Question

1) In a Windows clustering in a virtual environment, what are the 3 types of cluster...

1) In a Windows clustering in a virtual environment, what are the 3 types of cluster configurations? ( 1 point)

2) Why would you use clustering?  ( 1 point)

3) Define "role" ,"priviledge"and "permission" in the ESXI/vCenter Server security model. ( .5 points each)

4) Name and Describe the 3 vSphere storage presentation models  ( .5 points each)

5) How does vSphere use shared storage?  ( 1 point)

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. Fail-over Cluster, Load-balancing Cluster and HIGH Performance Computing Cluster.

2.Goal of clustering is to determine the intrinsic(natural) grouping in a set of Unlabeled data. It is an unsupervised learning (i.e. there is no output variable to guide the learning process) data is explored by algorithms to find pattern. opposed to supervised learning where your existing data is already labeled and you know which behaviour you want to determine in the new data you obtain , unsupervised technique don’t use labelled data and the algorithms are left to themselves to discover structures in the data.

3.Roles:Roles are sets of privileges. Roles allow you to assign permissions on an object based on a typical set of tasks that users perform. Default roles, such as Administrator, are predefined on vCenter Server and cannot be changed. Other roles, such as Resource Pool Administrator, are predefined sample roles. You can create custom roles either from scratch or by cloning and modifying sample roles.

Privileges:Privileges are fine-grained access controls. You can group those privileges into roles, that you can then map to users or groups.

Permissions:Each object in the vCenter Server object hierarchy has associated permissions. Each permission specifies for one group or user which privileges that group or user has on the object.

4.   

5.The protocols used for vSphere Shares Storage are iSCSI and NFS, both of which are natively supported in vSphere. The performance of NFS and iSCSI are similar, but both can vary depending on a variety of factors including the data storage device characteristics, network speed/latency and host server resources. Since both protocols use software built into vSphere to manage the storage connections over the network there is some minimal CPU resource usage on the host server as a result.

No extra hardware is required on a vSphere server to connect to a shared storage device using iSCSI or NFS, but it is recommended to have a dedicated network for this traffic. This includes dedicated NICs in the host server as well as a dedicated network switch that is isolated from the rest of the normal virtual machine network traffic. Additionally for iSCSI there are special network adapters (hardware initiators) available that have a TCP/IP Offload Engine (TOE) in them that offloads the iSCSI protocol processing from the host server which reduces the CPU overhead on the host.

Add a comment
Know the answer?
Add Answer to:
1) In a Windows clustering in a virtual environment, what are the 3 types of cluster...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1) In a Windows clustering in a virtual environment, what are the 3 types of cluster configuratio...

    1) In a Windows clustering in a virtual environment, what are the 3 types of cluster configurations? 2) Why would you use clustering?   3) Define "role" ,"priviledge"and "permission" in the ESXI/vCenter Server security model.   4) Name and Describe the 3 vSphere storage presentation models   5) How does vSphere use shared storage?

  • CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Additional Questions (5) Total. 210. What...

    CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Additional Questions (5) Total. 210. What is the PowerShell command to get the PowerShell version on Server 2016? Select one: a. Get-Version b. Get-PSVersion c. Get-Host d. Get-HostVersion 211. Server 2016 supports volume size up to _____ for storage replication. Select one: a. 256GB b. 64TB c. 128TB d. 1 PB 212. Which of these commands is used to get Windows OS information using Powershell? Select one: a. Get-SystemInfo b....

  • CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Additional Questions (5) Total. 143. Which...

    CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Additional Questions (5) Total. 143. Which of the following generation virtual machines can be created in Microsoft Hyper-V? (Choose 2) Select one or more: a. Generation 2 b. Generation 4 c. Generation 3 d. Generation 1 144. Which of the following details of IP address can a DHCP server provide? Select one: a. All of the listed options. b. Automatic allocation c. Dynamic allocation d. Static allocation 145. DHCP uses...

  • K-means clustering Problem 1. (10 pts) Suppose that we have the gene expression values for 5...

    K-means clustering Problem 1. (10 pts) Suppose that we have the gene expression values for 5 genes (G1 to G5) under 4 time points (t1 to t4) as shown in the following table. Please use K-Means clustering to group 5 genes into 2 clusters based on Euclidean distance. Find out the final centroids and their affiliated genes. The initial centroids are c1=(1,2,3,4) and c2=c(9,8,7,6). Please write down your algorithm step by step. Result without steps won't get points. t1 t2...

  • K-means clustering K-means clustering is a very well-known method of clustering unlabeled data. The simplicity of...

    K-means clustering K-means clustering is a very well-known method of clustering unlabeled data. The simplicity of the process made it popular to data analysts. The task is to form clusters of similar data objects (points, properties etc.). When the dataset given is unlabeled, we try to make some conclusion about the data by forming clusters. Now, the number of clusters can be pre-determined and number of points can have any range. The main idea behind the process is finding nearest...

  • 1. What is the difference between simple paging and virtual memory paging? 2. Explain thrashing. 3....

    1. What is the difference between simple paging and virtual memory paging? 2. Explain thrashing. 3. Why is the principle of locality crucial to the use of virtual memory? 4. What elements are typically found in a page table entry? briefly define each element. 5. What is the purpose of translation lookaside buffer?

  • I need help answering this from a developer point of view Linux Windows Mobile Devices Development...

    I need help answering this from a developer point of view Linux Windows Mobile Devices Development Mac Requirements Server Side <Evaluate Mac for its characteristics, advantages, and weaknesses for hosting a web- based software application> Client side Determine the software development considerations (cost, time, expertise) that are necessary for supporting multiple types of clients as they pertain to Mac. <Evaluate Linux <Evaluate <Evaluate Mobile for its Windows for its Devices for their characteristics, characteristics, characteristics, advantages, and advantages, and advantages,...

  • 1.Define what a linear program/linear programing model is including its three key characteristics. Be sure to...

    1.Define what a linear program/linear programing model is including its three key characteristics. Be sure to state those characteristics fully. 2.Some models are deterministic while others are stochastic. Discuss two key differences between deterministic models and stochastic models. Then further demonstrate your understanding of these two different kinds of models by providing an example of a stochastic model including at least two input variables and an example of a deterministic model including at least two input variables. 3.Every linear program/linear...

  • CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private,...

    CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private, and community clouds. What are some of the factors to consider when choosing which of the three to use? 2. How do cloud threats differ from traditional threats? Against what threats are cloud services typically more effective than local ones? 3. You are opening an online store in a cloud environment. What are three security controls you might use to protect customers’ credit card...

  • QUESTION 1 Virtual Memory is a technique that makes excellent use of available space on a...

    QUESTION 1 Virtual Memory is a technique that makes excellent use of available space on a hard drive, to temporarily store data that would otherwise require massive amounts of main memory (RAM). True False 2 points    QUESTION 2 Which of these allocation schemes require the entire program to be loaded before execution can begin? I. Segmented/Demand paged II. Paged III. Segmented IV. Demand paged 2 points    QUESTION 3 Select the advantages of the First-In First-Out page replacement policy...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT