APP下载
首页
>
IT互联网
>
虚拟化高级试题题库4
搜索
虚拟化高级试题题库4
题目内容
(
单选题
)
4.An architect is preparing a design for a company planning digital transformation. During the requirements gathering workshop, the following requirements ( ) and constraints ( ) are identified:

REQ01 The platform must host different types of workloads including applications that must be compliant with internal security standarD、

REQ02 The infrastructure must initially run 100 virtual machines.

REQ03 Ten of the virtual machines must be compliant with internal security standarD、

REQ04 The internal security standard specifies logical network separation for in-scope applications.


CON01 The customer has already purchased the licenses as part of another project.

CON02 The customer has five physical servers that must be reused.

Additionally, based on resource requirements, four physical servers will be enough to run all workloads.


Which recommendation should the architect make to meet requirements while minimizing project costs?

A、  Use Network I/O Control to ensure the internal security zone has higher share value

B、  Purchase additional servers and plan separate, isolated clusters for workloads that must be compliant with internal security

C、  Use a single cluster and ensure that different security zones are separated at least with dedicated VLANs and firewall

D、  Use a single cluster and configure DRS anti-affinity rules to ensure internal security compliant virtual machines cannot migrate between ESXi hosts.

答案:D

虚拟化高级试题题库4
27.The Chief Operating Officer ( ) at an organization raises concerns that their virtual infrastructure environment is vulnerable. Recently, a security-related issue with a virtual machine caused all management services to become unavailable. No budget is available in the short term for additional platform investment.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-2580-c0f9-29e3bb5dbe00.html
点击查看题目
60.An architect is considering placement of virtual machines within an existing VMware software-defined datacenter (SDDC ). During the discovery phase, the following information is documented:


Cluster One.

Six ESXi hosts.

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is enabled and set to automated.

Fully Automated vSphere DRS.

Transparent Page Sharing (TPS) is enabled.

Cluster Two.

Eight ESXi hosts.

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is disabled.

Partially Automated vSphere DRS.

Transparent Page Sharing (TPS) is disabled.

Cluster Three.

Three ESXi hosts.

vSphere HA with admission control is disabled.

Proactive HA is not supported.

Transparent Page Sharing (TPS) is disabled.

Virtual Machine Resource Profile 1.

Memory sharing techniques should not be used.

Virtual machines should be automatically restarted in the event of host failure if resources are available.

Automated initial virtual machine placement.

Virtual Machine Resource Profile 2.

Memory sharing techniques should not be used.

Virtual machines should be automatically restarted in the event of host failure regardless of available resources.

Automated initial virtual machine placement.


Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? (Choose two)

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-b220-c0f9-29e3bb5dbe00.html
点击查看题目
83.An architect is designing a new vSphere cluster. The requirement is to provide a total of 96 CPU cores and 1.5 TB RAM across all hosts.
The following information has been provided:
Two different physical hardware profiles are available for the ESXi hosts in the cluster.
- Profile 1: 16 CPU cores and 256 GB RAM
- Profile 2: 32 CPU cores and 512 GB RAM
Profile 2 is twice as expensive to purchase as Profile 1.
Which two aspects should the architect consider when selecting the hardware profile? Choose two.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-2f20-c0f9-29e3bb5dbe00.html
点击查看题目
15.An architect is designing storage for a new vSphere environment to meet the following requirements:
-Asynchronous replication is required between two sites.
-The impact on the storage layer should not impact the performance of the compute layer.
-Each application tier will require different replication attributes.
-Virtual machine live migration across compute and storage must be supported
-Virtual machine aware back up will be leveraged
-Operational management overhead should be minimized
-Operational automation should be supported
-Which storage design recommendations would meet the requirements?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-eae8-c0f9-29e3bb5dbe00.html
点击查看题目
21.An architect is designing a solution based on the following information:
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-0640-c0f9-29e3bb5dbe00.html
点击查看题目
88.A new real-time financial service application is being developed by the engineering team at a financial firm and will be released as a public Software-as-a-Service ( ) offering. The solutions architect has designed and deployed a new vSphere environment and the supporting network infrastructure for hosting all public services. ESXi hosts are configured to use Precision Time Protocol ( ) and a local stratum-1 network time server. Application provisioning and scaling will be managed by VMware vRealize Automation and can be run on Microsoft Windows or multiple distributions of Linux.
Which three recommendations should the architect include in the design to ensure that the service maintain timekeeping within an accuracy of one second? Choose three.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-5248-c0f9-29e3bb5dbe00.html
点击查看题目
56.An architect is designing a VMware solution for a customer to meet the following requirements:
The solution must use investments in existing storage array that supports both block and file storage.
The solution must support the ability to migrate workloads between hosts within a cluster.
The solution must support resource management priorities.
The solution must support the ability to connect virtual machines directly to LUNs.
The solution should use existing 32G fabric infrastructure.
There is no budget for additional physical hardware.
Which design decision should the architect make to meet these requirements?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-a280-c0f9-29e3bb5dbe00.html
点击查看题目
8.An architect is designing a new greenfield environment with 600 ESXi hosts in an automated fashion. The engineering department already has a PXE Boot server, TFTP server, and DHCP server set up with an NFS mount for their current Linux servers.
The architect must be able to demonstrate and meet a security requirement to have all infrastructure processes separated
Which recommendation should the architect make for the ESXi host deployment?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-c7c0-c0f9-29e3bb5dbe00.html
点击查看题目
11.An architect is reviewing a physical storage design. The customer has specified that storage DRS will be used for ease of operational management for capacity and performance
Which recommendation should the architect include in the design?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-db48-c0f9-29e3bb5dbe00.html
点击查看题目
18.A customer requires the use of data encryption to ensure data is not accessible when a drive is removed from the primary storage platform. However, there is also a requirement to use deduplication and compression against all workloads in order to conserve space
Which solution meets the customer requirements?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-fa88-c0f9-29e3bb5dbe01.html
点击查看题目
首页
>
IT互联网
>
虚拟化高级试题题库4
题目内容
(
单选题
)
手机预览
虚拟化高级试题题库4

4.An architect is preparing a design for a company planning digital transformation. During the requirements gathering workshop, the following requirements ( ) and constraints ( ) are identified:

REQ01 The platform must host different types of workloads including applications that must be compliant with internal security standarD、

REQ02 The infrastructure must initially run 100 virtual machines.

REQ03 Ten of the virtual machines must be compliant with internal security standarD、

REQ04 The internal security standard specifies logical network separation for in-scope applications.


CON01 The customer has already purchased the licenses as part of another project.

CON02 The customer has five physical servers that must be reused.

Additionally, based on resource requirements, four physical servers will be enough to run all workloads.


Which recommendation should the architect make to meet requirements while minimizing project costs?

A、  Use Network I/O Control to ensure the internal security zone has higher share value

B、  Purchase additional servers and plan separate, isolated clusters for workloads that must be compliant with internal security

C、  Use a single cluster and ensure that different security zones are separated at least with dedicated VLANs and firewall

D、  Use a single cluster and configure DRS anti-affinity rules to ensure internal security compliant virtual machines cannot migrate between ESXi hosts.

答案:D

分享
虚拟化高级试题题库4
相关题目
27.The Chief Operating Officer ( ) at an organization raises concerns that their virtual infrastructure environment is vulnerable. Recently, a security-related issue with a virtual machine caused all management services to become unavailable. No budget is available in the short term for additional platform investment.

A.   The virtual infrastructure environment must connect application virtual machines and management services to new physical network switches

B.   The virtual infrastructure environment must connect application virtual machines and management services to separate distributed virtual switches (DVS)

C.   The virtual infrastructure environment must connect application virtual machines and management services to separate VLANs

D.   The virtual infrastructure environment must connect management services to a vSphere standard switch (VSS)

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-2580-c0f9-29e3bb5dbe00.html
点击查看答案
60.An architect is considering placement of virtual machines within an existing VMware software-defined datacenter (SDDC ). During the discovery phase, the following information is documented:


Cluster One.

Six ESXi hosts.

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is enabled and set to automated.

Fully Automated vSphere DRS.

Transparent Page Sharing (TPS) is enabled.

Cluster Two.

Eight ESXi hosts.

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is disabled.

Partially Automated vSphere DRS.

Transparent Page Sharing (TPS) is disabled.

Cluster Three.

Three ESXi hosts.

vSphere HA with admission control is disabled.

Proactive HA is not supported.

Transparent Page Sharing (TPS) is disabled.

Virtual Machine Resource Profile 1.

Memory sharing techniques should not be used.

Virtual machines should be automatically restarted in the event of host failure if resources are available.

Automated initial virtual machine placement.

Virtual Machine Resource Profile 2.

Memory sharing techniques should not be used.

Virtual machines should be automatically restarted in the event of host failure regardless of available resources.

Automated initial virtual machine placement.


Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? (Choose two)

A.   All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster One.

B.   All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster One.

C.   All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Two.

D.   All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster Two.

E.   All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Three.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-b220-c0f9-29e3bb5dbe00.html
点击查看答案
83.An architect is designing a new vSphere cluster. The requirement is to provide a total of 96 CPU cores and 1.5 TB RAM across all hosts.
The following information has been provided:
Two different physical hardware profiles are available for the ESXi hosts in the cluster.
- Profile 1: 16 CPU cores and 256 GB RAM
- Profile 2: 32 CPU cores and 512 GB RAM
Profile 2 is twice as expensive to purchase as Profile 1.
Which two aspects should the architect consider when selecting the hardware profile? Choose two.

A.   The manufacturer and model of the CPUs in the hosts

B.   The amount of capacity available for failover of virtual machines within the cluster

C.   The downtime allowed for virtual machines that will be running within the cluster

D.   The cost to procure and maintain the hardware

E.   The number of virtual machines that will be running within the cluster

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-2f20-c0f9-29e3bb5dbe00.html
点击查看答案
15.An architect is designing storage for a new vSphere environment to meet the following requirements:
-Asynchronous replication is required between two sites.
-The impact on the storage layer should not impact the performance of the compute layer.
-Each application tier will require different replication attributes.
-Virtual machine live migration across compute and storage must be supported
-Virtual machine aware back up will be leveraged
-Operational management overhead should be minimized
-Operational automation should be supported
-Which storage design recommendations would meet the requirements?

A.   Two new Fibre Channel storage arrays will be deployed, one at either site.Each application tier will be initially provisioned a new LUN.Data replication will be offloaded to the new arrays.

B.   Two new vSphere clusters enabled with vSAN will be deployed, one at either site.vSAN will be used to provide policy-based management for each application tier.vSphere Replication will be used to replicate the virtual machine data in an asynchronous configuration.

C.   Two new ISCSI storage arrays will be deployed, one at either site.Each application tier will be initially provisioned a new LUN.Data replication will be offloaded to the new arrays.

D.   Two new storage arrays will be deployed, one at either site. vSphere Volumes (vVOLs) will be used to provide policy-based management for each application tier.Data replication will be offloaded to the new arrays.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-eae8-c0f9-29e3bb5dbe00.html
点击查看答案
21.An architect is designing a solution based on the following information:

A.   Configure vSphere HA--Configure % based admission control--Configure two isolation addresses--Consider an OEM with NIC failure conditions in their Proactive HA plugin

B.   Configure vSphere HA--Consider an OEM with NIC failure conditions in their Proactive HA plugin

C.   Configure vSphere HA--Configure two existing data stores for heartbeat--Consider an OEM with NIC failure conditions in their Proactive HA plugin

D.   Configure Proactive HA--Automation Level: Automated--Remediation: Maintenance mode for all failures--Consider an OEM with NIC failure conditions in their Proactive HA plugin

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-0640-c0f9-29e3bb5dbe00.html
点击查看答案
88.A new real-time financial service application is being developed by the engineering team at a financial firm and will be released as a public Software-as-a-Service ( ) offering. The solutions architect has designed and deployed a new vSphere environment and the supporting network infrastructure for hosting all public services. ESXi hosts are configured to use Precision Time Protocol ( ) and a local stratum-1 network time server. Application provisioning and scaling will be managed by VMware vRealize Automation and can be run on Microsoft Windows or multiple distributions of Linux.
Which three recommendations should the architect include in the design to ensure that the service maintain timekeeping within an accuracy of one second? Choose three.

A.   Use Microsoft Windows Server as the guest operating system.

B.   Configure the chrony time-sync agent on each virtual machine guest operating system.

C.   Set the virtual hardware device to use Host System Time (NTP) for each virtual machine running the application.

D.   Add a precision clock virtual device to each virtual machine running the application.

E.   Use a Linux distribution as the guest operating system.

F.   Add a virtual watchdog timer (VWDT) device to each virtual machine running the application.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-5248-c0f9-29e3bb5dbe00.html
点击查看答案
56.An architect is designing a VMware solution for a customer to meet the following requirements:
The solution must use investments in existing storage array that supports both block and file storage.
The solution must support the ability to migrate workloads between hosts within a cluster.
The solution must support resource management priorities.
The solution must support the ability to connect virtual machines directly to LUNs.
The solution should use existing 32G fabric infrastructure.
There is no budget for additional physical hardware.
Which design decision should the architect make to meet these requirements?

A.   The ESXi hosts will leverage Fibre Channel (FC).

B.   The ESXi hosts will leverage iSCSI.

C.   The ESXi hosts will leverage Fibre Channel over Ethernet (FCoE).

D.   The ESXi hosts will leverage NFS.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-a280-c0f9-29e3bb5dbe00.html
点击查看答案
8.An architect is designing a new greenfield environment with 600 ESXi hosts in an automated fashion. The engineering department already has a PXE Boot server, TFTP server, and DHCP server set up with an NFS mount for their current Linux servers.
The architect must be able to demonstrate and meet a security requirement to have all infrastructure processes separated
Which recommendation should the architect make for the ESXi host deployment?

A.   Request an isolated network segment to use and dedicate it to Auto Deploy functions

B.   Ask the business to expand the engineering environment to service the virtual environment as well

C.   Request a common shared network with flexible security measures to accommodate different auto deployment options

D.   Deploy each ESXi host individually and document it to satisfy security requirements

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-c7c0-c0f9-29e3bb5dbe00.html
点击查看答案
11.An architect is reviewing a physical storage design. The customer has specified that storage DRS will be used for ease of operational management for capacity and performance
Which recommendation should the architect include in the design?

A.   Create smaller datastores to balance space with Storage DRS

B.   Use a larger number of storage profiles (varied disk speeds and RAID levels) to improve performance

C.   Create larger datastores to balance space with Storage DRS

D.   Create more datastores within each Storage DRS cluster to balance space and performance

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-db48-c0f9-29e3bb5dbe00.html
点击查看答案
18.A customer requires the use of data encryption to ensure data is not accessible when a drive is removed from the primary storage platform. However, there is also a requirement to use deduplication and compression against all workloads in order to conserve space
Which solution meets the customer requirements?

A.   Data-in-transit encryption

B.   OS-level encryption

C.   Encrypted backups

D.   Array-based encryption

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-fa88-c0f9-29e3bb5dbe01.html
点击查看答案
试题通小程序
试题通app下载