Applications of different criticality have been deployed on a collection of virtual servers. In an effort to save cost, a business continuity plan has been devised to provide half the number of physical servers to host the virtual machines at the disaster recovery site.
What is a possible outcome if a disaster were to occur at the primary site?
A. Applications cannot be resolved
B. Application data is inaccessible
C. Application data is lost
D. Application performance is degraded
What cloud characteristic provides computing resources that facilitate multiple consumers using a multi-tenant model, with different physical and virtual components that are dynamically assigned and reassigned based on demand?
A. On-demand self-service
B. Resource pooling
C. Rapid elasticity
D. Measured service
An organization supporting 10,000 desktop PCs is considering implementing VDI. What is a benefit of moving forward with a VDI plan?
A. Control and containment of IP
B. Reduced impact on network infrastructure
C. No change in desktop management methods and tools
D. Immediate cost savings
An application processes test results from a manufacturing facility, then generates and archives quality reports. The application runs on an old, but still supported UNIX system. It was developed by an organization's IT department 10 years ago. While it has not been changed in over five years, the application source code and skills needed to modify it are still available internally.
What is this an example of?
A. A legacy application
B. Vendor lock-in
C. An enterprise application
D. Service-oriented architecture
A development organization uses a PaaS service from a public cloud to develop and test an application. Once sending and verification are complete, the development team discovers that the cloud services uses proprietary software in the PaaS clustering mailing and deployment of the application within their production data center imposition without significant application records.
What this type of lock-in called?
A. Geographical lock-in
B. Technology lock-in
C. Cloud lock-in
D. Vendor lock-in
What could delay a virtualization or cloud initiative?
A. Failed audits
B. Compliance concerns
C. Risk assessments
D. Improper asset valuations
You are meeting with the CIO to discuss your VDC design. They question the amount of capital that is being invested in iSCSI adapters. They state that, because of the number of adapters required, it is more cost-effective to purchase 10 Gigabit Ethernet NICs and use the integrated hypervisor software stack.
What effect will this have on the hypervisors?
A. Increased CPU load
B. Increased amount of I/O
C. Decreased amount of I/O
D. Decreased CPU load
Applications of different criticality have been deployed on a collection of virtual servers. In an effort to save cost, a business continuity plan has been devised to provide half the number of physical servers to host the virtual machines at the disaster recovery site.
What is a likely outcome if a disaster were to occur at the primary site?
A. Application performance would be degraded
B. Data would not be available to applications
C. Application URLs could not be resolved
D. Application data would be lost
A large company with multiple heterogeneous arrays would like to take advantage of the performance simplified management benefits of storage virtualization. They have a data center transformation pain that includes producing power and cooling at a high priority.
Which storage virtualization method would meet their requirements?
A. Network-based storage tiering
B. Vertical storage tiering
C. Server-based storage tiering
D. Horizontal storage tiering
An application executes code on a remote host while receiving keyboard and mouse input from the endpoint.
Which application virtualization architecture has been implemented?
A. Presentation
B. Thin install
C. Streaming
D. Thick install