试题通
试题通
APP下载
首页
>
IT互联网
>
虚拟化高级试题题库4
试题通
搜索
虚拟化高级试题题库4
题目内容
(
单选题
)
41.What is a benefit of using a scale-out method for handling vSphere cluster growth?

A、  An increase in the recovery time objective (RTO) for the cluster

B、  Faster to reach the limit of virtual machines per host

C、  An overall reduction in the license costs for the cluster

D、  Less potential impact to virtual machines during a single host failure

答案:D

试题通
虚拟化高级试题题库4
试题通
62.An architect is designing a new vSphere platform to meet a list of requirements from the security team.
Which two requirements would be classified as non-functional requirements? Choose two.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-c5a8-c0f9-29e3bb5dbe00.html
点击查看题目
8.An architect is designing a new greenfield environment with 600 ESXi hosts in an automated fashion. The engineering department already has a PXE Boot server, TFTP server, and DHCP server set up with an NFS mount for their current Linux servers.
The architect must be able to demonstrate and meet a security requirement to have all infrastructure processes separated
Which recommendation should the architect make for the ESXi host deployment?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-c7c0-c0f9-29e3bb5dbe00.html
点击查看题目
28.In a meeting to discuss the minimum viable product ( ) deployment of a new customer-facing application, the key stakeholder shares details of the application components and the application administrators share details of performance and integrity tests for the application.
The application will be made up of the following components:
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-2d50-c0f9-29e3bb5dbe00.html
点击查看题目
78.An architect is designing a vSphere environment for a customer based on the following information:

The vSphere cluster will have three hosts only due to budget considerations.

A database cluster (node majority) consisting of three virtual machines will be running on the vSphere cluster.

Which two recommendations can the architect make so that the customer achieves the highest level of application availability while taking into consideration operational resiliency? Choose two.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-1b98-c0f9-29e3bb5dbe00.html
点击查看题目
87.During a requirements gathering workshop, the customer provides the following information:
https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-4a78-c0f9-29e3bb5dbe00.html
点击查看题目
4.An architect is preparing a design for a company planning digital transformation. During the requirements gathering workshop, the following requirements ( ) and constraints ( ) are identified:

REQ01 The platform must host different types of workloads including applications that must be compliant with internal security standarD、

REQ02 The infrastructure must initially run 100 virtual machines.

REQ03 Ten of the virtual machines must be compliant with internal security standarD、

REQ04 The internal security standard specifies logical network separation for in-scope applications.


CON01 The customer has already purchased the licenses as part of another project.

CON02 The customer has five physical servers that must be reused.

Additionally, based on resource requirements, four physical servers will be enough to run all workloads.


Which recommendation should the architect make to meet requirements while minimizing project costs?

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-b438-c0f9-29e3bb5dbe00.html
点击查看题目
10 GbE storage connectivity for all devices.
The solution architect is tasked with coming up with a solution to meet this requirement while utilizing their existing investments.
Which two recommendations could the architect make? Choose two.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-ecb8-c0f9-29e3bb5dbe01.html
点击查看题目
33.During a requirements gathering workshop, the customer provides the following requirement that is pertinent to the design of a new vSphere environment:
The Maximum Tolerable Downtime ( ) for all Tier 1 applications is one hour.
Which requirement classification is being gathered for the design documentation?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-48a8-c0f9-29e3bb5dbe00.html
点击查看题目
58.Which requirement would be classified as a functional requirement within the design documentation?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-ae38-c0f9-29e3bb5dbe00.html
点击查看题目
60.An architect is considering placement of virtual machines within an existing VMware software-defined datacenter (SDDC ). During the discovery phase, the following information is documented:


Cluster One.

Six ESXi hosts.

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is enabled and set to automated.

Fully Automated vSphere DRS.

Transparent Page Sharing (TPS) is enabled.

Cluster Two.

Eight ESXi hosts.

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is disabled.

Partially Automated vSphere DRS.

Transparent Page Sharing (TPS) is disabled.

Cluster Three.

Three ESXi hosts.

vSphere HA with admission control is disabled.

Proactive HA is not supported.

Transparent Page Sharing (TPS) is disabled.

Virtual Machine Resource Profile 1.

Memory sharing techniques should not be used.

Virtual machines should be automatically restarted in the event of host failure if resources are available.

Automated initial virtual machine placement.

Virtual Machine Resource Profile 2.

Memory sharing techniques should not be used.

Virtual machines should be automatically restarted in the event of host failure regardless of available resources.

Automated initial virtual machine placement.


Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? (Choose two)

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-b220-c0f9-29e3bb5dbe00.html
点击查看题目
首页
>
IT互联网
>
虚拟化高级试题题库4
题目内容
(
单选题
)
手机预览
试题通
虚拟化高级试题题库4

41.What is a benefit of using a scale-out method for handling vSphere cluster growth?

A、  An increase in the recovery time objective (RTO) for the cluster

B、  Faster to reach the limit of virtual machines per host

C、  An overall reduction in the license costs for the cluster

D、  Less potential impact to virtual machines during a single host failure

答案:D

试题通
分享
试题通
试题通
虚拟化高级试题题库4
相关题目
62.An architect is designing a new vSphere platform to meet a list of requirements from the security team.
Which two requirements would be classified as non-functional requirements? Choose two.

A.   Migration of virtual machines between hosts must be encrypted

B.   Log information must be verbose to support incident resolution

C.   Critical events generated within the platform must be logged to an external Syslog service

D.   Data integrity must be ensured

E.   A common content library must be maintained across all data centers

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-c5a8-c0f9-29e3bb5dbe00.html
点击查看答案
8.An architect is designing a new greenfield environment with 600 ESXi hosts in an automated fashion. The engineering department already has a PXE Boot server, TFTP server, and DHCP server set up with an NFS mount for their current Linux servers.
The architect must be able to demonstrate and meet a security requirement to have all infrastructure processes separated
Which recommendation should the architect make for the ESXi host deployment?

A.   Request an isolated network segment to use and dedicate it to Auto Deploy functions

B.   Ask the business to expand the engineering environment to service the virtual environment as well

C.   Request a common shared network with flexible security measures to accommodate different auto deployment options

D.   Deploy each ESXi host individually and document it to satisfy security requirements

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-c7c0-c0f9-29e3bb5dbe00.html
点击查看答案
28.In a meeting to discuss the minimum viable product ( ) deployment of a new customer-facing application, the key stakeholder shares details of the application components and the application administrators share details of performance and integrity tests for the application.
The application will be made up of the following components:

A.   15 minutes

B.   60 minutes

C.   105 minutes

D.   90 minutes

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-2d50-c0f9-29e3bb5dbe00.html
点击查看答案
78.An architect is designing a vSphere environment for a customer based on the following information:

The vSphere cluster will have three hosts only due to budget considerations.

A database cluster (node majority) consisting of three virtual machines will be running on the vSphere cluster.

Which two recommendations can the architect make so that the customer achieves the highest level of application availability while taking into consideration operational resiliency? Choose two.

A.   Create VM-VM anti-affinity rules

B.   Set das.respectvmvmantiaffinityrules to false

C.   Create VM-Host anti-affinity rules

D.   Disable vSphere HA during maintenance

E.   Set das.ignoreinsufficienthbdatastore to true

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-1b98-c0f9-29e3bb5dbe00.html
点击查看答案
87.During a requirements gathering workshop, the customer provides the following information:

A.   Use Route Based on Physical NIC Load

B.   Use Network I/O Control with Shares.

C.   Use Network I/O Control with Reservation.

D.   Use Link Aggregation Control Protocol (LACP).

E.   Use Network I/O Control with Limits.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-4a78-c0f9-29e3bb5dbe00.html
点击查看答案
4.An architect is preparing a design for a company planning digital transformation. During the requirements gathering workshop, the following requirements ( ) and constraints ( ) are identified:

REQ01 The platform must host different types of workloads including applications that must be compliant with internal security standarD、

REQ02 The infrastructure must initially run 100 virtual machines.

REQ03 Ten of the virtual machines must be compliant with internal security standarD、

REQ04 The internal security standard specifies logical network separation for in-scope applications.


CON01 The customer has already purchased the licenses as part of another project.

CON02 The customer has five physical servers that must be reused.

Additionally, based on resource requirements, four physical servers will be enough to run all workloads.


Which recommendation should the architect make to meet requirements while minimizing project costs?

A.   Use Network I/O Control to ensure the internal security zone has higher share value

B.   Purchase additional servers and plan separate, isolated clusters for workloads that must be compliant with internal security

C.   Use a single cluster and ensure that different security zones are separated at least with dedicated VLANs and firewall

D.   Use a single cluster and configure DRS anti-affinity rules to ensure internal security compliant virtual machines cannot migrate between ESXi hosts.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-b438-c0f9-29e3bb5dbe00.html
点击查看答案
10 GbE storage connectivity for all devices.
The solution architect is tasked with coming up with a solution to meet this requirement while utilizing their existing investments.
Which two recommendations could the architect make? Choose two.

A.   Use vSAN native support for WSFC

B.   Use NFS 4.1 shares for quorum and shared disk

C.   Use raw device mapping (RDM)

D.   Use the SMB 2.1 protocol for sharing disks

E.   Run WSFC on vSAN iSCSI Target Service

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-ecb8-c0f9-29e3bb5dbe01.html
点击查看答案
33.During a requirements gathering workshop, the customer provides the following requirement that is pertinent to the design of a new vSphere environment:
The Maximum Tolerable Downtime ( ) for all Tier 1 applications is one hour.
Which requirement classification is being gathered for the design documentation?

A.   Manageability

B.   Performance

C.   Availability

D.   Recoverability

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-48a8-c0f9-29e3bb5dbe00.html
点击查看答案
58.Which requirement would be classified as a functional requirement within the design documentation?

A.   The system must perform virtual machine backups through an API.

B.   Virtual machines must be patched within one month of the patch release date.

C.   Virtual machines must be restarted within 30 minutes of a host failure.

D.   The system must be able to scale to support 500 concurrent virtual machines.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-ae38-c0f9-29e3bb5dbe00.html
点击查看答案
60.An architect is considering placement of virtual machines within an existing VMware software-defined datacenter (SDDC ). During the discovery phase, the following information is documented:


Cluster One.

Six ESXi hosts.

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is enabled and set to automated.

Fully Automated vSphere DRS.

Transparent Page Sharing (TPS) is enabled.

Cluster Two.

Eight ESXi hosts.

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is disabled.

Partially Automated vSphere DRS.

Transparent Page Sharing (TPS) is disabled.

Cluster Three.

Three ESXi hosts.

vSphere HA with admission control is disabled.

Proactive HA is not supported.

Transparent Page Sharing (TPS) is disabled.

Virtual Machine Resource Profile 1.

Memory sharing techniques should not be used.

Virtual machines should be automatically restarted in the event of host failure if resources are available.

Automated initial virtual machine placement.

Virtual Machine Resource Profile 2.

Memory sharing techniques should not be used.

Virtual machines should be automatically restarted in the event of host failure regardless of available resources.

Automated initial virtual machine placement.


Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? (Choose two)

A.   All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster One.

B.   All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster One.

C.   All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Two.

D.   All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster Two.

E.   All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Three.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-b220-c0f9-29e3bb5dbe00.html
点击查看答案
试题通小程序
试题通app下载