Deck 5: Installing and Working With Microsoft Hyper-V

ملء الشاشة (f)
exit full mode
سؤال
What are the two different types of checkpoints?

A) Primary and secondary
B) Standard and production
C) Supplemental and tertiary
D) Production and standby
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Hyper-V supports the use of a physical floppy drive within virtual machines, much the same way a physical DVD drive can be used to support discs.
سؤال
Available on both generations of virtual machines, Secure Boot can be used to block unauthorized software and operating systems from running at boot.
سؤال
When a virtual machine in Hyper-V is saved from the Action menu, where is the virtual machine's memory and state information saved to?

A) They're both saved to a file on the host computer
B) They're both saved to the virtual machine's virtual hard disk file.
C) They're both saved to the virtual machine's configuration file.
D) They're both saved to the guest OS's page file, much like a traditional suspend operation.
سؤال
When using the Hyper-V hypervisor, what is the default mouse release key combination that will transfer mouse control from the VM back to the host?

A) Ctrl + Home
B) Ctrl + Enter
C) Ctrl + Alt + left arrow
D) Ctrl + Alt + Insert
سؤال
What version of Windows Server 2016 does not include the Hyper-V role?

A) Windows Server 2016 Standard
B) Windows Server 2016 Datacenter
C) Windows Server 2016 Web
D) Windows Server 2016 Essentials
سؤال
Virtual machine performance suffers without the installation of Integration Services for Hyper-V VMs.
سؤال
A virtual machine that is paused on Hyper-V has a saved state, similar to a snapshot, that is reverted to when the virtual machine is resumed.
سؤال
You have enabled the "Data Exchange" feature within Integration Services for Hyper-V. What registry key is used to pass information back and forth between the guest and the host?

A) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Virtual Machine\Guest\Parameters
B) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Hyper-V\Guest\Parameters
C) HKEY_USERS\SOFTWARE\Microsoft\Hyper-V\Guest\Parameters
D) HKEY_CLASSES_ROOT\SOFTWARE\Microsoft\Virtual Machine\Guest\Parameters
سؤال
Where in the Hyper-V Settings window for a virtual machine can you configure the ability of the virtual machine to access local resources on the host computer, such as audio, printers, and USB devices?

A) Peripheral Devices
B) Enhanced Session Mode Policy
C) Hardware Sharing
D) Host Resource Permissions
سؤال
Diskette drives are only available on generation one virtual machines.
سؤال
You are getting ready to deploy a virtual machine on a Hyper-V host, and have come to the "Specify Generation" window. What generation should you select if your virtual machine will have a 32-bit guest OS?

A) generation one
B) generation two
C) Both generations will support a 32-bit operating system.
D) Neither generations will support a 32-bit operating system.
سؤال
Where should you check to ensure that both the DEP/NX bit and hardware virtualization are enabled for your host machine running Windows Server 2016 Standard?

A) The system BIOS configuration screens.
B) Under Control Panel, in the System application.
C) The Microsoft Management Console.
D) Device Manager, under CPU
سؤال
When using the Hyper-V hypervisor, what virtual switch type is the most restrictive, in that it will not allow communication with even the host?

A) external network
B) isolated network
C) internal network
D) private network
سؤال
What happens when the "Delete" link is used from the Actions menu in Hyper-V Manager?

A) The virtual machine configuration files and virtual hard disks are deleted.
B) The virtual machine configuration files are removed, but the virtual disk files are left in place.
C) The virtual machine configuration files are retained, but the virtual disk files are deleted.
D) The virtual machine is removed from the list in Hyper-V manager, but both the configuration files and disk files remain intact.
سؤال
You are attempting to install a Windows Server 2008 guest OS to a SCSI based drive within a generation one virtual machine, however, you find you are unable to perform the install. What is the reason for this failure?

A) Windows Server 2008 does not support the virtual SCSI controller used by generation one VMs in Hyper-V.
B) A SCSI based drive can't be added to a generation one virtual machine.
C) Generation one virtual machines do not support a non-IDE based boot drive.
D) The BIOS of a generation one virtual machine will not recognize the SCSI controller.
سؤال
What Windows OS is not supported by Microsoft for installation within Hyper-V?

A) Windows Vista Professional Edition SP2
B) Windows 7 Home Edition
C) Windows Server 2008 R2
D) Windows Home Server 2011
سؤال
What does the Ctrl + Alt + Break key combination do within Hyper-V?

A) It releases the host mouse and keyboard from the VM's management screen.
B) It pauses the currently selected running virtual machine.
C) It performs a paste operation.
D) It toggles the use of the Full Screen Mode.
سؤال
What statement regarding the installation requirements for Hyper-V is accurate?

A) To install Hyper-V, you need a 32-bit or 64-bit version of Windows Server 2016.
B) You must have a processor that supports SLAT in order to install Hyper-V.
C) Hyper-V does not require the use of a processor with hardware virtualization.
D) Hyper-V will not run on a processor with the DEP/NX bit feature.
سؤال
What is the default disk type utilized by the Hyper-V hypervisor?

A) differencing disk
B) dynamic disk
C) fixed disk
D) independent disk
سؤال
Match between columns
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
DEP (Data Execution Prevention)
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
Enlightened I/O
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
AMD-V
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
GPU
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
NUMA spanning
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
differencing disk
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
vfd file
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
dynamic memory
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
replication
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
Trusted Platform Module (TPM)
Hardware virtualization support for AMD processors.
DEP (Data Execution Prevention)
Hardware virtualization support for AMD processors.
Enlightened I/O
Hardware virtualization support for AMD processors.
AMD-V
Hardware virtualization support for AMD processors.
GPU
Hardware virtualization support for AMD processors.
NUMA spanning
Hardware virtualization support for AMD processors.
differencing disk
Hardware virtualization support for AMD processors.
vfd file
Hardware virtualization support for AMD processors.
dynamic memory
Hardware virtualization support for AMD processors.
replication
Hardware virtualization support for AMD processors.
Trusted Platform Module (TPM)
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
DEP (Data Execution Prevention)
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
Enlightened I/O
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
AMD-V
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
GPU
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
NUMA spanning
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
differencing disk
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
vfd file
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
dynamic memory
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
replication
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
Trusted Platform Module (TPM)
A virtual floppy disk file that can be attached to a virtual machine.
DEP (Data Execution Prevention)
A virtual floppy disk file that can be attached to a virtual machine.
Enlightened I/O
A virtual floppy disk file that can be attached to a virtual machine.
AMD-V
A virtual floppy disk file that can be attached to a virtual machine.
GPU
A virtual floppy disk file that can be attached to a virtual machine.
NUMA spanning
A virtual floppy disk file that can be attached to a virtual machine.
differencing disk
A virtual floppy disk file that can be attached to a virtual machine.
vfd file
A virtual floppy disk file that can be attached to a virtual machine.
dynamic memory
A virtual floppy disk file that can be attached to a virtual machine.
replication
A virtual floppy disk file that can be attached to a virtual machine.
Trusted Platform Module (TPM)
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
DEP (Data Execution Prevention)
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
Enlightened I/O
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
AMD-V
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
GPU
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
NUMA spanning
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
differencing disk
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
vfd file
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
dynamic memory
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
replication
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
Trusted Platform Module (TPM)
Special hardware that handles cryptographic keys.
DEP (Data Execution Prevention)
Special hardware that handles cryptographic keys.
Enlightened I/O
Special hardware that handles cryptographic keys.
AMD-V
Special hardware that handles cryptographic keys.
GPU
Special hardware that handles cryptographic keys.
NUMA spanning
Special hardware that handles cryptographic keys.
differencing disk
Special hardware that handles cryptographic keys.
vfd file
Special hardware that handles cryptographic keys.
dynamic memory
Special hardware that handles cryptographic keys.
replication
Special hardware that handles cryptographic keys.
Trusted Platform Module (TPM)
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
DEP (Data Execution Prevention)
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
Enlightened I/O
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
AMD-V
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
GPU
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
NUMA spanning
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
differencing disk
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
vfd file
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
dynamic memory
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
replication
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
Trusted Platform Module (TPM)
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
DEP (Data Execution Prevention)
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
Enlightened I/O
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
AMD-V
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
GPU
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
NUMA spanning
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
differencing disk
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
vfd file
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
dynamic memory
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
replication
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
Trusted Platform Module (TPM)
An option that enables a host PC's memory and processors to be split up into nodes.
DEP (Data Execution Prevention)
An option that enables a host PC's memory and processors to be split up into nodes.
Enlightened I/O
An option that enables a host PC's memory and processors to be split up into nodes.
AMD-V
An option that enables a host PC's memory and processors to be split up into nodes.
GPU
An option that enables a host PC's memory and processors to be split up into nodes.
NUMA spanning
An option that enables a host PC's memory and processors to be split up into nodes.
differencing disk
An option that enables a host PC's memory and processors to be split up into nodes.
vfd file
An option that enables a host PC's memory and processors to be split up into nodes.
dynamic memory
An option that enables a host PC's memory and processors to be split up into nodes.
replication
An option that enables a host PC's memory and processors to be split up into nodes.
Trusted Platform Module (TPM)
A disk that is tied to another disk, and only stores the changes between the two disks.
DEP (Data Execution Prevention)
A disk that is tied to another disk, and only stores the changes between the two disks.
Enlightened I/O
A disk that is tied to another disk, and only stores the changes between the two disks.
AMD-V
A disk that is tied to another disk, and only stores the changes between the two disks.
GPU
A disk that is tied to another disk, and only stores the changes between the two disks.
NUMA spanning
A disk that is tied to another disk, and only stores the changes between the two disks.
differencing disk
A disk that is tied to another disk, and only stores the changes between the two disks.
vfd file
A disk that is tied to another disk, and only stores the changes between the two disks.
dynamic memory
A disk that is tied to another disk, and only stores the changes between the two disks.
replication
A disk that is tied to another disk, and only stores the changes between the two disks.
Trusted Platform Module (TPM)
سؤال
What statement regarding the use of a generation two virtual machine is accurate?

A) Generation two virtual machines support the use of legacy network adapters.
B) A generation two virtual machine simulates the newer style EFI firmware.
C) A generation two virtual machine will not support a SCSI based DVD drive.
D) A generation two virtual machine does not support the addition of an IDE controller.
سؤال
What is used to facilitate the use of virtual machine dynamic memory?

A) The virtual hard disk associated with the virtual machine.
B) A registry entry that enables sharing the host's page file with all guest machines.
C) The virtualization features of the processor are used to overload and compress the amount of physical RAM needed for the dynamic memory.
D) The smart paging file, which is normally located in the same directory as the virtual machine configuration files.
سؤال
What security options exist for a virtual machine within Hyper-V under the Hardware section?
سؤال
A production type checkpoint within Hyper-V utilizes what service in the guest OS to perform the checkpoint?

A) Windows Backup Service
B) Volume Shadow Copy Service
C) Background Intelligent Transfer Service
D) Integration Services Checkpoint for Windows
سؤال
What is the difference between the live migrations feature and the storage migration feature within Hyper-V, and what configuration options exist for each in the Hyper-V Settings window?
سؤال
What are the three import types in Hyper-V?
سؤال
When you have finished using a virtual machine in Hyper-V, what are your options for ending the session?
سؤال
How do the two different types of checkpoints available in Hyper-V differ?
سؤال
What are the installation requirements for Hyper-V when using Windows Server 2016?
سؤال
Under what menu in the Virtual Machine Connection window can you send a "Ctrl+Alt+Delete" sequence to the guest OS?

A) File
B) Action
C) View
D) Edit
سؤال
How do virtual COM ports communicate with the host machine on Hyper-V?

A) COM ports communicate via special TCP/IP enabled network adapters on the guest and the host.
B) The serial ports must utilize a special Microsoft USB driver that passes the traffic on the host's USB bus.
C) Communication occurs through a setting in the Windows registry.
D) Communication is done through the use of a named pipe.
سؤال
What is the difference between the two virtual disk file formats supported by Hyper-V hypervisor?
سؤال
A user has asked for your assistance in restoring the wizard windows and confirmation messages that they've checked the "Do not show this again" option. Where can this setting be found?

A) Under the Hyper-V Settings dialog box, within the "User" section.
B) Under the Hyper-V Settings dialog box, within the "Server" section.
C) Under the Actions menu, "Reset Check Boxes" option.
D) Under the virtual machine settings window, in the "Management" section.
سؤال
What are some of the limitations inherent in the use of generation one versus generation two virtual machines?
سؤال
Where can the settings for the Shielding option on a virtual machine be configured?

A) Under the Hyper-V Settings window for a host, in the Server section.
B) Under the Hyper-V Settings window for a host, in the User section.
C) Under the Settings window for the virtual machine, in the Hardware section.
D) Under the Settings window for the virtual machine, in the Management section.
سؤال
What configuration settings are available in the Hyper-V Settings Server section, and what does each setting do?
سؤال
What are the features that are enabled through the use of Integration Services with Hyper-V?
سؤال
You are about to install a guest OS from a DVD disc. What must you do in order to install the guest OS in a generation two virtual machine?

A) Map the host's DVD drive to a DVD drive in the virtual machine.
B) An IDE controller must be added to the virtual machine, and a DVD player attached to it.
C) An ISO file must be created from the DVD in order to use it with a generation two virtual machine.
D) Nothing, the default configuration for a second generation virtual machine is to use the physical DVD drive as the source for installation.
سؤال
When using a physical graphics card to accelerate video and 3D rendering in a virtual machine, what role must be added to the server?

A) Virtualized Desktop Infrastructure role
B) Terminal Services role
C) 3D Render Host role
D) Remote Desktop Virtualization role
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Installing and Working With Microsoft Hyper-V
1
What are the two different types of checkpoints?

A) Primary and secondary
B) Standard and production
C) Supplemental and tertiary
D) Production and standby
B
2
Hyper-V supports the use of a physical floppy drive within virtual machines, much the same way a physical DVD drive can be used to support discs.
False
3
Available on both generations of virtual machines, Secure Boot can be used to block unauthorized software and operating systems from running at boot.
False
4
When a virtual machine in Hyper-V is saved from the Action menu, where is the virtual machine's memory and state information saved to?

A) They're both saved to a file on the host computer
B) They're both saved to the virtual machine's virtual hard disk file.
C) They're both saved to the virtual machine's configuration file.
D) They're both saved to the guest OS's page file, much like a traditional suspend operation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
5
When using the Hyper-V hypervisor, what is the default mouse release key combination that will transfer mouse control from the VM back to the host?

A) Ctrl + Home
B) Ctrl + Enter
C) Ctrl + Alt + left arrow
D) Ctrl + Alt + Insert
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
6
What version of Windows Server 2016 does not include the Hyper-V role?

A) Windows Server 2016 Standard
B) Windows Server 2016 Datacenter
C) Windows Server 2016 Web
D) Windows Server 2016 Essentials
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
7
Virtual machine performance suffers without the installation of Integration Services for Hyper-V VMs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
8
A virtual machine that is paused on Hyper-V has a saved state, similar to a snapshot, that is reverted to when the virtual machine is resumed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
9
You have enabled the "Data Exchange" feature within Integration Services for Hyper-V. What registry key is used to pass information back and forth between the guest and the host?

A) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Virtual Machine\Guest\Parameters
B) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Hyper-V\Guest\Parameters
C) HKEY_USERS\SOFTWARE\Microsoft\Hyper-V\Guest\Parameters
D) HKEY_CLASSES_ROOT\SOFTWARE\Microsoft\Virtual Machine\Guest\Parameters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
10
Where in the Hyper-V Settings window for a virtual machine can you configure the ability of the virtual machine to access local resources on the host computer, such as audio, printers, and USB devices?

A) Peripheral Devices
B) Enhanced Session Mode Policy
C) Hardware Sharing
D) Host Resource Permissions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
11
Diskette drives are only available on generation one virtual machines.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
12
You are getting ready to deploy a virtual machine on a Hyper-V host, and have come to the "Specify Generation" window. What generation should you select if your virtual machine will have a 32-bit guest OS?

A) generation one
B) generation two
C) Both generations will support a 32-bit operating system.
D) Neither generations will support a 32-bit operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
13
Where should you check to ensure that both the DEP/NX bit and hardware virtualization are enabled for your host machine running Windows Server 2016 Standard?

A) The system BIOS configuration screens.
B) Under Control Panel, in the System application.
C) The Microsoft Management Console.
D) Device Manager, under CPU
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
14
When using the Hyper-V hypervisor, what virtual switch type is the most restrictive, in that it will not allow communication with even the host?

A) external network
B) isolated network
C) internal network
D) private network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
15
What happens when the "Delete" link is used from the Actions menu in Hyper-V Manager?

A) The virtual machine configuration files and virtual hard disks are deleted.
B) The virtual machine configuration files are removed, but the virtual disk files are left in place.
C) The virtual machine configuration files are retained, but the virtual disk files are deleted.
D) The virtual machine is removed from the list in Hyper-V manager, but both the configuration files and disk files remain intact.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
16
You are attempting to install a Windows Server 2008 guest OS to a SCSI based drive within a generation one virtual machine, however, you find you are unable to perform the install. What is the reason for this failure?

A) Windows Server 2008 does not support the virtual SCSI controller used by generation one VMs in Hyper-V.
B) A SCSI based drive can't be added to a generation one virtual machine.
C) Generation one virtual machines do not support a non-IDE based boot drive.
D) The BIOS of a generation one virtual machine will not recognize the SCSI controller.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
17
What Windows OS is not supported by Microsoft for installation within Hyper-V?

A) Windows Vista Professional Edition SP2
B) Windows 7 Home Edition
C) Windows Server 2008 R2
D) Windows Home Server 2011
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
18
What does the Ctrl + Alt + Break key combination do within Hyper-V?

A) It releases the host mouse and keyboard from the VM's management screen.
B) It pauses the currently selected running virtual machine.
C) It performs a paste operation.
D) It toggles the use of the Full Screen Mode.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
19
What statement regarding the installation requirements for Hyper-V is accurate?

A) To install Hyper-V, you need a 32-bit or 64-bit version of Windows Server 2016.
B) You must have a processor that supports SLAT in order to install Hyper-V.
C) Hyper-V does not require the use of a processor with hardware virtualization.
D) Hyper-V will not run on a processor with the DEP/NX bit feature.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
20
What is the default disk type utilized by the Hyper-V hypervisor?

A) differencing disk
B) dynamic disk
C) fixed disk
D) independent disk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
21
Match between columns
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
DEP (Data Execution Prevention)
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
Enlightened I/O
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
AMD-V
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
GPU
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
NUMA spanning
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
differencing disk
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
vfd file
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
dynamic memory
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
replication
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
Trusted Platform Module (TPM)
Hardware virtualization support for AMD processors.
DEP (Data Execution Prevention)
Hardware virtualization support for AMD processors.
Enlightened I/O
Hardware virtualization support for AMD processors.
AMD-V
Hardware virtualization support for AMD processors.
GPU
Hardware virtualization support for AMD processors.
NUMA spanning
Hardware virtualization support for AMD processors.
differencing disk
Hardware virtualization support for AMD processors.
vfd file
Hardware virtualization support for AMD processors.
dynamic memory
Hardware virtualization support for AMD processors.
replication
Hardware virtualization support for AMD processors.
Trusted Platform Module (TPM)
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
DEP (Data Execution Prevention)
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
Enlightened I/O
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
AMD-V
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
GPU
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
NUMA spanning
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
differencing disk
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
vfd file
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
dynamic memory
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
replication
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
Trusted Platform Module (TPM)
A virtual floppy disk file that can be attached to a virtual machine.
DEP (Data Execution Prevention)
A virtual floppy disk file that can be attached to a virtual machine.
Enlightened I/O
A virtual floppy disk file that can be attached to a virtual machine.
AMD-V
A virtual floppy disk file that can be attached to a virtual machine.
GPU
A virtual floppy disk file that can be attached to a virtual machine.
NUMA spanning
A virtual floppy disk file that can be attached to a virtual machine.
differencing disk
A virtual floppy disk file that can be attached to a virtual machine.
vfd file
A virtual floppy disk file that can be attached to a virtual machine.
dynamic memory
A virtual floppy disk file that can be attached to a virtual machine.
replication
A virtual floppy disk file that can be attached to a virtual machine.
Trusted Platform Module (TPM)
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
DEP (Data Execution Prevention)
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
Enlightened I/O
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
AMD-V
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
GPU
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
NUMA spanning
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
differencing disk
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
vfd file
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
dynamic memory
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
replication
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
Trusted Platform Module (TPM)
Special hardware that handles cryptographic keys.
DEP (Data Execution Prevention)
Special hardware that handles cryptographic keys.
Enlightened I/O
Special hardware that handles cryptographic keys.
AMD-V
Special hardware that handles cryptographic keys.
GPU
Special hardware that handles cryptographic keys.
NUMA spanning
Special hardware that handles cryptographic keys.
differencing disk
Special hardware that handles cryptographic keys.
vfd file
Special hardware that handles cryptographic keys.
dynamic memory
Special hardware that handles cryptographic keys.
replication
Special hardware that handles cryptographic keys.
Trusted Platform Module (TPM)
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
DEP (Data Execution Prevention)
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
Enlightened I/O
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
AMD-V
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
GPU
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
NUMA spanning
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
differencing disk
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
vfd file
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
dynamic memory
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
replication
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
Trusted Platform Module (TPM)
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
DEP (Data Execution Prevention)
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
Enlightened I/O
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
AMD-V
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
GPU
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
NUMA spanning
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
differencing disk
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
vfd file
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
dynamic memory
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
replication
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
Trusted Platform Module (TPM)
An option that enables a host PC's memory and processors to be split up into nodes.
DEP (Data Execution Prevention)
An option that enables a host PC's memory and processors to be split up into nodes.
Enlightened I/O
An option that enables a host PC's memory and processors to be split up into nodes.
AMD-V
An option that enables a host PC's memory and processors to be split up into nodes.
GPU
An option that enables a host PC's memory and processors to be split up into nodes.
NUMA spanning
An option that enables a host PC's memory and processors to be split up into nodes.
differencing disk
An option that enables a host PC's memory and processors to be split up into nodes.
vfd file
An option that enables a host PC's memory and processors to be split up into nodes.
dynamic memory
An option that enables a host PC's memory and processors to be split up into nodes.
replication
An option that enables a host PC's memory and processors to be split up into nodes.
Trusted Platform Module (TPM)
A disk that is tied to another disk, and only stores the changes between the two disks.
DEP (Data Execution Prevention)
A disk that is tied to another disk, and only stores the changes between the two disks.
Enlightened I/O
A disk that is tied to another disk, and only stores the changes between the two disks.
AMD-V
A disk that is tied to another disk, and only stores the changes between the two disks.
GPU
A disk that is tied to another disk, and only stores the changes between the two disks.
NUMA spanning
A disk that is tied to another disk, and only stores the changes between the two disks.
differencing disk
A disk that is tied to another disk, and only stores the changes between the two disks.
vfd file
A disk that is tied to another disk, and only stores the changes between the two disks.
dynamic memory
A disk that is tied to another disk, and only stores the changes between the two disks.
replication
A disk that is tied to another disk, and only stores the changes between the two disks.
Trusted Platform Module (TPM)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
22
What statement regarding the use of a generation two virtual machine is accurate?

A) Generation two virtual machines support the use of legacy network adapters.
B) A generation two virtual machine simulates the newer style EFI firmware.
C) A generation two virtual machine will not support a SCSI based DVD drive.
D) A generation two virtual machine does not support the addition of an IDE controller.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
23
What is used to facilitate the use of virtual machine dynamic memory?

A) The virtual hard disk associated with the virtual machine.
B) A registry entry that enables sharing the host's page file with all guest machines.
C) The virtualization features of the processor are used to overload and compress the amount of physical RAM needed for the dynamic memory.
D) The smart paging file, which is normally located in the same directory as the virtual machine configuration files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
24
What security options exist for a virtual machine within Hyper-V under the Hardware section?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
25
A production type checkpoint within Hyper-V utilizes what service in the guest OS to perform the checkpoint?

A) Windows Backup Service
B) Volume Shadow Copy Service
C) Background Intelligent Transfer Service
D) Integration Services Checkpoint for Windows
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
26
What is the difference between the live migrations feature and the storage migration feature within Hyper-V, and what configuration options exist for each in the Hyper-V Settings window?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
27
What are the three import types in Hyper-V?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
28
When you have finished using a virtual machine in Hyper-V, what are your options for ending the session?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
29
How do the two different types of checkpoints available in Hyper-V differ?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
30
What are the installation requirements for Hyper-V when using Windows Server 2016?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
31
Under what menu in the Virtual Machine Connection window can you send a "Ctrl+Alt+Delete" sequence to the guest OS?

A) File
B) Action
C) View
D) Edit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
32
How do virtual COM ports communicate with the host machine on Hyper-V?

A) COM ports communicate via special TCP/IP enabled network adapters on the guest and the host.
B) The serial ports must utilize a special Microsoft USB driver that passes the traffic on the host's USB bus.
C) Communication occurs through a setting in the Windows registry.
D) Communication is done through the use of a named pipe.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
33
What is the difference between the two virtual disk file formats supported by Hyper-V hypervisor?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
34
A user has asked for your assistance in restoring the wizard windows and confirmation messages that they've checked the "Do not show this again" option. Where can this setting be found?

A) Under the Hyper-V Settings dialog box, within the "User" section.
B) Under the Hyper-V Settings dialog box, within the "Server" section.
C) Under the Actions menu, "Reset Check Boxes" option.
D) Under the virtual machine settings window, in the "Management" section.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
35
What are some of the limitations inherent in the use of generation one versus generation two virtual machines?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
36
Where can the settings for the Shielding option on a virtual machine be configured?

A) Under the Hyper-V Settings window for a host, in the Server section.
B) Under the Hyper-V Settings window for a host, in the User section.
C) Under the Settings window for the virtual machine, in the Hardware section.
D) Under the Settings window for the virtual machine, in the Management section.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
37
What configuration settings are available in the Hyper-V Settings Server section, and what does each setting do?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
38
What are the features that are enabled through the use of Integration Services with Hyper-V?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
39
You are about to install a guest OS from a DVD disc. What must you do in order to install the guest OS in a generation two virtual machine?

A) Map the host's DVD drive to a DVD drive in the virtual machine.
B) An IDE controller must be added to the virtual machine, and a DVD player attached to it.
C) An ISO file must be created from the DVD in order to use it with a generation two virtual machine.
D) Nothing, the default configuration for a second generation virtual machine is to use the physical DVD drive as the source for installation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
40
When using a physical graphics card to accelerate video and 3D rendering in a virtual machine, what role must be added to the server?

A) Virtualized Desktop Infrastructure role
B) Terminal Services role
C) 3D Render Host role
D) Remote Desktop Virtualization role
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.