The following are the business requirements for the design:
The solution must support virtual machines with the following storage profiles:
- Write-intensive
- Backup
- Write-Once-Read-Many (WORM ) archive
The solution must support migration of virtual machine disks between storage profiles.
The WORM archive data must be located at an isolated secure site.
The backup storage array must only be connected to a backup media server.
All data should be recoverable from backup.
Which design decision should the architect make to meet the business requirements?
A、 The solution will leverage a single storage array for the WORM archive and write-intensive storage profiles
B、 The solution will leverage the same array for the backup and write-intensive storage profiles
C、 The solution will leverage a different array for each storage profile
D、 The solution will leverage a single storage array for all storage profiles
答案:C
The following are the business requirements for the design:
The solution must support virtual machines with the following storage profiles:
- Write-intensive
- Backup
- Write-Once-Read-Many (WORM ) archive
The solution must support migration of virtual machine disks between storage profiles.
The WORM archive data must be located at an isolated secure site.
The backup storage array must only be connected to a backup media server.
All data should be recoverable from backup.
Which design decision should the architect make to meet the business requirements?
A、 The solution will leverage a single storage array for the WORM archive and write-intensive storage profiles
B、 The solution will leverage the same array for the backup and write-intensive storage profiles
C、 The solution will leverage a different array for each storage profile
D、 The solution will leverage a single storage array for all storage profiles
答案:C
A. A design diagram illustrating the configuration and specific attributes, such as IP addresses
B. A list of requirements, constraints, and risks
C. A solution architecture diagram with the components and data flow
D. An entity relationship diagram describing upstream and downstream dependencies for specific service components
A. Large
B. Small
C. X-Large
D. Medium
A. The virtual infrastructure environment must connect application virtual machines and management services to new physical network switches
B. The virtual infrastructure environment must connect application virtual machines and management services to separate distributed virtual switches (DVS)
C. The virtual infrastructure environment must connect application virtual machines and management services to separate VLANs
D. The virtual infrastructure environment must connect management services to a vSphere standard switch (VSS)
A. Performance
B. Manageability
C. Recoverability
D. Availability
A. All business application virtual machines can be deployed into a single cluster within the primary datacenter.
B. Each distribution hub should be configured with a backup device.
C. The wide area network has sufficient bandwidth to support centralized management.
D. Each cluster will have a minimum of four hosts.
G. iven the information from the customer, which assumption should the architect include in the design?
Cluster One.
Six ESXi hosts.
vSphere HA with host failures cluster tolerates = 1.
Proactive HA is enabled and set to automated.
Fully Automated vSphere DRS.
Transparent Page Sharing (TPS) is enabled.
Cluster Two.
Eight ESXi hosts.
vSphere HA with host failures cluster tolerates = 1.
Proactive HA is disabled.
Partially Automated vSphere DRS.
Transparent Page Sharing (TPS) is disabled.
Cluster Three.
Three ESXi hosts.
vSphere HA with admission control is disabled.
Proactive HA is not supported.
Transparent Page Sharing (TPS) is disabled.
Virtual Machine Resource Profile 1.
Memory sharing techniques should not be used.
Virtual machines should be automatically restarted in the event of host failure if resources are available.
Automated initial virtual machine placement.
Virtual Machine Resource Profile 2.
Memory sharing techniques should not be used.
Virtual machines should be automatically restarted in the event of host failure regardless of available resources.
Automated initial virtual machine placement.
Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? (Choose two)
A. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster One.
B. All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster One.
C. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Two.
D. All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster Two.
E. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Three.
A. The applications are created in-house with in-guest recovery protection
B. The maximum tolerable data loss is 10 minutes
C. The two data center locations have a network latency of 8 ms round-trip time (RTT)
D. The existing storage is out of maintenance
A. Interfaces must be audited
B. Encrypted channels must be used for all communications.
C. Unauthorized access to interfaces must be reported within 15 minutes.
D. Communications must be through Private VLANs (PVLAN).
A. The existing virtual infrastructure has sufficient capacity to host the new VDI workloads
B. The existing operations monitoring tools have sufficient capacity to monitor the new VDI services
C. The existing management cluster has enough available capacity to host any VDI service management component
D. The management cluster has N+1 redundancy
E. The VDI service has a higher service-level agreement (SLA) than the operations management SLA
A. Installation with kick start script
B. Auto Deploy with stateless caching mode
C. Manual installation using boot from SAN
D. Auto Deploy with stateful install mode