A、 The number of 10 GbE capable ports in the vSAN ReadyNode
B、 The use of vSAN ReadyNodes
C、 The existing network is 10 GbE capable
D、 The use of NVMe drives for cache and capacity
答案:C
A、 The number of 10 GbE capable ports in the vSAN ReadyNode
B、 The use of vSAN ReadyNodes
C、 The existing network is 10 GbE capable
D、 The use of NVMe drives for cache and capacity
答案:C
A. The application must be hosted with redundancy levels of N+1 or better.
B. Penetration testing must be executed quarterly with a pass rate of 80% or higher.
C. The application must be capable of handling 200 transactions per second.
D. Administrators must monitor the network traffic of the desired systems.
A. Use different logical networks to ensure traffic is isolated with separate VLANs
B. Use Network I/O Control and ensure appropriate share value is defined for different types of traffic giving priority to the virtual machines traffic
C. Use two dedicated virtual switches with a single adapter each, dedicating one virtual switch for Management, vMotion, vSAN and Fault Tolerance traffic, and the second one for virtual machine traffic
D. Use a NIC teaming policy based on the physical NIC load
Given the information from the customer, which two would be classified as assumptions within the design? Choose two.
A. The backup service will store data in a secure facility
B. The backup service has sufficient capacity for the new requirements
C. The customer will update their hardware standard to support rack mount servers
D. All virtual machines will be deployed with the same resource profile for production and development
E. The clusters will have a minimum redundancy of N+1
G.
A. The backup solution must leverage the VMware Consolidated Backup (VCB) framework.
B. The backup solution must leverage virtual machine snapshots.
C. The backup solution must leverage VMware vSphere Storage APIs - Data Protection.
D. The backup solution must leverage VMware vStorage APIs for Data Protection (VADP).
The following information is noted:
They have a single four-port (2 × 10 GbE and 2 × 1 GbE) NIC per ESXi host.
All top-of-rack (ToR) switches are 10 GbE and fully populated.
The backup traffic must not impact existing services .
Which two recommendations should the architect make to help the customer incorporate the service?Choose two.
A. Enable and tag traffic on the backup distributed port group
B. Add a new two-port 10 GbE NIC per ESXi host
C. Replace the existing NIC with a two-port 25 GbE NIC per ESXi host
D. Match the Class of Service (CoS) and Differentiated Services Code Point (DSCP) values to the physical network
E. Create a new virtual switch using the 1 GbE uplinks
G.
A. Separate Tier-1, Tier-2 and Tier-3 virtual machines using dedicated distributed virtual switches (DVS)
B. Separate Tier-2 virtual machines onto a dedicated cluster
C. Separate Tier-1, Tier-2 and Tier-3 virtual machines onto dedicated clusters
D. Separate Tier-1, Tier-2 and Tier-3 virtual machines using resource pools and shares
A. A new vCenter Server will be deployed for each branch site
B. A new host and cluster folder will be created for each branch site
C. The automation script will be updated to reflect unique naming for each site
D. A new virtual data center will be created for each branch site
A. A vCenter Server Appliance will be deployed to each site. Unique SSO domains will be created per site.
B. A vCenter Server will be installed on Windows virtual machines deployed to both sites.
C. A vCenter Server Appliance will be deployed to each site.
D. A vCenter Server Appliance will be deployed to the primary site only.
A. Clone virtual machines as VM templates to the published content library
B. Create a subscribed library from the published library and synchronize Open Virtualization Format (OVF) templates on-demand
C. Create a subscription and publish VM templates to a subscribed content library
D. Create a subscribed library from the published library and synchronize Open Virtualization Format (OVF) templates automatically
E. Clone virtual machines as Open Virtualization Format (OVF)templates to the published content library
F. Update the role for the DevOps team with new privileges
A. Maximum tolerable downtime
B. Predicted platform growth
C. Auditing requirements for the virtual machines
D. The level of isolation required between virtual machine classifications