An architect is preparing a design for a company planning digital transformation. During the requirements
gathering workshop, the following requirements (REQ) and constraints (CON) are identified:
REQ01 The platform must host different types of workloads including applications that must be compliant
with internal security standard.
REQ02 The infrastructure must initially run 100 virtual machines.
REQ03 Ten of the virtual machines must be compliant with internal security standard.
REQ04 The internal security standard specifies logical network separation for in-scope applications.
CON01 The customer has already purchased the licenses as part of another project.
CON02 The customer has five physical servers that must be reused.
Additionally, based on resource requirements, four physical servers will be enough to run all workloads.
Which recommendation should the architect make to meet requirements while minimizing project costs?
A. Use Network I/O Control to ensure the internal security zone has higher share value
B. Purchase additional servers and plan separate, isolated clusters for workloads that must be compliant with internal security
C. Use a single cluster and ensure that different security zones are separated at least with dedicated VLANs and firewall
D. Use a single cluster and configure DRS anti-affinity rules to ensure internal security compliant virtual machines cannot migrate between ESXi hosts.
An architect is reviewing a physical storage design. The customer has specified that storage DRS will be used for ease of operational management for capacity and performance.
Which recommendation should the architect include in the design?
A. Create smaller datastores to balance space with Storage DRS
B. Use a larger number of storage profiles (varied disk speeds and RAID levels) to improve performance
C. Create larger datastores to balance space with Storage DRS
D. Create more datastores within each Storage DRS cluster to balance space and performance
Refer to the exhibit.
During a requirements gathering workshop, the customer shares the following about their existing ESXi
host virtual networking infrastructure:
The customer confirms that:
Each ESXi host has approximately 200 virtual machines.
They want to maximize the number of concurrent virtual machine migrations.
When placing a host in maintenance mode, it takes a long time to evacuate the virtual machines.
Which two recommendations should the architect make in order to help the customer overcome their
challenge? (Choose two.)
A. Configure the network to use MTU for the VMotion VMKernel to 1,600 bytes
B. Configure the network to use MTU for the VMotion VMKernel to 9,000 bytes
C. Create an additional standard switch with pNIC3 to use for vMotion
D. Use the 3 pNICs and bundle them in a link aggregation group (LAG) configuration
E. Use 10 GbE NICs instead of 1 GbE
Following a company merger, there are two data centers running vSphere environments. Both data centers are leveraging separate Layer 3 vMotion networks.
Which requirement must be met in order to enable vMotion migration between these locations?
A. The vMotion service must be configured on the Management VMkernel adapter
B. A dedicated TCP/IP stack for vMotion with a dedicated gateway must be configured
C. A stretched vMotion network must be configured between data centers
D. Virtual machines must be powered off in order to migrate them between data centers
A customer requires the use of data encryption to ensure data is not accessible when a drive is removed from the primary storage platform. However, there is also a requirement to use deduplication and compression against all workloads in order to conserve space.
Which solution meets the customer requirements?
A. Data-in-transit encryption
B. OS-level encryption
C. Encrypted backups
D. Array-based encryption
An architect is tasked with designing a greenfield VMware software-defined data center (SDDC) solution
that will be used to deliver a private cloud service for a customer.
During the initial meeting with the service owner and business sponsor, the customer has provided the
following information to help inform the design:
The solution must initially support the concurrent running of 300 production and 600 development virtual
machines.
The production environment should be delivered across two geographically dispersed data centers.
The development environment must be vSphere-based but does not have to be deployed on-premises.
The two data centers are connected to each other through multiple diversely routed, high bandwidth and
low latency links.
The customer's server hardware standard document states that all virtual infrastructure hosts must be
based on blade architecture only.
The service owner has said that is important to ensure that neither the availability target of 99.5% nor the
resource capacity is affected when the operations team completes maintenance activities, such as the
monthly software patching and ad-hoc hardware break/fix.
All virtual machine backups must be completed using the existing backup service.
The recovery time objective (RTO) for the service is four hours.
The recovery point objective (RPO) of the service is 24 hours.
Given the information from the customer, which two would be classified as assumptions within the design? (Choose two.)
A. The backup service will store data in a secure facility
B. The backup service has sufficient capacity for the new requirements
C. The customer will update their hardware standard to support rack mount servers
D. All virtual machines will be deployed with the same resource profile for production and development
E. The clusters will have a minimum redundancy of N+1
During a requirements gathering workshop to design a physical to virtual migration, the customer provides
the following information:
There is no physical firewall in the data center with no anticipated plans for a future network refresh.
Leveraging the virtual infrastructure to mitigate the lack of network security must be addressed in the
design.
All physical servers to be migrated exist on the same VLAN.
Which recommendation should the architect make to address the customer requirement with regard to
virtual networking?
A. Split the virtual machines into several VLANs Use tag actions
B. Create port groups with different names and same VLAN IDs Enable traffic shaping for ingress and egress traffic
C. Enable traffic filtering and marking Use allow or drop actions
D. Disable traffic filtering and marking Use tag actions
During a requirements gathering workshop, the customer provides the following requirement that is
pertinent to the design of a new vSphere environment:
The Maximum Tolerable Downtime (MTD) for all Tier 1 applications is one hour.
Which requirement classification is being gathered for the design documentation?
A. Manageability
B. Performance
C. Availability
D. Recoverability
An architect is planning the physical server configuration for a vSAN-based infrastructure.
Which operations mode should a RAID controller support to minimize potential server downtime during physical disk failures?
A. RAID controller with Passthru mode
B. RAID controller with RAID 5 mode
C. RAID controller with RAID 10 mode
D. RAID controller with RAID 6 mode
An architect is considering placement of virtual machines within an existing VMware software-defined data center (SDDC).
During the discovery phase, the following information is documented:
Cluster One Six ESXi hosts vSphere HA with host failures cluster tolerates = 1 Proactive HA is enabled and set to automated Fully Automated vSphere DRS Transparent Page Sharing (TPS) is enabled
Cluster Two Eight ESXi hosts vSphere HA with host failures cluster tolerates = 1 Proactive HA is disabled Partially Automated vSphere DRS Transparent Page Sharing (TPS) is disabled
Cluster Three Three ESXi hosts vSphere HA with admission control is disabled Proactive HA is not supported Transparent Page Sharing (TPS) is disabled
Virtual Machine Resource Profile 1 Memory sharing techniques should not be used Virtual machines should be automatically restarted in the event of host failure if resources are available Automated initial virtual machine placement
Virtual Machine Resource Profile 2 Memory sharing techniques can be used Virtual machines should be protected from any host hardware failures Automated initial virtual machine placement Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? (Choose two.)
A. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster One.
B. All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster One.
C. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Two.
D. All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster Two.
E. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Three.