A、 Configure vSphere HA--Configure % based admission control--Configure two isolation addresses--Consider an OEM with NIC failure conditions in their Proactive HA plugin
B、 Configure vSphere HA--Consider an OEM with NIC failure conditions in their Proactive HA plugin
C、 Configure vSphere HA--Configure two existing data stores for heartbeat--Consider an OEM with NIC failure conditions in their Proactive HA plugin
D、 Configure Proactive HA--Automation Level: Automated--Remediation: Maintenance mode for all failures--Consider an OEM with NIC failure conditions in their Proactive HA plugin
答案:D
A、 Configure vSphere HA--Configure % based admission control--Configure two isolation addresses--Consider an OEM with NIC failure conditions in their Proactive HA plugin
B、 Configure vSphere HA--Consider an OEM with NIC failure conditions in their Proactive HA plugin
C、 Configure vSphere HA--Configure two existing data stores for heartbeat--Consider an OEM with NIC failure conditions in their Proactive HA plugin
D、 Configure Proactive HA--Automation Level: Automated--Remediation: Maintenance mode for all failures--Consider an OEM with NIC failure conditions in their Proactive HA plugin
答案:D
The following information is noted:
They have a single four-port (2 × 10 GbE and 2 × 1 GbE) NIC per ESXi host.
All top-of-rack (ToR) switches are 10 GbE and fully populated.
The backup traffic must not impact existing services .
Which two recommendations should the architect make to help the customer incorporate the service?Choose two.
A. Enable and tag traffic on the backup distributed port group
B. Add a new two-port 10 GbE NIC per ESXi host
C. Replace the existing NIC with a two-port 25 GbE NIC per ESXi host
D. Match the Class of Service (CoS) and Differentiated Services Code Point (DSCP) values to the physical network
E. Create a new virtual switch using the 1 GbE uplinks
G.
A. The application must be hosted with redundancy levels of N+1 or better.
B. Penetration testing must be executed quarterly with a pass rate of 80% or higher.
C. The application must be capable of handling 200 transactions per second.
D. Administrators must monitor the network traffic of the desired systems.
A. Separate Tier-1, Tier-2 and Tier-3 virtual machines using dedicated distributed virtual switches (DVS)
B. Separate Tier-2 virtual machines onto a dedicated cluster
C. Separate Tier-1, Tier-2 and Tier-3 virtual machines onto dedicated clusters
D. Separate Tier-1, Tier-2 and Tier-3 virtual machines using resource pools and shares
A. Leave the newly acquired company’s assets in its current place
B. Lift and shift the acquired assets into the data center.
C. Migrate the acquired company’s virtual machines into the existing vSphere environment.
D. Migrate and apply vSphere tags to the acquired company’s virtual machines.
During the discovery phase, the following information is documented:
Cluster One.
Six ESXi hosts
vSphere HA with host failures cluster tolerates = 1.
Proactive HA is enabled and set to automated.
Fully Automated vSphere DRS.
Transparent Page Sharing (TPS) is enabled.
Cluster Two.
Eight ESXi hosts.
vSphere HA with host failures cluster tolerates = 1.
Proactive HA is disabled.
Partially Automated vSphere DRS.
Transparent Page Sharing (TPS) is disabled.
Cluster Three.
Three ESXi hosts.
vSphere HA with admission control is disabled.
Proactive HA is not supported.
Transparent Page Sharing (TPS) is disabled.
Virtual Machine Resource Profile 1.
Memory sharing techniques should not be used.
Virtual machines should be automatically restarted in the event of host failure if resources are available.
Automated initial virtual machine placement.
Virtual Machine Resource Profile 2.
Memory sharing techniques can be used.
Virtual machines should be protected from any host hardware failures.
Automated initial virtual machine placement.
Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? Choose two.
A. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster One.
B. All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster One.
C. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Two.
D. All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster Two.
E. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Three
The following are the business requirements for the design:
The solution must support virtual machines with the following storage profiles:
- Write-intensive
- Backup
- Write-Once-Read-Many (WORM ) archive
The solution must support migration of virtual machine disks between storage profiles.
The WORM archive data must be located at an isolated secure site.
The backup storage array must only be connected to a backup media server.
All data should be recoverable from backup.
Which design decision should the architect make to meet the business requirements?
A. The solution will leverage a single storage array for the WORM archive and write-intensive storage profiles
B. The solution will leverage the same array for the backup and write-intensive storage profiles
C. The solution will leverage a different array for each storage profile
D. The solution will leverage a single storage array for all storage profiles
Cluster One.
Six ESXi hosts.
vSphere HA with host failures cluster tolerates = 1.
Proactive HA is enabled and set to automated.
Fully Automated vSphere DRS.
Transparent Page Sharing (TPS) is enabled.
Cluster Two.
Eight ESXi hosts.
vSphere HA with host failures cluster tolerates = 1.
Proactive HA is disabled.
Partially Automated vSphere DRS.
Transparent Page Sharing (TPS) is disabled.
Cluster Three.
Three ESXi hosts.
vSphere HA with admission control is disabled.
Proactive HA is not supported.
Transparent Page Sharing (TPS) is disabled.
Virtual Machine Resource Profile 1.
Memory sharing techniques should not be used.
Virtual machines should be automatically restarted in the event of host failure if resources are available.
Automated initial virtual machine placement.
Virtual Machine Resource Profile 2.
Memory sharing techniques should not be used.
Virtual machines should be automatically restarted in the event of host failure regardless of available resources.
Automated initial virtual machine placement.
Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? (Choose two)
A. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster One.
B. All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster One.
C. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Two.
D. All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster Two.
E. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Three.
A. The applications are created in-house with in-guest recovery protection
B. The maximum tolerable data loss is 10 minutes
C. The two data center locations have a network latency of 8 ms round-trip time (RTT)
D. The existing storage is out of maintenance
A. Interfaces must be audited
B. Encrypted channels must be used for all communications.
C. Unauthorized access to interfaces must be reported within 15 minutes.
D. Communications must be through Private VLANs (PVLAN).
A. An increase in the recovery time objective (RTO) for the cluster
B. Faster to reach the limit of virtual machines per host
C. An overall reduction in the license costs for the cluster
D. Less potential impact to virtual machines during a single host failure