APP下载
首页
>
IT互联网
>
虚拟化高级试题题库4
搜索
虚拟化高级试题题库4
题目内容
(
单选题
)
21.An architect is designing a solution based on the following information:

A、  Configure vSphere HA--Configure % based admission control--Configure two isolation addresses--Consider an OEM with NIC failure conditions in their Proactive HA plugin

B、  Configure vSphere HA--Consider an OEM with NIC failure conditions in their Proactive HA plugin

C、  Configure vSphere HA--Configure two existing data stores for heartbeat--Consider an OEM with NIC failure conditions in their Proactive HA plugin

D、  Configure Proactive HA--Automation Level: Automated--Remediation: Maintenance mode for all failures--Consider an OEM with NIC failure conditions in their Proactive HA plugin

答案:D

虚拟化高级试题题库4
67.A Cloud Service Provider wants to introduce backup as a service for a customer’s vSphere-based virtual machines.

The following information is noted:

They have a single four-port (2 × 10 GbE and 2 × 1 GbE) NIC per ESXi host.

All top-of-rack (ToR) switches are 10 GbE and fully populated.

The backup traffic must not impact existing services .

Which two recommendations should the architect make to help the customer incorporate the service?Choose two.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-e100-c0f9-29e3bb5dbe00.html
点击查看题目
55.Which requirement would be classified as a functional requirement within the application design documentation?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-9e98-c0f9-29e3bb5dbe00.html
点击查看题目
32.A customer requests a review of its current vSphere platform design.
The following information is noted:
There are three different workload profiles for the virtual machines:
- Tier-1 virtual machines operate resource-intensive applications and require dedicated allocations for CPU and RAM.
- Tier-2 virtual machines operate internet-facing applications and require access to externally facing networks.
- Tier-3 virtual machines operate platform management tools such as vCenter Server and have different lifecycle management requirements.
Tier-1, Tier-2 and Tier-3 virtual machines are all hosted on a single large vSphere cluster.
The Chief Information Security Officer ( ) has raised concerns that hosting externally facing applications alongside management tools does not meet internal compliance standards.
The Operations team has raised concerns about Tier-1 virtual machines negatively impacting the performance of vCenter Server.
The Operations lead has stated that management changes have consistently been rejected by application teams.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-40d8-c0f9-29e3bb5dbe01.html
点击查看题目
26.Following a recent acquisition, an architect needs to merge IT assets into its current data center. The combined vSphere environment will need to run the newly acquired company’s virtual machines.
Network integration work has already been completed and the current environment has capacity to host all virtual machines. The Operations team needs to identify which virtual machines belong to the acquired company and report on their usage.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-2198-c0f9-29e3bb5dbe00.html
点击查看题目
85.An architect is considering placement of virtual machines within an existing VMware software-defined data center (SDDC ).

During the discovery phase, the following information is documented:

Cluster One.

Six ESXi hosts

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is enabled and set to automated.

Fully Automated vSphere DRS.

Transparent Page Sharing (TPS) is enabled.

Cluster Two.

Eight ESXi hosts.

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is disabled.

Partially Automated vSphere DRS.

Transparent Page Sharing (TPS) is disabled.

Cluster Three.

Three ESXi hosts.

vSphere HA with admission control is disabled.

Proactive HA is not supported.

Transparent Page Sharing (TPS) is disabled.

Virtual Machine Resource Profile 1.

Memory sharing techniques should not be used.

Virtual machines should be automatically restarted in the event of host failure if resources are available.

Automated initial virtual machine placement.

Virtual Machine Resource Profile 2.

Memory sharing techniques can be used.

Virtual machines should be protected from any host hardware failures.

Automated initial virtual machine placement.

Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? Choose two.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-36f0-c0f9-29e3bb5dbe01.html
点击查看题目
3.An architect is designing a new VMware solution for a customer that has a number of different resource profiles.

The following are the business requirements for the design:

The solution must support virtual machines with the following storage profiles:

- Write-intensive

- Backup

- Write-Once-Read-Many (WORM ) archive

The solution must support migration of virtual machine disks between storage profiles.

The WORM archive data must be located at an isolated secure site.

The backup storage array must only be connected to a backup media server.

All data should be recoverable from backup.

Which design decision should the architect make to meet the business requirements?

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-b050-c0f9-29e3bb5dbe00.html
点击查看题目
60.An architect is considering placement of virtual machines within an existing VMware software-defined datacenter (SDDC ). During the discovery phase, the following information is documented:


Cluster One.

Six ESXi hosts.

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is enabled and set to automated.

Fully Automated vSphere DRS.

Transparent Page Sharing (TPS) is enabled.

Cluster Two.

Eight ESXi hosts.

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is disabled.

Partially Automated vSphere DRS.

Transparent Page Sharing (TPS) is disabled.

Cluster Three.

Three ESXi hosts.

vSphere HA with admission control is disabled.

Proactive HA is not supported.

Transparent Page Sharing (TPS) is disabled.

Virtual Machine Resource Profile 1.

Memory sharing techniques should not be used.

Virtual machines should be automatically restarted in the event of host failure if resources are available.

Automated initial virtual machine placement.

Virtual Machine Resource Profile 2.

Memory sharing techniques should not be used.

Virtual machines should be automatically restarted in the event of host failure regardless of available resources.

Automated initial virtual machine placement.


Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? (Choose two)

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-b220-c0f9-29e3bb5dbe00.html
点击查看题目
17.As part of a new hybrid cloud initiative for a large financial company, the customer technical team is presenting an overview of the current state of the infrastructure and their vision for a new solution.
The project team captures notes during the presentation and adds them to the discovery documentation.
Which of the listed statements is a design constraint?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-fa88-c0f9-29e3bb5dbe00.html
点击查看题目
47.During a requirements gathering workshop, the customer provides the following requirement:A new vSphere platform must be designed securely and all interfaces must be protected against potential snooping.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-7f58-c0f9-29e3bb5dbe00.html
点击查看题目
41.What is a benefit of using a scale-out method for handling vSphere cluster growth?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-67e8-c0f9-29e3bb5dbe00.html
点击查看题目
首页
>
IT互联网
>
虚拟化高级试题题库4
题目内容
(
单选题
)
手机预览
虚拟化高级试题题库4

21.An architect is designing a solution based on the following information:

A、  Configure vSphere HA--Configure % based admission control--Configure two isolation addresses--Consider an OEM with NIC failure conditions in their Proactive HA plugin

B、  Configure vSphere HA--Consider an OEM with NIC failure conditions in their Proactive HA plugin

C、  Configure vSphere HA--Configure two existing data stores for heartbeat--Consider an OEM with NIC failure conditions in their Proactive HA plugin

D、  Configure Proactive HA--Automation Level: Automated--Remediation: Maintenance mode for all failures--Consider an OEM with NIC failure conditions in their Proactive HA plugin

答案:D

分享
虚拟化高级试题题库4
相关题目
67.A Cloud Service Provider wants to introduce backup as a service for a customer’s vSphere-based virtual machines.

The following information is noted:

They have a single four-port (2 × 10 GbE and 2 × 1 GbE) NIC per ESXi host.

All top-of-rack (ToR) switches are 10 GbE and fully populated.

The backup traffic must not impact existing services .

Which two recommendations should the architect make to help the customer incorporate the service?Choose two.

A.   Enable and tag traffic on the backup distributed port group

B.   Add a new two-port 10 GbE NIC per ESXi host

C.   Replace the existing NIC with a two-port 25 GbE NIC per ESXi host

D.   Match the Class of Service (CoS) and Differentiated Services Code Point (DSCP) values to the physical network

E.   Create a new virtual switch using the 1 GbE uplinks

G.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-e100-c0f9-29e3bb5dbe00.html
点击查看答案
55.Which requirement would be classified as a functional requirement within the application design documentation?

A.   The application must be hosted with redundancy levels of N+1 or better.

B.   Penetration testing must be executed quarterly with a pass rate of 80% or higher.

C.   The application must be capable of handling 200 transactions per second.

D.   Administrators must monitor the network traffic of the desired systems.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-9e98-c0f9-29e3bb5dbe00.html
点击查看答案
32.A customer requests a review of its current vSphere platform design.
The following information is noted:
There are three different workload profiles for the virtual machines:
- Tier-1 virtual machines operate resource-intensive applications and require dedicated allocations for CPU and RAM.
- Tier-2 virtual machines operate internet-facing applications and require access to externally facing networks.
- Tier-3 virtual machines operate platform management tools such as vCenter Server and have different lifecycle management requirements.
Tier-1, Tier-2 and Tier-3 virtual machines are all hosted on a single large vSphere cluster.
The Chief Information Security Officer ( ) has raised concerns that hosting externally facing applications alongside management tools does not meet internal compliance standards.
The Operations team has raised concerns about Tier-1 virtual machines negatively impacting the performance of vCenter Server.
The Operations lead has stated that management changes have consistently been rejected by application teams.

A.   Separate Tier-1, Tier-2 and Tier-3 virtual machines using dedicated distributed virtual switches (DVS)

B.   Separate Tier-2 virtual machines onto a dedicated cluster

C.   Separate Tier-1, Tier-2 and Tier-3 virtual machines onto dedicated clusters

D.   Separate Tier-1, Tier-2 and Tier-3 virtual machines using resource pools and shares

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-40d8-c0f9-29e3bb5dbe01.html
点击查看答案
26.Following a recent acquisition, an architect needs to merge IT assets into its current data center. The combined vSphere environment will need to run the newly acquired company’s virtual machines.
Network integration work has already been completed and the current environment has capacity to host all virtual machines. The Operations team needs to identify which virtual machines belong to the acquired company and report on their usage.

A.   Leave the newly acquired company’s assets in its current place

B.   Lift and shift the acquired assets into the data center.

C.   Migrate the acquired company’s virtual machines into the existing vSphere environment.

D.   Migrate and apply vSphere tags to the acquired company’s virtual machines.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-2198-c0f9-29e3bb5dbe00.html
点击查看答案
85.An architect is considering placement of virtual machines within an existing VMware software-defined data center (SDDC ).

During the discovery phase, the following information is documented:

Cluster One.

Six ESXi hosts

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is enabled and set to automated.

Fully Automated vSphere DRS.

Transparent Page Sharing (TPS) is enabled.

Cluster Two.

Eight ESXi hosts.

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is disabled.

Partially Automated vSphere DRS.

Transparent Page Sharing (TPS) is disabled.

Cluster Three.

Three ESXi hosts.

vSphere HA with admission control is disabled.

Proactive HA is not supported.

Transparent Page Sharing (TPS) is disabled.

Virtual Machine Resource Profile 1.

Memory sharing techniques should not be used.

Virtual machines should be automatically restarted in the event of host failure if resources are available.

Automated initial virtual machine placement.

Virtual Machine Resource Profile 2.

Memory sharing techniques can be used.

Virtual machines should be protected from any host hardware failures.

Automated initial virtual machine placement.

Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? Choose two.

A.   All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster One.

B.   All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster One.

C.   All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Two.

D.   All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster Two.

E.   All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Three

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-36f0-c0f9-29e3bb5dbe01.html
点击查看答案
3.An architect is designing a new VMware solution for a customer that has a number of different resource profiles.

The following are the business requirements for the design:

The solution must support virtual machines with the following storage profiles:

- Write-intensive

- Backup

- Write-Once-Read-Many (WORM ) archive

The solution must support migration of virtual machine disks between storage profiles.

The WORM archive data must be located at an isolated secure site.

The backup storage array must only be connected to a backup media server.

All data should be recoverable from backup.

Which design decision should the architect make to meet the business requirements?

A.   The solution will leverage a single storage array for the WORM archive and write-intensive storage profiles

B.   The solution will leverage the same array for the backup and write-intensive storage profiles

C.   The solution will leverage a different array for each storage profile

D.   The solution will leverage a single storage array for all storage profiles

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-b050-c0f9-29e3bb5dbe00.html
点击查看答案
60.An architect is considering placement of virtual machines within an existing VMware software-defined datacenter (SDDC ). During the discovery phase, the following information is documented:


Cluster One.

Six ESXi hosts.

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is enabled and set to automated.

Fully Automated vSphere DRS.

Transparent Page Sharing (TPS) is enabled.

Cluster Two.

Eight ESXi hosts.

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is disabled.

Partially Automated vSphere DRS.

Transparent Page Sharing (TPS) is disabled.

Cluster Three.

Three ESXi hosts.

vSphere HA with admission control is disabled.

Proactive HA is not supported.

Transparent Page Sharing (TPS) is disabled.

Virtual Machine Resource Profile 1.

Memory sharing techniques should not be used.

Virtual machines should be automatically restarted in the event of host failure if resources are available.

Automated initial virtual machine placement.

Virtual Machine Resource Profile 2.

Memory sharing techniques should not be used.

Virtual machines should be automatically restarted in the event of host failure regardless of available resources.

Automated initial virtual machine placement.


Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? (Choose two)

A.   All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster One.

B.   All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster One.

C.   All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Two.

D.   All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster Two.

E.   All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Three.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-b220-c0f9-29e3bb5dbe00.html
点击查看答案
17.As part of a new hybrid cloud initiative for a large financial company, the customer technical team is presenting an overview of the current state of the infrastructure and their vision for a new solution.
The project team captures notes during the presentation and adds them to the discovery documentation.
Which of the listed statements is a design constraint?

A.   The applications are created in-house with in-guest recovery protection

B.   The maximum tolerable data loss is 10 minutes

C.   The two data center locations have a network latency of 8 ms round-trip time (RTT)

D.   The existing storage is out of maintenance

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-fa88-c0f9-29e3bb5dbe00.html
点击查看答案
47.During a requirements gathering workshop, the customer provides the following requirement:A new vSphere platform must be designed securely and all interfaces must be protected against potential snooping.

A.   Interfaces must be audited

B.   Encrypted channels must be used for all communications.

C.   Unauthorized access to interfaces must be reported within 15 minutes.

D.   Communications must be through Private VLANs (PVLAN).

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-7f58-c0f9-29e3bb5dbe00.html
点击查看答案
41.What is a benefit of using a scale-out method for handling vSphere cluster growth?

A.   An increase in the recovery time objective (RTO) for the cluster

B.   Faster to reach the limit of virtual machines per host

C.   An overall reduction in the license costs for the cluster

D.   Less potential impact to virtual machines during a single host failure

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-67e8-c0f9-29e3bb5dbe00.html
点击查看答案
试题通小程序
试题通app下载