Browse Definitions:
Quiz

Virtualization 101

anil_desai.jpg How much do you really know about virtualization?
Expert Anil Desai tests your knowledge.

1) Which of the following characteristics should you consider when deciding whether to deploy an application or service to a virtual machine?
a. Hardware requirements
b. Software support and compatibility
c. Licensing
d. Performance and resource requirements
e. Historical performance data
f. All of the above
Answer

2) Which of the following terms describes a situation in which many virtual machines are deployed without proper IT oversight?
a. Server sprawl
b. Server consolidation
c. Network virtualization
d. Virtual machine sprawl
e. Storage virtualization
f. None of the above
Answer

3) Which of the following virtualization management approaches can help organizations maintain optimal hardware resource utilization over time?
a. Automatically reconfiguring virtual machines based on performance statistics
b. Deploying multiple copies of virtual machines to different host servers
c. Automatically moving virtual machines based on changes to resource requirements
d. Placing virtual machines on isolated virtual network switches
e. Storing virtual machines on a Storage Area Network (SAN)
f. Both a and c
Answer

4) You are a systems administrator that manages a lab environment for your organization’s software developers and testers. How can you reduce the amount of time and effort you spend on managing the lab environment while providing quicker deployments of new virtual machines?
a. Create a library of virtual machine templates and copy them to create new VMs
b. Invest in self-service virtualization provisioning systems
c. Give developers and testers permissions to create and deploy new VMs
d. Define standardized configurations for test environment virtual machines
e. All of the above
Answer

5) You are a software tester that is testing a complex application that is running within a single virtual machine. You have recently encountered a rare and intermittent software defect that developers have been unable to reproduce or troubleshoot in the past. Which of the following steps should you take to allow developers to recreate the issue?
a. Power off the virtual machine and discard any saved state information
b. Save the state of the virtual machine and provide a copy of it to your developers to troubleshoot the problem
c. Roll back the state of the virtual machine to a point in time prior to when the defect was discovered
d. Move the virtual machine to another host server to which developers have access
Answer

6) You are a systems administrator that is responsible for supporting a team of software testers in your organization. The test department frequently requires new VMs running a wide variety of different operating systems to thoroughly test a new application your company is developing. VMs must be able to communicate with each other over the network. You are concerned about the potential security impact of these new VMs. Which of the following steps can you take to reduce security risks?
a. Disable network and Internet access for all virtual machines
b. Place all test-related virtual machines on a private virtual network
c. Power on virtual machines only when they are being actively used in the environment
d. Configure virtual machines to run under an account with limited permissions
Answer

7) In which of the following types of virtualization are applications stored and executed on the server?
a. Application Virtualization
b. Storage Virtualization
c. Presentation Virtualization
d. Network Virtualization
e. Server Virtualization
Answer

8) Which of the following is not a system requirement for running Microsoft Hyper-V?
a. A 64-bit-capable CPU
b. A 64-bit edition of Windows Server 2008
c. Virtualization-related CPU extensions
d. At least 8GB of physical memory
e. BIOS and CPU support for the “No Execute” (NX) bit
Answer

9) Which of the following features is not supported in the initial version of Hyper-V?
a. The ability to implement a guest-level cluster of virtual machines
b. The ability to implement host-level clusters to provide automatic fail-over of VMs
c. The ability to store virtual hard disks on a storage area network
d. The ability to reconfigure memory and virtual CPU settings after a VM has been created
e. The ability to perform a live migration of a virtual machine from one host to another
Answer

10) Which of the following methods allows you to enable Hyper-V in Windows Server 2008?
a. Use the Computer Management utility to enable the Hyper-V server role
b. Use the Hyper-V Admin Console to enable the Hyper-V server role
c. Use the Add Roles Wizard in the Server Manager console to add the Hyper-V server role
d. None of the above – Hyper-V is installed and enabled by default in Windows Server 2008
Answer

 

Listen and Learn Podcasts 

Virtualization 101
Virtualization expert Anil Desai provides an easy-to-understand primer on virtualization that will quickly bring any listener up to speed on the topic.

Using virtualization for testing and development environments
Learn how to use virtualization for quality assurance and testing while keeping the environment secure.

What is Microsoft Hyper-V?
Learn exactly what Hyper-V is, how to create virtual machines (VMs) and how to use Hyper-V's integrated features to best advantage.

This was last updated in December 2008

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

Extensiones de Documento y Formatos de Documento

Accionado por:

SearchCompliance

SearchSecurity

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

SearchHealthIT

  • population health management (PHM)

    Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery ...

  • ICD-10-PCS

    The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.S. cataloging system for...

  • U.S. National Library of Medicine (NLM)

    The U.S. National Library of Medicine (NLM) is the largest biomedical library in the world.

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • open source storage

    Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution ...

  • CompactFlash card (CF card)

    A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store ...

  • email archiving

    Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close