hostd, vpxa, and vpxd processes interact with each other?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
26
Describe the differences between a hardware based initiator and a software based initiator.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
27
What are the steps undertaken by an initiator in order to connect to an iSCSI target?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
28
While adding a new ESXi host and configuring a NAT adapter, you receive a warning that one or more hosts have no assigned physical network adapters. What should be done?

A) The host has no compatible network adapters, so a dedicated supported adapter should be installed.
B) The "Assign uplink" icon should be selected after the NAT network adapter is added.
C) The vswitch0 virtual switch on the host has no configured adapters.
D) The host's vmnet8 interface is not configured.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
29
What term is used to describe the top most object in the vCenter Server inventory?

A) head node
B) root object
C) primary branch
D) top host
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
30
Smaller organizations can use which of the following vCenter Server's built in database to manage data center objects?

A) Oracle DB
B) Microsoft SQL Server
C) PostgreSQL Server
D) MySQL Server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
31
What statement regarding the use of lockdown mode is accurate?

A) The root user is still able to log in via the DCUI console.
B) The vCLI and DCUI options are still available for use by any user.
C) A user may access ESXi hosts individually as long as they are members of the "Local Admins" role.
D) The lockdown mode only affects the use of the vCLI.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
32
During installation, the vCenter Server appliance sets up a Single Sign On account using what username?

A) root@domain_name
B) manager@domain_name
C) administrator@domain_name
D) admin@domain_name
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
33
What is the difference between a privilege and a role?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
34
What statement regarding the vCenter Server hardware requirements is accurate?

A) vCenter Server requires a minimum of 8 GB of RAM.
B) vCenter Server requires two CPU cores minimum.
C) vCenter Server requires 240 GB IDE drive space
D) vCenter Server requires two 100 Mbps Ethernet controllers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
35
What are the two major components that make up the vCenter Server system?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
36
When using the VMware vSphere Web Client, what three items are used to display license information?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
37
What is used by CHAP to verify the identity of a host?

A) A three way handshake and private keys
B) host certificates
C) network MAC address database
D) Pre-approved host list
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
38
What are the two supported methods of iSCSI target discovery on ESXi hosts?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
39
What are the two major ways in which the vCenter Server can be implemented?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
40
What is NOT a part of the VMware vCenter services component of vCenter Server?

A) Web Client
B) Inventory database service
C) Auto Deploy service
D) VMware Certificate Authority
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
41
How is CHAP utilized to provide authentication for the iSCSI technology?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 41 في هذه المجموعة.