Please draw on the whiteboard a high level drawing that details a cluster of 4 ESXi host, connected to a vCenter, that has 20 VMs evenly balanced across the hosts. There are 2 network switches (A & B) connected to data, and service console. The hosts are connected to 4-500GB shared storage LUNs that are presented via fiber channel.
Note: Most qualified VM Engineer will be able to draw something. If you are recruiting to fill an engineering spot that will be representing your team it is important that he can whiteboard a high level design with confidence.Continue reading
When planning your backup strategy you need to consider how often you will perform a backup, how much time the backup takes and what media you will use. What other factor must you consider when planning your backup strategy? _________
Many factors are taken into account when planning a backup strategy. The one most important one is how often does the file ____________.
You attempt to use shadow passwords but are unsuccessful. What characteristic of the /etc/passwd file may cause this? Choose one: a. The login command is missing. b. The username is too long. c. The password field is blank. d. The password field is prefaced by an asterick.
You create a new user account by adding the following line to your /etc/passwd file. bobm:baddog:501:501:Bob Morris:/home/bobm:/bin/bash Bob calls you and tells you that he cannot logon. You verify that he is using the correct username and password. What is the problem? Choose one: a. The UID and GID cannot be identical. b. You cannot have spaces in the line unless they are surrounded with double quotes. c. You cannot directly enter the password; rather you have to use the passwd command to assign a password to the user. d. The username is too short, it must be at least six characters long.
Firewall in simple manner is bascially the utility to provide the security over the network. These are the security measures that prevents the network‚Äôs in and out traffic to pass through the specific Security filters so that the unwanted and unsecure data can be stopped from entering into the network..
further‚ as a security measure it also depends on the network designer and implementer that how to use a Firewall mean to say the security measures like how to present the content filtering and Url filtering which type of firewall should be used and where to put it..
The most often asked question in interviews. You need to have a short statement prepared in your mind. Be careful that it does not sound rehearsed. Limit it to work-related items unless instructed otherwise. Talk about things you have done and jobs you have held that relate to the position you are interviewing for. Start with the item farthest back and work up to the present.
2. Why did you leave your last job?
Stay positive regardless of the circumstances. Never refer to a major problem with management and never speak ill of supervisors, co-workers or the organization. If you do, you will be the one looking bad. Keep smiling and talk about leaving for a positive reason such as an opportunity, a chance to do something special or other forward-looking reasons.
1. How to deploy a server in VM?
2. what is different between Template and Clone in VM?
3. What is HA(High availability), DRS(Distributed Resource Scheduler), Vmotion and What is EVC(Enhanced VMotion Compatibility) mode?
4. What is the use of VCenter? if we removed VC will the VM still run? still run, but can not reboot machine.