试题通
试题通
APP下载
首页
>
IT互联网
>
虚拟化高级试题题库4
试题通
搜索
虚拟化高级试题题库4
题目内容
(
多选题
)
75.An architect is tasked with designing a greenfield VMware software-defined data center ( ) solution that will be used to deliver a private cloud service for a customer.


Given the information from the customer, which two would be classified as assumptions within the design? Choose two.

A、  The backup service will store data in a secure facility

B、  The backup service has sufficient capacity for the new requirements

C、  The customer will update their hardware standard to support rack mount servers

D、  All virtual machines will be deployed with the same resource profile for production and development

E、  The clusters will have a minimum redundancy of N+1

G、

答案:BE

试题通
虚拟化高级试题题库4
试题通
37.An architect is creating a network design for a new vSphere environment.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-5848-c0f9-29e3bb5dbe00.html
点击查看题目
26.Following a recent acquisition, an architect needs to merge IT assets into its current data center. The combined vSphere environment will need to run the newly acquired company’s virtual machines.
Network integration work has already been completed and the current environment has capacity to host all virtual machines. The Operations team needs to identify which virtual machines belong to the acquired company and report on their usage.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-2198-c0f9-29e3bb5dbe00.html
点击查看题目
85.An architect is considering placement of virtual machines within an existing VMware software-defined data center (SDDC ).

During the discovery phase, the following information is documented:

Cluster One.

Six ESXi hosts

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is enabled and set to automated.

Fully Automated vSphere DRS.

Transparent Page Sharing (TPS) is enabled.

Cluster Two.

Eight ESXi hosts.

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is disabled.

Partially Automated vSphere DRS.

Transparent Page Sharing (TPS) is disabled.

Cluster Three.

Three ESXi hosts.

vSphere HA with admission control is disabled.

Proactive HA is not supported.

Transparent Page Sharing (TPS) is disabled.

Virtual Machine Resource Profile 1.

Memory sharing techniques should not be used.

Virtual machines should be automatically restarted in the event of host failure if resources are available.

Automated initial virtual machine placement.

Virtual Machine Resource Profile 2.

Memory sharing techniques can be used.

Virtual machines should be protected from any host hardware failures.

Automated initial virtual machine placement.

Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? Choose two.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-36f0-c0f9-29e3bb5dbe01.html
点击查看题目
10.An architect is finalizing the design for a new vSphere platform based on the following information:
-All Windows virtual machines will be hosted on a dedicated cluster for licensing purposes.
-All Linux virtual machines will be hosted on a dedicated cluster for licensing purposes.
-All management virtual machines will be hosted on a dedicated cluster.
-A total of ten physical sites will be used to host virtual machines.
-In the event of one physical datacenter becoming unavailable, the manageability of the virtual infrastructure in the remaining data centers should not be impacted
-Access to configure the management virtual machines via vCenter Server must be controlled through the management Active Directory domain.
-Access to configure the Windows and Linux virtual machines must be controlled through the resource Active Directory domain.
-The management and resource Active Directory domains are part of separate Active Directory forests and do not have any trusts between them.
-The design will use Active Directory with Integrated Windows Authentication.
-How should the architect document the vCenter Server configuration for this design?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-cf90-c0f9-29e3bb5dbe00.html
点击查看题目
19.During a requirements gathering workshop, the customer’s Chief Information Security Office ( CISO) provides the following requirements that are pertinent to the design of a new vSphere environment:All operating system critical patches must be installed within 24 hours of release;All virtual machine templates must be updated every three months in line with company policy.

Which requirement classification is being gathered for the design documentation?

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-fe70-c0f9-29e3bb5dbe00.html
点击查看题目
83.An architect is designing a new vSphere cluster. The requirement is to provide a total of 96 CPU cores and 1.5 TB RAM across all hosts.
The following information has been provided:
Two different physical hardware profiles are available for the ESXi hosts in the cluster.
- Profile 1: 16 CPU cores and 256 GB RAM
- Profile 2: 32 CPU cores and 512 GB RAM
Profile 2 is twice as expensive to purchase as Profile 1.
Which two aspects should the architect consider when selecting the hardware profile? Choose two.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-2f20-c0f9-29e3bb5dbe00.html
点击查看题目
27.The Chief Operating Officer ( ) at an organization raises concerns that their virtual infrastructure environment is vulnerable. Recently, a security-related issue with a virtual machine caused all management services to become unavailable. No budget is available in the short term for additional platform investment.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-2580-c0f9-29e3bb5dbe00.html
点击查看题目
3.An architect is designing a new VMware solution for a customer that has a number of different resource profiles.

The following are the business requirements for the design:

The solution must support virtual machines with the following storage profiles:

- Write-intensive

- Backup

- Write-Once-Read-Many (WORM ) archive

The solution must support migration of virtual machine disks between storage profiles.

The WORM archive data must be located at an isolated secure site.

The backup storage array must only be connected to a backup media server.

All data should be recoverable from backup.

Which design decision should the architect make to meet the business requirements?

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-b050-c0f9-29e3bb5dbe00.html
点击查看题目
61.Which two of the listed requirements would be classified as manageability non-functional requirements?Choose two.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-bdd8-c0f9-29e3bb5dbe00.html
点击查看题目
40.The architect for a large enterprise is tasked with reviewing a proposed design created by a service partner.
Which design elements are expected to be detailed within the physical design section of the
documentation?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-6400-c0f9-29e3bb5dbe00.html
点击查看题目
首页
>
IT互联网
>
虚拟化高级试题题库4
题目内容
(
多选题
)
手机预览
试题通
虚拟化高级试题题库4

75.An architect is tasked with designing a greenfield VMware software-defined data center ( ) solution that will be used to deliver a private cloud service for a customer.


Given the information from the customer, which two would be classified as assumptions within the design? Choose two.

A、  The backup service will store data in a secure facility

B、  The backup service has sufficient capacity for the new requirements

C、  The customer will update their hardware standard to support rack mount servers

D、  All virtual machines will be deployed with the same resource profile for production and development

E、  The clusters will have a minimum redundancy of N+1

G、

答案:BE

试题通
分享
试题通
试题通
虚拟化高级试题题库4
相关题目
37.An architect is creating a network design for a new vSphere environment.

A.   Use different logical networks to ensure traffic is isolated with separate VLANs

B.   Use Network I/O Control and ensure appropriate share value is defined for different types of traffic giving priority to the virtual machines traffic

C.   Use two dedicated virtual switches with a single adapter each, dedicating one virtual switch for Management, vMotion, vSAN and Fault Tolerance traffic, and the second one for virtual machine traffic

D.   Use a NIC teaming policy based on the physical NIC load

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-5848-c0f9-29e3bb5dbe00.html
点击查看答案
26.Following a recent acquisition, an architect needs to merge IT assets into its current data center. The combined vSphere environment will need to run the newly acquired company’s virtual machines.
Network integration work has already been completed and the current environment has capacity to host all virtual machines. The Operations team needs to identify which virtual machines belong to the acquired company and report on their usage.

A.   Leave the newly acquired company’s assets in its current place

B.   Lift and shift the acquired assets into the data center.

C.   Migrate the acquired company’s virtual machines into the existing vSphere environment.

D.   Migrate and apply vSphere tags to the acquired company’s virtual machines.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-2198-c0f9-29e3bb5dbe00.html
点击查看答案
85.An architect is considering placement of virtual machines within an existing VMware software-defined data center (SDDC ).

During the discovery phase, the following information is documented:

Cluster One.

Six ESXi hosts

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is enabled and set to automated.

Fully Automated vSphere DRS.

Transparent Page Sharing (TPS) is enabled.

Cluster Two.

Eight ESXi hosts.

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is disabled.

Partially Automated vSphere DRS.

Transparent Page Sharing (TPS) is disabled.

Cluster Three.

Three ESXi hosts.

vSphere HA with admission control is disabled.

Proactive HA is not supported.

Transparent Page Sharing (TPS) is disabled.

Virtual Machine Resource Profile 1.

Memory sharing techniques should not be used.

Virtual machines should be automatically restarted in the event of host failure if resources are available.

Automated initial virtual machine placement.

Virtual Machine Resource Profile 2.

Memory sharing techniques can be used.

Virtual machines should be protected from any host hardware failures.

Automated initial virtual machine placement.

Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? Choose two.

A.   All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster One.

B.   All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster One.

C.   All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Two.

D.   All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster Two.

E.   All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Three

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-36f0-c0f9-29e3bb5dbe01.html
点击查看答案
10.An architect is finalizing the design for a new vSphere platform based on the following information:
-All Windows virtual machines will be hosted on a dedicated cluster for licensing purposes.
-All Linux virtual machines will be hosted on a dedicated cluster for licensing purposes.
-All management virtual machines will be hosted on a dedicated cluster.
-A total of ten physical sites will be used to host virtual machines.
-In the event of one physical datacenter becoming unavailable, the manageability of the virtual infrastructure in the remaining data centers should not be impacted
-Access to configure the management virtual machines via vCenter Server must be controlled through the management Active Directory domain.
-Access to configure the Windows and Linux virtual machines must be controlled through the resource Active Directory domain.
-The management and resource Active Directory domains are part of separate Active Directory forests and do not have any trusts between them.
-The design will use Active Directory with Integrated Windows Authentication.
-How should the architect document the vCenter Server configuration for this design?

A.   Deploy a vCenter server for the management cluster. Deploy a vCenter Server for all remaining clusters. Create a shared SSO domain for each physical site

B.   Deploy a vCenter Server for the management cluster. Deploy a vCenter Server for all remaining clusters. Create a shared SSO domain across all physical sites.

C.   Deploy a vCenter Server for the management cluster with a dedicated SSO domain. Deploy a vCenter Server for all remaining clusters and use a dedicated SSO domain for each physical site

D.   Deploy a vCenter Server for the management cluster with a dedicated SSO domain. Deploy a vCenter Server for all remaining clusters and use a dedicated SSO domain into a single physical site

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-cf90-c0f9-29e3bb5dbe00.html
点击查看答案
19.During a requirements gathering workshop, the customer’s Chief Information Security Office ( CISO) provides the following requirements that are pertinent to the design of a new vSphere environment:All operating system critical patches must be installed within 24 hours of release;All virtual machine templates must be updated every three months in line with company policy.

Which requirement classification is being gathered for the design documentation?

A.   Security

B.   Manageability

C.   Recoverability

D.   Availability

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-fe70-c0f9-29e3bb5dbe00.html
点击查看答案
83.An architect is designing a new vSphere cluster. The requirement is to provide a total of 96 CPU cores and 1.5 TB RAM across all hosts.
The following information has been provided:
Two different physical hardware profiles are available for the ESXi hosts in the cluster.
- Profile 1: 16 CPU cores and 256 GB RAM
- Profile 2: 32 CPU cores and 512 GB RAM
Profile 2 is twice as expensive to purchase as Profile 1.
Which two aspects should the architect consider when selecting the hardware profile? Choose two.

A.   The manufacturer and model of the CPUs in the hosts

B.   The amount of capacity available for failover of virtual machines within the cluster

C.   The downtime allowed for virtual machines that will be running within the cluster

D.   The cost to procure and maintain the hardware

E.   The number of virtual machines that will be running within the cluster

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-2f20-c0f9-29e3bb5dbe00.html
点击查看答案
27.The Chief Operating Officer ( ) at an organization raises concerns that their virtual infrastructure environment is vulnerable. Recently, a security-related issue with a virtual machine caused all management services to become unavailable. No budget is available in the short term for additional platform investment.

A.   The virtual infrastructure environment must connect application virtual machines and management services to new physical network switches

B.   The virtual infrastructure environment must connect application virtual machines and management services to separate distributed virtual switches (DVS)

C.   The virtual infrastructure environment must connect application virtual machines and management services to separate VLANs

D.   The virtual infrastructure environment must connect management services to a vSphere standard switch (VSS)

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-2580-c0f9-29e3bb5dbe00.html
点击查看答案
3.An architect is designing a new VMware solution for a customer that has a number of different resource profiles.

The following are the business requirements for the design:

The solution must support virtual machines with the following storage profiles:

- Write-intensive

- Backup

- Write-Once-Read-Many (WORM ) archive

The solution must support migration of virtual machine disks between storage profiles.

The WORM archive data must be located at an isolated secure site.

The backup storage array must only be connected to a backup media server.

All data should be recoverable from backup.

Which design decision should the architect make to meet the business requirements?

A.   The solution will leverage a single storage array for the WORM archive and write-intensive storage profiles

B.   The solution will leverage the same array for the backup and write-intensive storage profiles

C.   The solution will leverage a different array for each storage profile

D.   The solution will leverage a single storage array for all storage profiles

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-b050-c0f9-29e3bb5dbe00.html
点击查看答案
61.Which two of the listed requirements would be classified as manageability non-functional requirements?Choose two.

A.   ESXi clusters must scale when compute resources are sustained above 70% for five business days

B.   vSphere Fault Tolerance must be supported to improve application uptime

C.   ESXi host updates must be installed within one week of release

D.   The vSphere environment must support administrator password rotation

E.   ESXi clusters must scale to 500 concurrent virtual machines

解析:解析:A、 Manageability (Scalability);B、 Avalability;C、 Security;D、 Security;E、 Manageability (Scalability)

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-bdd8-c0f9-29e3bb5dbe00.html
点击查看答案
40.The architect for a large enterprise is tasked with reviewing a proposed design created by a service partner.
Which design elements are expected to be detailed within the physical design section of the
documentation?

A.   A design diagram illustrating the configuration and specific attributes, such as IP addresses

B.   A list of requirements, constraints, and risks

C.   A solution architecture diagram with the components and data flow

D.   An entity relationship diagram describing upstream and downstream dependencies for specific service components

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-6400-c0f9-29e3bb5dbe00.html
点击查看答案
试题通小程序
试题通app下载