APP下载
首页
>
外语语音
>
英文知识复习题库
搜索
英文知识复习题库
题目内容
(
多选题
)
14、An administrator is tasked with configuring certificates for a VMware software-defined data center (SDDC) based on the following requirements: • All certificates should use certificates trusted by the Enterprise Certificate Authority (CA). • The solution should minimize the ongoing management overhead of replacing certificates. Which three actions should the administrator take to ensure that the solution meets corporate policy? (Choose three.)

A、 Replace the VMware Certificate Authority (VMCA) certificate with a self-signed certificate generated from the

B、 Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.

C、 Replace the machine SSL certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).

D、 Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.

E、 Replace the solution user certificates wife custom certificates generated from the Enterprise CA.

F、 Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).

G、

H、

I、

J、

答案:BDE

解析:解析: Option B, D and E are correct because they allow the administrator to replace the machine SSL certificates,the VMware Certificate Authority (VMCA) certificate and the solution user certificates with custom certificates generated from the Enterprise CA, which will ensure that all certificates are trusted by the Enterprise CA and minimize the ongoing management overhead of replacing certificates. Option A is incorrect because replacing the VMCA certificate with a self-signed certificate generated from the VMCA will not ensure that the certificate is trusted by the Enterprise CA. Option C is incorrect because replacing the machine SSL certificates with trusted certificates generated from the VMCA will not ensure that the certificates are trusted by the Enterprise CA. Option F is incorrect because replacing the solution user certificates with trusted certificates generated from the VMCA will not ensure that the certificates are trusted by the Enterprise CA. 选项B、D和E是正确的,因为它们允许管理员用企业CA生成的自定义证书替换机器SSL证书、VMware证书颁发机构(VMCA)证书和解决方案用户证书,这将确保企业CA信任所有证书,并将替换证书的持续管理开销降至最低。选项A不正确,因为用从VMCA生成的自签名证书替换VMCA证书不能确保该证书受到企业CA的信任。选项C是不正确的,因为用从VMCA生成的可信证书替换机器SSL证书不能确保证书被企业CA信任。选项F是不正确的,因为用从VMCA生成的可信证书替换解决方案用户证书不能确保证书被企业CA信任。

英文知识复习题库
70、An administrator needs to configure a content library solution based on the following information: •A new corporate virtual machine (VM) template is created every month to include all of the latest patches. •The new VM template should be downloaded from the primary data center site (London) to two secondary data center sites (Tokyo and New York) as soon as possible. •There is limited disk space available at one of the secondary data center sites (Tokyo) due to an ongoing data center consolidation project. Which four steps should the administrator take to configure the content library solution before adding a VM template? (Choose four.)
https://www.shititong.cn/cha-kan/shiti/000491c6-daa9-ffd0-c0a9-459fb8cdb200.html
点击查看题目
88、An administrator is asked to configure a security policy at the port group level of a standard switch. The following requirements must be met:• The security policy must apply to all virtual machines on portgroup-1.• All traffic must be forwarded, regardless of the destination.
https://www.shititong.cn/cha-kan/shiti/00049244-4fa0-4744-c070-20603eaf6c00.html
点击查看题目
52、A vSphere cluster has the following configuration: • Virtual machines (VMs) are running Production and Test workloads • vSphere Distributed Resource Scheduler (DRS) is enabled • There are no resource pools in the cluster Performance monitoring data shows that the Production workload VMs are not receiving their fully allocated memory when the vSphere cluster is fully utilized. A combination of which two steps could the administrator perform to ensure that the Production VMs are always guaranteed the full allocation of memory? (Choose two.)
https://www.shititong.cn/cha-kan/shiti/000491c6-daa5-45b1-c0a9-459fb8cdb200.html
点击查看题目
64、An administrator is preparing for a deployment of a new vCenter Server Appliance. The following information has been provided to complete the deployment:•ESXi Host name (FQDN): esx0l.corp local . ESXi IP Address: 172.20.10.200 •vCenter Server Name (FQDN): vcsa01 corp.local •vCenter Server IP Address: 172.20 10.100 •NTP Server: 172.20.10.20 •DNS Server: 172.20.10.1 •Deployment Size: Tiny •Storage Size: Default Which two actions must the administrator complete before starting the installation of the vCenter Server Appliance? (Choose two.)
https://www.shititong.cn/cha-kan/shiti/000491c6-daa7-453a-c0a9-459fb8cdb200.html
点击查看题目
95、A group of new virtual machines have been deployed using thin-provisioned disks due to the limited storage space available in an environment. The storage team has expressed concern about extensive use of this type of provisioning.
https://www.shititong.cn/cha-kan/shiti/00049244-4fa2-649e-c070-20603eaf6c00.html
点击查看题目
87、An administrator is tasked with looking into the disaster recovery ( DR) options for a software-defined data center ( SDDC).The following requirements must be met:•All virtual machines ( VMs) must be protected to a secondary site.•The source VMs must remain online until the failover.•When failing over to the secondary site, application downtime is allowed•The DR failover must be managed from the vSphere Client.•Costs must remain as low as possible.
https://www.shititong.cn/cha-kan/shiti/00049244-4f9f-ad5f-c070-20603eaf6c00.html
点击查看题目
1、An administrator manually configures a reference ESXi host that meets company security standards for vSphere environments. The administrator now needs to apply all of the security standards to every identically configured host across multiple vSphere clusters within a single VMware vCenter instance.Which four steps would the administrator complete to meet this requirement? (Choose four)
https://www.shititong.cn/cha-kan/shiti/000491c6-da94-b2b8-c0a9-459fb8cdb200.html
点击查看题目
72、An administrator is tasked with implementing a backup solution capable of backing up the Supervisor cluster, vSphere Pods, and persistent volumes. Which two solutions must be used to meet this requirement? ( Choose two)
https://www.shititong.cn/cha-kan/shiti/000491c6-daab-3c31-c0a9-459fb8cdb200.html
点击查看题目
76、An administrator is tasked with configuring an appropriate Single Sign-On (SSO) solution for VMware vCenter based on the following criteria:• The solution should support the creation of Enhanced Link Mode groups.• All user accounts are stored within a single Active Directory domain and the solution must support only this Active Directory domain as the identity source.• All user account password and account lockout policies must be managed within the Active Directory domain.• The solution should support token-based authentication.Which SSO solution should the administrator choose based on the criteria?
https://www.shititong.cn/cha-kan/shiti/00049244-4f99-623b-c070-20603eaf6c00.html
点击查看题目
86、An administrator is required to configure several Microsoft Windows virtual machines (VMs) to support Secure Boot for a critical secure application.The following information is provided:•The corporate security policy states that all forms of data encryption must utilize a key provider.•The firmware of each VM is currently set to use Unified Extensible Firmware Interface (UEFI).•Due to the nature of the application running within the VMs, the guest operating system for each VM is currently a minimum of Windows Server 2008 and Windows 7.Which security feature should the administrator implement to meet these requirements?
https://www.shititong.cn/cha-kan/shiti/00049244-4f9f-1806-c070-20603eaf6c00.html
点击查看题目
首页
>
外语语音
>
英文知识复习题库
题目内容
(
多选题
)
手机预览
英文知识复习题库

14、An administrator is tasked with configuring certificates for a VMware software-defined data center (SDDC) based on the following requirements: • All certificates should use certificates trusted by the Enterprise Certificate Authority (CA). • The solution should minimize the ongoing management overhead of replacing certificates. Which three actions should the administrator take to ensure that the solution meets corporate policy? (Choose three.)

A、 Replace the VMware Certificate Authority (VMCA) certificate with a self-signed certificate generated from the

B、 Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.

C、 Replace the machine SSL certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).

D、 Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.

E、 Replace the solution user certificates wife custom certificates generated from the Enterprise CA.

F、 Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).

G、

H、

I、

J、

答案:BDE

解析:解析: Option B, D and E are correct because they allow the administrator to replace the machine SSL certificates,the VMware Certificate Authority (VMCA) certificate and the solution user certificates with custom certificates generated from the Enterprise CA, which will ensure that all certificates are trusted by the Enterprise CA and minimize the ongoing management overhead of replacing certificates. Option A is incorrect because replacing the VMCA certificate with a self-signed certificate generated from the VMCA will not ensure that the certificate is trusted by the Enterprise CA. Option C is incorrect because replacing the machine SSL certificates with trusted certificates generated from the VMCA will not ensure that the certificates are trusted by the Enterprise CA. Option F is incorrect because replacing the solution user certificates with trusted certificates generated from the VMCA will not ensure that the certificates are trusted by the Enterprise CA. 选项B、D和E是正确的,因为它们允许管理员用企业CA生成的自定义证书替换机器SSL证书、VMware证书颁发机构(VMCA)证书和解决方案用户证书,这将确保企业CA信任所有证书,并将替换证书的持续管理开销降至最低。选项A不正确,因为用从VMCA生成的自签名证书替换VMCA证书不能确保该证书受到企业CA的信任。选项C是不正确的,因为用从VMCA生成的可信证书替换机器SSL证书不能确保证书被企业CA信任。选项F是不正确的,因为用从VMCA生成的可信证书替换解决方案用户证书不能确保证书被企业CA信任。

分享
英文知识复习题库
相关题目
70、An administrator needs to configure a content library solution based on the following information: •A new corporate virtual machine (VM) template is created every month to include all of the latest patches. •The new VM template should be downloaded from the primary data center site (London) to two secondary data center sites (Tokyo and New York) as soon as possible. •There is limited disk space available at one of the secondary data center sites (Tokyo) due to an ongoing data center consolidation project. Which four steps should the administrator take to configure the content library solution before adding a VM template? (Choose four.)

A.  Create a new published content library In each secondary site

B.  Configure the New York subscribed content library to download content immediately.

C.  Configure the Tokyo subscribed content library to download content immediately

D.  Configure the Tokyo subscribed content library to download content when needed

E.  Create a new published content library at the primary site

F.  Configure the New York subscribed content library to download content when needed.

G.  Create a new subscribed content library in each secondary site

H.

I.

J.

解析:解析: The administrator should take these four steps to configure the content library solution before adding a VM template: Create a new published content library at the primary site, which allows the administrator to share the VM template with other sites.Configure the New York subscribed content library to download content immediately, which ensures that the new VM template is downloaded from the primary site as soon as possible. Configure the Tokyo subscribed content library to download content when needed, which saves disk space at the secondary site by downloading only the metadata of the VM template until it is deployed. Create a new subscribed content library in each secondary site, which allows the administrator to subscribe to the published content library at the primary site and synchronize the VM template.在添加VM模板之前,管理员应该采取以下四个步骤来配置内容库解决方案:在主站点创建新的已发布内容库,这允许管理员与其他站点共享VM模板。将纽约订阅的内容库配置为立即下载内容,这可确保尽快从主站点下载新的虚拟机模板。将Tokyo subscribed content library配置为在需要时下载内容,这通过在部署之前仅下载虚拟机模板的元数据来节省辅助站点的磁盘空间。在每个辅助站点中创建一个新的订阅内容库,这允许管理员订阅主站点上发布的内容库,并同步虚拟机模板。

https://www.shititong.cn/cha-kan/shiti/000491c6-daa9-ffd0-c0a9-459fb8cdb200.html
点击查看答案
88、An administrator is asked to configure a security policy at the port group level of a standard switch. The following requirements must be met:• The security policy must apply to all virtual machines on portgroup-1.• All traffic must be forwarded, regardless of the destination.

A.  Forged transmits set to reject

B.  MAC address changes set to accept

C.  Promiscuous mode set to reject

D.  Promiscuous mode set to accept

解析:解析:The security policy that must be configured at the port group level to allow all traffic to be forwarded regardless of the destination is promiscuous mode set to accept, which allows receiving all traffic on a virtual switch port.必须在端口组级别配置安全策略,以允许转发所有流量,而不管目的地是哪里,将混杂模式设置为接受,这允许在虚拟交换机端口上接收所有流量。

https://www.shititong.cn/cha-kan/shiti/00049244-4fa0-4744-c070-20603eaf6c00.html
点击查看答案
52、A vSphere cluster has the following configuration: • Virtual machines (VMs) are running Production and Test workloads • vSphere Distributed Resource Scheduler (DRS) is enabled • There are no resource pools in the cluster Performance monitoring data shows that the Production workload VMs are not receiving their fully allocated memory when the vSphere cluster is fully utilized. A combination of which two steps could the administrator perform to ensure that the Production VMs are always guaranteed the full allocation of memory? (Choose two.)

A.  Assign a custom memory share value to the resource pool containing the Production VMs.

B.  Assign a memory reservation value to the resource pool containing the Production VMs.

C.  Create a parent resource pool for the Production VMs

D.  Create a sibling resource pool for each of the Production and Test VMs.

E.  Create a child resource pool for the Test VMs.

F.

G.

H.

I.

J.

解析:

https://www.shititong.cn/cha-kan/shiti/000491c6-daa5-45b1-c0a9-459fb8cdb200.html
点击查看答案
64、An administrator is preparing for a deployment of a new vCenter Server Appliance. The following information has been provided to complete the deployment:•ESXi Host name (FQDN): esx0l.corp local . ESXi IP Address: 172.20.10.200 •vCenter Server Name (FQDN): vcsa01 corp.local •vCenter Server IP Address: 172.20 10.100 •NTP Server: 172.20.10.20 •DNS Server: 172.20.10.1 •Deployment Size: Tiny •Storage Size: Default Which two actions must the administrator complete before starting the installation of the vCenter Server Appliance? (Choose two.)

A.  Create a DNS CNAME record for the vCenter Server (vcsaOl corp.local)

B.  Create a DNS CNAME record for the ESXi Host server (esx01 corp.local).

C.  Create a reverse DNS A record for the vCenter Server (vcsa0l).

D.  Create a reverse DNS A record for the ESXi Host server (esx01 )

E.  Create a forward DNS A record for the vCenter Server (vcsa0l ).

F.

G.

H.

I.

J.

解析:解析:The administrator must create a forward DNS A record for the vCenter Server (vcsa01), which maps the FQDN of the vCenter Server to its IP address. The administrator must also create a reverse DNS A record for the ESXi Host server (esx01), which maps the IP address of the ESXi Host to its FQDN. These DNS records are required for name resolution and certificate validation during the deployment of the vCenter Server Appliance.

https://www.shititong.cn/cha-kan/shiti/000491c6-daa7-453a-c0a9-459fb8cdb200.html
点击查看答案
95、A group of new virtual machines have been deployed using thin-provisioned disks due to the limited storage space available in an environment. The storage team has expressed concern about extensive use of this type of provisioning.

A.  Datastore

B.  Data center

C.  Datastore cluster

D.  Virtual machine

解析:解析: To create a custom alarm to notify when thin provisioning reaches a certain capacity threshold, the administrator must define this alarm at the datastore level, as it is related to datastore usage要创建自定义警报以在精简资源调配达到特定容量阈值时发出通知,管理员必须在数据存储区级别定义此警报,因为它与数据存储区使用情况相关

https://www.shititong.cn/cha-kan/shiti/00049244-4fa2-649e-c070-20603eaf6c00.html
点击查看答案
87、An administrator is tasked with looking into the disaster recovery ( DR) options for a software-defined data center ( SDDC).The following requirements must be met:•All virtual machines ( VMs) must be protected to a secondary site.•The source VMs must remain online until the failover.•When failing over to the secondary site, application downtime is allowed•The DR failover must be managed from the vSphere Client.•Costs must remain as low as possible.

A.  Configure VMware Cloud Disaster Recovery (VCDR) and combine it with array-based storage replication

B.  Configure VMware a Site Recovery Manager and combine it with vSphere Replication

C.  Configure a subscribed content library on the secondary site.

D.  Configure VMware Site Recovery Manager and combine it with array-based storage replication

E.

F.

G.

H.

I.

J.

解析:

https://www.shititong.cn/cha-kan/shiti/00049244-4f9f-ad5f-c070-20603eaf6c00.html
点击查看答案
1、An administrator manually configures a reference ESXi host that meets company security standards for vSphere environments. The administrator now needs to apply all of the security standards to every identically configured host across multiple vSphere clusters within a single VMware vCenter instance.Which four steps would the administrator complete to meet this requirement? (Choose four)

A.  Extract the host profile from the reference host

B.  Export the host profile from vCenter.

C.  Import host customization on the reference host.

D.  Attach the host profile to each cluster that requires the secure configuration.

E.  Check the compliance of each host against the host profile.

F.  Reset host customization on the reference host.

G.  在引用主机上重置主机定制。

H.

I.

J.

解析:解析: To apply the security standards from a reference host to other hosts across multiple clusters, the administrator needs to extract a host profile from the reference host, which captures its configuration settings; attach the host profile to each cluster that requires the same configuration; check the compliance of each host against the host profile, which compares their settings; and remediate all non-compliant hosts, which applies the configuration settings from the host profile.为了将来自参考主机的安全标准应用到跨多个集群的其他主机,管理员需要从参考主机提取主机配置文件,该主机配置文件捕获其配置设置;将主机配置文件附加到需要相同配置的每个群集;对照主机配置文件检查每台主机的合规性,主机配置文件会比较它们的设置;并修复所有不符合的主机,这将应用主机配置文件中的配置设置。

https://www.shititong.cn/cha-kan/shiti/000491c6-da94-b2b8-c0a9-459fb8cdb200.html
点击查看答案
72、An administrator is tasked with implementing a backup solution capable of backing up the Supervisor cluster, vSphere Pods, and persistent volumes. Which two solutions must be used to meet this requirement? ( Choose two)

A.  VMware vCenter

B.  Standalone Velero and Restic

C.  NSX-T Manager

D.  vSphere Host Client

E.  Velero Plugin for vSphere

F.

G.

H.

I.

J.

解析:

https://www.shititong.cn/cha-kan/shiti/000491c6-daab-3c31-c0a9-459fb8cdb200.html
点击查看答案
76、An administrator is tasked with configuring an appropriate Single Sign-On (SSO) solution for VMware vCenter based on the following criteria:• The solution should support the creation of Enhanced Link Mode groups.• All user accounts are stored within a single Active Directory domain and the solution must support only this Active Directory domain as the identity source.• All user account password and account lockout policies must be managed within the Active Directory domain.• The solution should support token-based authentication.Which SSO solution should the administrator choose based on the criteria?

A.  vCenter Identity Provider Federation with Active Directory Federation Services as the identity provider

B.  vCenter Single Sign-On with Active Directory over LDAP as the identity source

C.  vCenter Single Sign-On with Active Directory (Windows Integrated Authentication) as the identity source

D.  vCenter Identity Provider Federation with Active Directory over LDAP as the identity provider

E.

F.

G.

H.

I.

J.

解析:解析: „ In vCenter Server Identity Provider Federation, vCenter Server uses the OpenID Connect (OIDC) protocol to receive an identity token that authenticates the user with vCenter Server.“ Integrated Windows Authentication is deprecated since vSphere 7.0在vCenter Server身份提供商联盟中,vCenter Server使用OpenID连接(OIDC)协议接收身份令牌,该令牌通过vCenter Server对用户进行身份验证。“从vSphere 7.0开始,集成Windows身份验证已被弃用

https://www.shititong.cn/cha-kan/shiti/00049244-4f99-623b-c070-20603eaf6c00.html
点击查看答案
86、An administrator is required to configure several Microsoft Windows virtual machines (VMs) to support Secure Boot for a critical secure application.The following information is provided:•The corporate security policy states that all forms of data encryption must utilize a key provider.•The firmware of each VM is currently set to use Unified Extensible Firmware Interface (UEFI).•Due to the nature of the application running within the VMs, the guest operating system for each VM is currently a minimum of Windows Server 2008 and Windows 7.Which security feature should the administrator implement to meet these requirements?

A.  vSphere Virtual Machine Encryption

B.  vSphere Visualization-Based Security

C.  Virtual Intel Software Guard Extensions (vSGX)

D.  Virtual Trusted Platform Module (vTPM)

E.

F.

G.

H.

I.

J.

解析:

https://www.shititong.cn/cha-kan/shiti/00049244-4f9f-1806-c070-20603eaf6c00.html
点击查看答案
试题通小程序
试题通app下载