APP下载
首页
>
外语语音
>
英文知识复习题库
搜索
英文知识复习题库
题目内容
(
单选题
)
43、An administrator needs to update a VMware vCenter instance to a newer minor release version. Due to restrictions within the environment, the vCenter instance does not have access to the Internet As a first step, the administrator downloads the required update on another machine. What are the next steps the administrator must perform to complete the update?

A、 Place the update ISO file in a Virtual Machine File System (VMFS) datastore. Use the vSphere Client to select the update ISO file as the source for the update

B、 Mount the ISO update file to the CD-ROM drive of the vCenter instance Use the vCenter Management Interface to select the CD-ROM as the source for the update

C、 Place the ISO update file in a folder accessible to the vCenter instance over HTTPS. Use the vCenter Management Interface to select the update file as the source for the update

D、 Place the ZIP update file in a folder accessible to the vCenter instance over HTTPS Use the vSphere Client to select the update file as the source for the update

答案:B

英文知识复习题库
15、An administrator is completing the configuration of a new vSphere cluster and has enabled vSphere High Availability ( HA) and vSphere Distributed Resource Scheduler ( DRS). After adding the ESXi hosts to the cluster, which networking information will the administrator be prompted to provide when using the Cluster Quickstart workflow?
https://www.shititong.cn/cha-kan/shiti/00049244-4f7c-47f3-c070-20603eaf6c00.html
点击查看题目
69、 An administrator set up the following configuration: • The distributed switch has four ESXi hosts, and each host has two 10 Gbps NICs. • In the Network I/O Control configuration, the amount of bandwidth reserved for virtual machine (VM) traffic if 4 Gbps. The administrator wants to guarantee that VMs in the Retail distributed port group can access 50 percent of the available reserved bandwidth for VM traffic. Given this scenario, what should the size (in Gbps ) of the Retail network resource pool be?
https://www.shititong.cn/cha-kan/shiti/00049244-4f96-5b92-c070-20603eaf6c00.html
点击查看题目
45、An administrator is adding a new ESXi host to an existing vSphere cluster. When selecting the cluster, the administrator Is unable to use the Cluster Quickstart workflow to add and configure the additional host.What could be the root cause of this issue?
https://www.shititong.cn/cha-kan/shiti/00049244-4f8a-cad3-c070-20603eaf6c00.html
点击查看题目
76、An administrator is tasked with configuring an appropriate Single Sign-On (SSO) solution for VMware vCenter based on the following criteria:• The solution should support the creation of Enhanced Link Mode groups.• All user accounts are stored within a single Active Directory domain and the solution must support only this Active Directory domain as the identity source.• All user account password and account lockout policies must be managed within the Active Directory domain.• The solution should support token-based authentication.Which SSO solution should the administrator choose based on the criteria?
https://www.shititong.cn/cha-kan/shiti/00049244-4f99-623b-c070-20603eaf6c00.html
点击查看题目
92、Which four elements can a vSphere Lifecycle Manager image contain? (Choose four )
https://www.shititong.cn/cha-kan/shiti/000491c6-daaf-67c2-c0a9-459fb8cdb200.html
点击查看题目
55、An administrator wants to use tag-based placement rules on their virtual machine disks using VMware vCenter. Which option would allow the administrator to achieve this?
https://www.shititong.cn/cha-kan/shiti/00049244-4f90-5cee-c070-20603eaf6c00.html
点击查看题目
87、An administrator is tasked with looking into the disaster recovery ( DR) options for a software-defined data center ( SDDC).The following requirements must be met:•All virtual machines ( VMs) must be protected to a secondary site.•The source VMs must remain online until the failover.•When failing over to the secondary site, application downtime is allowed•The DR failover must be managed from the vSphere Client.•Costs must remain as low as possible.
https://www.shititong.cn/cha-kan/shiti/00049244-4f9f-ad5f-c070-20603eaf6c00.html
点击查看题目
86、An administrator is required to configure several Microsoft Windows virtual machines (VMs) to support Secure Boot for a critical secure application.The following information is provided:•The corporate security policy states that all forms of data encryption must utilize a key provider.•The firmware of each VM is currently set to use Unified Extensible Firmware Interface (UEFI).•Due to the nature of the application running within the VMs, the guest operating system for each VM is currently a minimum of Windows Server 2008 and Windows 7.Which security feature should the administrator implement to meet these requirements?
https://www.shititong.cn/cha-kan/shiti/00049244-4f9f-1806-c070-20603eaf6c00.html
点击查看题目
24、An administrator plans to bring VMware vCenter offline in order to perform hardware mainte-nance on the host where the vCenter Server Appliance is running.Which vSphere feature must be configured to ensure that vCenter users experience minimal downtime?
https://www.shititong.cn/cha-kan/shiti/00049244-4f81-257d-c070-20603eaf6c00.html
点击查看题目
88、An administrator is asked to configure a security policy at the port group level of a standard switch. The following requirements must be met:• The security policy must apply to all virtual machines on portgroup-1.• All traffic must be forwarded, regardless of the destination.
https://www.shititong.cn/cha-kan/shiti/00049244-4fa0-4744-c070-20603eaf6c00.html
点击查看题目
首页
>
外语语音
>
英文知识复习题库
题目内容
(
单选题
)
手机预览
英文知识复习题库

43、An administrator needs to update a VMware vCenter instance to a newer minor release version. Due to restrictions within the environment, the vCenter instance does not have access to the Internet As a first step, the administrator downloads the required update on another machine. What are the next steps the administrator must perform to complete the update?

A、 Place the update ISO file in a Virtual Machine File System (VMFS) datastore. Use the vSphere Client to select the update ISO file as the source for the update

B、 Mount the ISO update file to the CD-ROM drive of the vCenter instance Use the vCenter Management Interface to select the CD-ROM as the source for the update

C、 Place the ISO update file in a folder accessible to the vCenter instance over HTTPS. Use the vCenter Management Interface to select the update file as the source for the update

D、 Place the ZIP update file in a folder accessible to the vCenter instance over HTTPS Use the vSphere Client to select the update file as the source for the update

答案:B

分享
英文知识复习题库
相关题目
15、An administrator is completing the configuration of a new vSphere cluster and has enabled vSphere High Availability ( HA) and vSphere Distributed Resource Scheduler ( DRS). After adding the ESXi hosts to the cluster, which networking information will the administrator be prompted to provide when using the Cluster Quickstart workflow?

A.  vMotion networking

B.  Management networking

C.  vSAN networking

D.  Virtual machine networking

E.

F.

G.

H.

I.

J.

解析:

https://www.shititong.cn/cha-kan/shiti/00049244-4f7c-47f3-c070-20603eaf6c00.html
点击查看答案
69、 An administrator set up the following configuration: • The distributed switch has four ESXi hosts, and each host has two 10 Gbps NICs. • In the Network I/O Control configuration, the amount of bandwidth reserved for virtual machine (VM) traffic if 4 Gbps. The administrator wants to guarantee that VMs in the Retail distributed port group can access 50 percent of the available reserved bandwidth for VM traffic. Given this scenario, what should the size (in Gbps ) of the Retail network resource pool be?

A. 40

B. 32

C. 8

D. 16

E.

F.

G.

H.

I.

J.

解析:解析: 4Gbps*8Nic=32Gbps*50%=16Gbps

https://www.shititong.cn/cha-kan/shiti/00049244-4f96-5b92-c070-20603eaf6c00.html
点击查看答案
45、An administrator is adding a new ESXi host to an existing vSphere cluster. When selecting the cluster, the administrator Is unable to use the Cluster Quickstart workflow to add and configure the additional host.What could be the root cause of this issue?

A.  The administrator has previously dismissed the Cluster Quickstart workflow

B.  The administrator must manually add the host to the cluster before using the Cluster Quickstart workflow.

C.  The administrator has not been assigned the required permissions to use the Cluster Quickstart workflow.

D.  The administrator must enable the Cluster Quickstart workflow option in VMware vCenter.

解析:解析: Option A is correct because it indicates that the administrator has previously dismissed the Cluster Quickstart workflow, which will prevent them from using it to add and configure an additional host. To use the Cluster Quickstart workflow again, the administrator must enable it in the cluster settings. Option B is incorrect because the administrator does not need to manually add the host to the cluster before using the Cluster Quickstart workflow, as this is one of the steps in the workflow. Option C is incorrect because the administrator does not need any special permissions to use the Cluster Quickstart workflow, as long as they have permissions to perform cluster operations. Option D is incorrect because there is no option to enable the Cluster Quickstart workflow in VMware vCenter, as this is a feature of vSphere clusters.选项A是正确的,因为它表明管理员之前已经取消了群集快速启动工作流,这将阻止他们使用它来添加和配置额外的主机。要再次使用群集快速启动工作流,管理员必须在群集设置中启用它。选项B不正确,因为在使用群集快速启动工作流之前,管理员不需要手动将主机添加到群集,因为这是工作流中的一个步骤。选项C不正确,因为管理员不需要任何特殊权限就可以使用群集快速启动工作流,只要他们拥有执行群集操作的权限。选项D不正确,因为VMware vCenter中没有启用群集快速启动工作流的选项,因为这是vSphere群集的一项功能。

https://www.shititong.cn/cha-kan/shiti/00049244-4f8a-cad3-c070-20603eaf6c00.html
点击查看答案
76、An administrator is tasked with configuring an appropriate Single Sign-On (SSO) solution for VMware vCenter based on the following criteria:• The solution should support the creation of Enhanced Link Mode groups.• All user accounts are stored within a single Active Directory domain and the solution must support only this Active Directory domain as the identity source.• All user account password and account lockout policies must be managed within the Active Directory domain.• The solution should support token-based authentication.Which SSO solution should the administrator choose based on the criteria?

A.  vCenter Identity Provider Federation with Active Directory Federation Services as the identity provider

B.  vCenter Single Sign-On with Active Directory over LDAP as the identity source

C.  vCenter Single Sign-On with Active Directory (Windows Integrated Authentication) as the identity source

D.  vCenter Identity Provider Federation with Active Directory over LDAP as the identity provider

E.

F.

G.

H.

I.

J.

解析:解析: „ In vCenter Server Identity Provider Federation, vCenter Server uses the OpenID Connect (OIDC) protocol to receive an identity token that authenticates the user with vCenter Server.“ Integrated Windows Authentication is deprecated since vSphere 7.0在vCenter Server身份提供商联盟中,vCenter Server使用OpenID连接(OIDC)协议接收身份令牌,该令牌通过vCenter Server对用户进行身份验证。“从vSphere 7.0开始,集成Windows身份验证已被弃用

https://www.shititong.cn/cha-kan/shiti/00049244-4f99-623b-c070-20603eaf6c00.html
点击查看答案
92、Which four elements can a vSphere Lifecycle Manager image contain? (Choose four )

A.  ESXi base image

B.  ESXI configuration

C.  Vendor agents

D.  Vendor add-ons

E.  BIOS updates

F.  Firmware and drivers add-on

G.  Independent components

H.

I.

J.

解析:解析: vSphere Lifecycle Manager image can consist of the following four elements: ESXi base image The base image contains an image of VMware ESXi Server and additional components, such as drivers and adapters that are necessary to boot a server. The base image is the only mandatory element in a vSphere Lifecycle Manager image. All other elements are optional.vSphere Lifecycle Manager映像可由以下四个元素组成:ESXi基本映像基本映像包含VMware ESXi服务器的映像和其他组件,例如启动服务器所需的驱动程序和适配器。基本映像是vSphere Lifecycle Manager映像中唯一必需的元素。所有其他元素都是可选的。Vendor add-on The vendor add-on is a collection of software components that OEMs create and distribute. The vendor add-on can contain drivers, patches, and solutions.供应商插件供应商插件是OEM创建和分发的软件组件的集合。供应商附加组件可以包含驱动程序、修补程序和解决方案。Firmware and drivers add-on The firmware and drivers add-on is a special type of vendor add-on designed to assist in the firmware update process. The firmware and drivers add-on contains firmware for a specific server type and corresponding drivers. To add a firmware and drivers add-on to your image, you must install the hardware support manager plug-in provided by the hardware vendor for the hosts in the respective cluster.固件和驱动程序插件固件和驱动程序插件是一种特殊类型的供应商插件,旨在帮助固件更新过程。固件和驱动程序插件包含特定服务器类型的固件和相应的驱动程序。要向您的映像添加固件和驱动程序插件,您必须安装硬件供应商为相应集群中的主机提供的硬件支持管理器插件。Independent components The component is the smallest discrete unit in an image. The independent components that you add to an image contain third-party software, for example drivers or adapters.独立组件组件是图像中最小的离散单元。添加到映像的独立组件包含第三方软件,例如驱动程序或适配器。

https://www.shititong.cn/cha-kan/shiti/000491c6-daaf-67c2-c0a9-459fb8cdb200.html
点击查看答案
55、An administrator wants to use tag-based placement rules on their virtual machine disks using VMware vCenter. Which option would allow the administrator to achieve this?

A.   Storage Policy Based Management

B.   Storage I/O Control

C.   vSphere Storage APIs for Storage Awareness (VASA)

D.   vSphere Distributed Resource Scheduler (DRS)

https://www.shititong.cn/cha-kan/shiti/00049244-4f90-5cee-c070-20603eaf6c00.html
点击查看答案
87、An administrator is tasked with looking into the disaster recovery ( DR) options for a software-defined data center ( SDDC).The following requirements must be met:•All virtual machines ( VMs) must be protected to a secondary site.•The source VMs must remain online until the failover.•When failing over to the secondary site, application downtime is allowed•The DR failover must be managed from the vSphere Client.•Costs must remain as low as possible.

A.  Configure VMware Cloud Disaster Recovery (VCDR) and combine it with array-based storage replication

B.  Configure VMware a Site Recovery Manager and combine it with vSphere Replication

C.  Configure a subscribed content library on the secondary site.

D.  Configure VMware Site Recovery Manager and combine it with array-based storage replication

E.

F.

G.

H.

I.

J.

解析:

https://www.shititong.cn/cha-kan/shiti/00049244-4f9f-ad5f-c070-20603eaf6c00.html
点击查看答案
86、An administrator is required to configure several Microsoft Windows virtual machines (VMs) to support Secure Boot for a critical secure application.The following information is provided:•The corporate security policy states that all forms of data encryption must utilize a key provider.•The firmware of each VM is currently set to use Unified Extensible Firmware Interface (UEFI).•Due to the nature of the application running within the VMs, the guest operating system for each VM is currently a minimum of Windows Server 2008 and Windows 7.Which security feature should the administrator implement to meet these requirements?

A.  vSphere Virtual Machine Encryption

B.  vSphere Visualization-Based Security

C.  Virtual Intel Software Guard Extensions (vSGX)

D.  Virtual Trusted Platform Module (vTPM)

E.

F.

G.

H.

I.

J.

解析:

https://www.shititong.cn/cha-kan/shiti/00049244-4f9f-1806-c070-20603eaf6c00.html
点击查看答案
24、An administrator plans to bring VMware vCenter offline in order to perform hardware mainte-nance on the host where the vCenter Server Appliance is running.Which vSphere feature must be configured to ensure that vCenter users experience minimal downtime?

A.  vSphere Distributed Resource Scheduler

B.  Hybrid Linked Mode

C.  vCenter Server High Availability

D.  Enhanced Linked Mode

https://www.shititong.cn/cha-kan/shiti/00049244-4f81-257d-c070-20603eaf6c00.html
点击查看答案
88、An administrator is asked to configure a security policy at the port group level of a standard switch. The following requirements must be met:• The security policy must apply to all virtual machines on portgroup-1.• All traffic must be forwarded, regardless of the destination.

A.  Forged transmits set to reject

B.  MAC address changes set to accept

C.  Promiscuous mode set to reject

D.  Promiscuous mode set to accept

解析:解析:The security policy that must be configured at the port group level to allow all traffic to be forwarded regardless of the destination is promiscuous mode set to accept, which allows receiving all traffic on a virtual switch port.必须在端口组级别配置安全策略,以允许转发所有流量,而不管目的地是哪里,将混杂模式设置为接受,这允许在虚拟交换机端口上接收所有流量。

https://www.shititong.cn/cha-kan/shiti/00049244-4fa0-4744-c070-20603eaf6c00.html
点击查看答案
试题通小程序
试题通app下载