试题通
试题通
APP下载
首页
>
IT互联网
>
虚拟化高级试题题库4
试题通
搜索
虚拟化高级试题题库4
题目内容
(
单选题
)
28.In a meeting to discuss the minimum viable product ( ) deployment of a new customer-facing application, the key stakeholder shares details of the application components and the application administrators share details of performance and integrity tests for the application.
The application will be made up of the following components:

A、  15 minutes

B、  60 minutes

C、  105 minutes

D、  90 minutes

答案:C

试题通
虚拟化高级试题题库4
试题通
18.A customer requires the use of data encryption to ensure data is not accessible when a drive is removed from the primary storage platform. However, there is also a requirement to use deduplication and compression against all workloads in order to conserve space
Which solution meets the customer requirements?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-fa88-c0f9-29e3bb5dbe01.html
点击查看题目
35.A customer is deploying a new cluster and wants to be able to patch and update two hosts in parallel. The cluster must be able to maintain N+1 resiliency across the remaining hosts while patching activities are performed. The current expected utilization of the platform requires a minimum of two hosts to support all of the virtual machines.
What is the minimum number of hosts the customer will require in the cluster in order to meet the required resiliency level?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-5460-c0f9-29e3bb5dbe00.html
点击查看题目
53.An architect is preparing a design for a customer. Based on requirements, the architect recommends an HCI-based infrastructure with all-flash architecture. During the assessment, it is confirmed that the network throughput generated by virtual machines does not exceed 150 Mb/s.
What is the minimum number and type of network adapters in each server that the architect can recommend to ensure requirements are met and there is no single point of failure?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-96c8-c0f9-29e3bb5dbe00.html
点击查看题目
5.An architect makes the design decision to install ESXi on embedded and resilient 8 GB SD cards.
What is the impact of this design decision?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-bc08-c0f9-29e3bb5dbe00.html
点击查看题目
37.An architect is creating a network design for a new vSphere environment.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-5848-c0f9-29e3bb5dbe00.html
点击查看题目
26.Following a recent acquisition, an architect needs to merge IT assets into its current data center. The combined vSphere environment will need to run the newly acquired company’s virtual machines.
Network integration work has already been completed and the current environment has capacity to host all virtual machines. The Operations team needs to identify which virtual machines belong to the acquired company and report on their usage.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-2198-c0f9-29e3bb5dbe00.html
点击查看题目
75.An architect is tasked with designing a greenfield VMware software-defined data center ( ) solution that will be used to deliver a private cloud service for a customer.


Given the information from the customer, which two would be classified as assumptions within the design? Choose two.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-0bf8-c0f9-29e3bb5dbe00.html
点击查看题目
32.A customer requests a review of its current vSphere platform design.
The following information is noted:
There are three different workload profiles for the virtual machines:
- Tier-1 virtual machines operate resource-intensive applications and require dedicated allocations for CPU and RAM.
- Tier-2 virtual machines operate internet-facing applications and require access to externally facing networks.
- Tier-3 virtual machines operate platform management tools such as vCenter Server and have different lifecycle management requirements.
Tier-1, Tier-2 and Tier-3 virtual machines are all hosted on a single large vSphere cluster.
The Chief Information Security Officer ( ) has raised concerns that hosting externally facing applications alongside management tools does not meet internal compliance standards.
The Operations team has raised concerns about Tier-1 virtual machines negatively impacting the performance of vCenter Server.
The Operations lead has stated that management changes have consistently been rejected by application teams.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-40d8-c0f9-29e3bb5dbe01.html
点击查看题目
23.An architect is designing a new vSphere platform for a customer to meet the following requirements:
The platform must be deployed into five physically separate sites.
The sites are spread across multiple regions.
Some sites require more than one vCenter Server.
The platform must provide an administrator with the ability to access virtual infrastructure components across all sites from a single management tool instance
Which single sign-on ( ) design recommendation will meet these requirements?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-15e0-c0f9-29e3bb5dbe00.html
点击查看题目
34.Refer to the exhibit.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-4c90-c0f9-29e3bb5dbe00.html
点击查看题目
首页
>
IT互联网
>
虚拟化高级试题题库4
题目内容
(
单选题
)
手机预览
试题通
虚拟化高级试题题库4

28.In a meeting to discuss the minimum viable product ( ) deployment of a new customer-facing application, the key stakeholder shares details of the application components and the application administrators share details of performance and integrity tests for the application.
The application will be made up of the following components:

A、  15 minutes

B、  60 minutes

C、  105 minutes

D、  90 minutes

答案:C

试题通
分享
试题通
试题通
虚拟化高级试题题库4
相关题目
18.A customer requires the use of data encryption to ensure data is not accessible when a drive is removed from the primary storage platform. However, there is also a requirement to use deduplication and compression against all workloads in order to conserve space
Which solution meets the customer requirements?

A.   Data-in-transit encryption

B.   OS-level encryption

C.   Encrypted backups

D.   Array-based encryption

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-fa88-c0f9-29e3bb5dbe01.html
点击查看答案
35.A customer is deploying a new cluster and wants to be able to patch and update two hosts in parallel. The cluster must be able to maintain N+1 resiliency across the remaining hosts while patching activities are performed. The current expected utilization of the platform requires a minimum of two hosts to support all of the virtual machines.
What is the minimum number of hosts the customer will require in the cluster in order to meet the required resiliency level?

A.   Five

B.   Six

C.   Four

D.   Seven

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-5460-c0f9-29e3bb5dbe00.html
点击查看答案
53.An architect is preparing a design for a customer. Based on requirements, the architect recommends an HCI-based infrastructure with all-flash architecture. During the assessment, it is confirmed that the network throughput generated by virtual machines does not exceed 150 Mb/s.
What is the minimum number and type of network adapters in each server that the architect can recommend to ensure requirements are met and there is no single point of failure?

A.   Two 1 GbE network adapters per server

B.   Four 1 GbE network adapters per server

C.   Four 10 GbE network adapters per server

D.   Two 10 GbE network adapters per server

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-96c8-c0f9-29e3bb5dbe00.html
点击查看答案
5.An architect makes the design decision to install ESXi on embedded and resilient 8 GB SD cards.
What is the impact of this design decision?

A.   Host profiles must be used for this kind of installation

B.   Scratch partition would need to be created on the external storage

C.   The size of the SD cards is too small and the installation will fail

D.   The vSphere Auto Deploy feature must be enabled on vCenter Server

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-bc08-c0f9-29e3bb5dbe00.html
点击查看答案
37.An architect is creating a network design for a new vSphere environment.

A.   Use different logical networks to ensure traffic is isolated with separate VLANs

B.   Use Network I/O Control and ensure appropriate share value is defined for different types of traffic giving priority to the virtual machines traffic

C.   Use two dedicated virtual switches with a single adapter each, dedicating one virtual switch for Management, vMotion, vSAN and Fault Tolerance traffic, and the second one for virtual machine traffic

D.   Use a NIC teaming policy based on the physical NIC load

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-5848-c0f9-29e3bb5dbe00.html
点击查看答案
26.Following a recent acquisition, an architect needs to merge IT assets into its current data center. The combined vSphere environment will need to run the newly acquired company’s virtual machines.
Network integration work has already been completed and the current environment has capacity to host all virtual machines. The Operations team needs to identify which virtual machines belong to the acquired company and report on their usage.

A.   Leave the newly acquired company’s assets in its current place

B.   Lift and shift the acquired assets into the data center.

C.   Migrate the acquired company’s virtual machines into the existing vSphere environment.

D.   Migrate and apply vSphere tags to the acquired company’s virtual machines.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-2198-c0f9-29e3bb5dbe00.html
点击查看答案
75.An architect is tasked with designing a greenfield VMware software-defined data center ( ) solution that will be used to deliver a private cloud service for a customer.


Given the information from the customer, which two would be classified as assumptions within the design? Choose two.

A.   The backup service will store data in a secure facility

B.   The backup service has sufficient capacity for the new requirements

C.   The customer will update their hardware standard to support rack mount servers

D.   All virtual machines will be deployed with the same resource profile for production and development

E.   The clusters will have a minimum redundancy of N+1

G.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-0bf8-c0f9-29e3bb5dbe00.html
点击查看答案
32.A customer requests a review of its current vSphere platform design.
The following information is noted:
There are three different workload profiles for the virtual machines:
- Tier-1 virtual machines operate resource-intensive applications and require dedicated allocations for CPU and RAM.
- Tier-2 virtual machines operate internet-facing applications and require access to externally facing networks.
- Tier-3 virtual machines operate platform management tools such as vCenter Server and have different lifecycle management requirements.
Tier-1, Tier-2 and Tier-3 virtual machines are all hosted on a single large vSphere cluster.
The Chief Information Security Officer ( ) has raised concerns that hosting externally facing applications alongside management tools does not meet internal compliance standards.
The Operations team has raised concerns about Tier-1 virtual machines negatively impacting the performance of vCenter Server.
The Operations lead has stated that management changes have consistently been rejected by application teams.

A.   Separate Tier-1, Tier-2 and Tier-3 virtual machines using dedicated distributed virtual switches (DVS)

B.   Separate Tier-2 virtual machines onto a dedicated cluster

C.   Separate Tier-1, Tier-2 and Tier-3 virtual machines onto dedicated clusters

D.   Separate Tier-1, Tier-2 and Tier-3 virtual machines using resource pools and shares

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-40d8-c0f9-29e3bb5dbe01.html
点击查看答案
23.An architect is designing a new vSphere platform for a customer to meet the following requirements:
The platform must be deployed into five physically separate sites.
The sites are spread across multiple regions.
Some sites require more than one vCenter Server.
The platform must provide an administrator with the ability to access virtual infrastructure components across all sites from a single management tool instance
Which single sign-on ( ) design recommendation will meet these requirements?

A.   Use an SSO domain across all vCenter Server instances

B.   Use an SSO domain per region

C.   Use an SSO domain per vCenter Server instance

D.   Use an SSO domain per site

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-15e0-c0f9-29e3bb5dbe00.html
点击查看答案
34.Refer to the exhibit.

A.   Use explicit failover order with pNIC0 as Active for ESXi Management and VM Network.
Use explicit failover order with pNIC1 as Active for backup network.
Use explicit failover order with pNIC2 as Active for vMotion.
Use explicit failover order with pNIC3 as Active for replication.

B.   Use the Route Based on IP Hash for ESXi management and VM network.
Use the Route Based on IP Hash for backup network.
Use the Route Based on the Originating Virtual Port for vMotion.
Use failover with pNIC3 as Active for replication.

C.   Create a link aggregation group (LAG) for vDS01.
Use the Route Based on Physical NIC Load for vMotion.
Use the Route Based on Physical NIC Load for replication.

D.   Use the Route Based on IP Hash for ESXi management and VM network.
Use failover with pNIC1 as Active for backup network.Create a link aggregation group (LAG) for vDS02.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-4c90-c0f9-29e3bb5dbe00.html
点击查看答案
试题通小程序
试题通app下载