While using virtualization to share SAN adapters on a server, how does Node Port ID Virtualization (NPIV) differ from Virtual SCSI (vSCSI) related to the use of multipathing software?()
A . NPIV andvSCSI both require multipathing in VIO Server only.
B . NPIV requiresmultipathing software on client LPARs, vSCSI requires multipathing software on VIO Server.
C . NPIV requiresmultipathing software on VIO Server, vSCSI requires multipathing software on client LPARs.
D . NPIV requiresmultipathing and MPIO software on VIO Server LPARs, vSCSI requires multipathing software on VIO Server and MPIO on client LPARs.
-
While using virtualization to share SAN adapters on a server, how does Node Port ID Virtualization (NPIV) differ from Virtual SCSI (vSCSI) related to the use of multipathing software?()
A . NPIV and vSCSI both require multipathing in VIO Server only.
B . NPIV requires multipathing software on client LPARs, vSCSI requires multipathing software on VIO Server.
C . NPIV requires multipathing software on VIO Server, vSCSI requires multipathing software on client LPARs.
D . NPIV requires multipathing and MPIO software on VIO Server LPARs, vSCSI requires multipathing software on VIO Server and MPIO on client LPARs.
-
When using Overlay Transport Virtualization (OTV), how do L2 multicast frames traverse the overlay?()
A . The L2 multicast frames are encapsulated in an OTV packet using the configured control-group multicast address for transport
B . The L2 multicast frames are dropped because multicast cannot be carried across the overlay
C . The L2 multicast frames are encapsulated in an OTV packet using the configured data-group multicast address for transport
D . The L2 multicast frames are forwarded natively across the overlay based on their multicast ID
-
Which of the following functions can be performed using the Integrated Virtualization Manager?()
A . Concurrent firmware updates
B . Management of virtual storage
C . Hot add/remove of I/O drawers
D . Management of Capacity on Demand
-
Companycom LPAR that is using a Virtual IO Server needs to be more highly available. How can this be accomplished using APV features?()
A . Reallocate the Virtual IO Server disks to the user LPAR
B . Create a stripe-group within the Virtual IO Server to protect against disk failure
C . Reconfigure the user LPAR to use both locally owned disk and a Virtual SCSI disk
D . Create a second Virtual IO Server and reconfigure the user LPAR to mirror across both Virtual IO Server
-
Companycom will be using Virtual IO Server to share Ethernet adapters. What can be done to prevent network failure of the client if a Virtual IO Server goes down?()
A . Create two virtual adapters on the client, each one from a separate Virtual IO Server
B . Enable dead gateway detection on the client so that the network traffic can be rerouted
C . Have a spare network card on standby in the client in case the Virtual IO Server goes down
D . Create an etherchannel adapter on the client using one Virtual Ethernet adapter from two separate Virtual IO Server
-
Which tool is used to correctly size an IBM virtual tape solution?()
A . System Planning Tool (SPT)
B . Tape Magic
C . Capacity Magic
D . TS3500 Slot Calculator
-
A customer is debating whether to use Shared Ethernet versus Virtual Ethernet. Which of the following best describes a key difference between Shared and Virtual Ethernet?()
A . Shared Ethernet runs on POWER4 systems
B . Virtual Ethernet runs on POWER4 systems
C . Shared Ethernet requires a Virtual I/O server and Advanced Power Virtualization
D . Virtual Ethernet requires a Virtual I/O server and Advanced Power Virtualizatio
-
How many years of experience do you have with deploying and maintaining a virtualization infrastructure using Microsoft desktop or server virtualization technologies?()
A . I have not done this yet.
B . Less than 6 months
C . More than 6 months but less than 1 year
D . 1-2 years
E . 2-3 years
F . More than 3 year
-
Overlay Transport Virtualization (OTV) uses the Authoritative Edge Device (AED) to perform which tasks?()
A . The AED is responsible for sending all unicast traffic in a site, while either node in a site can transmit multicast and broadcast.
B . The AED is responsible for load balancing all traffic for all VLANs across the transport network.
C . The AED is responsible for handling all unicast, broadcast, and multicast traffic for a given VLAN within a site.
D . The AED is responsible for MAC address dispute contention for a given VLAN.
-
What restrictions apply to using virtual Ethernet within a cluster containing VIO clients?()
A . IPAT via Aliasing must be used
B . IPAT via Replacement must be used
C . Resilience must be provided by the use of dual VIO servers
D . Hardware Address Takeover (HWAT) must be used to ensure a consistent virtual MAC addre
-
When using VSD, traffic flow goes from the virtual machine to which of these?()
A . Upstream switch
B . Virtual Supervisor Module
C . VMware distributed switch
D . VMware vSwitch
E . Service virtual machine
-
When NIC teaming is used ,how are loops avoided in a virtual switch?()
A . By using active / passive teaming with spanning tree on the active link
B . By using active / passive teaming with only the active link in use
C . By using active / active teaming with VM utilizing both uplink port
-
The Cisco network-based virtual firewall service solution helps service providers to deliver cost-effective, scalable, integrated security services for enterprise customers using Cisco platforms.What is a virtual firewall?()
A . another name for a firewall deployed in routed mode
B . another name for a firewall deployed in transparent mode
C . a separation of multiple firewall security contexts on a single firewall
D . a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
-
The Cisco network-based virtual firewall service solution helps service providers to deliver costeffective, scalable, integrated security services for enterprise customers using Cisco platforms .What is a virtual firewall?()
A . another name for a firewall deployed in routed mode
B . another name for a firewall deployed in transparent mode
C . a separation of multiple firewall security contexts on a single firewall
D . a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
-
Your company has an Active Directory Domain Services (AD DS) domain. You virtualize applications by using Microsoft Application Virtualization (App-V). You are creating an application virtualization package. Which should you use?()
A . Microsoft Application Virtualization Sequencer
B . Microsoft Application Virtualization Desktop Client
C . Microsoft System Center Application Virtualization Streaming Server
D . Microsoft System Center Application Virtualization Management Server
-
How many years of experience do you have with deploying and maintaining a virtualization infrastructure using any desktop or server virtualization technologies?()
A . I have not done this yet.
B . Less than 6 months
C . More than 6 months but less than 1 year
D . 1 - 2 years
E . 2 - 3 years
F . More than 3 year
-
Which of the following is an advantage of using virtualization to consolidate servers?()
A . Reduced power and space requirements
B . Saves money on software costs
C . Maintenance is easier because there is only one server
D . Fewer instances of the operating system to maintai
-
In the wireless advanced feature set using lightweight access points, a virtual interface is used when supporting which of the following features?()
A . psk authentication
B . eap authentication
C . wpa authentication
D . web authenticatio
-
In the wireless Advanced Feature Set using lightweight access points, a virtual interface is used when supporting which of the following features?()
A . PSK authentication
B . EAP authentication
C . WPA authentication
D . Web authenticatio
-
When NIC teaming is used, how are Loops avoided in a virtual switch?()
A . By using active / passive teaming with spanning tree on the active Iink
B . By using active / passive teaming with onIy the active Iink in use
C . By using active / activate teaming with VM utilizing both uplink port
-
Your company uses Microsoft Application Virtualization (App-V). Your environment includes
Your company uses Microsoft Application Virtualization (App-V). Your environment includes multiple client computer configurations, as shown in the following table.Configuration Operating s ystem Processor App-V c lientConfig1 Windows Vista 32-bit 4.5Config 2 Windows Vista 64-bit 4.6Config 3 Windows 7 32-bit 4.5Config 4 Windows 7 64-bit 4.6You need to deploy a 32-bit application to all client computers.Which reference computer configuration should you use?()
A.Config1 with App-V Sequencer 4.5 32-bit
B.Config2 with App-V Sequencer 4.6 64-bit
C.Config3 with App-V Sequencer 4.6 32-bit
D.Config4 with App-V Sequencer 4.6 64-bit
-
有如下程序:include<iostream>using namespace std;class GA{public:virtual int f(){return 1
有如下程序: include<iostream> using namespace std; class GA{ public: virtual int f(){return 1;} }; class GB:public GA{ public: virtual int f(){return 2;} }; void show(GA g){eout<<g.f();} void display(GA&g){cout<<g.f();} int main(){ GA a;show(A) ;display(A) ; GB b;show(B) ;display(B) ; return 0; } 程序的输出结果是
A.1111
B.1211
C.1112
D.1212
-
有如下程序include<iostream>using namespace std;class base{public:virtual void f1(){cout<<
有如下程序 include<iostream> using namespace std; class base { public: virtual void f1() { cout<<"F1Base"; } virtual void f2() { cout<<"F2Base"; } }; class derive:public base { void f1() { cout<<"F1 Derive"; } void f2(int x) { cout<<"F2 Derive"; } }; int main() { base obj1,*p; derive obj2; p=& obj2; p->f1(); p->f2(); return (); ) 执行后的输出结果是()。
A.F1Derive F2Base
B.F1Derive F2Derive
C.F1Base F2Base
D.F1Base F2Derive
-
在下列基类的定义中,有无virtual修饰use成员函数的结...
在下列基类的定义中,有无virtual修饰use成员函数的结果将不同,其原因是______。
当use()为虚拟函数时的程序执行结果:
sizeof(A)=8
sized(B)=12
sizeof(C)=16
当use()非虚拟函数时的程序执行结果:
sizeof(A)=4
sized(B)=8
sizeof(C)=12
源程序如下:
include<iostream.h>
class Grandad
{
public:
Grandad():money(10){}
int money;
virtual void use(){}
};
class Father:public Grandad
{
public:
Father():money(100){}
int money;
void use(){}
};
class Son:public Father
{
public:
Son():money(300){}
int money;
void use(){}
};
void main(void)
{
Grandad A;Father B;Son C;
cout<<"sizeof(A)="<<sizeof(A)<<endl;
cout<<"sizeof(B)="<<sizeof(B)<<endl;
cout<<"sizeof(C)="<<sizeof(C)<<endl;
}