APP下载
首页
>
IT互联网
>
虚拟化高级试题题库4
搜索
虚拟化高级试题题库4
题目内容
(
多选题
)
80.Which two statements are true about gathering functional business and application requirements? Choose two.

A、  It focuses on functional requirements with C-level stakeholders

B、  It leverages a single set of questions for all stakeholders

C、  It might require multiple rounds of stakeholder interviews

D、  It builds stakeholder consensus

E、  It is a non-iterative process

答案:CD

虚拟化高级试题题库4
24.branch sites connected to a single VMware vCenter Server within the primary data center. To allow for the use of existing automation scripts, there is a requirement to replicate the names of the virtual distributed port groups across all sites. The procurement team purchases licensing and there is no further budget allocated
Which design decision should the architect make to meet this requirement?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-19c8-c0f9-29e3bb5dbe00.html
点击查看题目
85.An architect is considering placement of virtual machines within an existing VMware software-defined data center (SDDC ).

During the discovery phase, the following information is documented:

Cluster One.

Six ESXi hosts

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is enabled and set to automated.

Fully Automated vSphere DRS.

Transparent Page Sharing (TPS) is enabled.

Cluster Two.

Eight ESXi hosts.

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is disabled.

Partially Automated vSphere DRS.

Transparent Page Sharing (TPS) is disabled.

Cluster Three.

Three ESXi hosts.

vSphere HA with admission control is disabled.

Proactive HA is not supported.

Transparent Page Sharing (TPS) is disabled.

Virtual Machine Resource Profile 1.

Memory sharing techniques should not be used.

Virtual machines should be automatically restarted in the event of host failure if resources are available.

Automated initial virtual machine placement.

Virtual Machine Resource Profile 2.

Memory sharing techniques can be used.

Virtual machines should be protected from any host hardware failures.

Automated initial virtual machine placement.

Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? Choose two.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-36f0-c0f9-29e3bb5dbe01.html
点击查看题目
64.An architect is tasked with planning the design of a new vSphere environment. When commissioned, this environment will be used to migrate an existing set of virtual machines.


An inventory of the existing infrastructure, including configured vCPU, RAM and storage sizes has been provided.

In order for each virtual machine to be migrated, which two data sources with peak and average utilization data are required for sizing? Choose two.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-d160-c0f9-29e3bb5dbe00.html
点击查看题目
63.The Chief Information Security Officer ( ) for an organization is concerned about the security posture of the operating system images that are used for the provisioning of their Software-as-a-Service ( ) applications. The organization is in a growth period. The organization is opening a new data center to launch its next phase of new SaaS-based solutions.
The DevOps team currently creates encrypted virtual machine ( ) templates that are used for various operating systems and adds these to the vSphere inventory. The DevOps team already uses a published content library and has been granted a role with the ability to add and delete library items.
The following requirements have been noted:
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-c990-c0f9-29e3bb5dbe00.html
点击查看题目
65.Refer to the exhibit.During a requirements gathering workshop, the customer shares the following about their existing ESXi host virtual networking infrastructure:

The customer confirms that:
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-d548-c0f9-29e3bb5dbe00.html
点击查看题目
77. A customer provides the following list of requirements for their vSphere platform:
REQ01 The solution should utilize dual network connections to eliminate single points of failure.
REQ02 The solution should allow logs to be retained for a period of 30 days.
REQ03 All user access to the platform should be recorded for audit purposes.
REQ04 The solution should allow the management of multiple ESXi hosts.
REQ05 The solution should allow users to view the remote console of virtual machines.
Which two of the listed requirements would be classified as non-functional requirements? Choose two.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-13c8-c0f9-29e3bb5dbe01.html
点击查看题目
43.An architect is reviewing a physical storage design. The customer has specified that a new active-passive based storage array will be used to provide storage for the vSphere clusters.
Which configuration should for the architect recommended?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-6bd0-c0f9-29e3bb5dbe00.html
点击查看题目
16.An architect is designing a solution for an environment with two types of resource profiles that must be virtualizeD、 The first type consists of Tier 1 virtual machines that are disk I/O intensive, but do NOT require high CPU or memory. The second type consists of Tier 2 virtual machines that require a lower CPU and memory allocation and have minimal disk I/O.
Which design recommendation should the architect make for distributing the resource profiles?
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-f6a0-c0f9-29e3bb5dbe00.html
点击查看题目
27.The Chief Operating Officer ( ) at an organization raises concerns that their virtual infrastructure environment is vulnerable. Recently, a security-related issue with a virtual machine caused all management services to become unavailable. No budget is available in the short term for additional platform investment.
https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-2580-c0f9-29e3bb5dbe00.html
点击查看题目
19.During a requirements gathering workshop, the customer’s Chief Information Security Office ( CISO) provides the following requirements that are pertinent to the design of a new vSphere environment:All operating system critical patches must be installed within 24 hours of release;All virtual machine templates must be updated every three months in line with company policy.

Which requirement classification is being gathered for the design documentation?

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-fe70-c0f9-29e3bb5dbe00.html
点击查看题目
首页
>
IT互联网
>
虚拟化高级试题题库4
题目内容
(
多选题
)
手机预览
虚拟化高级试题题库4

80.Which two statements are true about gathering functional business and application requirements? Choose two.

A、  It focuses on functional requirements with C-level stakeholders

B、  It leverages a single set of questions for all stakeholders

C、  It might require multiple rounds of stakeholder interviews

D、  It builds stakeholder consensus

E、  It is a non-iterative process

答案:CD

分享
虚拟化高级试题题库4
相关题目
24.branch sites connected to a single VMware vCenter Server within the primary data center. To allow for the use of existing automation scripts, there is a requirement to replicate the names of the virtual distributed port groups across all sites. The procurement team purchases licensing and there is no further budget allocated
Which design decision should the architect make to meet this requirement?

A.   A new vCenter Server will be deployed for each branch site

B.   A new host and cluster folder will be created for each branch site

C.   The automation script will be updated to reflect unique naming for each site

D.   A new virtual data center will be created for each branch site

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-19c8-c0f9-29e3bb5dbe00.html
点击查看答案
85.An architect is considering placement of virtual machines within an existing VMware software-defined data center (SDDC ).

During the discovery phase, the following information is documented:

Cluster One.

Six ESXi hosts

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is enabled and set to automated.

Fully Automated vSphere DRS.

Transparent Page Sharing (TPS) is enabled.

Cluster Two.

Eight ESXi hosts.

vSphere HA with host failures cluster tolerates = 1.

Proactive HA is disabled.

Partially Automated vSphere DRS.

Transparent Page Sharing (TPS) is disabled.

Cluster Three.

Three ESXi hosts.

vSphere HA with admission control is disabled.

Proactive HA is not supported.

Transparent Page Sharing (TPS) is disabled.

Virtual Machine Resource Profile 1.

Memory sharing techniques should not be used.

Virtual machines should be automatically restarted in the event of host failure if resources are available.

Automated initial virtual machine placement.

Virtual Machine Resource Profile 2.

Memory sharing techniques can be used.

Virtual machines should be protected from any host hardware failures.

Automated initial virtual machine placement.

Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? Choose two.

A.   All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster One.

B.   All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster One.

C.   All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Two.

D.   All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster Two.

E.   All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Three

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-36f0-c0f9-29e3bb5dbe01.html
点击查看答案
64.An architect is tasked with planning the design of a new vSphere environment. When commissioned, this environment will be used to migrate an existing set of virtual machines.


An inventory of the existing infrastructure, including configured vCPU, RAM and storage sizes has been provided.

In order for each virtual machine to be migrated, which two data sources with peak and average utilization data are required for sizing? Choose two.

A.   %Ready

B.   Disk Write latency

C.   CPU

D.   Ballooned memory

E.   IOPS

I.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-d160-c0f9-29e3bb5dbe00.html
点击查看答案
63.The Chief Information Security Officer ( ) for an organization is concerned about the security posture of the operating system images that are used for the provisioning of their Software-as-a-Service ( ) applications. The organization is in a growth period. The organization is opening a new data center to launch its next phase of new SaaS-based solutions.
The DevOps team currently creates encrypted virtual machine ( ) templates that are used for various operating systems and adds these to the vSphere inventory. The DevOps team already uses a published content library and has been granted a role with the ability to add and delete library items.
The following requirements have been noted:

A.   Clone virtual machines as VM templates to the published content library

B.   Create a subscribed library from the published library and synchronize Open Virtualization Format (OVF) templates on-demand

C.   Create a subscription and publish VM templates to a subscribed content library

D.   Create a subscribed library from the published library and synchronize Open Virtualization Format (OVF) templates automatically

E.   Clone virtual machines as Open Virtualization Format (OVF)templates to the published content library

F.   Update the role for the DevOps team with new privileges

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-c990-c0f9-29e3bb5dbe00.html
点击查看答案
65.Refer to the exhibit.During a requirements gathering workshop, the customer shares the following about their existing ESXi host virtual networking infrastructure:

The customer confirms that:

A.   Configure the network to use MTU for the VMotion VMKernel to 1,600 bytes

B.   Configure the network to use MTU for the VMotion VMKernel to 9,000 bytes

C.   Create an additional standard switch with pNIC3 to use for vMotion

D.   Use the 3 pNICs and bundle them in a link aggregation group (LAG) configuration

E.   Use 10 GbE NICs instead of 1 GbE

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-d548-c0f9-29e3bb5dbe00.html
点击查看答案
77. A customer provides the following list of requirements for their vSphere platform:
REQ01 The solution should utilize dual network connections to eliminate single points of failure.
REQ02 The solution should allow logs to be retained for a period of 30 days.
REQ03 All user access to the platform should be recorded for audit purposes.
REQ04 The solution should allow the management of multiple ESXi hosts.
REQ05 The solution should allow users to view the remote console of virtual machines.
Which two of the listed requirements would be classified as non-functional requirements? Choose two.

A.   The solution should utilize dual network connections to eliminate single points of failure - NFR - Availability

B.   The solution should allow the management of multiple ESXi hosts - NFR - Manageability

C.   The solution should allow users to view the remote console of virtual machines - FR - Authentication

D.   All user access to the platform should be recorded for audit purposes - FR - Historical Data

E.   The solution should allow logs to be retained for a period of 30 days - FR - Reporting Requirements

https://www.shititong.cn/cha-kan/shiti/0005ee2e-7230-13c8-c0f9-29e3bb5dbe01.html
点击查看答案
43.An architect is reviewing a physical storage design. The customer has specified that a new active-passive based storage array will be used to provide storage for the vSphere clusters.
Which configuration should for the architect recommended?

A.   VMWSATPLOCAL local devices

B.   VMWPSPMRU active-passive storage devices

C.   VMWSATPDEFAULTAA Generic SATP for active-active arrays

D.   VMWPSPFIXED The default policy for active-active storage devices

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-6bd0-c0f9-29e3bb5dbe00.html
点击查看答案
16.An architect is designing a solution for an environment with two types of resource profiles that must be virtualizeD、 The first type consists of Tier 1 virtual machines that are disk I/O intensive, but do NOT require high CPU or memory. The second type consists of Tier 2 virtual machines that require a lower CPU and memory allocation and have minimal disk I/O.
Which design recommendation should the architect make for distributing the resource profiles?

A.   Separate the two resource profiles into two clusters. The Tier 1 cluster will have fast storage while the Tier 2 cluster will not.

B.   Run both resource profiles on the same cluster with the same host hardware platform.

C.   Separate the two resource profiles into two clusters. The Tier 2 cluster will have faster CPU and more memory while the Tier 1 cluster will have slower CPU and less memory but more disk space

D.   Run both resource profiles on the same cluster with host hardware that has fast CPU, large amounts of memory, and the fastest storage platform.

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-f6a0-c0f9-29e3bb5dbe00.html
点击查看答案
27.The Chief Operating Officer ( ) at an organization raises concerns that their virtual infrastructure environment is vulnerable. Recently, a security-related issue with a virtual machine caused all management services to become unavailable. No budget is available in the short term for additional platform investment.

A.   The virtual infrastructure environment must connect application virtual machines and management services to new physical network switches

B.   The virtual infrastructure environment must connect application virtual machines and management services to separate distributed virtual switches (DVS)

C.   The virtual infrastructure environment must connect application virtual machines and management services to separate VLANs

D.   The virtual infrastructure environment must connect management services to a vSphere standard switch (VSS)

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722f-2580-c0f9-29e3bb5dbe00.html
点击查看答案
19.During a requirements gathering workshop, the customer’s Chief Information Security Office ( CISO) provides the following requirements that are pertinent to the design of a new vSphere environment:All operating system critical patches must be installed within 24 hours of release;All virtual machine templates must be updated every three months in line with company policy.

Which requirement classification is being gathered for the design documentation?

A.   Security

B.   Manageability

C.   Recoverability

D.   Availability

https://www.shititong.cn/cha-kan/shiti/0005ee2e-722e-fe70-c0f9-29e3bb5dbe00.html
点击查看答案
试题通小程序
试题通app下载