Citrix XenServer Questions

1. The __________ manages the network and storage I/O for all guest virtual machines.
a. Hardware layer
b. Control domain
c. Xen hypervisor
d. Windows virtual machine
Answser: B

2. The _________ decouples the operating system and its applications from the underlying
hardware.
a. Xen hypervisor
b. Control domain
c. Linux virtual machine
d. Windows virtual machine
Answer: A
3. XenServer can be installed over the network using an XML-based answer file?
a. True
b. False
Answer: True

4. Before installing XenServer, you should: (Choose two)
a. Verify that the whole physical disk is at least 20 GB of space.
b. Verify that the server meets the CPU and memory requirements.
c. Test the connection when installing from a remote disk.
d. Remove all existing data that may be on the server.
Answers: B and C

5. Which two configurations are recommended when more than one disk is available for storage?
a. RAID 0
b. RAID 1
c. RAID 5
d. RAID 10
Answers: B and C
6. Which installation source is the simplest way to deploy Windows virtual machines on multiple XenServers?
a. PXE boot
b. ISO library
c. Physical CD
d. Local storage
Answer: B

7. The key to improving performance of Windows virtual machines is to use __________ for network and storage devices.
a. Emulated drivers
b. Hypervisor drivers
c. Virtual drivers
d. Paravirtualized drivers
Answer: D

8. NFS and CIFS clients are included with XenServer.
a. True
b. False
4. XenServer Tools is installed automatically on Windows and Linux virtual machines.
a. True
b. False
Answer: B
9. XenServer includes a guest agent which provides what additional information about the virtual machine to the host? (Choose three)
a. Linux distribution name and version
b. Number of CPUs available
c. Kernel version
d. IP address of each Ethernet interface
Answers: A, C and D

10. SLES 10, __________, and __________ are Xen-enabled distributions.
a. RHEL 3
b. CentOS 5
c. SLES 10 SP1
d. RHEL 4/5
Answers: B and D

11. For optimal performance, both Windows and Linux virtual machines require __________storage and network drivers.
a. Virtualized
b. Emulated
c. Paravirtualized
d. Unmodified
Answer: C
12. The __________ function is best used for the initial creation of base virtual machines.
a. Copy
b. Snapshot
c. Export as backup
d. Convert to template
Answer: D

13. When exporting a virtual machine, the virtual machine __________.
a. Must still be running
b. Is converted to the host version of XenServer
c. Is exported by XenServer as a set of compressed binary files
d. Data is sent over the SSL link to the system running XenCenter
Answer: D

14. Full templates for Debian Etch and Debian Sarge are included in XenServer.
a. True
b. False
Answer: A
15. What operating systems does XenConvert support? (Choose four.)
a. CentOS 4.5 - 4.6 (32-bit)
b. CentOS 5.0 - 5.2 (32-bit and 64-bit)
c. Windows XP SP2 (32-bit)
d. Windows 2000 SP4 (32-bit)
e. RHEL 5.0 - 5.2 (32-bit and 64-bit)
f. Windows Server 2003 Standard, Enterprise SP2 (64-bit)
g. Windows Server 2003 Web, Standard, Enterprise SP0/ SP1/SP2/R2 (32-bit)
Answers: C, D, F, and G

16. XenConvert always produces a virtualized instance of a workload that can be used with XenServer.
a. True
b. False
Answer: A
17. Which tool is used to increase the size of a virtual disk in a Windows virtual machine in the command-line interface?
a. fdisk
b. diskpart
c. Disk Manager
d. Partition Manager
Answer: B

18. Select the highest priority that can be set for a storage I/O resource.
a. 0
b. 1
c. 7
d. 10
Answer: A

19. The size of virtual disks can be increased or decreased using XenCenter.
a. True
b. False
Answer: B

20. Windows virtual machines need to be __________ after adding a vCPU.
a. Halted
b. Restarted
c. Reinstalled
d. Powered off
Answer: B

21. A virtual machine is set to a CPU priority of __________ by default, but critical services should be set to __________ while test servers could be set to __________.
a. Normal, lowest, highest
b. Highest, normal, lowest
c. Normal, highest, lowest
d. Lowest, normal, highest
Answer: C

22. by default, the CPU Scheduler __________.
a. Dedicates a CPU for each virtual machine
b. Must be manually configured
c. Moves CPUs between cores based on load
d. Assigns a CPU to the first virtual machine created
Answer: C

23. Spreading virtual machine network load allows for an adjustable traffic mix as _____________ requirements change.
a. CPU
b. Memory
c. Storage
d. Bandwidth
Answer: D

24. NIC bonds work in a(n) _____________ mode by default.
a. Active
b. Locked
c. Passive
d. Active/active
Answer: D

25. A virtual NIC can be added by __________ and __________. (Choose two.)
a. Clicking New in the General tab on XenCenter
b. Using the xe nic -create commands in the command-line interface
c. Using the xe network -create commands in the command-line interface
d. Clicking Add Interface in the Network tab in XenCenter
Answers: C and D

26. The management NIC cannot be used for virtual machine connections.
a. True
b. False
Answer: B

27.Which of the following commands modifies a virtual machine in the command-line interface?
a. xe vm-param-set name-label="My New Name"
b. xe vm-set uuid=07da0013-026d name-label="My New Name"
c. xe vm-set uuid=07da0013-026d-cfbc-93bf-ea426782c795 name-label="My New Name"
d. xe vm-param-set uuid=07da0013-026d-cfbc-93bf-ea426782c795 name-label="My New
Name"
Answer: D

28. Which of the following tasks is not required for XenServer and Active Directory integration?
a. Enabling Active Directory authentication
b. Adding user accounts
c. Assigning roles to user accounts
d. Disabling the local super user account
Answer: D

29. Which of the following is not a description of a XenServer object?
a. Representation of a physical host in a XenServer pool
b. Representation of a particular virtual machine instance on a XenServer host or resource
Pool
c. Representation of an object name associated with the object.
d. On-disk representation of a virtual disk provided to a virtual machine.
Answer: C

30. The Virtual Machine Power Administrator cannot migrate virtual machines or perform snapshots.
a. True
b. False
Answer: B

31. Which two adapter types does XenServer support?
a. NFS adapters
b. ATTO host adapters
c. iSCSI HBA adapters
d. Fibre Channel adapters
Answers: C and D

32. Which of the following items is used to turn storage devices into a storage pool?
a. Linux drivers
b. Xen hypervisor
c. Open iSCSI client
d. Logical volume manager
Answer: C

33. A physical block device:
a. Is an on-disk representation of a virtual disk provided to a guest virtual machine.
b. Represents the interface between a physical host and an attached storage repository.
c. Is a connector object that allows mappings between VDIs and virtual machines.
d. Allows the fine-tuning of parameters regarding QoS
Answers: C

34. Which options are available for setting up local storage?
a. Install the product on both disks.
b. Configure additional local storage after the installation.
c. Install the product and storage repository on the same disk.
d. Install the product on one disk and use other disks for storage repository.
Answers: B, C and D

35. Which three tasks should you perform before adding a secondary server to a pool?
a. Shut down all running virtual machines.
b. Disconnect any shared storage.
c. Disconnect local disk.
d. Ensure that NICs are connected to the same networks in the same pool in the same order.
Answers: A, B and D

36. Resource pools in a XenServer environment: (Choose two.)
a. Allow multiple virtualization servers to be treated as a single entity from a management perspective
b. Use a master/secondary server model for management
c. Use heartbeats on the network and a storage device to determine the state of the servers
d. Provide a process for disaster recovery
Answers: A and B

37. Which of the following statements about resource pool architecture are true? (Choose two.)
a. The master and secondary servers communicate using the same XML-RPC protocol.
b. The GUI and command-line interface communicate using XML-RPC protocol over HTTP
to call the XAPI.
c. The GUI and remote command-line interface always connect to the master.
d. The local command-
Answers: A and C

38. What happens when a fence action is taken?
a. The server is immediately restarted.
b. The server is immediately put into maintenance mode.
c. All of the virtual machines running on the server are stopped.
d. All of the virtual machines running on the server are suspended.
Answer: C

39. Which two commands support the metadata backup/restore feature in the control domain?
(Choose two.)
a. xe backup-vmdata
b. xe backup-metadata
c. xe restore-vmdata
d. xe restore-metadata
Answers: B and D

40. What type of shared storage does not work in a high availability configuration?
a. NFS
b. iSCSI
c. Fibre Channel LUN
Answer: A

41. Which Workload Balancing report displays resource usage for CPU, memory, network reads, and network writes?
a. Virtual Machine Performance History report
b. Pool Health report
c. Host Health History report
d. Optimization Performance History report
Answer: A

42. You can use Workload Balancing to help determine when to turn off hosts at certain times of the day.
a. True
b. False
Answer: A

43. Which two actions must you perform when configuring antivirus software on a server running Workload Balancing components? (Choose two.)
a. Include the folder that contains the Workload Balancing log.
b. Exclude the folder that contains the Workload Balancing log.
c. Include the SQL Server database folder.
d. Exclude the SQL Server database folder.
Answers: B and D

44. XenCenter or the command-line interface can be used to migrate virtual machines running on a XenServer host running an older version of the product to one running either the same version or higher.
a. True
b. False
Answer: A

45. What are three things to check when you have trouble connecting to the XenServer host with XenCenter?
a. Is the license current?
b. Is XenServer running Linux virtual machines without XenTools?
c. Is XenServer using port 443 to communicate with XenCenter?
d. Is XenCenter an older version than the XenServer host you are attempting to connect to?
Answers: A, C and D

46. What items does the event log include a description of for an event recorded by XenCenter?
a. alert and error
b. alert, information, and error
c. action, information, alert, and error
d. actions, errors, and failed login attempts
Answer: C

Comments

Popular posts from this blog

enable TLS 1.2 and disabling TLS1.0 and SSL 3 on all exchange servers and Clients

HP 3PAR storage Commands to troubleshoot performance issues