Browse Definitions :
Quiz

Virtualization 101

How much do you really know about virtualization?
Expert Anil Desai tests your knowledge.

1) Which of the following characteristics should you consider when deciding whether to deploy an application or service to a virtual machine?
a. Hardware requirements
b. Software support and compatibility
c. Licensing
d. Performance and resource requirements
e. Historical performance data
f. All of the above
Answer

2) Which of the following terms describes a situation in which many virtual machines are deployed without proper IT oversight?
a. Server sprawl
b. Server consolidation
c. Network virtualization
d. Virtual machine sprawl
e. Storage virtualization
f. None of the above
Answer

3) Which of the following virtualization management approaches can help organizations maintain optimal hardware resource utilization over time?
a. Automatically reconfiguring virtual machines based on performance statistics
b. Deploying multiple copies of virtual machines to different host servers
c. Automatically moving virtual machines based on changes to resource requirements
d. Placing virtual machines on isolated virtual network switches
e. Storing virtual machines on a Storage Area Network (SAN)
f. Both a and c
Answer

4) You are a systems administrator that manages a lab environment for your organization’s software developers and testers. How can you reduce the amount of time and effort you spend on managing the lab environment while providing quicker deployments of new virtual machines?
a. Create a library of virtual machine templates and copy them to create new VMs
b. Invest in self-service virtualization provisioning systems
c. Give developers and testers permissions to create and deploy new VMs
d. Define standardized configurations for test environment virtual machines
e. All of the above
Answer

5) You are a software tester that is testing a complex application that is running within a single virtual machine. You have recently encountered a rare and intermittent software defect that developers have been unable to reproduce or troubleshoot in the past. Which of the following steps should you take to allow developers to recreate the issue?
a. Power off the virtual machine and discard any saved state information
b. Save the state of the virtual machine and provide a copy of it to your developers to troubleshoot the problem
c. Roll back the state of the virtual machine to a point in time prior to when the defect was discovered
d. Move the virtual machine to another host server to which developers have access
Answer

6) You are a systems administrator that is responsible for supporting a team of software testers in your organization. The test department frequently requires new VMs running a wide variety of different operating systems to thoroughly test a new application your company is developing. VMs must be able to communicate with each other over the network. You are concerned about the potential security impact of these new VMs. Which of the following steps can you take to reduce security risks?
a. Disable network and Internet access for all virtual machines
b. Place all test-related virtual machines on a private virtual network
c. Power on virtual machines only when they are being actively used in the environment
d. Configure virtual machines to run under an account with limited permissions
Answer

7) In which of the following types of virtualization are applications stored and executed on the server?
a. Application Virtualization
b. Storage Virtualization
c. Presentation Virtualization
d. Network Virtualization
e. Server Virtualization
Answer

8) Which of the following is not a system requirement for running Microsoft Hyper-V?
a. A 64-bit-capable CPU
b. A 64-bit edition of Windows Server 2008
c. Virtualization-related CPU extensions
d. At least 8GB of physical memory
e. BIOS and CPU support for the “No Execute” (NX) bit
Answer

9) Which of the following features is not supported in the initial version of Hyper-V?
a. The ability to implement a guest-level cluster of virtual machines
b. The ability to implement host-level clusters to provide automatic fail-over of VMs
c. The ability to store virtual hard disks on a storage area network
d. The ability to reconfigure memory and virtual CPU settings after a VM has been created
e. The ability to perform a live migration of a virtual machine from one host to another
Answer

10) Which of the following methods allows you to enable Hyper-V in Windows Server 2008?
a. Use the Computer Management utility to enable the Hyper-V server role
b. Use the Hyper-V Admin Console to enable the Hyper-V server role
c. Use the Add Roles Wizard in the Server Manager console to add the Hyper-V server role
d. None of the above – Hyper-V is installed and enabled by default in Windows Server 2008
Answer

 

Listen and Learn Podcasts 

Virtualization 101
Virtualization expert Anil Desai provides an easy-to-understand primer on virtualization that will quickly bring any listener up to speed on the topic.

Using virtualization for testing and development environments
Learn how to use virtualization for quality assurance and testing while keeping the environment secure.

What is Microsoft Hyper-V?
Learn exactly what Hyper-V is, how to create virtual machines (VMs) and how to use Hyper-V's integrated features to best advantage.

This was last updated in December 2008
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close