Question
Question 1 (Marks: 25) Q.1.1 Your manager has created a virtual hard disk and has tasked you to explain how this created virtual disk can
Question 1 (Marks: 25) | ||||||||||||||
Q.1.1 | Your manager has created a virtual hard disk and has tasked you to explain how this created virtual disk can be edited later. Explain. | (5) | ||||||||||||
Q.1.2 | Explain the editions of Windows Server 2016 below. In your answer, include three differences in terms of features between them and give a practical example of what each feature does: Standard edition. Datacenter edition. Follow this table to format your answer:
| (12) | ||||||||||||
Q.1.3 | Consider the two different types of checkpoints: standard checkpoint and production checkpoint. Explain the importance of checkpoints and for each checkpoint type, describe an example of a situation or event you may use each type. | (8) |
The Independent Institute of Education (Pty) Ltd 2022
Page 3 of 6
20; 21l 22 2022
Question 2 (Marks: 20) | ||
Q.2.1 | Your company has adopted Microsoft HyperV as a virtualisation platform and started using Virtual Machine Manager to manage its virtual servers. They would like to create hardware templates to make deploying virtual machines easier. Using suitable examples, differentiate between a file server and DHCP server hardware profiles. | (8) |
Q.2.2 | You have been tasked with the installation of a Virtual Machine Manager (VMM) in your companys network. Discuss the system requirements for running VMM, also include why these are required. | (12) |
Question 3 (Marks: 25) | ||
Q.3.1 | Using suitable examples, explain how Security policy can be defined and describe two security exceptions that an administrator can set. | (10) |
Q.3.2 | Using suitable examples, explain how TrafficShaping policy can be defined and describe two traffic characteristics that the administrator can set to prioritise network traffic. | (9) |
Q.3.3 | Differentiate between the two supported iSCSI targetdiscovery methods on ESXi hots. | (6) |
Question 4 (Marks: 25) | ||
Q.4.1 | Explain the function of three components that make up the Microsoft virtual Desktop infrastructure. | (9) |
Q.4.2 | You are a network technician and your manager would like to know how to access virtual Desktops through the web. | (5) |
The Independent Institute of Education (Pty) Ltd 2022
Page 4 of 6
20; 21l 22 2022
Briefly explain in detail (not more than five facts or points) your manager how she would access the virtual Desktop through the web. | ||
Q.4.3 | You have finished preparing a template that can be used to create virtual desktops. Your manager requested you to provide him with steps on how he can make the desktops available to the users. Provide the correct steps. | (5) |
Q.4.4 | Briefly explain what application virtualization is and what benefits it provides. | (6) |
Question 5 (Marks: 25) | ||
Q.5.1 | Softwaredefined networking (SDN) is directly part of virtualization. Is the statement above correct? Argue in support or against the above statement. | (3) |
Q.5.2 | Explain by giving one reason each, why a college institution would need to deploy or adopt each of the following applications of Infrastructure as a Service (IaaS). In your answer, include suitable examples. Building a cloudbased data Center. Hosting Private Cloud Services. Implementing Disaster Recovery. | (12) |
Q.5.3 | Consider the Hacker Cycle diagram below and then answer the question that follows. | (10) |
The Independent Institute of Education (Pty) Ltd 2022
Page 5 of 6
20; 21l 22
2022
Explain its purpose and describe using one example each what each phase in the cycle involves. |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started