APP下载
首页
>
外语语音
>
英文知识复习题库
搜索
英文知识复习题库
题目内容
(
单选题
)
69、 An administrator set up the following configuration: • The distributed switch has four ESXi hosts, and each host has two 10 Gbps NICs. • In the Network I/O Control configuration, the amount of bandwidth reserved for virtual machine (VM) traffic if 4 Gbps. The administrator wants to guarantee that VMs in the Retail distributed port group can access 50 percent of the available reserved bandwidth for VM traffic. Given this scenario, what should the size (in Gbps ) of the Retail network resource pool be?

A、40

B、32

C、8

D、16

E、

F、

G、

H、

I、

J、

答案:D

解析:解析: 4Gbps*8Nic=32Gbps*50%=16Gbps

英文知识复习题库
23、An administrator is investigating user logon failures for a VMware vCenter instance。Where can the administrator find log files containing information related to user login activities?
https://www.shititong.cn/cha-kan/shiti/00049244-4f80-aa21-c070-20603eaf6c00.html
点击查看题目
91、Which two tasks can be completed using vSphere LifeCycle Manager? (Choose two )
https://www.shititong.cn/cha-kan/shiti/000491c6-daae-7ec3-c0a9-459fb8cdb200.html
点击查看题目
44、An administrator must gracefully restart a virtual machine (VM) through the vSphere Client but the option is greyed out. The administrator has full administrative access on VMware vCenter and all the objects available in vCenter, but has no access to log onto the operating system.Which action should the administrator take to meet the objective?
https://www.shititong.cn/cha-kan/shiti/00049244-4f89-f5d6-c070-20603eaf6c00.html
点击查看题目
22、An administrator is investigating reports of users experiencing difficulties logging into a VMware vCenter instance using LDAP accounts. Which service should the administrator check as part of troubleshooting?
https://www.shititong.cn/cha-kan/shiti/00049244-4f7f-faeb-c070-20603eaf6c00.html
点击查看题目
101、An administrator is tasked with moving an application and guest operating system (OS) running on top of a physical server to a software-defined data center (SDDC) in a remote secure location.The following constraints apply• The remote secure location has no network connectivity to the outside world. • The business owner is not concerned if all changes in the application make it to the SDDC in the secure location. • The application's data is hosted in a database with a high number of transactions.What could the administrator do to create an image of the guest OS and application that can be moved to this remote data center?
https://www.shititong.cn/cha-kan/shiti/00049244-4fa5-878d-c070-20603eaf6c00.html
点击查看题目
69、 An administrator set up the following configuration: • The distributed switch has four ESXi hosts, and each host has two 10 Gbps NICs. • In the Network I/O Control configuration, the amount of bandwidth reserved for virtual machine (VM) traffic if 4 Gbps. The administrator wants to guarantee that VMs in the Retail distributed port group can access 50 percent of the available reserved bandwidth for VM traffic. Given this scenario, what should the size (in Gbps ) of the Retail network resource pool be?
https://www.shititong.cn/cha-kan/shiti/00049244-4f96-5b92-c070-20603eaf6c00.html
点击查看题目
102、An administrator wants to allow a DevOps engineer the ability to delete Tanzu Kubernetes Grid ( ) cluster objects in a vSphere Namespace. Which role would provide the minimum required permissions to perform this operation?
https://www.shititong.cn/cha-kan/shiti/00049244-4fa6-1b8f-c070-20603eaf6c00.html
点击查看题目
18、An administrator is creating a content library to manage VM templates and ISO images. The administrator wants to password-protect the images and templates and share them with a remote site.Which two tasks must the administration perform when creating the content library? (Choose two.)
https://www.shititong.cn/cha-kan/shiti/000491c6-da9a-676b-c0a9-459fb8cdb200.html
点击查看题目
82、What is the role of vSphere Distributed Services Engine?
https://www.shititong.cn/cha-kan/shiti/00049244-4f9d-39b4-c070-20603eaf6c00.html
点击查看题目
1、An administrator manually configures a reference ESXi host that meets company security standards for vSphere environments. The administrator now needs to apply all of the security standards to every identically configured host across multiple vSphere clusters within a single VMware vCenter instance.Which four steps would the administrator complete to meet this requirement? (Choose four)
https://www.shititong.cn/cha-kan/shiti/000491c6-da94-b2b8-c0a9-459fb8cdb200.html
点击查看题目
首页
>
外语语音
>
英文知识复习题库
题目内容
(
单选题
)
手机预览
英文知识复习题库

69、 An administrator set up the following configuration: • The distributed switch has four ESXi hosts, and each host has two 10 Gbps NICs. • In the Network I/O Control configuration, the amount of bandwidth reserved for virtual machine (VM) traffic if 4 Gbps. The administrator wants to guarantee that VMs in the Retail distributed port group can access 50 percent of the available reserved bandwidth for VM traffic. Given this scenario, what should the size (in Gbps ) of the Retail network resource pool be?

A、40

B、32

C、8

D、16

E、

F、

G、

H、

I、

J、

答案:D

解析:解析: 4Gbps*8Nic=32Gbps*50%=16Gbps

分享
英文知识复习题库
相关题目
23、An administrator is investigating user logon failures for a VMware vCenter instance。Where can the administrator find log files containing information related to user login activities?

A.  On the vCenter Management Interface

B.  On the ESXi host using the Direct Console User Interface

C.  On the vCenter Server Appliance

D.  In the vSphere Client when viewing the vCenter virtual machine

解析:解析: The administrator can find log files containing information related to user login activities on the vCenter Server Appliance, which is a preconfigured Linux-based virtual machine that runs all vCenter Server services. The log files are located in /var/log/vmware/vmware-vpx/vpxd.log and /var/log/vmware/sso/ssoAdminServer.log directories.管理员可以在vCenter Server Appliance上找到包含用户登录活动相关信息的日志文件,vCenter Server Appliance是一个预配置的基于Linux的虚拟机,运行所有vCenter Server服务。日志文件位于/var/log/VMware/VMware-vpx/vpxd . log和/var/log/VMware/SSO/ssoadminserver . log目录中

https://www.shititong.cn/cha-kan/shiti/00049244-4f80-aa21-c070-20603eaf6c00.html
点击查看答案
91、Which two tasks can be completed using vSphere LifeCycle Manager? (Choose two )

A.  Manage the firmware lifecycle of ESXi hosts that are part of a managed cluster with a single image.

B.  Check that the ESXi hosts are compliant with the recommended baseline and update the hosts

C.  Upgrade VMware vCenter from version 7 to 8.

D.  Check the hardware compatibility of the hosts in a cluster against the VMware Compatibility Guide (VCG) using baselines.

E.  Manage the firmware lifecycle of ESXi hosts are part of a managed cluster using baselines

F.

G.

H.

I.

J.

解析:

https://www.shititong.cn/cha-kan/shiti/000491c6-daae-7ec3-c0a9-459fb8cdb200.html
点击查看答案
44、An administrator must gracefully restart a virtual machine (VM) through the vSphere Client but the option is greyed out. The administrator has full administrative access on VMware vCenter and all the objects available in vCenter, but has no access to log onto the operating system.Which action should the administrator take to meet the objective?

A.  Upgrade the virtual hardware

B.  Migrate the VM to another host

C.  Install VMware Tools

D.  Restart vCenter

E.

F.

G.

H.

I.

J.

解析:解析: Installing VMware Tools will enable the graceful restart option for the virtual machine, as well as other features such as time synchronization and guest OS customization.安装VMware Tools将启用虚拟机的正常重启选项,以及其他功能,如时间同步和来宾操作系统自定义。

https://www.shititong.cn/cha-kan/shiti/00049244-4f89-f5d6-c070-20603eaf6c00.html
点击查看答案
22、An administrator is investigating reports of users experiencing difficulties logging into a VMware vCenter instance using LDAP accounts. Which service should the administrator check as part of troubleshooting?

A.  vSphere Authentication Proxy Service

B.  Lookup Service

C.  Identity Management Service

D.  VMware Authentication Framework Daemon

解析:解析: Identity Management Service is the service that handles authentication requests from LDAP accounts and other identity sources in vCenter Server.身份管理服务是处理来自vCenter Server中LDAP帐户和其他身份源的身份认证请求的服务。

https://www.shititong.cn/cha-kan/shiti/00049244-4f7f-faeb-c070-20603eaf6c00.html
点击查看答案
101、An administrator is tasked with moving an application and guest operating system (OS) running on top of a physical server to a software-defined data center (SDDC) in a remote secure location.The following constraints apply• The remote secure location has no network connectivity to the outside world. • The business owner is not concerned if all changes in the application make it to the SDDC in the secure location. • The application's data is hosted in a database with a high number of transactions.What could the administrator do to create an image of the guest OS and application that can be moved to this remote data center?

A. Create a hot clone of the physical server using VMware vCenter Converter.

B. Create a cold clone of the physical server using VMware vCenter Converter.

C. Restore the guest OS from a backup.

D. Use storage replication to replicate the guest OS and application.

E.

F.

G.

H.

I.

J.

解析:解析:Option B is correct because it allows the administrator to create a cold clone of the physical server using VMware vCenter Converter, which will create an image of the guest OS and application that can be moved to this remote data center without requiring network connectivity or affecting the application’s data. Option A is incorrect because creating a hot clone of the physical server using VMware vCenter Converter will require network connectivity and may affect the application’s data due to changes during conversion. Option C is incorrect because restoring the guest OS from a backup will require network connectivity and may not include the latest changes in the application. Option D is incorrect because using storage replication to replicate the guest OS and application will require network connectivity and may not be feasible for a physical server.选项B是正确的,因为它允许管理员使用VMware vCenter Converter创建物理服务器的冷克隆,这将创建来宾操作系统和应用程序的映像,这些映像可以移动到该远程数据中心,而不需要网络连接或影响应用程序的数据。选项A不正确,因为使用VMware vCenter Converter创建物理服务器的热克隆需要网络连接,并且可能会由于转换期间的更改而影响应用程序的数据。选项C不正确,因为从备份恢复来宾操作系统需要网络连接,并且可能不包括应用程序中的最新更改。选项D不正确,因为使用存储复制来复制来宾操作系统和应用程序需要网络连接,对于物理服务器来说可能不可行。

https://www.shititong.cn/cha-kan/shiti/00049244-4fa5-878d-c070-20603eaf6c00.html
点击查看答案
69、 An administrator set up the following configuration: • The distributed switch has four ESXi hosts, and each host has two 10 Gbps NICs. • In the Network I/O Control configuration, the amount of bandwidth reserved for virtual machine (VM) traffic if 4 Gbps. The administrator wants to guarantee that VMs in the Retail distributed port group can access 50 percent of the available reserved bandwidth for VM traffic. Given this scenario, what should the size (in Gbps ) of the Retail network resource pool be?

A. 40

B. 32

C. 8

D. 16

E.

F.

G.

H.

I.

J.

解析:解析: 4Gbps*8Nic=32Gbps*50%=16Gbps

https://www.shititong.cn/cha-kan/shiti/00049244-4f96-5b92-c070-20603eaf6c00.html
点击查看答案
102、An administrator wants to allow a DevOps engineer the ability to delete Tanzu Kubernetes Grid ( ) cluster objects in a vSphere Namespace. Which role would provide the minimum required permissions to perform this operation?

A.  Administrator

B.  Can View

C.  Owner

D.  Can Edit

解析:解析: The Can Edit role would provide the minimum required permissions to delete Tanzu Kubernetes Grid (TKG) cluster objects in a vSphere Namespace, as it allows creating, updating, and deleting objects within a namespace.“可以编辑”角色将提供在vSphere命名空间中删除Tanzu Kubernetes Grid (TKG)集群对象所需的最低权限,因为它允许在命名空间中创建和删除对象。

https://www.shititong.cn/cha-kan/shiti/00049244-4fa6-1b8f-c070-20603eaf6c00.html
点击查看答案
18、An administrator is creating a content library to manage VM templates and ISO images. The administrator wants to password-protect the images and templates and share them with a remote site.Which two tasks must the administration perform when creating the content library? (Choose two.)

A.  Publish the local content library.

B.  Enable the security policy.

C.  Create a subscribed content library.

D.  Select an NFS datastore.

E.  Enable authentication.

F.

G.

H.

I.

J.

解析:解析: To password-protect and share images and templates with a remote site, the administrator needs to publish the local content library, which makes it available for subscription by other vCenter Server instances; and enable authentication, which requires users to enter credentials when accessing the content library.要使用密码保护并与远程站点共享镜像和模板,管理员需要发布本地内容库,使其可供其他vCenter Server实例订阅。并启用身份验证,这要求用户在访问内容库时输入凭据。

https://www.shititong.cn/cha-kan/shiti/000491c6-da9a-676b-c0a9-459fb8cdb200.html
点击查看答案
82、What is the role of vSphere Distributed Services Engine?

A.  Provide a live shadow Instance of a virtual machine (VM) that mirror, the primary VM to prevent data loss and downtime during outages

B.  Implement Quality of Service (QoS) on network traffic within a vSphert Distributed Switch

C.  Provide hardware accelerated data processing to boort infrastructure performance

D.  Redistribute virtual machines across vSphere cluster host affinity rules following host failures or during maintenance operations

解析:解析: The role of vSphere Distributed Services Engine is to provide hardware accelerated data processing to boost infrastructure performance by offloading network services from the CPU to the DPU.VSP here Distributed Services Engine的作用是提供硬件加速数据处理,通过将网络服务从CPU转移到DPU来提升基础架构性能。

https://www.shititong.cn/cha-kan/shiti/00049244-4f9d-39b4-c070-20603eaf6c00.html
点击查看答案
1、An administrator manually configures a reference ESXi host that meets company security standards for vSphere environments. The administrator now needs to apply all of the security standards to every identically configured host across multiple vSphere clusters within a single VMware vCenter instance.Which four steps would the administrator complete to meet this requirement? (Choose four)

A.  Extract the host profile from the reference host

B.  Export the host profile from vCenter.

C.  Import host customization on the reference host.

D.  Attach the host profile to each cluster that requires the secure configuration.

E.  Check the compliance of each host against the host profile.

F.  Reset host customization on the reference host.

G.  在引用主机上重置主机定制。

H.

I.

J.

解析:解析: To apply the security standards from a reference host to other hosts across multiple clusters, the administrator needs to extract a host profile from the reference host, which captures its configuration settings; attach the host profile to each cluster that requires the same configuration; check the compliance of each host against the host profile, which compares their settings; and remediate all non-compliant hosts, which applies the configuration settings from the host profile.为了将来自参考主机的安全标准应用到跨多个集群的其他主机,管理员需要从参考主机提取主机配置文件,该主机配置文件捕获其配置设置;将主机配置文件附加到需要相同配置的每个群集;对照主机配置文件检查每台主机的合规性,主机配置文件会比较它们的设置;并修复所有不符合的主机,这将应用主机配置文件中的配置设置。

https://www.shititong.cn/cha-kan/shiti/000491c6-da94-b2b8-c0a9-459fb8cdb200.html
点击查看答案
试题通小程序
试题通app下载