APP下载
首页
>
IT互联网
>
虚拟化高级试题题库4
搜索
虚拟化高级试题题库4
题目内容
(
多选题
)
65.Refer to the exhibit.During a requirements gathering workshop, the customer shares the following about their existing ESXi host virtual networking infrastructure:

The customer confirms that:

A、  Configure the network to use MTU for the VMotion VMKernel to 1,600 bytes

B、  Configure the network to use MTU for the VMotion VMKernel to 9,000 bytes

C、  Create an additional standard switch with pNIC3 to use for vMotion

D、  Use the 3 pNICs and bundle them in a link aggregation group (LAG) configuration

E、  Use 10 GbE NICs instead of 1 GbE

答案:BC

虚拟化高级试题题库4
47.During a requirements gathering workshop, the customer provides the following requirement:A new vSphere platform must be designed securely and all interfaces must be protected against potential snooping.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-7f58-c0f9-29e3bb5dbe00.html
点击查看题目
85.An architect is considering placement of virtual machines within an existing VMware software-defined data center (SDDC ).

During the discovery phase, the following information is documented:

Cluster One.

Six ESXi hosts

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is enabled and set to automated.

Fully Automated vSphere DRS.

Transparent Page Sharing (TPS) is enabled.

Cluster Two.

Eight ESXi hosts.

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is disabled.

Partially Automated vSphere DRS.

Transparent Page Sharing (TPS) is disabled.

Cluster Three.

Three ESXi hosts.

vSphere HA with admission control is disabled.

Proactive HA is not supported.

Transparent Page Sharing (TPS) is disabled.

Virtual Machine Resource Profile 1.

Memory sharing techniques should not be used.

Virtual machines should be automatically restarted in the event of host failure if resources are available.

Automated initial virtual machine placement.

Virtual Machine Resource Profile 2.

Memory sharing techniques can be used.

Virtual machines should be protected from any host hardware failures.

Automated initial virtual machine placement.

Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? Choose two.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-36f0-c0f9-29e3bb5dbe01.html
点击查看题目
55.Which requirement would be classified as a functional requirement within the application design documentation?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-9e98-c0f9-29e3bb5dbe00.html
点击查看题目
58.Which requirement would be classified as a functional requirement within the design documentation?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-ae38-c0f9-29e3bb5dbe00.html
点击查看题目
8.An architect is designing a new greenfield environment with 600 ESXi hosts in an automated fashion. The engineering department already has a PXE Boot server, TFTP server, and DHCP server set up with an NFS mount for their current Linux servers.
The architect must be able to demonstrate and meet a security requirement to have all infrastructure processes separated
Which recommendation should the architect make for the ESXi host deployment?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-c7c0-c0f9-29e3bb5dbe00.html
点击查看题目
25.An architect is designing a new greenfield environment that will install ESXi on local disks. There is a requirement to streamline initial and future installations of ESXi hosts.
Which configuration option should the architect recommend for installing ESXi hosts to meet these requirements?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-1db0-c0f9-29e3bb5dbe00.html
点击查看题目
52.A customer defines a requirement to minimize the vMotion migration time during a maintenance perioD、
The servers being used are equipped with eight 1 GbE network adapters.
Per the defined logical network configuration, there are two network adapters each used for:
Management traffic
vMotion traffic
iSCSI traffic
Virtual machine traffic
Which design decision should the architect make to meet the customer requirement?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-8ef8-c0f9-29e3bb5dbe00.html
点击查看题目
35.A customer is deploying a new cluster and wants to be able to patch and update two hosts in parallel. The cluster must be able to maintain N+1 resiliency across the remaining hosts while patching activities are performed. The current expected utilization of the platform requires a minimum of two hosts to support all of the virtual machines.
What is the minimum number of hosts the customer will require in the cluster in order to meet the required resiliency level?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-5460-c0f9-29e3bb5dbe00.html
点击查看题目
19.During a requirements gathering workshop, the customer’s Chief Information Security Office ( CISO) provides the following requirements that are pertinent to the design of a new vSphere environment:All operating system critical patches must be installed within 24 hours of release;All virtual machine templates must be updated every three months in line with company policy.

Which requirement classification is being gathered for the design documentation?

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-fe70-c0f9-29e3bb5dbe00.html
点击查看题目
7.An architect is designing the expansion of an existing vSphere 7 environment. The customer is requesting a design for a new cluster to support the anticipated future business growth. The requirements specified for the existing environment design must be considered when designing the new cluster.
The existing design has the following requirements:
REQ01 The environment has an availability target of 99.5% for all infrastructure.
REQ02 The recovery time objective ( ) for Tier 1 virtual machines is one hour.
REQ03 Windows and Linux virtual machines must reside on separate clusters.
REQ04 Access to the management cluster within the environment must be controlled.
Which of the listed requirements would be classified as a functional requirement?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-bff0-c0f9-29e3bb5dbe01.html
点击查看题目
首页
>
IT互联网
>
虚拟化高级试题题库4
题目内容
(
多选题
)
手机预览
虚拟化高级试题题库4

65.Refer to the exhibit.During a requirements gathering workshop, the customer shares the following about their existing ESXi host virtual networking infrastructure:

The customer confirms that:

A、  Configure the network to use MTU for the VMotion VMKernel to 1,600 bytes

B、  Configure the network to use MTU for the VMotion VMKernel to 9,000 bytes

C、  Create an additional standard switch with pNIC3 to use for vMotion

D、  Use the 3 pNICs and bundle them in a link aggregation group (LAG) configuration

E、  Use 10 GbE NICs instead of 1 GbE

答案:BC

分享
虚拟化高级试题题库4
相关题目
47.During a requirements gathering workshop, the customer provides the following requirement:A new vSphere platform must be designed securely and all interfaces must be protected against potential snooping.

A.   Interfaces must be audited

B.   Encrypted channels must be used for all communications.

C.   Unauthorized access to interfaces must be reported within 15 minutes.

D.   Communications must be through Private VLANs (PVLAN).

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-7f58-c0f9-29e3bb5dbe00.html
点击查看答案
85.An architect is considering placement of virtual machines within an existing VMware software-defined data center (SDDC ).

During the discovery phase, the following information is documented:

Cluster One.

Six ESXi hosts

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is enabled and set to automated.

Fully Automated vSphere DRS.

Transparent Page Sharing (TPS) is enabled.

Cluster Two.

Eight ESXi hosts.

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is disabled.

Partially Automated vSphere DRS.

Transparent Page Sharing (TPS) is disabled.

Cluster Three.

Three ESXi hosts.

vSphere HA with admission control is disabled.

Proactive HA is not supported.

Transparent Page Sharing (TPS) is disabled.

Virtual Machine Resource Profile 1.

Memory sharing techniques should not be used.

Virtual machines should be automatically restarted in the event of host failure if resources are available.

Automated initial virtual machine placement.

Virtual Machine Resource Profile 2.

Memory sharing techniques can be used.

Virtual machines should be protected from any host hardware failures.

Automated initial virtual machine placement.

Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? Choose two.

A.   All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster One.

B.   All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster One.

C.   All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Two.

D.   All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster Two.

E.   All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Three

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-36f0-c0f9-29e3bb5dbe01.html
点击查看答案
55.Which requirement would be classified as a functional requirement within the application design documentation?

A.   The application must be hosted with redundancy levels of N+1 or better.

B.   Penetration testing must be executed quarterly with a pass rate of 80% or higher.

C.   The application must be capable of handling 200 transactions per second.

D.   Administrators must monitor the network traffic of the desired systems.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-9e98-c0f9-29e3bb5dbe00.html
点击查看答案
58.Which requirement would be classified as a functional requirement within the design documentation?

A.   The system must perform virtual machine backups through an API.

B.   Virtual machines must be patched within one month of the patch release date.

C.   Virtual machines must be restarted within 30 minutes of a host failure.

D.   The system must be able to scale to support 500 concurrent virtual machines.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-ae38-c0f9-29e3bb5dbe00.html
点击查看答案
8.An architect is designing a new greenfield environment with 600 ESXi hosts in an automated fashion. The engineering department already has a PXE Boot server, TFTP server, and DHCP server set up with an NFS mount for their current Linux servers.
The architect must be able to demonstrate and meet a security requirement to have all infrastructure processes separated
Which recommendation should the architect make for the ESXi host deployment?

A.   Request an isolated network segment to use and dedicate it to Auto Deploy functions

B.   Ask the business to expand the engineering environment to service the virtual environment as well

C.   Request a common shared network with flexible security measures to accommodate different auto deployment options

D.   Deploy each ESXi host individually and document it to satisfy security requirements

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-c7c0-c0f9-29e3bb5dbe00.html
点击查看答案
25.An architect is designing a new greenfield environment that will install ESXi on local disks. There is a requirement to streamline initial and future installations of ESXi hosts.
Which configuration option should the architect recommend for installing ESXi hosts to meet these requirements?

A.   Installation with kick start script

B.   Auto Deploy with stateless caching mode

C.   Manual installation using boot from SAN

D.   Auto Deploy with stateful install mode

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-1db0-c0f9-29e3bb5dbe00.html
点击查看答案
52.A customer defines a requirement to minimize the vMotion migration time during a maintenance perioD、
The servers being used are equipped with eight 1 GbE network adapters.
Per the defined logical network configuration, there are two network adapters each used for:
Management traffic
vMotion traffic
iSCSI traffic
Virtual machine traffic
Which design decision should the architect make to meet the customer requirement?

A.   Use Network I/O Control to define a reservation for vMotion traffic.

B.   Implement Multi-NIC vMotion by adding additional vMotion VMkernels.

C.   Configure a dedicated TCP/IP stack for vMotion traffic.

D.   Combine vMotion and Management traffic to make use of four adapters.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-8ef8-c0f9-29e3bb5dbe00.html
点击查看答案
35.A customer is deploying a new cluster and wants to be able to patch and update two hosts in parallel. The cluster must be able to maintain N+1 resiliency across the remaining hosts while patching activities are performed. The current expected utilization of the platform requires a minimum of two hosts to support all of the virtual machines.
What is the minimum number of hosts the customer will require in the cluster in order to meet the required resiliency level?

A.   Five

B.   Six

C.   Four

D.   Seven

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-5460-c0f9-29e3bb5dbe00.html
点击查看答案
19.During a requirements gathering workshop, the customer’s Chief Information Security Office ( CISO) provides the following requirements that are pertinent to the design of a new vSphere environment:All operating system critical patches must be installed within 24 hours of release;All virtual machine templates must be updated every three months in line with company policy.

Which requirement classification is being gathered for the design documentation?

A.   Security

B.   Manageability

C.   Recoverability

D.   Availability

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-fe70-c0f9-29e3bb5dbe00.html
点击查看答案
7.An architect is designing the expansion of an existing vSphere 7 environment. The customer is requesting a design for a new cluster to support the anticipated future business growth. The requirements specified for the existing environment design must be considered when designing the new cluster.
The existing design has the following requirements:
REQ01 The environment has an availability target of 99.5% for all infrastructure.
REQ02 The recovery time objective ( ) for Tier 1 virtual machines is one hour.
REQ03 Windows and Linux virtual machines must reside on separate clusters.
REQ04 Access to the management cluster within the environment must be controlled.
Which of the listed requirements would be classified as a functional requirement?

A.   The environment has an availability target of 99.5% for all infrastructure

B.   The recovery time objective (RTO) for Tier 1 virtual machines is one hour

C.   Access to the management cluster within the environment must be controlled

D.   Windows and Linux virtual machines must reside on separate clusters

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-bff0-c0f9-29e3bb5dbe01.html
点击查看答案
试题通小程序
试题通app下载