REQ01 The platform must host different types of workloads including applications that must be compliant with internal security standarD、
REQ02 The infrastructure must initially run 100 virtual machines.
REQ03 Ten of the virtual machines must be compliant with internal security standarD、
REQ04 The internal security standard specifies logical network separation for in-scope applications.
CON01 The customer has already purchased the licenses as part of another project.
CON02 The customer has five physical servers that must be reused.
Additionally, based on resource requirements, four physical servers will be enough to run all workloads.
Which recommendation should the architect make to meet requirements while minimizing project costs?
A、 Use Network I/O Control to ensure the internal security zone has higher share value
B、 Purchase additional servers and plan separate, isolated clusters for workloads that must be compliant with internal security
C、 Use a single cluster and ensure that different security zones are separated at least with dedicated VLANs and firewall
D、 Use a single cluster and configure DRS anti-affinity rules to ensure internal security compliant virtual machines cannot migrate between ESXi hosts.
答案:D
REQ01 The platform must host different types of workloads including applications that must be compliant with internal security standarD、
REQ02 The infrastructure must initially run 100 virtual machines.
REQ03 Ten of the virtual machines must be compliant with internal security standarD、
REQ04 The internal security standard specifies logical network separation for in-scope applications.
CON01 The customer has already purchased the licenses as part of another project.
CON02 The customer has five physical servers that must be reused.
Additionally, based on resource requirements, four physical servers will be enough to run all workloads.
Which recommendation should the architect make to meet requirements while minimizing project costs?
A、 Use Network I/O Control to ensure the internal security zone has higher share value
B、 Purchase additional servers and plan separate, isolated clusters for workloads that must be compliant with internal security
C、 Use a single cluster and ensure that different security zones are separated at least with dedicated VLANs and firewall
D、 Use a single cluster and configure DRS anti-affinity rules to ensure internal security compliant virtual machines cannot migrate between ESXi hosts.
答案:D
A. The virtual infrastructure environment must connect application virtual machines and management services to new physical network switches
B. The virtual infrastructure environment must connect application virtual machines and management services to separate distributed virtual switches (DVS)
C. The virtual infrastructure environment must connect application virtual machines and management services to separate VLANs
D. The virtual infrastructure environment must connect management services to a vSphere standard switch (VSS)
Cluster One.
Six ESXi hosts.
vSphere HA with host failures cluster tolerates = 1.
Proactive HA is enabled and set to automated.
Fully Automated vSphere DRS.
Transparent Page Sharing (TPS) is enabled.
Cluster Two.
Eight ESXi hosts.
vSphere HA with host failures cluster tolerates = 1.
Proactive HA is disabled.
Partially Automated vSphere DRS.
Transparent Page Sharing (TPS) is disabled.
Cluster Three.
Three ESXi hosts.
vSphere HA with admission control is disabled.
Proactive HA is not supported.
Transparent Page Sharing (TPS) is disabled.
Virtual Machine Resource Profile 1.
Memory sharing techniques should not be used.
Virtual machines should be automatically restarted in the event of host failure if resources are available.
Automated initial virtual machine placement.
Virtual Machine Resource Profile 2.
Memory sharing techniques should not be used.
Virtual machines should be automatically restarted in the event of host failure regardless of available resources.
Automated initial virtual machine placement.
Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? (Choose two)
A. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster One.
B. All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster One.
C. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Two.
D. All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster Two.
E. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Three.
A. The manufacturer and model of the CPUs in the hosts
B. The amount of capacity available for failover of virtual machines within the cluster
C. The downtime allowed for virtual machines that will be running within the cluster
D. The cost to procure and maintain the hardware
E. The number of virtual machines that will be running within the cluster
A. Two new Fibre Channel storage arrays will be deployed, one at either site.Each application tier will be initially provisioned a new LUN.Data replication will be offloaded to the new arrays.
B. Two new vSphere clusters enabled with vSAN will be deployed, one at either site.vSAN will be used to provide policy-based management for each application tier.vSphere Replication will be used to replicate the virtual machine data in an asynchronous configuration.
C. Two new ISCSI storage arrays will be deployed, one at either site.Each application tier will be initially provisioned a new LUN.Data replication will be offloaded to the new arrays.
D. Two new storage arrays will be deployed, one at either site. vSphere Volumes (vVOLs) will be used to provide policy-based management for each application tier.Data replication will be offloaded to the new arrays.
A. Configure vSphere HA--Configure % based admission control--Configure two isolation addresses--Consider an OEM with NIC failure conditions in their Proactive HA plugin
B. Configure vSphere HA--Consider an OEM with NIC failure conditions in their Proactive HA plugin
C. Configure vSphere HA--Configure two existing data stores for heartbeat--Consider an OEM with NIC failure conditions in their Proactive HA plugin
D. Configure Proactive HA--Automation Level: Automated--Remediation: Maintenance mode for all failures--Consider an OEM with NIC failure conditions in their Proactive HA plugin
A. Use Microsoft Windows Server as the guest operating system.
B. Configure the chrony time-sync agent on each virtual machine guest operating system.
C. Set the virtual hardware device to use Host System Time (NTP) for each virtual machine running the application.
D. Add a precision clock virtual device to each virtual machine running the application.
E. Use a Linux distribution as the guest operating system.
F. Add a virtual watchdog timer (VWDT) device to each virtual machine running the application.
A. The ESXi hosts will leverage Fibre Channel (FC).
B. The ESXi hosts will leverage iSCSI.
C. The ESXi hosts will leverage Fibre Channel over Ethernet (FCoE).
D. The ESXi hosts will leverage NFS.
A. Request an isolated network segment to use and dedicate it to Auto Deploy functions
B. Ask the business to expand the engineering environment to service the virtual environment as well
C. Request a common shared network with flexible security measures to accommodate different auto deployment options
D. Deploy each ESXi host individually and document it to satisfy security requirements
A. Create smaller datastores to balance space with Storage DRS
B. Use a larger number of storage profiles (varied disk speeds and RAID levels) to improve performance
C. Create larger datastores to balance space with Storage DRS
D. Create more datastores within each Storage DRS cluster to balance space and performance
A. Data-in-transit encryption
B. OS-level encryption
C. Encrypted backups
D. Array-based encryption