A、 An increase in the recovery time objective (RTO) for the cluster
B、 Faster to reach the limit of virtual machines per host
C、 An overall reduction in the license costs for the cluster
D、 Less potential impact to virtual machines during a single host failure
答案:D
A、 An increase in the recovery time objective (RTO) for the cluster
B、 Faster to reach the limit of virtual machines per host
C、 An overall reduction in the license costs for the cluster
D、 Less potential impact to virtual machines during a single host failure
答案:D
A. Migration of virtual machines between hosts must be encrypted
B. Log information must be verbose to support incident resolution
C. Critical events generated within the platform must be logged to an external Syslog service
D. Data integrity must be ensured
E. A common content library must be maintained across all data centers
A. Request an isolated network segment to use and dedicate it to Auto Deploy functions
B. Ask the business to expand the engineering environment to service the virtual environment as well
C. Request a common shared network with flexible security measures to accommodate different auto deployment options
D. Deploy each ESXi host individually and document it to satisfy security requirements
A. 15 minutes
B. 60 minutes
C. 105 minutes
D. 90 minutes
The vSphere cluster will have three hosts only due to budget considerations.
A database cluster (node majority) consisting of three virtual machines will be running on the vSphere cluster.
Which two recommendations can the architect make so that the customer achieves the highest level of application availability while taking into consideration operational resiliency? Choose two.
A. Create VM-VM anti-affinity rules
B. Set das.respectvmvmantiaffinityrules to false
C. Create VM-Host anti-affinity rules
D. Disable vSphere HA during maintenance
E. Set das.ignoreinsufficienthbdatastore to true
A. Use Route Based on Physical NIC Load
B. Use Network I/O Control with Shares.
C. Use Network I/O Control with Reservation.
D. Use Link Aggregation Control Protocol (LACP).
E. Use Network I/O Control with Limits.
REQ01 The platform must host different types of workloads including applications that must be compliant with internal security standarD、
REQ02 The infrastructure must initially run 100 virtual machines.
REQ03 Ten of the virtual machines must be compliant with internal security standarD、
REQ04 The internal security standard specifies logical network separation for in-scope applications.
CON01 The customer has already purchased the licenses as part of another project.
CON02 The customer has five physical servers that must be reused.
Additionally, based on resource requirements, four physical servers will be enough to run all workloads.
Which recommendation should the architect make to meet requirements while minimizing project costs?
A. Use Network I/O Control to ensure the internal security zone has higher share value
B. Purchase additional servers and plan separate, isolated clusters for workloads that must be compliant with internal security
C. Use a single cluster and ensure that different security zones are separated at least with dedicated VLANs and firewall
D. Use a single cluster and configure DRS anti-affinity rules to ensure internal security compliant virtual machines cannot migrate between ESXi hosts.
A. Use vSAN native support for WSFC
B. Use NFS 4.1 shares for quorum and shared disk
C. Use raw device mapping (RDM)
D. Use the SMB 2.1 protocol for sharing disks
E. Run WSFC on vSAN iSCSI Target Service
A. Manageability
B. Performance
C. Availability
D. Recoverability
A. The system must perform virtual machine backups through an API.
B. Virtual machines must be patched within one month of the patch release date.
C. Virtual machines must be restarted within 30 minutes of a host failure.
D. The system must be able to scale to support 500 concurrent virtual machines.
Cluster One.
Six ESXi hosts.
vSphere HA with host failures cluster tolerates = 1.
Proactive HA is enabled and set to automated.
Fully Automated vSphere DRS.
Transparent Page Sharing (TPS) is enabled.
Cluster Two.
Eight ESXi hosts.
vSphere HA with host failures cluster tolerates = 1.
Proactive HA is disabled.
Partially Automated vSphere DRS.
Transparent Page Sharing (TPS) is disabled.
Cluster Three.
Three ESXi hosts.
vSphere HA with admission control is disabled.
Proactive HA is not supported.
Transparent Page Sharing (TPS) is disabled.
Virtual Machine Resource Profile 1.
Memory sharing techniques should not be used.
Virtual machines should be automatically restarted in the event of host failure if resources are available.
Automated initial virtual machine placement.
Virtual Machine Resource Profile 2.
Memory sharing techniques should not be used.
Virtual machines should be automatically restarted in the event of host failure regardless of available resources.
Automated initial virtual machine placement.
Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? (Choose two)
A. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster One.
B. All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster One.
C. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Two.
D. All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster Two.
E. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Three.