Which of the following is not a function hypervisor management software?
A. Create VM.
B. Store VM.
C. Delete VM.
D. Move VM.

1 Answer

Answer :

Store VM.

Related questions

Description : In a ____________ scheme, the VM is installed as a Type 1 Hypervisor directly onto the hardware. a) paravirtualization b) full virtualization c) emulation d) none of the mentioned

Last Answer : full virtualization

Description : Which of the following should be placed in second lowermost layer for the following figure?a) Host Operating System b) Software c) VM d) None of the mentioned

Last Answer : Host Operating System

Description : . _________ is virtualization software for the x86 architecture. a)VMware b) GAE c) VM d) VirtualBox

Last Answer : VirtualBox

Description : Point out the wrong statement. a) Some hypervisors are installed over an operating system and are referred to as Type 2 or hosted VM b) All CPUs support virtual machines c) On a Type 2 VM, ... is created that emulates the devices with which a system would normally interact d) All of the mentioned

Last Answer : All CPUs support virtual machines

Description : Which of the following should be placed in second lowermost layer for the following figure?a) Host Operating System b) Software c) VM d) None of the mentioned

Last Answer : Host Operating System

Description : The program which provide partitioning, isolation or abstraction is called? A. virtualization hypervisor B. software hypervisor C. hardware hypervisor D. system hypervisor

Last Answer : virtualization hypervisor

Description : In which issue, It is challenging to migrate an application, which is resource-intensive to cloud and to execute it via Virtual Machine? A. Architectural Issues B. Security and Privacy C. Mobile Communication Congestion D. Live VM Migration

Last Answer : Live VM Migration

Description : An operating system running on a Type ______ VM is full virtualization. A. 1 B. 2 C. 3 D. 4

Last Answer : 1

Description : Point out the wrong statement : A. Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through ... A process virtual machine instantiates when a command begins a process D. All of the above

Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

Description : Point out the wrong statement : A. Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through ... A process virtual machine instantiates when a command begins a process D. All of the above

Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

Description : Which of the following is Type 2 VM? a) VirtualLogix VLX b) VMware ESX c) Xen d) LynxSecure

Last Answer : Xen

Description : An operating system running on a Type ______ VM is full virtualization. a) 1 b) 2 c) 3 d) All of the mentioned

Last Answer : 1

Description : Mention what are the networking options used in OpenStack a. Flat Network Manager: IP addresses for VM instances are fetched from the subnet, and then injected into the image on launch b. Flat DHCP Network ... is started for each VLAN to pass out IP addresses to VM instances. d. All of the above

Last Answer : All of the above

Description : Mention what are the networking options used in OpenStack a. Flat Network Manager: IP addresses for VM instances are fetched from the subnet, and then injected into the image on launch b. Flat DHCP Network ... is started for each VLAN to pass out IP addresses to VM instances. d. All of the above

Last Answer : All of the above

Description : The gateway administrator provides the _________ template information when the infrastructure is set up. a) Cloud b) HDFS c) better d) VM

Last Answer : VM

Description : Point out the wrong statement. a) Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware ... A process virtual machine instantiates when a command begins a process d) All of the mentioned

Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

Description : Which of the following is Type 2 VM? a) VirtualLogix VLX b) VMware ESX c) Xen d) LynxSecure

Last Answer : Microsoft Hyper-V

Description : An operating system running on a Type ______ VM is full virtualization. a) 1 b) 2 c) 3 d) All of the mentioned

Last Answer : 1

Description : Which of the following component is called hypervisor? a) VGM b) VMc c) VMM d) All of the mentioned

Last Answer : VMM

Description : __________ allows multiple operating system instances to run as guest on the same server. A. Server. B. Hypervisor. C. Network. D. Data.

Last Answer : Hypervisor.

Description : Which statement is true about a bare metal hypervisor? A. It can only be hosted on an existing operating system. B. It requires a separate license for the native operating system. C ... system. D. It runs directly on server hardware to provide virtual machines with timesharing resources.

Last Answer : It runs directly on server hardware to provide virtual machines with timesharing resources.

Description : What is used to logically assign and separate physical resources such as memory and CPU in a cloud computing model? A. bios B. a hypervisor C. a load balancer D. a blade chassis

Last Answer : a hypervisor

Description : IaaS offers an isolated environment to individual customers through? A. hypervisor B. virtual machine sprawl C. security vulnerabilities D. renting

Last Answer : hypervisor

Description : Which of the following is Type 1 Hypervisor? A. Wind River Simics B. Virtual Server 2005 R2 C. KVM D. LynxSecure

Last Answer : LynxSecure

Description : Hypervisor also known as? A. high-level program B. simple program C. complex program D. low-level program

Last Answer : low-level program

Description : ____________ is a firmware that acts as a Virtual Machine Manager. A. Hypervisor B. Network C. Server D. Storage

Last Answer : Hypervisor

Description : Parallels Desktop is an example of? A. TYPE-1 Hypervisor B. DISPATCHER C. TYPE-2 Hypervisor D. INTERPRETER

Last Answer : TYPE-2 Hypervisor

Description : Parallels Desktop is an example of? A. TYPE-1 Hypervisor B. DISPATCHER C. TYPE-2 Hypervisor D. INTERPRETER

Last Answer : Parallels Desktop is an example of? A. TYPE-1 Hypervisor B. DISPATCHER C. TYPE-2 Hypervisor D. INTERPRETER

Description : The allocator is invoked by the? A. INTERPRETER B. DISPATCHER C. Both A and B D. TYPE-2 Hypervisor

Last Answer : DISPATCHER

Description : Which of the following is not an examples of Type 1 hypervisors? A. VMware ESXi B. Citrix XenServer C. VMware Player D. Microsoft Hyper-V hypervisor

Last Answer : VMware Player

Description : Hypervisor runs directly on underlying host system.It is also known as? A. Bare metal hypervisor B. Native Hypervisor C. Hosted Hypervisor D. Both A and B

Last Answer : Both A and B

Description : How many types of hypervisor are there? A. 2 B. 3 C. 4 D. 5

Last Answer : 2

Description : A hypervisor is sometimes also called a? A. VMA B. VMS C. VMM D. VMR

Last Answer : VMM

Description : Which of the following is Type 1 Hypervisor? a) Wind River Simics b) Virtual Server 2005 R2c) KVM d) LynxSecure

Last Answer : LynxSecure

Description : Which type of Hypervisor is shown in the following figure?a) Type 1 b) Type 2 c) Type 3 d) All of the mentioned

Last Answer : Type 1

Description : Which of the following is open and both hypervisor and processor-architecture- agnostic? a) Dell Scalent b) CloudKick c) Elastra d) All of the mentioned

Last Answer : Dell Scalent

Description : Which of the following component is called hypervisor? a) VGM b) VMc c) VMM d) All of the mentioned

Last Answer : VMM

Description : ______ component is called hypervisor? a ) VGM b) VMc c) VMM d ) All of the mentioned

Last Answer : VMM

Description : Which of the following component is called hypervisor? a) VGM b) VMc c) VMM d) All of the mentioned

Last Answer : VMM

Description : What is most commonly used for managing the resources for every virtual system? a) Load balancer b) Hypervisor c) Router d) Cloud

Last Answer : Hypervisor

Description : Which of the following type of virtualization is found in hypervisor such as Microsoft’s Hyper-V? a) paravirtualization b) full virtualization c) emulation d) none of the mentioned

Last Answer : paravirtualization

Description : Which of the following is Type 1 Hypervisor? a) Wind River Simics b) Virtual Server 2005 R2 c) KVM d) LynxSecure

Last Answer : LynxSecure

Description : Which type of Hypervisor is shown in the following figure? a) Type 1 b) Type 2 c) Type 3 d) All of the mentioned

Last Answer : Type 1

Description : What is most commonly used for managing the resources for every virtual system? a) Load balancer b) Hypervisor c) Router d) Cloud

Last Answer : Hypervisor

Description : Point out the correct statement. a) With PaaS, the goal is to create hosted scalable applications that are used in a Software as a Service model b) Applications built using PaaS tools need to ... , the data and transaction management conforms to the business rules you create d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) With PaaS, the goal is to create hosted scalable applications that are used in a Software as a Service model b) Applications built using PaaS tools need to ... the data and transaction management conforms to the business rules you create d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned

Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data

Description : Point out the correct statement. a) Platforms cannot be based on specific types of development languages, application frameworks, or other constructs b) PaaS systems offer a way to create user ... customers may interact with the software to enter and retrieve data d) All of the mentioned

Last Answer : PaaS systems offer a way to create user interfaces

Description : Point out the wrong statement. a) Platforms represent nearly the full cloud software stack b) A platform in the cloud is a software layer that is used to create higher levels of servicec) ... replete with tools and utilities to aid in application design and deployment d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned