100% found this document useful (1 vote)
92 views13 pages

Final Exam

The document contains multiple choice questions about VMware concepts and technologies. It asks about the minimum requirements to install ESXi 7, what VMDK and VMX files are, what vCenter and VMotion enable, and other topics related to virtualization, storage, and VMware infrastructure. The questions have between 1-4 possible answer choices for each.

Uploaded by

M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
92 views13 pages

Final Exam

The document contains multiple choice questions about VMware concepts and technologies. It asks about the minimum requirements to install ESXi 7, what VMDK and VMX files are, what vCenter and VMotion enable, and other topics related to virtualization, storage, and VMware infrastructure. The questions have between 1-4 possible answer choices for each.

Uploaded by

M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

ALL HHE EXAM IS MULTIPLE CHOICES .

CHOICE THE BES ANSWER OR ANSWERS


Q1 What is the minimum memory to install ESXi 7 ?
1. 2 RAM GB of physical RAM at least 3 GB ON VM
2. 4 RAM GB of physical RAM at least 8GB ON VM
3. 1 RAM GB of physical RAM at least 2 GB ON VM
4. 1 AND 2

Q2 What is VMDK file ?


1. is a format specification for virtual machine
2. is STstorage daabase
3. is aclone No
4. no one is correct

Q3 What is vCenter ?
1. esxi hos of virtual machine VM
2. disk of storage
3. centralized management of VMware
4. 1 and 2

Q4 what is enterprise storge ?


1. NAS Storage
2. all of the above
3. SAN Storge
4. DAS Storge

Q5 what is nfs ?
1. is amechanism for storing files on network
2. is amechanism for storing files on disk
3. is amechanism for storing files on windows
4. is amechanism for storing files on linux

Q6 what is vmx file in the VMware ?

1. is a network switch for virtuall machines


2. is a type of storage protocol
3.  contains settings for your virtual machine's behavior
4. 2 and 3

Q7 which from those vmware file type?


1. VMX file
2. VMDK file
3. NVRAM file
4 . all of abve

Q8 what is vmkernel in vmware?


1. NIC of vcentet
2. NIC of pc
3. NIC of esxi host
4. all answer is incorrect

Q9 what is vmotion ?
1 enables the live migration of running virtual machines from one physical server to another with
zero downtime
2 enables the live migration of running virtual machines from one rom   to another network
3. 1 and 2
4. All of above

Q10- What is a snapshot in VMware ?


1. is NVRAM of esxi host of virtual machine
2. copy of the virtual machine's disk file (VMDK) at a given point in time.
3. copy of the virtual machine's  file (VMX) at a given point in time.
4. copy of the virtual machine's network file (NVRAM) at a given point in time.

Q11 what is the DRS on a virtual machine?

1.  the resource scheduling and load balancing solution for vSphere
2. provide the Linux system to change the network adapter
3 all the answer is correct
4. all the answer is. incorrect

Q12 virtual switch types ?


1. virtual standard switch
2. Virtual distributed switch
3. NSX virtual distributed switch
4. 1,2 and 3

Q13 A template typically includes ?


1. A gest operating system
2. vcentet management
3. One or more applications
4. 1 and 3
Q14 which of these it's not vcentet hardware requirements size ?
1.  small
2. x large
3. tiny
4. tall

Q15 what is vmware virtualization type ?


1. Server virtualization
2. 1, 3 and 4
3 storage virtualization
4. network virtualization

Q16 how many Free licenses from vmware?


1. 70 days
2. 60 days
3. 80 days
4. 90 days

Q17 which protocols support storage virtualization?


1. ISCSI
2. PCoE
3. EIGRP
4. 1 and 2

Q18 how many stages to install vcenter ?


1. 2 stages
2. 3 stages
3. 1 stages
4. All of above

Q19 how  do I access vCenter management1. ?


1. ospf
2. web site
3. no one
4.  capwap

Q20 Which service that we can enable in VMkernel Port ?


1. Fault Tolerance
2. Vmotion
3. All answer is correct
4. 1 and 2

Q21 What is the minimum number of hosts a HA cluster can contain ?


1. at least 3 EsXi host 4 is best
2. at least 2 EsXi host 3 is best
3. 1 and 2
4. at least 1 EsXi host 2 is best

Q22. You have three switches connected to VLAN 50. They’re all running
Spanning Tree and have the base MAC addresses: SW1 0010.84b0.ee30, SW2
007c.5d8a.e100, SW3 0084.8ede.fdd0 Which of the following will be the root
for VLAN 50?

1. SW1
2. SW2
3. SW3
4. None of these
Q23. Which of the following is the most scalable physical architecture for
North-South traffic patterns?

1. Leaf-and-spine architecture
2. Two-tier collapsed core
3. Three-tier
4. Routed

Q24. A 100 mW signal increases by about 13 dB. What is the new


approximate power level?

1. 113 mW
2. 1300 mW
3. 2000 mW
4. 2600 mW
Q25. Which of the following must match for OSPF routers to form an
adjacency?

1. OSPF process number


2. MTU
3. network statement
4. Router IDs
Q26. What is the primary purpose of EIGRP’s feasibility condition?

1. Rapid convergence
2. Shortest path selection
5. Loop prevention
3. Route filtering
Q27. How frequently do BGP peers send keepalive messages?

1. 30 seconds
6. 60 seconds
2. 80 seconds
3. 180 seconds

Q28. On a NAT router, which of the following can be an inside global


address? (Choose two.)

7. A loopback interface address


1. An outside local address
2. An inside interface address
8. An outside interface address
Q29. In three-color policing, what does red mean?

1. Packets are violating and will be marked down.


9. Packets are violating and will be dropped.
2. Packets are exceeding and will be marked down.
3. Packets are exceeding and will be dropped.
Q30. What protocol and port does IKE use?

1. UDP/50
2. TCP/50
3. UDP/500
4. TCP/500
Q31 You are the administrator responsible for security and user desktop
settings on your network. You need to configure a custom registry entry for
all users. You want to add the custom registry entry into a Group Policy
object (GPO) with the least amount of administrative effort What should you
do?

(A) Configure an ADM template and add the template to the GPO
(B) Configure an INF policy and add the policy to the GPO

(C) Configure a Microsoft Windows Installer package and add the package to the GPO

(D) Configure RIS to include the registry entry


Q32. You are the administrator of a Windows 2000 Server computer named Intra. Intra is
a member of an Active Directory domain and hosts an Intranet Web-Ske for your
company. Company policy requires that only authenticated users have access to the
intranet site. All company users have a user account in the Active Directory domain. You
configure directory security for the Web Site to use integrated security. However, you
discover that users can access the Web Site without authentication. You need to ensure that
only authenticated users can access the web site. What should you do?

(A) Install Active Directory on the server

(B) Select Basic Authentication check box

(C) Clear the Allow Anonymous Connection check box

(D) Disable the IUSE_inta user account on Intra

Q33. You are the administrator of a Windows 2000 Server computer named Intra. Intra is
a member of an Active Directory domain and hosts an Intranet Web-Ske for your
company. Company policy requires that only authenticated users have access to the
intranet site. All company users have a user account in the Active Directory domain. You
configure directory security for the Web Site to use integrated security. However, you
discover that users can access the Web Site without authentication. You need to ensure that
only authenticated users can access the web site. What should you do?

A. Install Active Directory on the server


B. Select Basic Authentication check box
C. Clear the Allow Anonymous Connection check box
D. Disable the IUSE_inta user account on Intra

Q34. You install a new multiple-process database application named Application on your
Windows 2000 Server computer. Two days later, users begin to report that the new
application has suddenly stopped responding to queries. You verify that the server is
operation and decide that you need to restart the application. What should you do before
you restart the application?

A. End the task named Application


B. End the Application.exe process
C. End the Application.exe process tree
D. End both the Explorer.exe process and the Application.exe process

Q35. You have a machine with two hard disk and you add an extra 100 GB hard disk for a specific
Client-Server application to run on, because the application gets very slow
Q36. returning query data. You want to have the fastest possible access for the Client-Server App
to the HDD's. Which Raid should you apply?

A. RAID0
B. RAID1
C. RAID5
D. RAID2

Q37. You have a machine with two hard disk and you add an extra 100 GB hard disk for a
specific Client-Server application to run on, because the application gets very slow
returning query data. You want to have the fastest possible access for the Client-Server
App to the HDD's. Which Raid should you apply?

A. RAID0
B. RAID1
C. RAID5
D. RAID2

Q38. Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array.
You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report
that disk access on the server is slower than it had been on the previous day. You use Disk
Management and discover that the status of the third disk in the array is missing. You want to
recover the failed RAID-5 volume. What should you do first?

A. Replace the third disk and restart the server. Use Disk Management to repair the volume
B. Ensure that the third disk is attached to the server and has power. Use Disk Management
to reactivate the disk
C. Ensure that the third disk is attached to the server and has power. Use Disk Management
to repair the volume
D. Install a new disk and create a single extended partition on the new disk. Restart the
computer and allow Windows 2000 to automatically repair the volume on the extended
partition5. Your Windows 2000 Server computer contains a stripe set with parity on a
four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six
months later, users report that disk access on the server is slower than it had been on the
previous day.

Q39 You use Disk Management and discover that the status of the third disk in the
array is missing. You want to recover the failed RAID-5 volume. What should you
do first?
A. Replace the third disk and restart the server. Use Disk Management to repair the
volume
B. Ensure that the third disk is attached to the server and has power. Use Disk
Management to reactivate the disk
C. Ensure that the third disk is attached to the server and has power. Use Disk
Management to repair the volume
D. Install a new disk and create a single extended partition on the new disk. Restart
the computer and allow Windows 2000 to automatically repair the volume on the
extended partition

Q40. You are configuring a Windows 2000 Server computer as a Routing and Remote
Access server for a Branch office. You discover that an incorrect driver was installed
during the installation of the modem. You attempt to remove the modem by using Phone
and Modem Options in Control Panel. After each attempt to remove the modem by using
this method, the computer stops responding. You restart the computer again. You must
install the correct driver for the modem as quickly as possible. What should you do?

A. Use the Add/Remove Hardware wizard to uninstall the modem. Restart the server
B. Shut down the server, remove the modem card, and restart the server. Shut down
the server again, insert the modem card, and restart the server
C. Delete all references to modems in the registry
D. Run the Modem troubleshooter and remove the modem when prompted. Restart
the server

Q41. You are configuring a Windows 2000 Server computer as a Routing and Remote
Access server for a Branch office. You discover that an incorrect driver was installed
during the installation of the modem. You attempt to remove the modem by using Phone
and Modem Options in Control Panel. After each attempt to remove the modem by using
this method, the computer stops responding. You restart the computer again. You must
install the correct driver for the modem as quickly as possible. What should you do?

A. Use the Add/Remove Hardware wizard to uninstall the modem. Restart the server
B. Shut down the server, remove the modem card, and restart the server. Shut down
the server again, insert the modem card, and restart the server
C. Delete all references to modems in the registry
D. Run the Modem troubleshooter and remove the modem when prompted. Restart
the server

Q42. How can you assign an application to one processor exclusively?

A. Right click on application executable, select properties and select assign processor
B. Right click on application process in Task Manager, select Set Affinity, and select
the appropriate processor
C. Open Task Manager, chose options from task bar, select processor and assign
processes to appropriate processor
D. Open Task Manager, chose Performance, chose view all processors, assign
processes to appropriate processor

Q43. You are the administrator of a Windows 2000 Server computer that has FIVE hard disks.
Four 100 GB hard disks on the server are configured as a single stripe volume. You want to
reconfigure the fourth disk so that the volume is fault tolerant and has as much

A. Convert the disk to dynamic disk shut doWn and restart the server

B. Backup the data on the stripe volume and delete the stripe volume. Create a raidS volume on the four
disks, restore the data to the new raid5 volume

C. Backup the data on the stripe volume and delete the stripe volume. Create a mirror volume, shut down
and restart the server. Restore the data to new mirror volumes

D. Backup the data on the stripe volume and delete the stripe

Q44. space possible available for storing data. You want to use only existing hardware. What
should you do?

A. Convert the disk to dynamic disk shut down and restart the server
B. Backup the data on the stripe volume and delete the stripe volume. Create a raid-5
volume on the four disks, restore the data to the new raid-5 volume
C. Backup the data on the stripe volume and delete the stripe volume. Create a
mirror volume, shut down and restart the server. Restore the data to new mirror
volumes
D. Backup the data on the stripe volume and delete the stripe8. You are the
administrator of a Windows 2016 Server computer that has FIVE hard disks. Four
100 GB hard disks on the server are configured as a single stripe volume. You
want to reconfigure the fourth disk so that the volume is fault tolerant and has as
much space possible available for storing data.

Q45 You want to use only existing hardware. What should you do?
A. Convert the disk to dynamic disk shut down and restart the server
B. Backup the data on the stripe volume and delete the stripe volume. Create a raid-5
volume on the four disks, restore the data to the new raid-5 volume
C. Backup the data on the stripe volume and delete the stripe volume. Create a
mirror volume, shut down and restart the server. Restore the data to new mirror
volumes
D. Backup the data on the stripe volume and delete the stripe
Q46. You are the administrator of a network that consists of a single Windows NT 4.0 domain. The
network contains five Windows NT Server domain controllers and 1,000 Windows NT Workstation
client computers. You want to install Windows 2000 Server on a new computer. You want the new
computer to act as a domain controller in the existing domain. What should you do?

a. On the new computer, install Windows NT Server 4.0 and designate the
computer as a BDC in the existing domain. Promote the computer to the PDC of
the domain. Upgrade the computer to Windows 2000 Server

b. On the new computer, install Windows NT Server 4.0 and designate the
computer as a PDC in a new domain that has the same NetBIOS name as the
existing Windows NT domain. Upgrade the computer to Windows 2000 Server.
Use Active Directory Sites and Services to force synchronization of the domain
controllers

c. Shut down the PDC of the existing Windows NT domain from the network. On
the new computer, install Windows 2000 Server, and then run the Active
Directory Installation wizard to install Active Directory, specifying the same
NetBIOS name for the Windows2000 domain as the existing Windows NT
domain

d. Shut down the PDC of the existing Windows NT domain from the network. On
the new computer, install Windows 2000 Server, and then run the Active
Directory Installation wizard to install Active Directory as a replica in the
existing Windows NT domain. Promote the new computer to the PDC of the
domain. Restart the Windows NT PDC on the network and demote it to a BDC

Q47. You are the administrator of a network that consists of a single Windows NT 4.0
domain. The network contains five Windows NT Server domain controllers and 1,000
Windows NT Workstation client computers. You want to install Windows 2000 Server on a
new computer. You want the new computer to act as a domain controller in the existing
domain. What should you do?

A. On the new computer, install Windows NT Server 4.0 and designate the computer
as a BDC in the existing domain. Promote the computer to the PDC of the
domain. Upgrade the computer to Windows 2000 Server
B. On the new computer, install Windows NT Server 4.0 and designate the computer
as a PDC in a new domain that has the same NetBIOS name as the existing
Windows NT domain. Upgrade the computer to Windows 2000 Server. Use
Active Directory Sites and Services to force synchronization of the domain
controllers
C. Shut down the PDC of the existing Windows NT domain from the network. On
the new computer, install Windows 2000 Server, and then run the Active
Directory Installation wizard to install Active Directory, specifying the same
NetBIOS name for the Windows2000 domain as the existing Windows NT
domain
D. Shut down the PDC of the existing Windows NT domain from the network. On
the new computer, install Windows 2000 Server, and then run the Active
Directory Installation wizard to install Active Directory as a replica in the existing
Windows NT domain. Promote the new computer to the PDC of the domain.
Restart the Windows NT PDC on the network and demote it to a BDC

Q48. You are the administrator of a Windows 2000 domain that has three domain
controllers. Each day, you use Windows Backup to perform full backups of each domain
controller. You run a script to make changes to account information in Active Directory.
As a result of errors in the script, the incorrect user accounts are modified. Active
Directory replication then replicates the changes to the other two domain controllers. You
want to revert Active Directory to the version that was backed up the previous day. What
should you do?

A. On a single domain controller, use Windows Backup to restore the System State
data. Shut down and restart the computer
B. Shut down and restart a single domain controller in directory services restore
mode. Use Windows Backup to restore the System State data. Run the Ntdsutil
utility. Restart the computer
C. Shut down, and restart a single domain controller by using the Recovery Console.
Use Windows Backup to restore the System State data. Exit the Recovery
Console. Restart the computer
D. Shut down and restart each domain controller by using the Recovery Console.
Use Windows Backup to restore the Sysvol folder. Exit the Recovery Console.
Restart the computer

Q49. What are the forms of password cracking techniques?

A. AttackSyllable
B. AttackBrute Forcing
C. AttacksHybrid
D. All of the above

Q50. what is the primary goal of an Ethical Hacker ?

A. Avoiding detection
B. Testing security controls
C. Resolving security vulnerabilities
D. Determining return on investment for security measures

Q51. What is the first phase of hacking?


A. Maintaining access
B. Gaining access
C. Reconnaissance
D. Scanning

Q52. Which type of hacker represents the highest risk to your network?

A. Black-hat hackers
B. Grey-hat hackers
C. Script kiddies
D. Disgruntled employees

Q53. Which of the following protocols operate at the Physical layer?

1. HDLC
2. IEEE 802.3
3. PPP
4. Twisted pair

Q54. How should an organization include third-party suppliers in the continual


improvement of services?

A. Ensure suppliers include details of their approach to service improvement in contracts


B. Require evidence that the supplier uses agile development methods
C. Require evidence that the supplier implements all improvements using project
management practices
D. Ensure that all supplier problem management activities result in improvements

Q55. What is the reason for using a balanced bundle of service metrics?

A. It reduces the number of metrics that need to be collected


B. It reports each service element separately
C. It provides an outcome-based view of services
D. It facilitates the automatic collection of metrics

Q56. Why should incidents be prioritized?


A. To help automated matching of incidents to problems or known errors
B. To identify which support team the incident should be escalated to
C. To ensure that incidents with the highest business impact are resolved first
D. To encourage a high level of collaboration within and between teams

Q57. Which guiding principle recommends assessing the current state and deciding what
can be reused?

A. Focus on value
B. Start where you are
C. Collaborate and promote visibility
D. Progress iteratively with feedback

Q58. How do all value chain activities transform inputs to outputs?


A. By determining service demand
B. By using a combination of practices
C. By using a single functional team
D. By implementing process automation

Q59. Which practice ensures that accurate and reliable information is available about
configuration items and the relationships between them?
A. Service configuration management
B. Service desk
C. IT asset management
D. Monitoring and event management
 

Q60. What does the 'service request management' practice depend on for maximum efficiency?
a. Compliments and complaints
b. Self-service tools
c. Processes and procedures
d. Incident management

You might also like