APP下载
首页
>
IT互联网
>
虚拟化高级试题题库4
搜索
虚拟化高级试题题库4
题目内容
(
单选题
)
50.Which of the listed requirements would be classified as a recoverability non-functional requirement?

A、  The platform must be integrated with existing change control policies.

B、  The platform must be able to support a maximum tolerable downtime (MTD) of 30 minutes.

C、  Maintenance windows must be scheduled to take place monthly during an established overnight period.

D、  The platform must be available 24 hours a day, 7 days a week with the exception of scheduled downtime.

答案:B

虚拟化高级试题题库4
1.An architect will be taking over control of a former Linux server fleet and repurposing the hardware into a new vSphere cluster. The current environment is already connected to the network but the hosts do not have any local disks. Since the fleet hardware is uniform, the architect can use a single ESXi image.

All hosts within the cluster have the same CPU and memory capacity.

Which ESXi deployment method should the architect use?

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-a880-c0f9-29e3bb5dbe00.html
点击查看题目
8.An architect is designing a new greenfield environment with 600 ESXi hosts in an automated fashion. The engineering department already has a PXE Boot server, TFTP server, and DHCP server set up with an NFS mount for their current Linux servers.
The architect must be able to demonstrate and meet a security requirement to have all infrastructure processes separated
Which recommendation should the architect make for the ESXi host deployment?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-c7c0-c0f9-29e3bb5dbe00.html
点击查看题目
32.A customer requests a review of its current vSphere platform design.
The following information is noted:
There are three different workload profiles for the virtual machines:
- Tier-1 virtual machines operate resource-intensive applications and require dedicated allocations for CPU and RAM.
- Tier-2 virtual machines operate internet-facing applications and require access to externally facing networks.
- Tier-3 virtual machines operate platform management tools such as vCenter Server and have different lifecycle management requirements.
Tier-1, Tier-2 and Tier-3 virtual machines are all hosted on a single large vSphere cluster.
The Chief Information Security Officer ( ) has raised concerns that hosting externally facing applications alongside management tools does not meet internal compliance standards.
The Operations team has raised concerns about Tier-1 virtual machines negatively impacting the performance of vCenter Server.
The Operations lead has stated that management changes have consistently been rejected by application teams.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-40d8-c0f9-29e3bb5dbe01.html
点击查看题目
15.An architect is designing storage for a new vSphere environment to meet the following requirements:
-Asynchronous replication is required between two sites.
-The impact on the storage layer should not impact the performance of the compute layer.
-Each application tier will require different replication attributes.
-Virtual machine live migration across compute and storage must be supported
-Virtual machine aware back up will be leveraged
-Operational management overhead should be minimized
-Operational automation should be supported
-Which storage design recommendations would meet the requirements?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-eae8-c0f9-29e3bb5dbe00.html
点击查看题目
63.The Chief Information Security Officer ( ) for an organization is concerned about the security posture of the operating system images that are used for the provisioning of their Software-as-a-Service ( ) applications. The organization is in a growth period. The organization is opening a new data center to launch its next phase of new SaaS-based solutions.
The DevOps team currently creates encrypted virtual machine ( ) templates that are used for various operating systems and adds these to the vSphere inventory. The DevOps team already uses a published content library and has been granted a role with the ability to add and delete library items.
The following requirements have been noted:
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-c990-c0f9-29e3bb5dbe00.html
点击查看题目
38.Refer to the exhibit.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-5c30-c0f9-29e3bb5dbe00.html
点击查看题目
17.As part of a new hybrid cloud initiative for a large financial company, the customer technical team is presenting an overview of the current state of the infrastructure and their vision for a new solution.
The project team captures notes during the presentation and adds them to the discovery documentation.
Which of the listed statements is a design constraint?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-fa88-c0f9-29e3bb5dbe00.html
点击查看题目
53.An architect is preparing a design for a customer. Based on requirements, the architect recommends an HCI-based infrastructure with all-flash architecture. During the assessment, it is confirmed that the network throughput generated by virtual machines does not exceed 150 Mb/s.
What is the minimum number and type of network adapters in each server that the architect can recommend to ensure requirements are met and there is no single point of failure?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-96c8-c0f9-29e3bb5dbe00.html
点击查看题目
24.branch sites connected to a single VMware vCenter Server within the primary data center. To allow for the use of existing automation scripts, there is a requirement to replicate the names of the virtual distributed port groups across all sites. The procurement team purchases licensing and there is no further budget allocated
Which design decision should the architect make to meet this requirement?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-19c8-c0f9-29e3bb5dbe00.html
点击查看题目
10.An architect is finalizing the design for a new vSphere platform based on the following information:
-All Windows virtual machines will be hosted on a dedicated cluster for licensing purposes.
-All Linux virtual machines will be hosted on a dedicated cluster for licensing purposes.
-All management virtual machines will be hosted on a dedicated cluster.
-A total of ten physical sites will be used to host virtual machines.
-In the event of one physical datacenter becoming unavailable, the manageability of the virtual infrastructure in the remaining data centers should not be impacted
-Access to configure the management virtual machines via vCenter Server must be controlled through the management Active Directory domain.
-Access to configure the Windows and Linux virtual machines must be controlled through the resource Active Directory domain.
-The management and resource Active Directory domains are part of separate Active Directory forests and do not have any trusts between them.
-The design will use Active Directory with Integrated Windows Authentication.
-How should the architect document the vCenter Server configuration for this design?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-cf90-c0f9-29e3bb5dbe00.html
点击查看题目
首页
>
IT互联网
>
虚拟化高级试题题库4
题目内容
(
单选题
)
手机预览
虚拟化高级试题题库4

50.Which of the listed requirements would be classified as a recoverability non-functional requirement?

A、  The platform must be integrated with existing change control policies.

B、  The platform must be able to support a maximum tolerable downtime (MTD) of 30 minutes.

C、  Maintenance windows must be scheduled to take place monthly during an established overnight period.

D、  The platform must be available 24 hours a day, 7 days a week with the exception of scheduled downtime.

答案:B

分享
虚拟化高级试题题库4
相关题目
1.An architect will be taking over control of a former Linux server fleet and repurposing the hardware into a new vSphere cluster. The current environment is already connected to the network but the hosts do not have any local disks. Since the fleet hardware is uniform, the architect can use a single ESXi image.

All hosts within the cluster have the same CPU and memory capacity.

Which ESXi deployment method should the architect use?

A.   Stateless cached vSphere Auto Deploy

B.   Stateless vSphere Auto Deploy

C.   Manual install of each ESXi host with an image from USB

D.   Stateful vSphere Auto Deploy

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-a880-c0f9-29e3bb5dbe00.html
点击查看答案
8.An architect is designing a new greenfield environment with 600 ESXi hosts in an automated fashion. The engineering department already has a PXE Boot server, TFTP server, and DHCP server set up with an NFS mount for their current Linux servers.
The architect must be able to demonstrate and meet a security requirement to have all infrastructure processes separated
Which recommendation should the architect make for the ESXi host deployment?

A.   Request an isolated network segment to use and dedicate it to Auto Deploy functions

B.   Ask the business to expand the engineering environment to service the virtual environment as well

C.   Request a common shared network with flexible security measures to accommodate different auto deployment options

D.   Deploy each ESXi host individually and document it to satisfy security requirements

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-c7c0-c0f9-29e3bb5dbe00.html
点击查看答案
32.A customer requests a review of its current vSphere platform design.
The following information is noted:
There are three different workload profiles for the virtual machines:
- Tier-1 virtual machines operate resource-intensive applications and require dedicated allocations for CPU and RAM.
- Tier-2 virtual machines operate internet-facing applications and require access to externally facing networks.
- Tier-3 virtual machines operate platform management tools such as vCenter Server and have different lifecycle management requirements.
Tier-1, Tier-2 and Tier-3 virtual machines are all hosted on a single large vSphere cluster.
The Chief Information Security Officer ( ) has raised concerns that hosting externally facing applications alongside management tools does not meet internal compliance standards.
The Operations team has raised concerns about Tier-1 virtual machines negatively impacting the performance of vCenter Server.
The Operations lead has stated that management changes have consistently been rejected by application teams.

A.   Separate Tier-1, Tier-2 and Tier-3 virtual machines using dedicated distributed virtual switches (DVS)

B.   Separate Tier-2 virtual machines onto a dedicated cluster

C.   Separate Tier-1, Tier-2 and Tier-3 virtual machines onto dedicated clusters

D.   Separate Tier-1, Tier-2 and Tier-3 virtual machines using resource pools and shares

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-40d8-c0f9-29e3bb5dbe01.html
点击查看答案
15.An architect is designing storage for a new vSphere environment to meet the following requirements:
-Asynchronous replication is required between two sites.
-The impact on the storage layer should not impact the performance of the compute layer.
-Each application tier will require different replication attributes.
-Virtual machine live migration across compute and storage must be supported
-Virtual machine aware back up will be leveraged
-Operational management overhead should be minimized
-Operational automation should be supported
-Which storage design recommendations would meet the requirements?

A.   Two new Fibre Channel storage arrays will be deployed, one at either site.Each application tier will be initially provisioned a new LUN.Data replication will be offloaded to the new arrays.

B.   Two new vSphere clusters enabled with vSAN will be deployed, one at either site.vSAN will be used to provide policy-based management for each application tier.vSphere Replication will be used to replicate the virtual machine data in an asynchronous configuration.

C.   Two new ISCSI storage arrays will be deployed, one at either site.Each application tier will be initially provisioned a new LUN.Data replication will be offloaded to the new arrays.

D.   Two new storage arrays will be deployed, one at either site. vSphere Volumes (vVOLs) will be used to provide policy-based management for each application tier.Data replication will be offloaded to the new arrays.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-eae8-c0f9-29e3bb5dbe00.html
点击查看答案
63.The Chief Information Security Officer ( ) for an organization is concerned about the security posture of the operating system images that are used for the provisioning of their Software-as-a-Service ( ) applications. The organization is in a growth period. The organization is opening a new data center to launch its next phase of new SaaS-based solutions.
The DevOps team currently creates encrypted virtual machine ( ) templates that are used for various operating systems and adds these to the vSphere inventory. The DevOps team already uses a published content library and has been granted a role with the ability to add and delete library items.
The following requirements have been noted:

A.   Clone virtual machines as VM templates to the published content library

B.   Create a subscribed library from the published library and synchronize Open Virtualization Format (OVF) templates on-demand

C.   Create a subscription and publish VM templates to a subscribed content library

D.   Create a subscribed library from the published library and synchronize Open Virtualization Format (OVF) templates automatically

E.   Clone virtual machines as Open Virtualization Format (OVF)templates to the published content library

F.   Update the role for the DevOps team with new privileges

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-c990-c0f9-29e3bb5dbe00.html
点击查看答案
38.Refer to the exhibit.

A.   Enable vSphere HA and add a VM Override with VM Restart Priority set to Disabled

B.   Enable Fault Tolerance

C.   Achieve application availability with snapshots

D.   Enable vSphere HA and add a VM Override with VM Restart Priority set to Lowest

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-5c30-c0f9-29e3bb5dbe00.html
点击查看答案
17.As part of a new hybrid cloud initiative for a large financial company, the customer technical team is presenting an overview of the current state of the infrastructure and their vision for a new solution.
The project team captures notes during the presentation and adds them to the discovery documentation.
Which of the listed statements is a design constraint?

A.   The applications are created in-house with in-guest recovery protection

B.   The maximum tolerable data loss is 10 minutes

C.   The two data center locations have a network latency of 8 ms round-trip time (RTT)

D.   The existing storage is out of maintenance

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-fa88-c0f9-29e3bb5dbe00.html
点击查看答案
53.An architect is preparing a design for a customer. Based on requirements, the architect recommends an HCI-based infrastructure with all-flash architecture. During the assessment, it is confirmed that the network throughput generated by virtual machines does not exceed 150 Mb/s.
What is the minimum number and type of network adapters in each server that the architect can recommend to ensure requirements are met and there is no single point of failure?

A.   Two 1 GbE network adapters per server

B.   Four 1 GbE network adapters per server

C.   Four 10 GbE network adapters per server

D.   Two 10 GbE network adapters per server

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-96c8-c0f9-29e3bb5dbe00.html
点击查看答案
24.branch sites connected to a single VMware vCenter Server within the primary data center. To allow for the use of existing automation scripts, there is a requirement to replicate the names of the virtual distributed port groups across all sites. The procurement team purchases licensing and there is no further budget allocated
Which design decision should the architect make to meet this requirement?

A.   A new vCenter Server will be deployed for each branch site

B.   A new host and cluster folder will be created for each branch site

C.   The automation script will be updated to reflect unique naming for each site

D.   A new virtual data center will be created for each branch site

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-19c8-c0f9-29e3bb5dbe00.html
点击查看答案
10.An architect is finalizing the design for a new vSphere platform based on the following information:
-All Windows virtual machines will be hosted on a dedicated cluster for licensing purposes.
-All Linux virtual machines will be hosted on a dedicated cluster for licensing purposes.
-All management virtual machines will be hosted on a dedicated cluster.
-A total of ten physical sites will be used to host virtual machines.
-In the event of one physical datacenter becoming unavailable, the manageability of the virtual infrastructure in the remaining data centers should not be impacted
-Access to configure the management virtual machines via vCenter Server must be controlled through the management Active Directory domain.
-Access to configure the Windows and Linux virtual machines must be controlled through the resource Active Directory domain.
-The management and resource Active Directory domains are part of separate Active Directory forests and do not have any trusts between them.
-The design will use Active Directory with Integrated Windows Authentication.
-How should the architect document the vCenter Server configuration for this design?

A.   Deploy a vCenter server for the management cluster. Deploy a vCenter Server for all remaining clusters. Create a shared SSO domain for each physical site

B.   Deploy a vCenter Server for the management cluster. Deploy a vCenter Server for all remaining clusters. Create a shared SSO domain across all physical sites.

C.   Deploy a vCenter Server for the management cluster with a dedicated SSO domain. Deploy a vCenter Server for all remaining clusters and use a dedicated SSO domain for each physical site

D.   Deploy a vCenter Server for the management cluster with a dedicated SSO domain. Deploy a vCenter Server for all remaining clusters and use a dedicated SSO domain into a single physical site

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-cf90-c0f9-29e3bb5dbe00.html
点击查看答案
试题通小程序
试题通app下载