Given the information from the customer, which two would be classified as assumptions within the design? Choose two.
A、 The backup service will store data in a secure facility
B、 The backup service has sufficient capacity for the new requirements
C、 The customer will update their hardware standard to support rack mount servers
D、 All virtual machines will be deployed with the same resource profile for production and development
E、 The clusters will have a minimum redundancy of N+1
G、
答案:BE
Given the information from the customer, which two would be classified as assumptions within the design? Choose two.
A、 The backup service will store data in a secure facility
B、 The backup service has sufficient capacity for the new requirements
C、 The customer will update their hardware standard to support rack mount servers
D、 All virtual machines will be deployed with the same resource profile for production and development
E、 The clusters will have a minimum redundancy of N+1
G、
答案:BE
A. Use different logical networks to ensure traffic is isolated with separate VLANs
B. Use Network I/O Control and ensure appropriate share value is defined for different types of traffic giving priority to the virtual machines traffic
C. Use two dedicated virtual switches with a single adapter each, dedicating one virtual switch for Management, vMotion, vSAN and Fault Tolerance traffic, and the second one for virtual machine traffic
D. Use a NIC teaming policy based on the physical NIC load
A. Leave the newly acquired company’s assets in its current place
B. Lift and shift the acquired assets into the data center.
C. Migrate the acquired company’s virtual machines into the existing vSphere environment.
D. Migrate and apply vSphere tags to the acquired company’s virtual machines.
During the discovery phase, the following information is documented:
Cluster One.
Six ESXi hosts
vSphere HA with host failures cluster tolerates = 1.
Proactive HA is enabled and set to automated.
Fully Automated vSphere DRS.
Transparent Page Sharing (TPS) is enabled.
Cluster Two.
Eight ESXi hosts.
vSphere HA with host failures cluster tolerates = 1.
Proactive HA is disabled.
Partially Automated vSphere DRS.
Transparent Page Sharing (TPS) is disabled.
Cluster Three.
Three ESXi hosts.
vSphere HA with admission control is disabled.
Proactive HA is not supported.
Transparent Page Sharing (TPS) is disabled.
Virtual Machine Resource Profile 1.
Memory sharing techniques should not be used.
Virtual machines should be automatically restarted in the event of host failure if resources are available.
Automated initial virtual machine placement.
Virtual Machine Resource Profile 2.
Memory sharing techniques can be used.
Virtual machines should be protected from any host hardware failures.
Automated initial virtual machine placement.
Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? Choose two.
A. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster One.
B. All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster One.
C. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Two.
D. All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster Two.
E. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Three
A. Deploy a vCenter server for the management cluster. Deploy a vCenter Server for all remaining clusters. Create a shared SSO domain for each physical site
B. Deploy a vCenter Server for the management cluster. Deploy a vCenter Server for all remaining clusters. Create a shared SSO domain across all physical sites.
C. Deploy a vCenter Server for the management cluster with a dedicated SSO domain. Deploy a vCenter Server for all remaining clusters and use a dedicated SSO domain for each physical site
D. Deploy a vCenter Server for the management cluster with a dedicated SSO domain. Deploy a vCenter Server for all remaining clusters and use a dedicated SSO domain into a single physical site
Which requirement classification is being gathered for the design documentation?
A. Security
B. Manageability
C. Recoverability
D. Availability
A. The manufacturer and model of the CPUs in the hosts
B. The amount of capacity available for failover of virtual machines within the cluster
C. The downtime allowed for virtual machines that will be running within the cluster
D. The cost to procure and maintain the hardware
E. The number of virtual machines that will be running within the cluster
A. The virtual infrastructure environment must connect application virtual machines and management services to new physical network switches
B. The virtual infrastructure environment must connect application virtual machines and management services to separate distributed virtual switches (DVS)
C. The virtual infrastructure environment must connect application virtual machines and management services to separate VLANs
D. The virtual infrastructure environment must connect management services to a vSphere standard switch (VSS)
The following are the business requirements for the design:
The solution must support virtual machines with the following storage profiles:
- Write-intensive
- Backup
- Write-Once-Read-Many (WORM ) archive
The solution must support migration of virtual machine disks between storage profiles.
The WORM archive data must be located at an isolated secure site.
The backup storage array must only be connected to a backup media server.
All data should be recoverable from backup.
Which design decision should the architect make to meet the business requirements?
A. The solution will leverage a single storage array for the WORM archive and write-intensive storage profiles
B. The solution will leverage the same array for the backup and write-intensive storage profiles
C. The solution will leverage a different array for each storage profile
D. The solution will leverage a single storage array for all storage profiles
A. ESXi clusters must scale when compute resources are sustained above 70% for five business days
B. vSphere Fault Tolerance must be supported to improve application uptime
C. ESXi host updates must be installed within one week of release
D. The vSphere environment must support administrator password rotation
E. ESXi clusters must scale to 500 concurrent virtual machines
解析:解析:A、 Manageability (Scalability);B、 Avalability;C、 Security;D、 Security;E、 Manageability (Scalability)
A. A design diagram illustrating the configuration and specific attributes, such as IP addresses
B. A list of requirements, constraints, and risks
C. A solution architecture diagram with the components and data flow
D. An entity relationship diagram describing upstream and downstream dependencies for specific service components