You have been tasked with creating a vSphere 6.5 design for an organization. The organization is looking to implement a Virtual SAN into their environment. You have been tasked with determining whether a given Virtual SAN logical design
decision meets the technical requirements of their infrastructure.
For each Design Decision on the left drag the red Decision buttons (D1-D8) on the right and place it on the proper Technical Requirement.
NOTE: Not all Design Decisions will be used.
Select and Place:
You have been provided with a list of requirements for a vSphere Design. For each requirement, categorize the requirement as a component of the WRT, RTO, RPO, MTD, and Recoverbility. Drag a requirement button (R1-R8) over to the green space provided beside the corrisponding Design Phase.
Select and Place:
According to VMware-recommended best practices, on which cluster should each of the services be placed?
Select and Place:
An organization's security policy requires a design where the ESXi hosts will be manageable only through vCenter Server.
Which two security configurations will help meet this requirement? (Choose two)
A. enable lockdown mode strict
B. disable DCUI access
C. enable lockdown mode normal
D. disable shell access
A solution architect has been tasked with designing a new environment that meets the needs of a growing company, and has obtained this information:
1.
The current capacity will be exhausted in 180 days, and the new infrastructure must be deployed and in production prior to that.
2.
The new servers have a 90-day delivery time.
3.
A data center for disaster recovery has been selected, and it is 20 miles away and connected by MPLS.
4.
The security team will continue to utilize its current investments and VM Encryption for the new environment.
5.
The backup team currently uses Data Domain, and reports show an 8:1 compression and deduplication ratio for backups.
Based on the information obtained, which two statements are risks for the new design? (Choose two.)
A. MPLS will be used to connect the two data centers.
B. The Change Advisory Board will approve all changes.
C. Current back up space will not be sufficient if using VM Encryption.
D. The current firewalls will support the additional workloads.
A customer is deploying a mission-critical Oracle database with high SLA requirements, including high performance and high availability. The customer has chosen to purchase an All-Flash vSAN solution.
Which three storage policies should be used? (Choose three.)
A. RAID5/6 for data disk and RAID1 for OS disk with FTT=2
B. IOPS limit and checksum should be enabled.
C. RAID5/6 for OS disk and RAID1 for data disk with FTT=2
D. Configure multiple disk stripes.
E. Deduplication and Compression should be disabled.
A customer wants to use the Microsoft NU3 clustering feature in Unicast mode in its newly-designed environment. To meet that requirement, what security policies must be configured on the network port group?
A. Promiscuous mode Reject MAC address changes Reject Forged transmits Reject Notify switches Yes
B. Promiscuous mode Reject MAC address changes Accept Forged transmits Accept Notify switches No
C. Promiscuous mode Accept MAC address changes Reject Forged transmits Accept Notify switches No
D. Promiscuous mode Reject MAC address changes Reject Forged transmits Accept Notify switches Yes
A company would like to leverage snapshot technology on vSphere 6.5. Which configuration supports taking snapshots?
A. Windows Failover Cluster VM with RDM in virtual mode
B. vSphere Fault Tolerance VM
C. Windows Failover Cluster VM with RDM in physical mode
D. SQL Always On Availability Group
The customer has two sites that must operate independently of each other in the event of a WAN failure. During normal operations, administrators from each site must be able to manage the other site through the vSphere Web Client.
Which vCenter Server Appliance (VCSA) and Platform Services Controller (PSC) diagram shows the VMware-recommended design that satisfies these requirements?
A. Exhibit A
B. Exhibit B
C. Exhibit C
D. Exhibit D
A company has asked a systems architect to ensure that a backup solution leverages VMware vSphere Storage APIs - Data Protections (VCAP). Which logical design concept applies to the situation?
A. Requirement
B. Assumption
C. Constraint
D. Risk