A、 Enable vSphere HA and add a VM Override with VM Restart Priority set to Disabled
B、 Enable Fault Tolerance
C、 Achieve application availability with snapshots
D、 Enable vSphere HA and add a VM Override with VM Restart Priority set to Lowest
答案:D
A、 Enable vSphere HA and add a VM Override with VM Restart Priority set to Disabled
B、 Enable Fault Tolerance
C、 Achieve application availability with snapshots
D、 Enable vSphere HA and add a VM Override with VM Restart Priority set to Lowest
答案:D
A. Request an isolated network segment to use and dedicate it to Auto Deploy functions
B. Ask the business to expand the engineering environment to service the virtual environment as well
C. Request a common shared network with flexible security measures to accommodate different auto deployment options
D. Deploy each ESXi host individually and document it to satisfy security requirements
A. The virtual infrastructure environment must connect application virtual machines and management services to new physical network switches
B. The virtual infrastructure environment must connect application virtual machines and management services to separate distributed virtual switches (DVS)
C. The virtual infrastructure environment must connect application virtual machines and management services to separate VLANs
D. The virtual infrastructure environment must connect management services to a vSphere standard switch (VSS)
Given the information from the customer, which two would be classified as assumptions within the design? Choose two.
A. The backup service will store data in a secure facility
B. The backup service has sufficient capacity for the new requirements
C. The customer will update their hardware standard to support rack mount servers
D. All virtual machines will be deployed with the same resource profile for production and development
E. The clusters will have a minimum redundancy of N+1
G.
A. Split the virtual machines into several VLANs
Use tag actions
B. Create port groups with different names and same VLAN IDs
C. Enable traffic filtering and marking
Use allow or drop actions
D. Disable traffic filtering and marking
Use tag actions
A. All business application virtual machines can be deployed into a single cluster within the primary datacenter.
B. Each distribution hub should be configured with a backup device.
C. The wide area network has sufficient bandwidth to support centralized management.
D. Each cluster will have a minimum of four hosts.
G. iven the information from the customer, which assumption should the architect include in the design?
A. The applications are created in-house with in-guest recovery protection
B. The maximum tolerable data loss is 10 minutes
C. The two data center locations have a network latency of 8 ms round-trip time (RTT)
D. The existing storage is out of maintenance
A. The number of 10 GbE capable ports in the vSAN ReadyNode
B. The use of vSAN ReadyNodes
C. The existing network is 10 GbE capable
D. The use of NVMe drives for cache and capacity
A. vCenter Server High Availability will be configured.
B. The vCenter Server Appliance will be protected with vSphere Fault Tolerance.
C. The cluster will be configured to use vSphere DRS in fully automated mode.
D. The cluster will be configured with vSphere HA and set to restart virtual machines based on guest operating system heartbeat monitoring.
A. The existing virtual infrastructure has sufficient capacity to host the new VDI workloads
B. The existing operations monitoring tools have sufficient capacity to monitor the new VDI services
C. The existing management cluster has enough available capacity to host any VDI service management component
D. The management cluster has N+1 redundancy
E. The VDI service has a higher service-level agreement (SLA) than the operations management SLA
Cluster One.
Six ESXi hosts.
vSphere HA with host failures cluster tolerates = 1.
Proactive HA is enabled and set to automated.
Fully Automated vSphere DRS.
Transparent Page Sharing (TPS) is enabled.
Cluster Two.
Eight ESXi hosts.
vSphere HA with host failures cluster tolerates = 1.
Proactive HA is disabled.
Partially Automated vSphere DRS.
Transparent Page Sharing (TPS) is disabled.
Cluster Three.
Three ESXi hosts.
vSphere HA with admission control is disabled.
Proactive HA is not supported.
Transparent Page Sharing (TPS) is disabled.
Virtual Machine Resource Profile 1.
Memory sharing techniques should not be used.
Virtual machines should be automatically restarted in the event of host failure if resources are available.
Automated initial virtual machine placement.
Virtual Machine Resource Profile 2.
Memory sharing techniques should not be used.
Virtual machines should be automatically restarted in the event of host failure regardless of available resources.
Automated initial virtual machine placement.
Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? (Choose two)
A. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster One.
B. All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster One.
C. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Two.
D. All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster Two.
E. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Three.