A、 The load balancing algorithm used by the Management Distributed Virtual Switches (DVS)
B、 The SSH configuration settings for the vCenter Server’s active node
C、 The vCenter Management Network IPv4 addresses for the witness node vCenter Server
D、 The details of each of the vCenter Server licenses for active, passive and witness nodes
答案:C
A、 The load balancing algorithm used by the Management Distributed Virtual Switches (DVS)
B、 The SSH configuration settings for the vCenter Server’s active node
C、 The vCenter Management Network IPv4 addresses for the witness node vCenter Server
D、 The details of each of the vCenter Server licenses for active, passive and witness nodes
答案:C
A. The existing virtual infrastructure has sufficient capacity to host the new VDI workloads
B. The existing operations monitoring tools have sufficient capacity to monitor the new VDI services
C. The existing management cluster has enough available capacity to host any VDI service management component
D. The management cluster has N+1 redundancy
E. The VDI service has a higher service-level agreement (SLA) than the operations management SLA
A. Configure vSphere HA--Configure % based admission control--Configure two isolation addresses--Consider an OEM with NIC failure conditions in their Proactive HA plugin
B. Configure vSphere HA--Consider an OEM with NIC failure conditions in their Proactive HA plugin
C. Configure vSphere HA--Configure two existing data stores for heartbeat--Consider an OEM with NIC failure conditions in their Proactive HA plugin
D. Configure Proactive HA--Automation Level: Automated--Remediation: Maintenance mode for all failures--Consider an OEM with NIC failure conditions in their Proactive HA plugin
A. Two 1 GbE network adapters per server
B. Four 1 GbE network adapters per server
C. Four 10 GbE network adapters per server
D. Two 10 GbE network adapters per server
A. Separate Distributed Virtual Switches (DVS)
B. Private VLANs (PVLAN)
C. Virtual Guest Tagging (VGT)
D. vSwitch VLAN Tagging (VST)
A. The database tier breaches a single NUMA node boundary for the benchmarking cluster
B. The database tier breaches a single NUMA node boundary for the development cluster
C. The development cluster can support a lower %Ready time per vCPU
D. The development cluster has more available RAM per host
REQ01: The customer is looking for a way to limit database virtual machine (VM ) placement to save on CPU licensing costs.
CON01: There is a single cluster with no budget to scale.
CON02: All virtual machines must run on the consolidated cluster.
Which two design decisions should the architect make to meet the customer requirement? Choose two.
A. The solution must use VM-VM anti-affinity rules
B. The solution must use vSphere DRS in manual mode
C. The solution must use a vRealize Orchestrator workflow for VM placement
D. The solution must use VM-Host affinity rules
E. The solution must use vSphere VM and host DRS groups
A. There will be an increase in management overhead.
B. Identical hardware must be procured for all hosts.
C. There will be a reduction in performancd.
D. The patching cycles will affect both clusters at the same time.
E. There will be additional licensing and cost requirements for both clusters.
The vSphere cluster will have three hosts only due to budget considerations.
A database cluster (node majority) consisting of three virtual machines will be running on the vSphere cluster.
Which two recommendations can the architect make so that the customer achieves the highest level of application availability while taking into consideration operational resiliency? Choose two.
A. Create VM-VM anti-affinity rules
B. Set das.respectvmvmantiaffinityrules to false
C. Create VM-Host anti-affinity rules
D. Disable vSphere HA during maintenance
E. Set das.ignoreinsufficienthbdatastore to true
A. It focuses on functional requirements with C-level stakeholders
B. It leverages a single set of questions for all stakeholders
C. It might require multiple rounds of stakeholder interviews
D. It builds stakeholder consensus
E. It is a non-iterative process
The following are the business requirements for the design:
The solution must support virtual machines with the following storage profiles:
- Write-intensive
- Backup
- Write-Once-Read-Many (WORM ) archive
The solution must support migration of virtual machine disks between storage profiles.
The WORM archive data must be located at an isolated secure site.
The backup storage array must only be connected to a backup media server.
All data should be recoverable from backup.
Which design decision should the architect make to meet the business requirements?
A. The solution will leverage a single storage array for the WORM archive and write-intensive storage profiles
B. The solution will leverage the same array for the backup and write-intensive storage profiles
C. The solution will leverage a different array for each storage profile
D. The solution will leverage a single storage array for all storage profiles