APP下载
首页
>
IT互联网
>
虚拟化高级试题题库4
搜索
虚拟化高级试题题库4
题目内容
(
单选题
)
29.During a requirements gathering workshop to design a physical to virtual migration, the customer provides the following information:
There is no physical firewall in the data center with no anticipated plans for a future network refresh.
Leveraging the virtual infrastructure to mitigate the lack of network security must be addressed in the design.

A、  Split the virtual machines into several VLANs
Use tag actions

B、  Create port groups with different names and same VLAN IDs

C、  Enable traffic filtering and marking
Use allow or drop actions

D、  Disable traffic filtering and marking
Use tag actions

答案:C

虚拟化高级试题题库4
22.An architect is tasked with reviewing the design of a VMware software-defined data center ( ) for a software development company. The platform is used to developing applications and services. It is important that the customer be able to accurately benchmark performance of developed applications.
The platform has recently commissioned new hosts to update the development cluster.The development cluster host configuration is:
--4 ESXi hosts with 2 sockets × 16 cores
--512 GB RAM divided evenly between sockets
--There is no resource contention
--The benchmarking cluster host configuration is:
--8 ESXi hosts with 2 sockets × 8 cores
--256 GB RAM divided evenly between sockets
--There is no resource contention
--The customer is developing an application that includes a database virtual machine、 The application developer states that the database virtual machine performs as required only when allocated 8 vCPUs 256 GB RAM. The database virtual machine performance meets the required levels when run from the development cluster. Performance benchmarking for the database virtual machine yields highly variable results when run from the benchmarking cluster. The application cannot be released without reliable performance benchmarking data
What is a possible reason for the difference in performance test results between the development and benchmarking clusters?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-0e10-c0f9-29e3bb5dbe00.html
点击查看题目
33.During a requirements gathering workshop, the customer provides the following requirement that is pertinent to the design of a new vSphere environment:
The Maximum Tolerable Downtime ( ) for all Tier 1 applications is one hour.
Which requirement classification is being gathered for the design documentation?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-48a8-c0f9-29e3bb5dbe00.html
点击查看题目
55.Which requirement would be classified as a functional requirement within the application design documentation?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-9e98-c0f9-29e3bb5dbe00.html
点击查看题目
83.An architect is designing a new vSphere cluster. The requirement is to provide a total of 96 CPU cores and 1.5 TB RAM across all hosts.
The following information has been provided:
Two different physical hardware profiles are available for the ESXi hosts in the cluster.
- Profile 1: 16 CPU cores and 256 GB RAM
- Profile 2: 32 CPU cores and 512 GB RAM
Profile 2 is twice as expensive to purchase as Profile 1.
Which two aspects should the architect consider when selecting the hardware profile? Choose two.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-2f20-c0f9-29e3bb5dbe00.html
点击查看题目
13.A customer has six hosts available in a cluster. When running at full capacity, all virtual machines can be run on two hosts.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-df30-c0f9-29e3bb5dbe01.html
点击查看题目
2.An architect is finalizing the design for a new vCenter Server High Availability deployment.
What is one thing the architect must document in the design?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-ac68-c0f9-29e3bb5dbe00.html
点击查看题目
8.An architect is designing a new greenfield environment with 600 ESXi hosts in an automated fashion. The engineering department already has a PXE Boot server, TFTP server, and DHCP server set up with an NFS mount for their current Linux servers.
The architect must be able to demonstrate and meet a security requirement to have all infrastructure processes separated
Which recommendation should the architect make for the ESXi host deployment?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-c7c0-c0f9-29e3bb5dbe00.html
点击查看题目
15.An architect is designing storage for a new vSphere environment to meet the following requirements:
-Asynchronous replication is required between two sites.
-The impact on the storage layer should not impact the performance of the compute layer.
-Each application tier will require different replication attributes.
-Virtual machine live migration across compute and storage must be supported
-Virtual machine aware back up will be leveraged
-Operational management overhead should be minimized
-Operational automation should be supported
-Which storage design recommendations would meet the requirements?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-eae8-c0f9-29e3bb5dbe00.html
点击查看题目
17.As part of a new hybrid cloud initiative for a large financial company, the customer technical team is presenting an overview of the current state of the infrastructure and their vision for a new solution.
The project team captures notes during the presentation and adds them to the discovery documentation.
Which of the listed statements is a design constraint?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-fa88-c0f9-29e3bb5dbe00.html
点击查看题目
47.During a requirements gathering workshop, the customer provides the following requirement:A new vSphere platform must be designed securely and all interfaces must be protected against potential snooping.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-7f58-c0f9-29e3bb5dbe00.html
点击查看题目
首页
>
IT互联网
>
虚拟化高级试题题库4
题目内容
(
单选题
)
手机预览
虚拟化高级试题题库4

29.During a requirements gathering workshop to design a physical to virtual migration, the customer provides the following information:
There is no physical firewall in the data center with no anticipated plans for a future network refresh.
Leveraging the virtual infrastructure to mitigate the lack of network security must be addressed in the design.

A、  Split the virtual machines into several VLANs
Use tag actions

B、  Create port groups with different names and same VLAN IDs

C、  Enable traffic filtering and marking
Use allow or drop actions

D、  Disable traffic filtering and marking
Use tag actions

答案:C

分享
虚拟化高级试题题库4
相关题目
22.An architect is tasked with reviewing the design of a VMware software-defined data center ( ) for a software development company. The platform is used to developing applications and services. It is important that the customer be able to accurately benchmark performance of developed applications.
The platform has recently commissioned new hosts to update the development cluster.The development cluster host configuration is:
--4 ESXi hosts with 2 sockets × 16 cores
--512 GB RAM divided evenly between sockets
--There is no resource contention
--The benchmarking cluster host configuration is:
--8 ESXi hosts with 2 sockets × 8 cores
--256 GB RAM divided evenly between sockets
--There is no resource contention
--The customer is developing an application that includes a database virtual machine、 The application developer states that the database virtual machine performs as required only when allocated 8 vCPUs 256 GB RAM. The database virtual machine performance meets the required levels when run from the development cluster. Performance benchmarking for the database virtual machine yields highly variable results when run from the benchmarking cluster. The application cannot be released without reliable performance benchmarking data
What is a possible reason for the difference in performance test results between the development and benchmarking clusters?

A.   The database tier breaches a single NUMA node boundary for the benchmarking cluster

B.   The database tier breaches a single NUMA node boundary for the development cluster

C.   The development cluster can support a lower %Ready time per vCPU

D.   The development cluster has more available RAM per host

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-0e10-c0f9-29e3bb5dbe00.html
点击查看答案
33.During a requirements gathering workshop, the customer provides the following requirement that is pertinent to the design of a new vSphere environment:
The Maximum Tolerable Downtime ( ) for all Tier 1 applications is one hour.
Which requirement classification is being gathered for the design documentation?

A.   Manageability

B.   Performance

C.   Availability

D.   Recoverability

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-48a8-c0f9-29e3bb5dbe00.html
点击查看答案
55.Which requirement would be classified as a functional requirement within the application design documentation?

A.   The application must be hosted with redundancy levels of N+1 or better.

B.   Penetration testing must be executed quarterly with a pass rate of 80% or higher.

C.   The application must be capable of handling 200 transactions per second.

D.   Administrators must monitor the network traffic of the desired systems.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-9e98-c0f9-29e3bb5dbe00.html
点击查看答案
83.An architect is designing a new vSphere cluster. The requirement is to provide a total of 96 CPU cores and 1.5 TB RAM across all hosts.
The following information has been provided:
Two different physical hardware profiles are available for the ESXi hosts in the cluster.
- Profile 1: 16 CPU cores and 256 GB RAM
- Profile 2: 32 CPU cores and 512 GB RAM
Profile 2 is twice as expensive to purchase as Profile 1.
Which two aspects should the architect consider when selecting the hardware profile? Choose two.

A.   The manufacturer and model of the CPUs in the hosts

B.   The amount of capacity available for failover of virtual machines within the cluster

C.   The downtime allowed for virtual machines that will be running within the cluster

D.   The cost to procure and maintain the hardware

E.   The number of virtual machines that will be running within the cluster

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-2f20-c0f9-29e3bb5dbe00.html
点击查看答案
13.A customer has six hosts available in a cluster. When running at full capacity, all virtual machines can be run on two hosts.

A.   Two

B.   Three

C.   One

D.   None

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-df30-c0f9-29e3bb5dbe01.html
点击查看答案
2.An architect is finalizing the design for a new vCenter Server High Availability deployment.
What is one thing the architect must document in the design?

A.   The load balancing algorithm used by the Management Distributed Virtual Switches (DVS)

B.   The SSH configuration settings for the vCenter Server’s active node

C.   The vCenter Management Network IPv4 addresses for the witness node vCenter Server

D.   The details of each of the vCenter Server licenses for active, passive and witness nodes

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-ac68-c0f9-29e3bb5dbe00.html
点击查看答案
8.An architect is designing a new greenfield environment with 600 ESXi hosts in an automated fashion. The engineering department already has a PXE Boot server, TFTP server, and DHCP server set up with an NFS mount for their current Linux servers.
The architect must be able to demonstrate and meet a security requirement to have all infrastructure processes separated
Which recommendation should the architect make for the ESXi host deployment?

A.   Request an isolated network segment to use and dedicate it to Auto Deploy functions

B.   Ask the business to expand the engineering environment to service the virtual environment as well

C.   Request a common shared network with flexible security measures to accommodate different auto deployment options

D.   Deploy each ESXi host individually and document it to satisfy security requirements

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-c7c0-c0f9-29e3bb5dbe00.html
点击查看答案
15.An architect is designing storage for a new vSphere environment to meet the following requirements:
-Asynchronous replication is required between two sites.
-The impact on the storage layer should not impact the performance of the compute layer.
-Each application tier will require different replication attributes.
-Virtual machine live migration across compute and storage must be supported
-Virtual machine aware back up will be leveraged
-Operational management overhead should be minimized
-Operational automation should be supported
-Which storage design recommendations would meet the requirements?

A.   Two new Fibre Channel storage arrays will be deployed, one at either site.Each application tier will be initially provisioned a new LUN.Data replication will be offloaded to the new arrays.

B.   Two new vSphere clusters enabled with vSAN will be deployed, one at either site.vSAN will be used to provide policy-based management for each application tier.vSphere Replication will be used to replicate the virtual machine data in an asynchronous configuration.

C.   Two new ISCSI storage arrays will be deployed, one at either site.Each application tier will be initially provisioned a new LUN.Data replication will be offloaded to the new arrays.

D.   Two new storage arrays will be deployed, one at either site. vSphere Volumes (vVOLs) will be used to provide policy-based management for each application tier.Data replication will be offloaded to the new arrays.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-eae8-c0f9-29e3bb5dbe00.html
点击查看答案
17.As part of a new hybrid cloud initiative for a large financial company, the customer technical team is presenting an overview of the current state of the infrastructure and their vision for a new solution.
The project team captures notes during the presentation and adds them to the discovery documentation.
Which of the listed statements is a design constraint?

A.   The applications are created in-house with in-guest recovery protection

B.   The maximum tolerable data loss is 10 minutes

C.   The two data center locations have a network latency of 8 ms round-trip time (RTT)

D.   The existing storage is out of maintenance

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-fa88-c0f9-29e3bb5dbe00.html
点击查看答案
47.During a requirements gathering workshop, the customer provides the following requirement:A new vSphere platform must be designed securely and all interfaces must be protected against potential snooping.

A.   Interfaces must be audited

B.   Encrypted channels must be used for all communications.

C.   Unauthorized access to interfaces must be reported within 15 minutes.

D.   Communications must be through Private VLANs (PVLAN).

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-7f58-c0f9-29e3bb5dbe00.html
点击查看答案
试题通小程序
试题通app下载