IT Questions and Answers :)

Sunday, January 15, 2023

Common questions and answers asked to L1 VMware/Network Engineer & Administrator or Admin

Common questions and answers asked to L1 VMware/Network Engineer & Administrator or Admin

What are the layers of the OSI reference model and What is its job?

What are the layers of the OSI reference model and What is its job?

There are 7 OSI layers: 

1) Physical Layer, 

2) Data Link Layer, 

3) Network Layer, 

4) TransportLayer, 

5) Session Layer, 

6) Presentation Layer, and 

7) Application Layer.


The Network layer is responsible for data routing, packet switching, and control of network

congestion. Routers operate under this layer.


What are routers? 

Routers can connect two or more network segments. These are intelligent network devices that store information in their routing tables, such as paths, hops, and bottlenecks. With this info, they can determine the best path for data transfer. Routers operate at the OSI Network Layer.


What is a VPN? 

VPN means Virtual Private Network, a technology that allows a secure tunnel to be created across a network such as the Internet. For example, VPNs allow you to establish a secure dial-up connection to a remote server.


Briefly describe NAT

NAT is Network Address Translation. This is a protocol that provides a way for multiple computers on a common network to share a single connection to the Internet. 


What are proxy servers, and how do they protect computer networks? 

Proxy servers primarily prevent external users who are identifying the IP addresses of an internal network. Without knowledge of the correct IP address, even the physical location of the network cannot be identified. Proxy servers can make a network virtually invisible to external users.


How can you identify the IP class of a given IP address? 

By looking at the first octet of any given IP address, you can identify whether it’s Class A, B, or C. If the first octet begins with a 0 bit, that address is Class A. If it begins with bits 10 then that address is a Class B address. If it begins with 110, then it’s a Class C network.


What is the disadvantage of a star topology? 

One major disadvantage of star topology is that once the central Hub or switch gets damaged, the entire network becomes unusable.


What is the main job of the ARP? 

The main task of the ARP or Address Resolution Protocol is to map a known IP address to a MAC layer address.


What protocol can be applied when you want to transfer files between different platforms, such as UNIX systems and Windows servers? 

Use FTP (File Transfer Protocol) for file transfers between such different servers. This is possible because FTP is platform-independent


What is ICMP? 

ICMP is an Internet Control Message Protocol. It provides messaging and communication for protocols within the TCP/IP stack. This is also the protocol that manages error messages that are used by network tools such as PING


What is SMTP? 

SMTP is short for Simple Mail Transfer Protocol. This protocol deals with all internal mail and provides the necessary mail delivery services on the TCP/IP protocol stack.


What is one basic requirement for establishing VLANs? 

A VLAN is required because at the switch level. There is only one broadcast domain. It means whenever a new user is connected to switch. This information is spread throughout the network. VLAN on switch helps to create a separate broadcast domain at the switch level. It is used for security purposes.


What are the different types of VPN?

 Access VPN: Access VPN is used to provide connectivity to remote mobile users and telecommuters. It serves as an alternative to dial-up connections or ISDN (Integrated Services Digital Network) connections. It is a low-cost solution and provides a wide range of connectivity. 

Site-to-Site VPN: A Site-to-Site or Router-to-Router VPN is commonly used in large companies having branches in different locations to connect the network of one office to another in different locations. There are 2 sub-categories as mentioned below:  

Intranet VPN: Intranet VPN is useful for connecting remote offices in different geographical locations using shared infrastructure (internet connectivity and servers) with the same accessibility policies as a private WAN (wide area network). 

Extranet VPN: Extranet VPN uses shared infrastructure over an intranet, suppliers, customers, partners, and other entities and connects them using dedicated connections.


Topology: All the nodes are connected using the central link known as the bus. It is useful to connect a smaller number of devices. If the main cable gets damaged, it will damage the whole network.

Star Topology: All the nodes are connected to one single node known as the central node. It is more robust. If the central node fails the complete network is damaged. Easy to troubleshoot. Mainly used in home and office networks.

Ring Topology: Each node is connected to exactly two nodes forming a ring structure. If one of the nodes are damaged, it will damage the whole network. It is used very rarely as it is expensive and hard to install and manage.

Mesh Topology: Each node is connected to one or many nodes. It is robust as failure in one link only disconnects that node. It is rarely used and installation and management are difficult.

Tree Topology: A combination of star and bus topology also know as an extended bus topology. All the smaller star networks are connected to a single bus. If the main bus fails, the whole network is damaged.

Hybrid: It is a combination of different topologies to form a new topology. It helps to ignore the drawback of a particular topology and helps to pick the strengths from other.


What are Unicasting, Anycasting, Multicasting and Broadcasting?

Unicasting: If the message is sent to a single node from the source then it is known as unicasting. This is commonly used in networks to establish a new connection.

Anycasting: If the message is sent to any of the nodes from the source then it is known as anycasting. It is mainly used to get the content from any of the servers in the Content Delivery System. 

Multicasting: If the message is sent to a subset of nodes from the source then it is known as multicasting. Used to send the same data to multiple receivers.

Broadcasting: If the message is sent to all the nodes in a network from a source then it is known as broadcasting. DHCP and ARP in the local network use broadcasting.


What happens when you enter google.com in the web browser?

If not, the browser checks if the IP of the URL is present in the cache (browser and OS) if not then request the OS to do a DNS lookup using UDP to get the corresponding IP address of the URL from the DNS server to establish a new TCP connection.

A new TCP connection is set between the browser and the server using three-way handshaking.

An HTTP request is sent to the server using the TCP connection.

The web servers running on the Servers handle the incoming HTTP request and send the HTTP response.

The browser process the HTTP response sent by the server and may close the TCP connection or reuse the same for future requests.

If the response data is cacheable then browsers cache the same. • Browser decodes the response and renders the conten


What is SNMP architecture? 

SNMP has a simple architecture based on a client-server model.

The servers, called managers, collect and process information about devices on the network.

The clients, called agents, are any type of device or device component connected to the network. They can include not just computers, but also network switches, phones, printers, and so on.


What are the different memories used in a CISCO router?

NVRAM: stores the startup configuration file.

DRAM: stores the configuration file that is being executed.

ROM It is the bootstrap software that runs and maintains instructions for POST diagnostics.

Flash Memory: stores the Cisco IOS.


Differentiate User Mode from Privileged Mode 

User Mode is used for regular task when using a CISCO router, such as to view system information, connecting to remote devices, and checking the status of the router. On the other hand, privileged mode includes all options that are available for User Mode, plus more. You can use this mode in order to make configurations on the router, including making tests and debugging.


Differentiate full-duplex from half-duplex.

 In full-duplex, both the transmitting device and the receiving device can communicate simultaneously, that is, both can be transmitting and receiving at the same time. In the case of half-duplex, a device cannot receive while it is transmitting, and vice versa.


In configuring a router, what command must be used if you want to delete the configuration data that is stored in the NVRAM? 

erase startup-config


What Is The Location Of The Active Directory Database? 

C:windows\Ntds\Ntds.dit.


Name the default protocol used in directory services? 

LDAP (Lightweight Directory Access Protocol).


Explain Emulation Drivers? 

The emulation drivers are mainly devices that imitate another program. In simple terms, emulation drivers are a trick to fool the device that it is some other sort of a device.


What Are Synthetic Drivers? 

Synthetic drives are different and better than the emulation ones in their functions. They don’t imitate another program but, create another hardware complex device on a virtual platform.


What Is Desktop Virtualization? 


Desktop virtualization is a logical procedure to isolate and extract the OS or system from the client that is ready to access it. There are many types of desktop virtualizations some of which include virtual machines while some do not

What Is Dac? 

Microsoft Dynamic Access Control or DAC is a data governance tool in Windows Server 2012 that allows administrators control access settings. It uses centralized policies to permit administrators to review who has access to individual files. Files can be classified manually or automatically.

Define SYSVOL? 

The SysVOL file keeps the server’s copy of the domain’s public files. The fillings such as users, group policy.

What is Kerberos? 

Kerberos is a verification protocol for the network. It is built to present secure verification for client applications by using secret-key cryptography.

What do you mean by organizational units? 

The Organizational Unit is a serious design factor impacting policy, security, competence and the charge of administration. Organizational Units are a kind of LDAP (X.500) pot. It can be a reflection of as a sub-domain element with comparable properties to domains.

What do you mean by Active Directory Recycle Bin? 

Active Directory Recycle bin is a characteristic of Windows Server 2008 AD. It helps to re-establish by chance deleted Active Directory objects without using a backed-up AD database, rebooting area controller.

Do we use clustering in Active Directory? …. Why? 

No one installs Active Directory in a bunch. There is no need for clustering a field controller. Active Directory provides total joblessness with two or more servers.

What is child DC?

Child DC is a sub-area controller under the root domain controller which share a namespace.

Tell me the port no of LDAP?

 The port no of LDAP is 389

If I try to look schema, how can I do that?

 c:\windows\system32>regsvr32 schmmgmt.dll
Open mmc --> add snapin --> add Active directory schema
name it as schema.msc Open administrative tool --> schema.msc

Define Native Mode? 


When all domain controllers in a given area are consecutively Windows 2000 Server, this way permits organizations to take the lead of new Active Directory features such as worldwide groups, inter-domain group membership and nested group membership.

What is VMware and what are their benefits? 

VMware provides different applications and software for virtualization. VMware products are categorized into two levels, desktop applications, and Server applications. It is useful for: • Running multiple operating systems and applications on a single computer • Consolidate hardware to get vastly higher productivity from fewer servers • Save more of total cost spend on IT • It simplifies IT management and speeds up the deployment of new applications

Explain what is hypervisor 


A hypervisor is a program that enables multiple operating systems to share a single hardware host. Each operating system has the host’s processor, memory and other resources all to itself. The hypervisor controls the resources and host processor, allocating what is required for each operating system in turn and make sure that the guest operating system cannot disrupt each other.

Explain VMware DRS? 

VMware DRS stands for Distributed Resource Scheduler; it dynamically balances resources across various host under a cluster or resource pool. It enables users to determine the rules and
policies which decide how virtual machines deploy resources, and these resources should be prioritized to multiple virtual machines

What are the storage and availability in vCloud Suite? 

Storage DRS:It place and load balance virtual machines based on storage capacity and I/O latency
Storage vMotion:It employs proactive, non-disruptive storage migration to reduce virtual machine storage I/O bottlenecks and free up valuable storage capacity 
Application HA:It gains high availability that is bound to specific applications
Data Protection: Based on EMC avamar, it deploys a back-up and recovery tool

What is the difference between VMware HA and Vmware FT? 


VMware FT is enabled per VM basis while VMware is enabled per cluster 

In the case of ESX host failure, virtual machines are the failed host and are re-started and powered-on the other active hosts in HA cluster. But FT-enabled virtual machines; there is no downtime. In the case of a host failure, the secondary VM will be activated, and it becomes primary and continue to run from the exact point where the primary VM is failed or left off.

What is Fault Tolerant Logging? 

The communication between two ESXI host is known as Fault logging when FT is configured between them.

Explain vSS 

vSS stands for Virtual Standard Switch is responsible for communication of VMs hosted on a single physical host. It automatically detects a VM which wants to communicate with other VM on the same physical server

What are pluggable devices which can be added while Virtual Machine is running? 

You can add HDDs and NIC while Virtual Machine is running.

What is Cold and Hot Migration? 

When you migrate powered off or suspended, it is known as cold migration. When you migrate your running power on virtual machines, it is known as hot migration.

Explain the importance of snapshot in VMWare

A VMWare snapshot is a copy of a virtual machine disk file which is used to restore a VM to a specific point in time when the system fails, or system error occurs.

Explain Cluster in VMware 

Cluster in VMware is a logical grouping of multi ESXi hosts. It allows you to add or delete the host from the cluster. It also provides a feature like HA, DRS, on the cluster.

Disadvantages of the VMware virtualization platform

It requires a considerable investment to buy the resources
High-end server needs which increase the cost. 
Different technologies are required for its implementation

Can we do vMotion between two data centers? 

Yes, we can do vMotion between two datacenters. However, for this VM should be powered off.

What is RDM? 

RDM is a sort form of Raw Device Mapping. It is a file stored in VMFS volume which acts as a proxy for a raw physical device. It allows you to store virtual machine data directly on LUN.

What is NFS? 

NFS is a Network file system. It is a file sharing protocol which ESXI host used to communicate with the NAS device. It is a specialized store device which connects to a network.

What is VMKernel? 

Why is it important? The VMkernel is the interface between virtual machines (VMs) and the physical hardware of the system. The responsibility of VMkernel is to scheduling CPUs, allocating memory and providing other hardware abstraction with other operating system (OS) services.

How can I differentiate between virtual machine port groups and VMkernel ports? 

The big difference between a Virtual Machine port group and a VMkernel port group is the sort of traffic it’s passing. As you’ll see, a VMkernel port is passing traffic specific to VMware vSphere. A virtual machine port group is simply passing your garden variety virtual machine traffic.

How does vMotion work in the background? 

The Virtual Machine Memory state is copied over the Vmotion Network from the source Host to the Target Host. users still access the virtual machine and potentially update pages in memory. A list of modified pages in memory is kept during a memory Bitmap on the source Host.

What happens if VMotion fails? 

VMotion will fail if the target host does not have enough memory to satisfy the reservation of the virtual machine. If you want to fix this, migrate the virtual machine to another ESXi host that can provide the guaranteed memory for the VM or reduce the memory reservation of the virtual machine.

What’s iSCSI in VMware? 

iSCSI may be a protocol which uses the TCP to move SCSI commands and also enables the utilization of the prevailing TCP/IP networking infrastructure as a cargo area Network.

What’s the difference between FC and FCoE? 

FCOE maps Fiber Channel over full duplex Ethernet networks based on IEEE 802.3 standard. and therefore the other hand, Fiber Channel or FC may be a serial data transfer protocol and standard for high-speed enterprise-grade storage networking. It accelerates to 128 Gbps and delivers storage data over fast optical networks.

What’s the utilization of snapshots in VMware? 

The VMware snapshot is used to preserve the state and data of the Virtual machine at the present point in time so once you are done testing, you’ll quickly revert the VM back to a desired state. In VMware, VMware snapshots are easy and quick thanks to saving the state of a virtual machine before you test a software update, patch or other change.

What’s the complete sort of LUN? 

LUN stands for Logical Unit Number.

What’s the difference between RDM and VMDK? 

RDM is additionally referred to as a pass-through disk, and may be a mapping file that acts as a proxy for a physical device like a LUN. On the opposite side VMDK may be a file that appears as a tough drive to the guest OS . Fundamentally it’s a virtual disk drive.

What’s the difference between SAN and vSAN? 

SAN leverages storage protocols like FCP and iSCSI while vSAN only works with ESXi hosts. Within the case of SAN, storage administrators are required to pre-allocate storage on different systems although vSAN automatically converts local storage resources into one storage pool.

What’s a vSphere client?

The vSphere Client is an application software that permits management of a vSphere installation. The vSphere Client provides an administrator with access to the key functions of vSphere without the necessity to access a vSphere server directly.

What’s the max number of virtual machines per host? 

Maximum number of virtual machines per host is 100

What are the 2 reasons why a virtual machine might fail to power on? 

The virtual machine is running on an ESXi host which has an expired license. 
The virtual machine is running on a data-store which has insufficient disc space for the .vswp file.

What’s the utilization of vCenter server? 

vCenter is employed to manage multiple ESXi hosts, virtual machines and every one dependent component from one centralized location.

What are the services in vCenter server? 

The vCenter Server services are vCenter Server, vSphere Web Client, Inventory Service, vSphere Auto Deploy, vSphere ESXi Dump Collector, VMware vSphere Syslog Collector on Windows and VMware Sphere Syslog Service for the vCenter Server Appliance.
Share:

Thursday, June 13, 2019

VMWare files ending with the .VMX extension hold what kind of data?

VMWare files ending with the .VMX extension hold what kind of data?

  • VHD connection data for the VM
  • Type 2 data for the host to start the VM properly
  • Primary configuration file and settings for the VM
  • Virtual Machine Extension data for the VM 
VMWare files ending with the .VMX extension hold what kind of data?

EXPLANATION

The .vmx file is the primary configuration file for VMWare, storing the settings you selected using either the New Virtual Machine Wizard or the virtual machine settings editor.
If you created the virtual machine using an earlier version of VMware Workstation on a Linux host, this file may have a .cfg extension.

.vmx <vmname>.vmx This is the primary configuration file, which stores settings chosen in the New Virtual Machine Wizard or virtual machine settings editor. If you created the virtual machine under an earlier version of VMware Workstation on a Linux host, this file may have a .cfg extension

Share:

Wednesday, May 15, 2019

What is the maximum RAM that can be used by a virtual machine in Vmware Vsphere 6.5?

What is the maximum RAM that can be used by a virtual machine in Vmware Vsphere 6.5?

  • 2 TB
  • 4 TB
  • 1 TB
  • 6 TB

What is the maximum RAM that can be used by a virtual machine in Vmware Vsphere 6.5?

EXPLANATION

The maximum memory for each virtual machine has increased from 4 TB in Vsphere 60o to 6 TB in Vshere 6.5.

Platform Services Controller Maximums
Powered-on VMs per vCenter Server2500010000
RAM per host12TB6TB *some exceptions
RAM per VM6128GB4080GB
Registered VMs per vCenter Server3500015000

SOURCE

https://www.vmware.com/pdf/vsphere6/r65/vsphere-65-configuration-maximums.pdf

 

Share:

Friday, April 26, 2019

What settings in VMware would you use to keep VMs together or separate?

What settings in VMware would you use to keep VMs together or separate?

  • Affinity rules
  • NSX
  • VDS
  • Snapshots 

 
What settings in VMware would you use to keep VMs together or separate?

EXPLANATION


An affinity rule is a setting that establishes a relationship between two or more VMware virtual machines (VMs) and hosts.
Affinity rules and anti-affinity rules tell the vSphere hypervisor platform to keep virtual entities together or separated. The rules, which can be applied as either required or preferred, help reduce traffic across networks and keep the virtual workload balanced on available hosts.
If two virtual machines communicate frequently and should share a host, the VMware admin can create a VM-VM affinity rule to keep them together. Conversely, if two resource-hungry VMs would tax a host, an anti-affinity rule will keep those VMs from sharing a host.
Affinity rules and anti-affinity rules can be applied between VMs and hosts as well, and a VM can be subject to VM-VM affinity rules and VM-Host affinity rules at the same time. Affinity and anti-affinity rules in a vSphere environment can conflict with one another. For example, two VMs with an anti-affinity relationship may both be linked to a third VM via an affinity rule, but they cannot share a host. Optional affinity rule violation alarms can alert administrators to these events.

SOURCE

https://searchvmware.techtarget.com/definition/affinity-rules
Share:

Wednesday, March 20, 2019

What settings in VMware would you use to keep VMs together or separate?

What settings in VMware would you use to keep VMs together or separate?

  • VDS
  • Affinity rules
  • NSX
  • Snapshots 

 
What settings in VMware would you use to keep VMs together or separate?

EXPLANATION


An affinity rule is a setting that establishes a relationship between two or more VMware virtual machines (VMs) and hosts.
Affinity rules and anti-affinity rules tell the vSphere hypervisor platform to keep virtual entities together or separated. The rules, which can be applied as either required or preferred, help reduce traffic across networks and keep the virtual workload balanced on available hosts. If two virtual machines communicate frequently and should share a host, the VMware admin can create a VM-VM affinity rule to keep them together. Conversely, if two resource-hungry VMs would tax a host, an anti-affinity rule will keep those VMs from sharing a host.
Affinity rules and anti-affinity rules can be applied between VMs and hosts as well, and a VM can be subject to VM-VM affinity rules and VM-Host affinity rules at the same time. Affinity and anti-affinity rules in a vSphere environment can conflict with one another. For example, two VMs with an anti-affinity relationship may both be linked to a third VM via an affinity rule, but they cannot share a host. Optional affinity rule violation alarms can alert administrators to these events.

SOURCE

https://searchvmware.techtarget.com/definition/affinity-rules
Share:

Monday, February 18, 2019

In VMware vSphere, the term VMotion refers to

In VMware vSphere, the term VMotion refers to

  • the use of high definition video on a virtual machine.
  • the process used to describe the movement of hard drive platters on a virtual machine.
  • a zero downtime live migration of workloads from one server to another.
  • the patented technology available to migrate a server from Hyper-V to VMware. 

In VMware vSphere, the term VMotion refers to

EXPLANATION


VMware vSphere live migration allows you to move an entire running virtual machine from one physical server to another, with no downtime. The virtual machine retains its network identity and connections, ensuring a seamless migration process. Transfer the virtual machine’s active memory and precise execution state over a high-speed network, allowing the virtual machine to switch from running on the source vSphere host to the destination vSphere host. This entire process takes less than two seconds on a gigabit Ethernet network. Live migration allows you to:

  • Automatically optimize virtual machines within resource pools.
  • Perform hardware maintenance without scheduling downtime or disrupting business operations.
  • Move virtual machines away from failing or underperforming servers. 

SOURCE

http://www.vmware.com/products/vsphere/vmotion.html
Share:

Wednesday, January 23, 2019

How could leaving a VMware snapshot unattended cause a server down scenario?

How could leaving a VMware snapshot unattended cause a server down scenario?

  • Known bug in ESXi 5.0. VMDK file for VM becomes locked when multiple snapshots exist for the same VM
  • All remaining storage space on the host becomes used
  • The snapshot becomes "unlocked" and causes a hostname/IP conflict
  • Trick question, snapshots are good for as long as you need them 
How could leaving a VMware snapshot unattended cause a server down scenario?

EXPLANATION

Snapshots grow in size over time.  Although the host and VMs may not actually go down, lack of sufficient space on the host would render the host and all hosted virtual machines nearly useless - similar to a CPU and/or memory utilization being maxed out.  Should this occur, access the vSphere client and delete all snapshots.  If you power down the VM, the process will take longer but you will not be able to power up the VM until the process completes.  Leaving the VM powered on will take longer to delete the snapshot but once sufficient space is gained the server(s) should start normal operation again.
Best practices for virtual machine snapshots in the VMware environment:
https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&external...
Share:

Friday, January 11, 2019

VMware introduced Stretch Clusters in vSAN 6.6. Which of the following is NOT true about Stretch Clusters?

VMware introduced Stretch Clusters in vSAN 6.6. Which of the following is NOT true about Stretch Clusters?

  • Stretched clusters use fault domains to provide redundancy and failure protection across sites.
  • You can use a witness virtual appliance as the witness host in a stretched cluster.
  • The witness host can run VMs.
  • A vSAN stretched cluster can tolerate one link failure at a time without data becoming unavailable. 

VMware introduced Stretch Clusters in vSAN 6.6. Which of the following is NOT true about Stretch Clusters?

EXPLANATION

The witness host cannot run VMs.
The witness host can be a physical host or an ESXi host running inside a VM. The VM witness host does not provide other types of functionality, such as storing or running VMs.
Multiple witness hosts can run as VMs on a single physical server. For patching and basic networking and monitoring configuration, the VM witness host works in the same way as a typical ESXi host. You can manage it with vCenter Server, patch it and update it by using esxcli or vSphere Update Manager, and monitor it with standard tools that interact with ESXi hosts.

SOURCE

https://docs.vmware.com/en/VMware-vSphere/6.5/com.vmware.vsphere.virtualsan.doc/GUID-1BDC7194-67A7-4E7C-BF3A-3A0A32AEECA9.html
Share:

Tuesday, October 23, 2018

What are VM snapshots intended to be used for?

What are VM snapshots intended to be used for?

  • To shut down the server
  • As a backup tool for your VMs
  • To create albums
  • To easily revert the VM to an earlier state 

What are VM snapshots intended to be used for?

EXPLANATION

Snapshots provide a fast and easy way to revert the virtual machine to a previous state. For this reason, virtual machine snapshots are intended mainly for use in development and test environments. Having an easy way to revert a virtual machine can be very useful if you need to recreate a specific state or condition so that you can troubleshoot a problem.
There are certain circumstances in which it may make sense to use snapshots in a production environment. For example, you can use snapshots to provide a way to revert a potentially risky operation in a production environment, such as applying an update to the software running in the virtual machine.
Many backup products use snapshots in a production environment. They create a snapshot and then processing continues from the snapshot, meanwhile they have an unchanging original to back up. Once the backup is completed the snapshot is merged back into the live environment. This allows a machine to be backed up with very little affect for the users and for them remains up 24/7.
NB: Hyper-V snapshots do not replace backups. Backup usually involves some form of duplication (so two copies of the protected data exist) but in snapshots... there is no duplication whatsoever. All data is in VHD(X) file and changes in AVHD(X) file and if the VHD(X) file is damaged/lost, the data is pretty much gone. Also with most backups you can restore a single file to an earlier state, but with Snapshots, it's all or nothing (meaning if an user wants a file from last week, you'd have to bring the whole system back a week). There are other concerns as well (there might be performance  issues with multiple snapshots, snapshots usually lose value as they age and there are issues with disk space)

SOURCE

https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1015180
Share:

Tuesday, July 17, 2018

Which of the following technologies is required to run Hyper-V on Windows 2012 R2?

Which of the following technologies is required to run Hyper-V on Windows 2012 R2?

  • DirectX
  • Hyper-threading
  • Hardware Enforced Data Execution Prevention (DEP)
  • MMX4 

 

EXPLANATION

Hyper-V virtualization technology requires specific hardware. You can identify systems that support x64-based architecture and Hyper-V by searching the Windows Server Catalog for Hyper-V: Windows Server catalog.
Hyper-V Server has hardware requirements that are similar to those for the Hyper-V role in other editions of Windows Server. Hardware-enforced Data Execution Prevention (DEP) must be available and enabled. Specifically, you must enable the Intel XD (“execute disable”) bit or the AMD NX (“no execute”) bit.


SOURCE

https://technet.microsoft.com/en-us/library/cc731898(v=ws.11).aspx
Share:

Monday, July 9, 2018

Which of the following is not a system role in vCenter?

Which of the following is not a system role in vCenter?

  • Administrator
  • Read Only
  • No Access
  • Virtual Machine User (Power User) 
Which of the following is not a system role in vCenter?

EXPLANATION

Virtual Machine User is a sample role on the vCenter system of permissions - No Access, Administrator and Read Only are the system roles which are not customizable.

SOURCE

https://pubs.vmware.com/vsphere-60/topic/com.vmware.ICbase/PDF/vsphere-esxi-vcenter-server-60-security-guide.pdf
Share:

Friday, June 15, 2018

The VHDX virtual hard disk format supports what maximum storage capacity?

The VHDX virtual hard disk format supports what maximum storage capacity?

  • 640GB
  • 6.4PB
  • 64TB
  • 6.4TB 

 
The VHDX virtual hard disk format supports what maximum storage capacity?

EXPLANATION

The VHDX disk format supports virtual hard disks as large as 64TB with power failure resiliency.


Share:

Monday, May 7, 2018

In vSphere, what technology is used to perform a live migration of a VM to another host?

In vSphere, what technology is used to perform a live migration of a VM to another host?

  • Replication
  • VMotion
  • Cloning
  • Snapshots 

 
In vSphere, what technology is used to perform a live migration of a VM to another host?

EXPLANATION




VMware VMotion enables the live migration of running virtual machines from one physical server to another with no downtime, continuous service availability, and complete transaction integrity. It is transparent to users.



 www.mosaictec.com/tessera/what-is-vmotion.htm

Share:

Wednesday, April 18, 2018

A hypervisor that runs directly on top of hardware (as opposed to on an OS) is known as:

A hypervisor that runs directly on top of hardware (as opposed to on an OS) is known as:

  • Side saddle
  • Hosted
  • Bare metal
  • Type 2 

 
A hypervisor that runs directly on top of hardware (as opposed to on an OS) is known as:

EXPLANATION

A bare-metal (also known as native or type-1) hypervisor runs directly on the host's hardware to control the hardware and to manage guest operating systems. For this reason, they are sometimes called bare-metal hypervisors.
A guest operating system runs as a process on the host.
Share:

Thursday, April 5, 2018

The software layer that abstracts physical resources from the VMs or operating systems running on top is the:

The software layer that abstracts physical resources from the VMs or operating systems running on top is the:

  • Compiler
  • Browser
  • Hypervisor
  • VMBus 

 
The software layer that abstracts physical resources from the VMs or operating systems running on top is the:

EXPLANATION

A hypervisor is computer software that creates and runs virtual machines. A hypervisor also divides the physical resources of a server and allocates them to all of the VMs that it manages.
Share:

Friday, March 30, 2018

The physical server that runs the hypervisor is known as the:

The physical server that runs the hypervisor is known as the:

  • Master
  • Trunk
  • Host
  • Root 
The physical server that runs the hypervisor is known as the:

EXPLANATION


A hypervisor is a program that allows multiple operating systems to share a single hardware host. The hypervisor runs on a host server, which is the physical server that provides the resources used these virtual operating systems. https://en.wikipedia.org/wiki/Hypervisor
The term "Host" comes from the biological relationship between a host and a parasite. http://www.businessdictionary.com/definition/host-computer.html
 

Share:

Tuesday, March 6, 2018

Which of the following technologies is required to run Hyper-V on Windows 2012 R2?

Which of the following technologies is required to run Hyper-V on Windows 2012 R2?

  • Hardware Enforced Data Execution Prevention (DEP)
  • Hyper-threading
  • DirectX
  • MMX4 

 
Which of the following technologies is required to run Hyper-V on Windows 2012 R2?

EXPLANATION

Hyper-V virtualization technology requires specific hardware. You can identify systems that support x64-based architecture and Hyper-V by searching the Windows Server Catalog for Hyper-V: Windows Server catalog.
Hyper-V Server has hardware requirements that are similar to those for the Hyper-V role in other editions of Windows Server. Hardware-enforced Data Execution Prevention (DEP) must be available and enabled. Specifically, you must enable the Intel XD (“execute disable”) bit or the AMD NX (“no execute”) bit.

SOURCE

https://technet.microsoft.com/en-us/library/cc731898(v=ws.11).aspx
Share:

Wednesday, February 21, 2018

Which is the standard file extension used by VMWare for virtual hard drive images?

Which is the standard file extension used by VMWare for virtual hard drive images?

  • VHD (Virtual Hard Disk)
  • VDI (Virtual Disk Image)
  • VMDK (Virtual Machine Disk)
  • HDD (Hard Disk Drive) 

 
Which is the standard file extension used by VMWare for virtual hard drive images?

EXPLANATION

VMDK is the standard used by VMWare and is supported by several other virtual hypervisors.  It can contain the entire virtual machine, including settings.
VHD is the standard typically used by Microsoft Hyper-V.  It represents a single virtual drive, and does not contain configuration settings for the rest of the virtual machine.
HDD is the standard for Parallels.
VDI is the standard and default for type-2 hypervisor VirtualBox; it can use and create all four of the listed formats, however.

Share:

Tuesday, February 6, 2018

In VMware ESXi, when expanding a virtual disk, which of the follwing should not exist?

In VMware ESXi, when expanding a virtual disk, which of the follwing should not exist?

  • A new virtual machine
  • Backup
  • Snapshots
  • Available space 

 
In VMware ESXi, when expanding a virtual disk, which of the follwing should not exist?

EXPLANATION


The Prerequisites for expanding a virtual disk are:

■ Power off the virtual machine.
■ Verify that the virtual disk is not mapped or mounted. You cannot expand a virtual disk while it is mapped or mounted.
■ Verify that the virtual machine has no snapshots.
■ Verify that the virtual machine is not a linked clone or the parent of a linked clone.

SOURCE

https://pubs.vmware.com/workstation-9/index.jsp?topic=%2Fcom.vmware.ws.using.doc%2FGUID-73BEB4E6-A1B9-41F4-BA37-364C4B067AA8.html
Share:

Thursday, January 18, 2018

What are VM snapshots intended to be used for?

What are VM snapshots intended to be used for?

  • To easily revert the VM to an earlier state
  • To shut down the server
  • As a backup tool for your VMs
  • To create albums 

 
What are VM snapshots intended to be used for?

EXPLANATION

Snapshots provide a fast and easy way to revert the virtual machine to a previous state. For this reason, virtual machine snapshots are intended mainly for use in development and test environments. Having an easy way to revert a virtual machine can be very useful if you need to recreate a specific state or condition so that you can troubleshoot a problem.
There are certain circumstances in which it may make sense to use snapshots in a production environment. For example, you can use snapshots to provide a way to revert a potentially risky operation in a production environment, such as applying an update to the software running in the virtual machine.
Many backup products use snapshots in a production environment. They create a snapshot and then processing continues from the snapshot, meanwhile they have an unchanging original to back up. Once the backup is completed the snapshot is merged back into the live environment. This allows a machine to be backed up with very little affect for the users and for them remains up 24/7.
NB: Hyper-V snapshots do not replace backups. Backup usually involves some form of duplication (so two copies of the protected data exist) but in snapshots... there is no duplication whatsoever. All data is in VHD(X) file and changes in AVHD(X) file and if the VHD(X) file is damaged/lost, the data is pretty much gone. Also with most backups you can restore a single file to an earlier state, but with Snapshots, it's all or nothing (meaning if an user wants a file from last week, you'd have to bring the whole system back a week). There are other concerns as well (there might be performance  issues with multiple snapshots, snapshots usually lose value as they age and there are issues with disk space)

SOURCE

https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1015180
 
Share:

Popular Posts