APP下载
首页
>
IT互联网
>
虚拟化高级试题题库4
搜索
虚拟化高级试题题库4
题目内容
(
单选题
)
47.During a requirements gathering workshop, the customer provides the following requirement:A new vSphere platform must be designed securely and all interfaces must be protected against potential snooping.

A、  Interfaces must be audited

B、  Encrypted channels must be used for all communications.

C、  Unauthorized access to interfaces must be reported within 15 minutes.

D、  Communications must be through Private VLANs (PVLAN).

答案:B

虚拟化高级试题题库4
28.In a meeting to discuss the minimum viable product ( ) deployment of a new customer-facing application, the key stakeholder shares details of the application components and the application administrators share details of performance and integrity tests for the application.
The application will be made up of the following components:
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-2d50-c0f9-29e3bb5dbe00.html
点击查看题目
52.A customer defines a requirement to minimize the vMotion migration time during a maintenance perioD、
The servers being used are equipped with eight 1 GbE network adapters.
Per the defined logical network configuration, there are two network adapters each used for:
Management traffic
vMotion traffic
iSCSI traffic
Virtual machine traffic
Which design decision should the architect make to meet the customer requirement?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-8ef8-c0f9-29e3bb5dbe00.html
点击查看题目
39.An architect is planning the physical server configuration for a vSAN-based infrastructure.
Which operations mode should a RAID controller support to minimize potential server downtime during physical disk failures?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-6018-c0f9-29e3bb5dbe00.html
点击查看题目
30.There is a request for approved virtual machine applications through a new vSphere platform’s integrated automation portal. The platform was built following all provided company security guidelines and has been assessed against Sarbanes-Oxley Act of 2002 ( ) regulations.
The platform has the following characteristics:
vRealize Operations is being used to monitor all clusters.
There is a dedicated ESXi cluster, supporting all management services.
- All network traffic is via distributed virtual switches ( ).
There is a dedicated ESXi cluster for all line-of-business applications.
- Network traffic is serviced by NSX-T.
There is a dedicated ESXi cluster for virtual desktop infrastructure ( ).
- Network traffic is serviced by NSX-T.
The application owner is requesting approval to install a new service that must be protected as per the Payment Card Industry ( ) Data Security Standard.
Which additional non-functional requirement should the architect include in the design to support the new service?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-3520-c0f9-29e3bb5dbe00.html
点击查看题目
63.The Chief Information Security Officer ( ) for an organization is concerned about the security posture of the operating system images that are used for the provisioning of their Software-as-a-Service ( ) applications. The organization is in a growth period. The organization is opening a new data center to launch its next phase of new SaaS-based solutions.
The DevOps team currently creates encrypted virtual machine ( ) templates that are used for various operating systems and adds these to the vSphere inventory. The DevOps team already uses a published content library and has been granted a role with the ability to add and delete library items.
The following requirements have been noted:
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-c990-c0f9-29e3bb5dbe00.html
点击查看题目
79.During a requirements gathering workshop, the customer provides the following requirement ( REQ) and constraints ( CON):

REQ01: The customer is looking for a way to limit database virtual machine (VM ) placement to save on CPU licensing costs.

CON01: There is a single cluster with no budget to scale.

CON02: All virtual machines must run on the consolidated cluster.

Which two design decisions should the architect make to meet the customer requirement? Choose two.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-1f80-c0f9-29e3bb5dbe00.html
点击查看题目
68.An organization’s data scientists are executing a plan to use machine learning ( ). They must have access to graphical processing unit ( ) capabilities to execute their computational models when needed. The solutions architect needs to design a solution to ensure that GPUs can be shared by multiple virtual machines.
Which two solutions should the architect recommend to meet these requirements? Choose two.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-e8d0-c0f9-29e3bb5dbe00.html
点击查看题目
86.A VMware Service Provider is tasked with delivering a solution for continuous availability for a subset of Tier 1 virtual machines ( ) and vApps running in their vSAN environment. The VMs make up a missioncritical application and there can be no data loss in the event of an outage at their primary data center. In the event of a regional outage, they have established a 10-minute recovery point objective ( ). Failover/failback to the third site must be automated.
They have the following in place:
Two local data centers ( ) connected with 100 Gb dedicated fiber.
- 2ms round-trip time ( ) latency between the sites.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-4690-c0f9-29e3bb5dbe00.html
点击查看题目
55.Which requirement would be classified as a functional requirement within the application design documentation?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-9e98-c0f9-29e3bb5dbe00.html
点击查看题目
27.The Chief Operating Officer ( ) at an organization raises concerns that their virtual infrastructure environment is vulnerable. Recently, a security-related issue with a virtual machine caused all management services to become unavailable. No budget is available in the short term for additional platform investment.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-2580-c0f9-29e3bb5dbe00.html
点击查看题目
首页
>
IT互联网
>
虚拟化高级试题题库4
题目内容
(
单选题
)
手机预览
虚拟化高级试题题库4

47.During a requirements gathering workshop, the customer provides the following requirement:A new vSphere platform must be designed securely and all interfaces must be protected against potential snooping.

A、  Interfaces must be audited

B、  Encrypted channels must be used for all communications.

C、  Unauthorized access to interfaces must be reported within 15 minutes.

D、  Communications must be through Private VLANs (PVLAN).

答案:B

分享
虚拟化高级试题题库4
相关题目
28.In a meeting to discuss the minimum viable product ( ) deployment of a new customer-facing application, the key stakeholder shares details of the application components and the application administrators share details of performance and integrity tests for the application.
The application will be made up of the following components:

A.   15 minutes

B.   60 minutes

C.   105 minutes

D.   90 minutes

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-2d50-c0f9-29e3bb5dbe00.html
点击查看答案
52.A customer defines a requirement to minimize the vMotion migration time during a maintenance perioD、
The servers being used are equipped with eight 1 GbE network adapters.
Per the defined logical network configuration, there are two network adapters each used for:
Management traffic
vMotion traffic
iSCSI traffic
Virtual machine traffic
Which design decision should the architect make to meet the customer requirement?

A.   Use Network I/O Control to define a reservation for vMotion traffic.

B.   Implement Multi-NIC vMotion by adding additional vMotion VMkernels.

C.   Configure a dedicated TCP/IP stack for vMotion traffic.

D.   Combine vMotion and Management traffic to make use of four adapters.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-8ef8-c0f9-29e3bb5dbe00.html
点击查看答案
39.An architect is planning the physical server configuration for a vSAN-based infrastructure.
Which operations mode should a RAID controller support to minimize potential server downtime during physical disk failures?

A.   RAID controller with Passthru mode

B.   RAID controller with RAID 5 mode

C.   RAID controller with RAID 10 mode

D.   RAID controller with RAID 6 mode

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-6018-c0f9-29e3bb5dbe00.html
点击查看答案
30.There is a request for approved virtual machine applications through a new vSphere platform’s integrated automation portal. The platform was built following all provided company security guidelines and has been assessed against Sarbanes-Oxley Act of 2002 ( ) regulations.
The platform has the following characteristics:
vRealize Operations is being used to monitor all clusters.
There is a dedicated ESXi cluster, supporting all management services.
- All network traffic is via distributed virtual switches ( ).
There is a dedicated ESXi cluster for all line-of-business applications.
- Network traffic is serviced by NSX-T.
There is a dedicated ESXi cluster for virtual desktop infrastructure ( ).
- Network traffic is serviced by NSX-T.
The application owner is requesting approval to install a new service that must be protected as per the Payment Card Industry ( ) Data Security Standard.
Which additional non-functional requirement should the architect include in the design to support the new service?

A.   The vSphere hosting platform and all PCI application virtual machines must be assessed against Payment Card Industry (PCI) Data Security Standard compliance

B.   The vSphere hosting platform and all PCI application virtual machines must be assessed for SOX compliance.

C.   The vSphere hosting platform and all PCI application virtual machine network traffic must be routed via NSX-T.

D.   The vSphere hosting platform and all PCI application virtual machines must be monitored using the vRealize Operations Compliance Pack for Payment Card Industry.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-3520-c0f9-29e3bb5dbe00.html
点击查看答案
63.The Chief Information Security Officer ( ) for an organization is concerned about the security posture of the operating system images that are used for the provisioning of their Software-as-a-Service ( ) applications. The organization is in a growth period. The organization is opening a new data center to launch its next phase of new SaaS-based solutions.
The DevOps team currently creates encrypted virtual machine ( ) templates that are used for various operating systems and adds these to the vSphere inventory. The DevOps team already uses a published content library and has been granted a role with the ability to add and delete library items.
The following requirements have been noted:

A.   Clone virtual machines as VM templates to the published content library

B.   Create a subscribed library from the published library and synchronize Open Virtualization Format (OVF) templates on-demand

C.   Create a subscription and publish VM templates to a subscribed content library

D.   Create a subscribed library from the published library and synchronize Open Virtualization Format (OVF) templates automatically

E.   Clone virtual machines as Open Virtualization Format (OVF)templates to the published content library

F.   Update the role for the DevOps team with new privileges

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-c990-c0f9-29e3bb5dbe00.html
点击查看答案
79.During a requirements gathering workshop, the customer provides the following requirement ( REQ) and constraints ( CON):

REQ01: The customer is looking for a way to limit database virtual machine (VM ) placement to save on CPU licensing costs.

CON01: There is a single cluster with no budget to scale.

CON02: All virtual machines must run on the consolidated cluster.

Which two design decisions should the architect make to meet the customer requirement? Choose two.

A.   The solution must use VM-VM anti-affinity rules

B.   The solution must use vSphere DRS in manual mode

C.   The solution must use a vRealize Orchestrator workflow for VM placement

D.   The solution must use VM-Host affinity rules

E.   The solution must use vSphere VM and host DRS groups

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-1f80-c0f9-29e3bb5dbe00.html
点击查看答案
68.An organization’s data scientists are executing a plan to use machine learning ( ). They must have access to graphical processing unit ( ) capabilities to execute their computational models when needed. The solutions architect needs to design a solution to ensure that GPUs can be shared by multiple virtual machines.
Which two solutions should the architect recommend to meet these requirements? Choose two.

A.   NVIDIA vGPU

B.   AMD MxGPU

C.   vSphere DirectPath I/O

D.   vSGA

E.   vSphere Bitfusion

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-e8d0-c0f9-29e3bb5dbe00.html
点击查看答案
86.A VMware Service Provider is tasked with delivering a solution for continuous availability for a subset of Tier 1 virtual machines ( ) and vApps running in their vSAN environment. The VMs make up a missioncritical application and there can be no data loss in the event of an outage at their primary data center. In the event of a regional outage, they have established a 10-minute recovery point objective ( ). Failover/failback to the third site must be automated.
They have the following in place:
Two local data centers ( ) connected with 100 Gb dedicated fiber.
- 2ms round-trip time ( ) latency between the sites.

A.   Site Recovery Manager

B.   Snapshots

C.   vSAN Metro Cluster

D.   vSphere Data Protection

E.   vStorage APIs for Array Integration (VAAI)

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-4690-c0f9-29e3bb5dbe00.html
点击查看答案
55.Which requirement would be classified as a functional requirement within the application design documentation?

A.   The application must be hosted with redundancy levels of N+1 or better.

B.   Penetration testing must be executed quarterly with a pass rate of 80% or higher.

C.   The application must be capable of handling 200 transactions per second.

D.   Administrators must monitor the network traffic of the desired systems.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-9e98-c0f9-29e3bb5dbe00.html
点击查看答案
27.The Chief Operating Officer ( ) at an organization raises concerns that their virtual infrastructure environment is vulnerable. Recently, a security-related issue with a virtual machine caused all management services to become unavailable. No budget is available in the short term for additional platform investment.

A.   The virtual infrastructure environment must connect application virtual machines and management services to new physical network switches

B.   The virtual infrastructure environment must connect application virtual machines and management services to separate distributed virtual switches (DVS)

C.   The virtual infrastructure environment must connect application virtual machines and management services to separate VLANs

D.   The virtual infrastructure environment must connect management services to a vSphere standard switch (VSS)

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-2580-c0f9-29e3bb5dbe00.html
点击查看答案
试题通小程序
试题通app下载