A、 The backup solution must leverage the VMware Consolidated Backup (VCB) framework.
B、 The backup solution must leverage virtual machine snapshots.
C、 The backup solution must leverage VMware vSphere Storage APIs - Data Protection.
D、 The backup solution must leverage VMware vStorage APIs for Data Protection (VADP).
答案:C
A、 The backup solution must leverage the VMware Consolidated Backup (VCB) framework.
B、 The backup solution must leverage virtual machine snapshots.
C、 The backup solution must leverage VMware vSphere Storage APIs - Data Protection.
D、 The backup solution must leverage VMware vStorage APIs for Data Protection (VADP).
答案:C
A. Configure vSphere HA--Configure % based admission control--Configure two isolation addresses--Consider an OEM with NIC failure conditions in their Proactive HA plugin
B. Configure vSphere HA--Consider an OEM with NIC failure conditions in their Proactive HA plugin
C. Configure vSphere HA--Configure two existing data stores for heartbeat--Consider an OEM with NIC failure conditions in their Proactive HA plugin
D. Configure Proactive HA--Automation Level: Automated--Remediation: Maintenance mode for all failures--Consider an OEM with NIC failure conditions in their Proactive HA plugin
The following are the business requirements for the design:
The solution must support virtual machines with the following storage profiles:
- Write-intensive
- Backup
- Write-Once-Read-Many (WORM ) archive
The solution must support migration of virtual machine disks between storage profiles.
The WORM archive data must be located at an isolated secure site.
The backup storage array must only be connected to a backup media server.
All data should be recoverable from backup.
Which design decision should the architect make to meet the business requirements?
A. The solution will leverage a single storage array for the WORM archive and write-intensive storage profiles
B. The solution will leverage the same array for the backup and write-intensive storage profiles
C. The solution will leverage a different array for each storage profile
D. The solution will leverage a single storage array for all storage profiles
A. NVIDIA vGPU
B. AMD MxGPU
C. vSphere DirectPath I/O
D. vSGA
E. vSphere Bitfusion
A. Use different logical networks to ensure traffic is isolated with separate VLANs
B. Use Network I/O Control and ensure appropriate share value is defined for different types of traffic giving priority to the virtual machines traffic
C. Use two dedicated virtual switches with a single adapter each, dedicating one virtual switch for Management, vMotion, vSAN and Fault Tolerance traffic, and the second one for virtual machine traffic
D. Use a NIC teaming policy based on the physical NIC load
A. The manufacturer and model of the CPUs in the hosts
B. The amount of capacity available for failover of virtual machines within the cluster
C. The downtime allowed for virtual machines that will be running within the cluster
D. The cost to procure and maintain the hardware
E. The number of virtual machines that will be running within the cluster
A. An increase in the recovery time objective (RTO) for the cluster
B. Faster to reach the limit of virtual machines per host
C. An overall reduction in the license costs for the cluster
D. Less potential impact to virtual machines during a single host failure
All hosts within the cluster have the same CPU and memory capacity.
Which ESXi deployment method should the architect use?
A. Stateless cached vSphere Auto Deploy
B. Stateless vSphere Auto Deploy
C. Manual install of each ESXi host with an image from USB
D. Stateful vSphere Auto Deploy
A. Performance
B. Manageability
C. Recoverability
D. Availability
A. The solution should utilize dual network connections to eliminate single points of failure - NFR - Availability
B. The solution should allow the management of multiple ESXi hosts - NFR - Manageability
C. The solution should allow users to view the remote console of virtual machines - FR - Authentication
D. All user access to the platform should be recorded for audit purposes - FR - Historical Data
E. The solution should allow logs to be retained for a period of 30 days - FR - Reporting Requirements
A. Five
B. Six
C. Four
D. Seven