REQ01: The customer is looking for a way to limit database virtual machine (VM ) placement to save on CPU licensing costs.
CON01: There is a single cluster with no budget to scale.
CON02: All virtual machines must run on the consolidated cluster.
Which two design decisions should the architect make to meet the customer requirement? Choose two.
A、 The solution must use VM-VM anti-affinity rules
B、 The solution must use vSphere DRS in manual mode
C、 The solution must use a vRealize Orchestrator workflow for VM placement
D、 The solution must use VM-Host affinity rules
E、 The solution must use vSphere VM and host DRS groups
答案:DE
REQ01: The customer is looking for a way to limit database virtual machine (VM ) placement to save on CPU licensing costs.
CON01: There is a single cluster with no budget to scale.
CON02: All virtual machines must run on the consolidated cluster.
Which two design decisions should the architect make to meet the customer requirement? Choose two.
A、 The solution must use VM-VM anti-affinity rules
B、 The solution must use vSphere DRS in manual mode
C、 The solution must use a vRealize Orchestrator workflow for VM placement
D、 The solution must use VM-Host affinity rules
E、 The solution must use vSphere VM and host DRS groups
答案:DE
A. Use vSAN native support for WSFC
B. Use NFS 4.1 shares for quorum and shared disk
C. Use raw device mapping (RDM)
D. Use the SMB 2.1 protocol for sharing disks
E. Run WSFC on vSAN iSCSI Target Service
A. A design diagram illustrating the configuration and specific attributes, such as IP addresses
B. A list of requirements, constraints, and risks
C. A solution architecture diagram with the components and data flow
D. An entity relationship diagram describing upstream and downstream dependencies for specific service components
A. Three
B. Five
C. Four
D. Two
解析:解析:CPU: (60+60*0.45)/36 =2.4,RAM: (1152+1152*0.45)/512 = 3.2
A. Separate Tier-1, Tier-2 and Tier-3 virtual machines using dedicated distributed virtual switches (DVS)
B. Separate Tier-2 virtual machines onto a dedicated cluster
C. Separate Tier-1, Tier-2 and Tier-3 virtual machines onto dedicated clusters
D. Separate Tier-1, Tier-2 and Tier-3 virtual machines using resource pools and shares
A. The environment has an availability target of 99.5% for all infrastructure
B. The recovery time objective (RTO) for Tier 1 virtual machines is one hour
C. Access to the management cluster within the environment must be controlled
D. Windows and Linux virtual machines must reside on separate clusters
A. The platform must be integrated with existing change control policies.
B. The platform must be able to support a maximum tolerable downtime (MTD) of 30 minutes.
C. Maintenance windows must be scheduled to take place monthly during an established overnight period.
D. The platform must be available 24 hours a day, 7 days a week with the exception of scheduled downtime.
The vSphere cluster will have three hosts only due to budget considerations.
A database cluster (node majority) consisting of three virtual machines will be running on the vSphere cluster.
Which two recommendations can the architect make so that the customer achieves the highest level of application availability while taking into consideration operational resiliency? Choose two.
A. Create VM-VM anti-affinity rules
B. Set das.respectvmvmantiaffinityrules to false
C. Create VM-Host anti-affinity rules
D. Disable vSphere HA during maintenance
E. Set das.ignoreinsufficienthbdatastore to true
A. Configure the network to use MTU for the VMotion VMKernel to 1,600 bytes
B. Configure the network to use MTU for the VMotion VMKernel to 9,000 bytes
C. Create an additional standard switch with pNIC3 to use for vMotion
D. Use the 3 pNICs and bundle them in a link aggregation group (LAG) configuration
E. Use 10 GbE NICs instead of 1 GbE
A. Site Recovery Manager
B. Snapshots
C. vSAN Metro Cluster
D. vSphere Data Protection
E. vStorage APIs for Array Integration (VAAI)
A. Use different logical networks to ensure traffic is isolated with separate VLANs
B. Use Network I/O Control and ensure appropriate share value is defined for different types of traffic giving priority to the virtual machines traffic
C. Use two dedicated virtual switches with a single adapter each, dedicating one virtual switch for Management, vMotion, vSAN and Fault Tolerance traffic, and the second one for virtual machine traffic
D. Use a NIC teaming policy based on the physical NIC load