试题通
试题通
APP下载
首页
>
IT互联网
>
虚拟化高级试题题库4
试题通
搜索
虚拟化高级试题题库4
题目内容
(
单选题
)
18.A customer requires the use of data encryption to ensure data is not accessible when a drive is removed from the primary storage platform. However, there is also a requirement to use deduplication and compression against all workloads in order to conserve space
Which solution meets the customer requirements?

A、  Data-in-transit encryption

B、  OS-level encryption

C、  Encrypted backups

D、  Array-based encryption

答案:D

试题通
虚拟化高级试题题库4
试题通
13.A customer has six hosts available in a cluster. When running at full capacity, all virtual machines can be run on two hosts.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-df30-c0f9-29e3bb5dbe01.html
点击查看题目
19.During a requirements gathering workshop, the customer’s Chief Information Security Office ( CISO) provides the following requirements that are pertinent to the design of a new vSphere environment:All operating system critical patches must be installed within 24 hours of release;All virtual machine templates must be updated every three months in line with company policy.

Which requirement classification is being gathered for the design documentation?

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-fe70-c0f9-29e3bb5dbe00.html
点击查看题目
68.An organization’s data scientists are executing a plan to use machine learning ( ). They must have access to graphical processing unit ( ) capabilities to execute their computational models when needed. The solutions architect needs to design a solution to ensure that GPUs can be shared by multiple virtual machines.
Which two solutions should the architect recommend to meet these requirements? Choose two.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-e8d0-c0f9-29e3bb5dbe00.html
点击查看题目
31.An architect is tasked with recommending a solution for a company that is running out of VLANs. Currently the company is running two separate data centers based on vSphere including an Enterprise Plus license. In the first data center, the problem was solved by using VMware NSX and overlay network. In the second data center, there is currently no VMware NSX implementation in place and no budget for additional licenses.
What should the architect recommend as a potential solution to provide support for additional VLANs?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-40d8-c0f9-29e3bb5dbe00.html
点击查看题目
9.An architect is designing a new vSphere environment with the following resources:
-600 vCPU 5,760 GB RAM
-Average resource usage is:
-60 vCPU 1,152 GB RAM
-The design must meet the following requirements:
-The environment has the ability to burst by 25%.
-Each host can schedule 36 vCPUs and has 512 GB RAM.
-Management overhead is 20%.
What is the minimum number of hosts required to meet the design requirements?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-cba8-c0f9-29e3bb5dbe00.html
点击查看题目
16.An architect is designing a solution for an environment with two types of resource profiles that must be virtualizeD、 The first type consists of Tier 1 virtual machines that are disk I/O intensive, but do NOT require high CPU or memory. The second type consists of Tier 2 virtual machines that require a lower CPU and memory allocation and have minimal disk I/O.
Which design recommendation should the architect make for distributing the resource profiles?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-f6a0-c0f9-29e3bb5dbe00.html
点击查看题目
32.A customer requests a review of its current vSphere platform design.
The following information is noted:
There are three different workload profiles for the virtual machines:
- Tier-1 virtual machines operate resource-intensive applications and require dedicated allocations for CPU and RAM.
- Tier-2 virtual machines operate internet-facing applications and require access to externally facing networks.
- Tier-3 virtual machines operate platform management tools such as vCenter Server and have different lifecycle management requirements.
Tier-1, Tier-2 and Tier-3 virtual machines are all hosted on a single large vSphere cluster.
The Chief Information Security Officer ( ) has raised concerns that hosting externally facing applications alongside management tools does not meet internal compliance standards.
The Operations team has raised concerns about Tier-1 virtual machines negatively impacting the performance of vCenter Server.
The Operations lead has stated that management changes have consistently been rejected by application teams.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-40d8-c0f9-29e3bb5dbe01.html
点击查看题目
41.What is a benefit of using a scale-out method for handling vSphere cluster growth?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-67e8-c0f9-29e3bb5dbe00.html
点击查看题目
82.An organization's existing vSphere environments are configured for Enhanced Linked Mode. The DevOps team automates the creation of hardened virtual machine images for various operating systems. Their continuous integration/continuous delivery ( CI/CD) pipeline runs a task at the end of a successful build, which uploads the Open Virtualization Format ( OV) image to a sandbox content library, deploys a virtual machine from the image, and then destroys these objects after quality checks are complete.

The following requirements have been noted:

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-2b38-c0f9-29e3bb5dbe00.html
点击查看题目
38.Refer to the exhibit.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-5c30-c0f9-29e3bb5dbe00.html
点击查看题目
首页
>
IT互联网
>
虚拟化高级试题题库4
题目内容
(
单选题
)
手机预览
试题通
虚拟化高级试题题库4

18.A customer requires the use of data encryption to ensure data is not accessible when a drive is removed from the primary storage platform. However, there is also a requirement to use deduplication and compression against all workloads in order to conserve space
Which solution meets the customer requirements?

A、  Data-in-transit encryption

B、  OS-level encryption

C、  Encrypted backups

D、  Array-based encryption

答案:D

试题通
分享
试题通
试题通
虚拟化高级试题题库4
相关题目
13.A customer has six hosts available in a cluster. When running at full capacity, all virtual machines can be run on two hosts.

A.   Two

B.   Three

C.   One

D.   None

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-df30-c0f9-29e3bb5dbe01.html
点击查看答案
19.During a requirements gathering workshop, the customer’s Chief Information Security Office ( CISO) provides the following requirements that are pertinent to the design of a new vSphere environment:All operating system critical patches must be installed within 24 hours of release;All virtual machine templates must be updated every three months in line with company policy.

Which requirement classification is being gathered for the design documentation?

A.   Security

B.   Manageability

C.   Recoverability

D.   Availability

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-fe70-c0f9-29e3bb5dbe00.html
点击查看答案
68.An organization’s data scientists are executing a plan to use machine learning ( ). They must have access to graphical processing unit ( ) capabilities to execute their computational models when needed. The solutions architect needs to design a solution to ensure that GPUs can be shared by multiple virtual machines.
Which two solutions should the architect recommend to meet these requirements? Choose two.

A.   NVIDIA vGPU

B.   AMD MxGPU

C.   vSphere DirectPath I/O

D.   vSGA

E.   vSphere Bitfusion

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-e8d0-c0f9-29e3bb5dbe00.html
点击查看答案
31.An architect is tasked with recommending a solution for a company that is running out of VLANs. Currently the company is running two separate data centers based on vSphere including an Enterprise Plus license. In the first data center, the problem was solved by using VMware NSX and overlay network. In the second data center, there is currently no VMware NSX implementation in place and no budget for additional licenses.
What should the architect recommend as a potential solution to provide support for additional VLANs?

A.   Separate Distributed Virtual Switches (DVS)

B.   Private VLANs (PVLAN)

C.   Virtual Guest Tagging (VGT)

D.   vSwitch VLAN Tagging (VST)

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-40d8-c0f9-29e3bb5dbe00.html
点击查看答案
9.An architect is designing a new vSphere environment with the following resources:
-600 vCPU 5,760 GB RAM
-Average resource usage is:
-60 vCPU 1,152 GB RAM
-The design must meet the following requirements:
-The environment has the ability to burst by 25%.
-Each host can schedule 36 vCPUs and has 512 GB RAM.
-Management overhead is 20%.
What is the minimum number of hosts required to meet the design requirements?

A.   Three

B.   Five

C.   Four

D.   Two

解析:解析:CPU: (60+60*0.45)/36 =2.4,RAM: (1152+1152*0.45)/512 = 3.2

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-cba8-c0f9-29e3bb5dbe00.html
点击查看答案
16.An architect is designing a solution for an environment with two types of resource profiles that must be virtualizeD、 The first type consists of Tier 1 virtual machines that are disk I/O intensive, but do NOT require high CPU or memory. The second type consists of Tier 2 virtual machines that require a lower CPU and memory allocation and have minimal disk I/O.
Which design recommendation should the architect make for distributing the resource profiles?

A.   Separate the two resource profiles into two clusters. The Tier 1 cluster will have fast storage while the Tier 2 cluster will not.

B.   Run both resource profiles on the same cluster with the same host hardware platform.

C.   Separate the two resource profiles into two clusters. The Tier 2 cluster will have faster CPU and more memory while the Tier 1 cluster will have slower CPU and less memory but more disk space

D.   Run both resource profiles on the same cluster with host hardware that has fast CPU, large amounts of memory, and the fastest storage platform.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-f6a0-c0f9-29e3bb5dbe00.html
点击查看答案
32.A customer requests a review of its current vSphere platform design.
The following information is noted:
There are three different workload profiles for the virtual machines:
- Tier-1 virtual machines operate resource-intensive applications and require dedicated allocations for CPU and RAM.
- Tier-2 virtual machines operate internet-facing applications and require access to externally facing networks.
- Tier-3 virtual machines operate platform management tools such as vCenter Server and have different lifecycle management requirements.
Tier-1, Tier-2 and Tier-3 virtual machines are all hosted on a single large vSphere cluster.
The Chief Information Security Officer ( ) has raised concerns that hosting externally facing applications alongside management tools does not meet internal compliance standards.
The Operations team has raised concerns about Tier-1 virtual machines negatively impacting the performance of vCenter Server.
The Operations lead has stated that management changes have consistently been rejected by application teams.

A.   Separate Tier-1, Tier-2 and Tier-3 virtual machines using dedicated distributed virtual switches (DVS)

B.   Separate Tier-2 virtual machines onto a dedicated cluster

C.   Separate Tier-1, Tier-2 and Tier-3 virtual machines onto dedicated clusters

D.   Separate Tier-1, Tier-2 and Tier-3 virtual machines using resource pools and shares

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-40d8-c0f9-29e3bb5dbe01.html
点击查看答案
41.What is a benefit of using a scale-out method for handling vSphere cluster growth?

A.   An increase in the recovery time objective (RTO) for the cluster

B.   Faster to reach the limit of virtual machines per host

C.   An overall reduction in the license costs for the cluster

D.   Less potential impact to virtual machines during a single host failure

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-67e8-c0f9-29e3bb5dbe00.html
点击查看答案
82.An organization's existing vSphere environments are configured for Enhanced Linked Mode. The DevOps team automates the creation of hardened virtual machine images for various operating systems. Their continuous integration/continuous delivery ( CI/CD) pipeline runs a task at the end of a successful build, which uploads the Open Virtualization Format ( OV) image to a sandbox content library, deploys a virtual machine from the image, and then destroys these objects after quality checks are complete.

The following requirements have been noted:

A.   Create a local content library in the primary vSphere environment and enable publishing.

B.   Create and publish a new subscription to a new subscriber library for each target vSphere environment.

C.   Deploy the OVF images to vSphere and clone as an OVF template to a local content library.

D.   Deploy the OVF images to vSphere and clone as a VM template to a local content library.

E.   Edit the Auto Sync Refresh Interval advanced setting for each subscribed library.

F.   Add a new subscriber library from each vSphere environment.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-2b38-c0f9-29e3bb5dbe00.html
点击查看答案
38.Refer to the exhibit.

A.   Enable vSphere HA and add a VM Override with VM Restart Priority set to Disabled

B.   Enable Fault Tolerance

C.   Achieve application availability with snapshots

D.   Enable vSphere HA and add a VM Override with VM Restart Priority set to Lowest

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-5c30-c0f9-29e3bb5dbe00.html
点击查看答案
试题通小程序
试题通app下载