Exam Tech Virt 18 19 VF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Examen

Semestre : 1 2

Session : Principale Rattrapage

Module : Techniques de virtualisation


Enseignant(s) Sarra Berrahal, Nouha Samet
Classe(s) : 4 ARCTIC
Documents autorisés : NON Nombre de pages :
Calculatrice autorisée : NON Internet autorisée : NON
Date : 11/1/2019 Heure : 16 h Durée : 1H30

Part 1 (7 Pts)
N.B: Each question may have one or more correct answer(s). You should report the correct choice(s) on
your exam sheet

Q1: Virtualization has a set of properties that include:

a. Binary Compatibility.
b. Fault tolerance.
c. Performance isolation.
d. Interposition.
Q2: Bare-Metal virtualization can be supported by a number of solutions such as:

a. Vmware ESX/ESXi
b. Vmware workstation
c. Citrix XenServer
d. MS Hyper-V
Q3: Desktop Virtualization is a software technology that separates the desktop environment and
associated application software from the physical client device that is used to access it. Which of
the following citations is not associated to desktop virtualization?

a. Desktop virtualization simulates an environment where several VMs equipped with


an OS run on a server, itself operating with a particular OS (i.e., hypervisor).
b. Users can view and interact with their desktops over a network by using a remote
display protocol or thin clients based on Linux and XPe (WYSE ThinOS models).
c. An application running in an isolated environment, which do not require any local
installation, integration, or dependencies on the underlying computing platform, is
provided.
d. Desktop virtualization provides an easy way to share and mutualize the resources
among several applications.

1/5
Q4: A VPN is an assembly of private networks connected to each other but are isolated from public
networks (e.g., the Internet).

a. A VPN tunneling is used to enable the transmission of datagrams across the Internet
in a plain text format.
b. IP-in-IP tunneling is generally used by most VPNs by facilitating the encapsulation of an
encrypted datagram in the payload section of another datagram before its transmission to
destination point.
c. A VPN can be considered as a logical network built on top of one or more existing
physical networks.
d. The network control and forwarding functions are decoupled in a VPN solution
enabling the network control to become directly programmable and the underlying
infrastructure to be abstracted for applications and network services.
Q5: VM migration is, generally, associated to which citation(s)?

a. Migration is performed by copying a virtual machine in order to create a new one.


b. Migration is the process of moving a running VM from one physical hardware
environment to another, without disconnecting the client.
c. Migration can be provided as cold migration, warm migration, and light migration.
d. Migration accommodates for the changing workloads automatically so that users
experience high availability of applications at all times.
Q6: Which of the following virtualization management approaches can help organizations maintain
optimal hardware resource utilization over time?

a. Automatically reconfiguring virtual machines based on performance statistics


b. Deploying multiple copies of virtual machines to different host servers
c. Automatically moving virtual machines based on changes to resource requirements
d. Placing virtual machines on isolated virtual network switches
e. Storing virtual machines on a Storage Area Network (SAN)
Q7: You are a systems administrator that manages a lab environment for your organization’s
software developers and testers. How can you reduce the amount of time and effort you spend on
managing the lab environment while providing quicker deployments of new virtual machines?

a. Create a library of virtual machine templates and copy them to create new VMs
b. Invest in self-service virtualization provisioning systems
c. Give developers and testers permissions to create and deploy new VMs
d. Define standardized configurations for test environment virtual machines
Q8: In which mode, IPSec protects information delivered from the transport layer to the network
layer.

a. Transport
b. Tunnel
c. Either (a) or (b)

2/5
d. Neither (a) nor (b)
Q9: In RAID, which technique (s) that ensure to spread data across multiple drives in order to use
the drives in parallel

a. Striping,
b. Mirroring
c. Parity
d. Fault tolerance
Q10: Virtual Machine Monitor (VMM) can be defined as:

a. An isolated environment that behaves as a whole computer that contains its own
hardware resources.
b. The control system at the core of virtualization that enables the creation, management
and governance of virtual machines (VM).
c. Either (a) or (b).
d. Neither (a) nor (b).
Q11: Network virtualization can be employed to improve network efficiency/Increase flexibility
while reducing capital and operational costs. Which among the following citations is NOT a
definition that can be associated to network virtualization.

a. Network virtualization allows network aggregation and provisioning.


b. Network virtualization combines different physical network topologies into a single
one.
c. Network virtualization breaks a physical network into multiple virtual networks that
are isolated from each other.
d. Network virtualization can be applied within virtual servers to create synthetic
networks between virtual machines (VMs).
Q12: Full virtualization and Para-virtualization are two types of hypervisor-based virtualization that
could be differentiated by:
a. The use of a software that is directly installed and runs on the physical hardware and
can in theory exists without any accompanying operating system.
b. The software is used in order to provide server virtualization.
c. The VM simulates hardware to allow an unmodified guest OS to be run in isolation.
d. The virtualization software refers to an operating system feature in which the kernel
allows the existence of multiple isolated user-space instances
Q13: The Storage Area Networks (SANs):

a. Provides block-level access to shared data storage.


b. Supports online storage only.
c. Uses NFS to allow multiple remote systems to connect to a shared file systems.
d. None of them
Q14: Virtual Machine File System (VMFS) is the native file system for hypervisor. Which citation
among the following is not associated to VMFS:
a. Allows multiple compute systems to read and write to the same storage
simultaneously.

3/5
b. Provides on-disk locking to ensure that the same virtual machine is not powered on by
multiple compute systems at the same time.
c. Is mounted on the compute system in order to allow logical volumes to provide storage
for all VMs.
d. Is used for providing storage space for creating Virtual Machine File System to store
virtual machine files.

Part 2 (14 Pts)


NB: All the questions are independent.

1. In order to be able to run multiple OS on your laptop, you have decided to use VMWare
workstation to create different virtual machines (VMs) that need to access to Internet.
a. What are the possible configuration options that could be performed to enable
network connection to your VMs?
b. Explain the difference between them.
2. When dealing with server virtualization, two common hypervisor designs are supported;
namely, monolithic and microkernel architectures.
a. Explain the difference between these two hypervisor types regarding
architecture, use case, advantages and drawbacks, and market products.
b. We assume, at this point, that your VMs are running and one of your physical
servers is overloaded. Consequently, you should perform live VM migration to
another physical server. List the live migration techniques and explain the
difference between them.
3. Your organization is composed of 4 departments, which are distributed over multiple sites
and needs to be connected using Virtual Private Networks.
a. Which type of VPN solution should be deployed?
b. Justify you answer.
4. Software-Defined Networking (SDN) is an emerging architecture that is dynamic,
manageable, cost-effective, and adaptable solution for building high bandwidth networks.
a. What is the relation between SDN and network virtualization?
5. Your organization need to virtualize its data storage. Two possibilities are offered to you
to make the decision, as illustrated in the figure below. Accordingly, you are asked to:
a. Identify the two approaches presented in the figure,
b. Explain the difference between the two approaches and point-out the
advantages offered by each of them.

4/5
6. Your organization asked you to deploy a solution in order to offer software to employees
without the need modifying the host computer or making any changes to the local
operating system, file system, or registry.
a. What are the different deployment types you can use in order to put in place
the application virtualization solution?
b. Could containerization be a solution the organization need? Identify the
relation between containerization and application virtualization.

5/5

You might also like