APP下载
首页
>
IT互联网
>
虚拟化高级试题题库4
搜索
虚拟化高级试题题库4
题目内容
(
单选题
)
17.As part of a new hybrid cloud initiative for a large financial company, the customer technical team is presenting an overview of the current state of the infrastructure and their vision for a new solution.
The project team captures notes during the presentation and adds them to the discovery documentation.
Which of the listed statements is a design constraint?

A、  The applications are created in-house with in-guest recovery protection

B、  The maximum tolerable data loss is 10 minutes

C、  The two data center locations have a network latency of 8 ms round-trip time (RTT)

D、  The existing storage is out of maintenance

答案:C

虚拟化高级试题题库4
10 GbE storage connectivity for all devices.
The solution architect is tasked with coming up with a solution to meet this requirement while utilizing their existing investments.
Which two recommendations could the architect make? Choose two.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-ecb8-c0f9-29e3bb5dbe01.html
点击查看题目
29.During a requirements gathering workshop to design a physical to virtual migration, the customer provides the following information:
There is no physical firewall in the data center with no anticipated plans for a future network refresh.
Leveraging the virtual infrastructure to mitigate the lack of network security must be addressed in the design.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-3138-c0f9-29e3bb5dbe00.html
点击查看题目
53.An architect is preparing a design for a customer. Based on requirements, the architect recommends an HCI-based infrastructure with all-flash architecture. During the assessment, it is confirmed that the network throughput generated by virtual machines does not exceed 150 Mb/s.
What is the minimum number and type of network adapters in each server that the architect can recommend to ensure requirements are met and there is no single point of failure?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-96c8-c0f9-29e3bb5dbe00.html
点击查看题目
17.As part of a new hybrid cloud initiative for a large financial company, the customer technical team is presenting an overview of the current state of the infrastructure and their vision for a new solution.
The project team captures notes during the presentation and adds them to the discovery documentation.
Which of the listed statements is a design constraint?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-fa88-c0f9-29e3bb5dbe00.html
点击查看题目
87.During a requirements gathering workshop, the customer provides the following information:
https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-4a78-c0f9-29e3bb5dbe00.html
点击查看题目
14.An architect is designing a series of new vSphere environments for an organization. The environments will be deployed in their US-East and US-West region data centers. Each data center may have one or more dedicated vSphere environments. Only the vSphere environments within a data center will be configured with Enhanced Linked Mode. The Chief Technology Officer ( ) has authorized the use of VMware vRealize Automation Cloud for automation. The build team creates standardized virtual machine images for various operating systems in Open Virtualization Format ( ) and publishes the latest version on an asneeded basis to an internal HTTPS-accessible repository.
The architect must design a content library topology that meets the following requirements:
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-e700-c0f9-29e3bb5dbe00.html
点击查看题目
37.An architect is creating a network design for a new vSphere environment.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-5848-c0f9-29e3bb5dbe00.html
点击查看题目
4.An architect is preparing a design for a company planning digital transformation. During the requirements gathering workshop, the following requirements ( ) and constraints ( ) are identified:

REQ01 The platform must host different types of workloads including applications that must be compliant with internal security standarD、

REQ02 The infrastructure must initially run 100 virtual machines.

REQ03 Ten of the virtual machines must be compliant with internal security standarD、

REQ04 The internal security standard specifies logical network separation for in-scope applications.


CON01 The customer has already purchased the licenses as part of another project.

CON02 The customer has five physical servers that must be reused.

Additionally, based on resource requirements, four physical servers will be enough to run all workloads.


Which recommendation should the architect make to meet requirements while minimizing project costs?

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-b438-c0f9-29e3bb5dbe00.html
点击查看题目
51.An architect has 50 ESXi hosts to deploy and DHCP servers are not allowed on any network.
Which automated host deployment method should the architect use?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-8b10-c0f9-29e3bb5dbe01.html
点击查看题目
50.Which of the listed requirements would be classified as a recoverability non-functional requirement?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-8b10-c0f9-29e3bb5dbe00.html
点击查看题目
首页
>
IT互联网
>
虚拟化高级试题题库4
题目内容
(
单选题
)
手机预览
虚拟化高级试题题库4

17.As part of a new hybrid cloud initiative for a large financial company, the customer technical team is presenting an overview of the current state of the infrastructure and their vision for a new solution.
The project team captures notes during the presentation and adds them to the discovery documentation.
Which of the listed statements is a design constraint?

A、  The applications are created in-house with in-guest recovery protection

B、  The maximum tolerable data loss is 10 minutes

C、  The two data center locations have a network latency of 8 ms round-trip time (RTT)

D、  The existing storage is out of maintenance

答案:C

分享
虚拟化高级试题题库4
相关题目
10 GbE storage connectivity for all devices.
The solution architect is tasked with coming up with a solution to meet this requirement while utilizing their existing investments.
Which two recommendations could the architect make? Choose two.

A.   Use vSAN native support for WSFC

B.   Use NFS 4.1 shares for quorum and shared disk

C.   Use raw device mapping (RDM)

D.   Use the SMB 2.1 protocol for sharing disks

E.   Run WSFC on vSAN iSCSI Target Service

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-ecb8-c0f9-29e3bb5dbe01.html
点击查看答案
29.During a requirements gathering workshop to design a physical to virtual migration, the customer provides the following information:
There is no physical firewall in the data center with no anticipated plans for a future network refresh.
Leveraging the virtual infrastructure to mitigate the lack of network security must be addressed in the design.

A.   Split the virtual machines into several VLANs
Use tag actions

B.   Create port groups with different names and same VLAN IDs

C.   Enable traffic filtering and marking
Use allow or drop actions

D.   Disable traffic filtering and marking
Use tag actions

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-3138-c0f9-29e3bb5dbe00.html
点击查看答案
53.An architect is preparing a design for a customer. Based on requirements, the architect recommends an HCI-based infrastructure with all-flash architecture. During the assessment, it is confirmed that the network throughput generated by virtual machines does not exceed 150 Mb/s.
What is the minimum number and type of network adapters in each server that the architect can recommend to ensure requirements are met and there is no single point of failure?

A.   Two 1 GbE network adapters per server

B.   Four 1 GbE network adapters per server

C.   Four 10 GbE network adapters per server

D.   Two 10 GbE network adapters per server

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-96c8-c0f9-29e3bb5dbe00.html
点击查看答案
17.As part of a new hybrid cloud initiative for a large financial company, the customer technical team is presenting an overview of the current state of the infrastructure and their vision for a new solution.
The project team captures notes during the presentation and adds them to the discovery documentation.
Which of the listed statements is a design constraint?

A.   The applications are created in-house with in-guest recovery protection

B.   The maximum tolerable data loss is 10 minutes

C.   The two data center locations have a network latency of 8 ms round-trip time (RTT)

D.   The existing storage is out of maintenance

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-fa88-c0f9-29e3bb5dbe00.html
点击查看答案
87.During a requirements gathering workshop, the customer provides the following information:

A.   Use Route Based on Physical NIC Load

B.   Use Network I/O Control with Shares.

C.   Use Network I/O Control with Reservation.

D.   Use Link Aggregation Control Protocol (LACP).

E.   Use Network I/O Control with Limits.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-4a78-c0f9-29e3bb5dbe00.html
点击查看答案
14.An architect is designing a series of new vSphere environments for an organization. The environments will be deployed in their US-East and US-West region data centers. Each data center may have one or more dedicated vSphere environments. Only the vSphere environments within a data center will be configured with Enhanced Linked Mode. The Chief Technology Officer ( ) has authorized the use of VMware vRealize Automation Cloud for automation. The build team creates standardized virtual machine images for various operating systems in Open Virtualization Format ( ) and publishes the latest version on an asneeded basis to an internal HTTPS-accessible repository.
The architect must design a content library topology that meets the following requirements:

A.   Work with the build team to create a local content library for each vSphere environment. Import the OVF images when new image are published to the repository.

B.   Create a local content library for the primary vSphere environment in each data center.Create a subscribed content library for each additional vSphere environment in each data center. Configure the content library to download content automatically.

C.   Work with the build team to automate a JSON-based manifest to the repository when changes occur in the repository. Create a subscribed content library for each vSphere environment. Configure the content library to download content when needed.

D.   Work with the build team to automate a JSON-based manifest to the repository when changes occur in the repository.Create a subscribed content library for each vSphere environment.Configure the content library to download content automatically.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-e700-c0f9-29e3bb5dbe00.html
点击查看答案
37.An architect is creating a network design for a new vSphere environment.

A.   Use different logical networks to ensure traffic is isolated with separate VLANs

B.   Use Network I/O Control and ensure appropriate share value is defined for different types of traffic giving priority to the virtual machines traffic

C.   Use two dedicated virtual switches with a single adapter each, dedicating one virtual switch for Management, vMotion, vSAN and Fault Tolerance traffic, and the second one for virtual machine traffic

D.   Use a NIC teaming policy based on the physical NIC load

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-5848-c0f9-29e3bb5dbe00.html
点击查看答案
4.An architect is preparing a design for a company planning digital transformation. During the requirements gathering workshop, the following requirements ( ) and constraints ( ) are identified:

REQ01 The platform must host different types of workloads including applications that must be compliant with internal security standarD、

REQ02 The infrastructure must initially run 100 virtual machines.

REQ03 Ten of the virtual machines must be compliant with internal security standarD、

REQ04 The internal security standard specifies logical network separation for in-scope applications.


CON01 The customer has already purchased the licenses as part of another project.

CON02 The customer has five physical servers that must be reused.

Additionally, based on resource requirements, four physical servers will be enough to run all workloads.


Which recommendation should the architect make to meet requirements while minimizing project costs?

A.   Use Network I/O Control to ensure the internal security zone has higher share value

B.   Purchase additional servers and plan separate, isolated clusters for workloads that must be compliant with internal security

C.   Use a single cluster and ensure that different security zones are separated at least with dedicated VLANs and firewall

D.   Use a single cluster and configure DRS anti-affinity rules to ensure internal security compliant virtual machines cannot migrate between ESXi hosts.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-b438-c0f9-29e3bb5dbe00.html
点击查看答案
51.An architect has 50 ESXi hosts to deploy and DHCP servers are not allowed on any network.
Which automated host deployment method should the architect use?

A.   Stateless vSphere Auto Deploy

B.   Stateful vSphere Auto Deploy

C.   Scripted installation

D.   Interactive installation

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-8b10-c0f9-29e3bb5dbe01.html
点击查看答案
50.Which of the listed requirements would be classified as a recoverability non-functional requirement?

A.   The platform must be integrated with existing change control policies.

B.   The platform must be able to support a maximum tolerable downtime (MTD) of 30 minutes.

C.   Maintenance windows must be scheduled to take place monthly during an established overnight period.

D.   The platform must be available 24 hours a day, 7 days a week with the exception of scheduled downtime.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-8b10-c0f9-29e3bb5dbe00.html
点击查看答案
试题通小程序
试题通app下载