Which three actions would satisfy these requirements?

A customer has requested a vSphere 6.5 deployment design that utilizes vCenter Server and the use of vMware-recommended best practices for securing vCenter Server. Which three actions would satisfy these requirements? (Choose three.)A . Utlizing vSphere CLI and vSphere SDK for Perl scripts.B . Restricting vCerter Server access to only...

July 31, 2019 No Comments READ MORE +

In the vCenter HA configuration below, drag the two correct components to the blank boxes in this diagram. The same component may be used more twice (Choose two

DRAG DROP In the vCenter HA configuration below, drag the two correct components to the blank boxes in this diagram. The same component may be used more twice (Choose two.)View AnswerAnswer: Platform services controller

July 30, 2019 No Comments READ MORE +

A company would like to utilize its current infrastructure but wants to adopt virtualization to consolidate its environment

DRAG DROP A company would like to utilize its current infrastructure but wants to adopt virtualization to consolidate its environment. Currently, the infrastructure contains: • server with 2 x 8 cores CPUs and 96G8 of memory • backup LAN with a single physical switch • production LAN • sufficient datastore...

July 29, 2019 No Comments READ MORE +

A company would like to utilize its current infrastructure but wants to adopt virtualization to consolidate its environment

DRAG DROP A company would like to utilize its current infrastructure but wants to adopt virtualization to consolidate its environment. Currently, the infrastructure contains: • server with 2 x 8 cores CPUs and 96G8 of memory • backup LAN with a single physical switch • production LAN • sufficient datastore...

July 28, 2019 No Comments READ MORE +

Which two actions would meet the design requirements?

A solution architect has finished conducting interviews and gathering requirements for a company, and has determined that the logical requirements are: • two data centers for high availability • synchronous replication to meet the zero minute RPO • separating management workloads from application workloads • dedicated 10Gb uplink for each...

July 27, 2019 No Comments READ MORE +

Which three vSphere features support fault tolerance?

A customer has requested a high availability option for its data center in the event of power failure and the loss of connectivity to a virtual machine. Which three vSphere features support fault tolerance? (Choose three.)A . HAB . Virtual volume datastoreC . vMotionD . Storage-based policy managementE . DRSF...

July 27, 2019 No Comments READ MORE +

How can this be done without consuming more VLANs?

A development team must provide layer 2 network isolation between virtual machines that are in the same VLAN. The solutions architect must provide additional security between the virtual machines on the same subnet. How can this be done without consuming more VLANs?A . Use Virtual Switch TaggingB . Use Private...

July 26, 2019 No Comments READ MORE +

A company has requested assistance with a new cross-site failover design between two sites which will support business-critical applications. Latency between the sites is less than 5ms round-trip

DRAG DROP A company has requested assistance with a new cross-site failover design between two sites which will support business-critical applications. Latency between the sites is less than 5ms round-trip. The company requires: • application must be restarted quickly in the event of a total site failure • allow for...

July 26, 2019 No Comments READ MORE +

What are its two key challenges?

A company provides critical financial and statistical data for several major banks. • The company ensures that the bank's customer data is secure and that analytics data is available when needed. • Customers rely on this data before making crucial business and financial decisions. • Just a few minutes of...

July 26, 2019 No Comments READ MORE +

Which two security configurations will help meet this requirement?

An organization's security policy requires a design where the ESXi hosts will be manageable only through vCenter Server. Which two security configurations will help meet this requirement? (Choose two)A . enable lockdown mode strictB . disable DCUI accessC . enable lockdown mode normalD . disable shell accessView AnswerAnswer: AD

July 25, 2019 No Comments READ MORE +