IT Essentials 8.0 Module 9.3.1.2 Virtualization and Cloud Computing Quiz Answers
1. To which category of hypervisor does the Microsoft Virtual PC belong?
- Type 1
- Type 2
- Type 3
- Type 4
Explanation: The Microsoft Virtual PC is an example of a Type 2 hypervisor. Type 2 is hosted by an operating system.
2. Which statement describes a characteristic of cloud computing?
- A business can connect directly to the Internet without the use of an ISP.
- Applications can be accessed over the Internet through a subscription.
- Devices can connect to the Internet through existing electrical wiring.
- Investment in new infrastructure is required in order to access the cloud.
Explanation: Cloud computing allows users to access applications, back up and store files, and perform tasks without needing additional software or servers. Cloud users access resources through subscription-based or pay-per-use services, in real time, using nothing more than a web browser.
3. A company uses a cloud-based payroll system. Which cloud computing technology is this company using?
- browser as a service (BaaS)
- infrastructure as a service (IaaS)
- software as a service (SaaS)
- wireless as a service (WaaS)
Explanation: This item is based on information contained in the presentation.
There is no such thing as BaaS. Infrastructure as a service (IaaS) is when key network devices such as routers and firewalls are leased from a provider. Wireless as a service (WaaS) is when a provider provides wireless connectivity at a fixed monthly cost.
4. Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?
- browser as a service (BaaS)
- infrastructure as a service (IaaS)
- software as a service (SaaS)
- wireless as a service (WaaS)
Explanation: This item is based on information contained in the presentation.
Routers, switches, and firewalls are infrastructure devices that can be provided in the cloud.
5. Which term is associated with Cloud computing?
IT Essentials 8.0 Module 9.3.1.2 Virtualization and Cloud Computing Quiz
- teleworkers
- wireless
- tall servers
- virtualization
Explanation: Cloud computing involves computers, software, servers, network devices, and other services physically held at a remote location. Virtualization is used by the cloud computing vendors so they can provide multiple servers, networks, applications, operating systems, etc. to clients without having to buy the equipment for each one. Virtualization of servers, for example, allows multiple servers to be on one physical server. Each server could be for a different client if necessary.
6. For a large enterprise deploying virtualized servers, what are two benefits of using a bare metal hypervisor solution instead of a hosted hypervisor solution? (Choose two.)
- direct access to hardware resources
- increased efficiency
- enhanced security
- elimination of the need for management console software
- addition of an extra layer of abstraction
Explanation: Type 1, or bare metal hypervisors, install directly on host hardware. Because of this, a Type 1 hypervisor has direct access to the host hardware resources; and thus has fewer layers of abstraction and is more efficient. However, bare metal hypervisors do need to have management console software to manage the VM instances.
7. What is the difference between a data center and cloud computing?
- The data center makes use of more devices to process data.
- Cloud computing provides access to shared computing resources, while a data center is a facility that stores and processes data.
- Of the two, only cloud computing is located off-site.
- There is no difference. These terms can be used interchangeably.
- Data centers require cloud computing but cloud computing does not require data centers.
Explanation: Cloud service providers use one or more data centers for services and resources such as data storage. A data center is a data storage facility located inside the company and maintained by the IT staff or leased from a co-location provider where the maintenance can be done by the provider or the corporate IT staff.
8. Which statement describes the concept of cloud computing?
- separation of application from hardware
- separation of operating system from hardware
- separation of control plane from data plane
- separation of management plane from control plane
Explanation: Cloud computing is used to separate the application or service from hardware. Virtualization separates the operating system from the hardware.
9. A college is exploring options to outsource the student email service to a cloud provider. Which two solutions will help the college to achieve the task? (Choose two.)
- Gmail
- Dropbox
- OneDrive
- Virtual Desktop
- Exchange Online
Explanation: Gmail and Exchange Online are cloud-based email services. OneDrive and Dropbox are cloud-based file storage solutions. The virtual desktop solution deploys the entire desktop environment of an organization from a server in a data center to clients.
10. How does cloud computing improve the performance and user experience of an online version of office productivity tools?
- by providing application code as needed
- by downloading the application package to the local storage
- by ensuring a secure connection between the client and the service provider
- by connecting local hardware devices, such as a printer, to the service provider
Explanation: Organizations use cloud-based applications to provide on-demand software delivery. When a user requests an application, minimal application code is forwarded to the client. The client pulls additional code from the cloud server as needed.
11. A research and development group has members from different company locations. The group is looking for a central file storage solution to store research-related documents. What are two possible solutions? (Choose two.)
- Gmail
- OneDrive
- Google Drive
- virtual desktop
- Exchange Online
Explanation: Google Drive and OneDrive are cloud-based file storage solutions. Gmail and Exchange Online are cloud-based email services. The virtual desktop solution deploys the entire desktop environment of an organization from a server in a data center to client
12. A small advertising company is considering outsourcing the information technology services to a cloud provider. The services would include user training, software licensing, and provisioning. What cloud service would the company consider purchasing?
- IT as a service (ITaaS)
- platform as a service (PaaS)
- software as a service (SaaS)
- infrastructure as a service (IaaS)
Explanation: IT as a service (ITaaS) extends the capability of IT services so that the company does not need to invest in new infrastructure. ITaaS providers also provide training for new personnel and licensing for new software required by the company. These services are available on demand and delivered economically to any device anywhere in the world without compromising security or function.
13. The IT department in a company is looking for a solution to consolidate the functionality of several mission critical server computers into VMs on a few high performance host machines. Which two hypervisors should be considered? (Choose two.)
- VMWare vSphere
- Oracle VM Server
- VMWare Workstation
- Oracle VM VirtualBox
- Windows 10 Hyper-V
Explanation: Mission critical services should use server virtualization technology with a Type 1 hypervisor. VMWare vSphere and Oracle VM Server are examples of Type 1 hypervisors. VMWare Workstation, Oracle VM VirtualBox, and Windows 10 Hyper-V are examples of Type 2 hypervisors.
14. What is a characteristic of a virtual machine running on a PC?
- A virtual machine runs its own operating system.
- A virtual machine is not susceptible to threats and malicious attacks.
- A virtual machine needs a physical network adapter to connect to the Internet.
- The number of virtual machines that can be made available depends on the software resources of the host machine.
Explanation: Each virtual machine runs its own operating system. The number of virtual machines that can be made available depends on the hardware resources of the host machine. Virtual machines are susceptible to threats and malicious attacks, like physical computers. To connect to the Internet, a virtual machine uses a virtual network adapter, that acts like a physical adapter in a physical computer, connecting through the physical adapter on the host to establish a connection to the Internet.