Browse Definitions:
Quiz

Virtualization 101

anil_desai.jpg How much do you really know about virtualization?
Expert Anil Desai tests your knowledge.

1) Which of the following characteristics should you consider when deciding whether to deploy an application or service to a virtual machine?
a. Hardware requirements
b. Software support and compatibility
c. Licensing
d. Performance and resource requirements
e. Historical performance data
f. All of the above
Answer

2) Which of the following terms describes a situation in which many virtual machines are deployed without proper IT oversight?
a. Server sprawl
b. Server consolidation
c. Network virtualization
d. Virtual machine sprawl
e. Storage virtualization
f. None of the above
Answer

3) Which of the following virtualization management approaches can help organizations maintain optimal hardware resource utilization over time?
a. Automatically reconfiguring virtual machines based on performance statistics
b. Deploying multiple copies of virtual machines to different host servers
c. Automatically moving virtual machines based on changes to resource requirements
d. Placing virtual machines on isolated virtual network switches
e. Storing virtual machines on a Storage Area Network (SAN)
f. Both a and c
Answer

4) You are a systems administrator that manages a lab environment for your organization’s software developers and testers. How can you reduce the amount of time and effort you spend on managing the lab environment while providing quicker deployments of new virtual machines?
a. Create a library of virtual machine templates and copy them to create new VMs
b. Invest in self-service virtualization provisioning systems
c. Give developers and testers permissions to create and deploy new VMs
d. Define standardized configurations for test environment virtual machines
e. All of the above
Answer

5) You are a software tester that is testing a complex application that is running within a single virtual machine. You have recently encountered a rare and intermittent software defect that developers have been unable to reproduce or troubleshoot in the past. Which of the following steps should you take to allow developers to recreate the issue?
a. Power off the virtual machine and discard any saved state information
b. Save the state of the virtual machine and provide a copy of it to your developers to troubleshoot the problem
c. Roll back the state of the virtual machine to a point in time prior to when the defect was discovered
d. Move the virtual machine to another host server to which developers have access
Answer

6) You are a systems administrator that is responsible for supporting a team of software testers in your organization. The test department frequently requires new VMs running a wide variety of different operating systems to thoroughly test a new application your company is developing. VMs must be able to communicate with each other over the network. You are concerned about the potential security impact of these new VMs. Which of the following steps can you take to reduce security risks?
a. Disable network and Internet access for all virtual machines
b. Place all test-related virtual machines on a private virtual network
c. Power on virtual machines only when they are being actively used in the environment
d. Configure virtual machines to run under an account with limited permissions
Answer

7) In which of the following types of virtualization are applications stored and executed on the server?
a. Application Virtualization
b. Storage Virtualization
c. Presentation Virtualization
d. Network Virtualization
e. Server Virtualization
Answer

8) Which of the following is not a system requirement for running Microsoft Hyper-V?
a. A 64-bit-capable CPU
b. A 64-bit edition of Windows Server 2008
c. Virtualization-related CPU extensions
d. At least 8GB of physical memory
e. BIOS and CPU support for the “No Execute” (NX) bit
Answer

9) Which of the following features is not supported in the initial version of Hyper-V?
a. The ability to implement a guest-level cluster of virtual machines
b. The ability to implement host-level clusters to provide automatic fail-over of VMs
c. The ability to store virtual hard disks on a storage area network
d. The ability to reconfigure memory and virtual CPU settings after a VM has been created
e. The ability to perform a live migration of a virtual machine from one host to another
Answer

10) Which of the following methods allows you to enable Hyper-V in Windows Server 2008?
a. Use the Computer Management utility to enable the Hyper-V server role
b. Use the Hyper-V Admin Console to enable the Hyper-V server role
c. Use the Add Roles Wizard in the Server Manager console to add the Hyper-V server role
d. None of the above – Hyper-V is installed and enabled by default in Windows Server 2008
Answer

 

Listen and Learn Podcasts 

Virtualization 101
Virtualization expert Anil Desai provides an easy-to-understand primer on virtualization that will quickly bring any listener up to speed on the topic.

Using virtualization for testing and development environments
Learn how to use virtualization for quality assurance and testing while keeping the environment secure.

What is Microsoft Hyper-V?
Learn exactly what Hyper-V is, how to create virtual machines (VMs) and how to use Hyper-V's integrated features to best advantage.

This was last updated in December 2008

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

SearchSecurity

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

  • password

    A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

  • data migration

    Data migration is the process of transferring data between data storage systems, data formats or computer systems.

  • compact disc (CD)

    A compact disc is a portable storage medium that can be used for recording, storing and playing back audio, video and other data ...

SearchSolidStateStorage

  • NVMe (non-volatile memory express)

    NVMe (non-volatile memory express) is a host controller interface and storage protocol to enable a solid-state drive to use the ...

  • SSD RAID (solid-state drive RAID)

    SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across ...

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close