A company has requested that a new vSphere 6.5 design be created.The existing environment consists of 32 vSphere 6.0 hosts attached to an iSCSI storage array.The storage arrays contain external customer financial and medical records used by company´s investment and medical services division.The design must:Protect the company´s existing data center investmentExpand to a second data center siteIntroduce process automationExpand to and fail over to public cloudWhich two non-functional requirements are applicable for this design? A: The automation solution must be compatible with the existing equipment. B: The product of the design must account for regulatory compliance. C: At least two 10Gbps interfaces must be dedicated to storage on each host. D: Every host in the design must have Lockdown Mode enabled for security.
A developer is tasked with building an application to process shipping requests. The developer is determining failover options and performance best practices.Three ESXi hosts with 8 CPU cores and 256GB RAM per host.The developer does NOT know how many VMs they will require.Which sizing strategy will provide the highest level of uptime, individual VM performance, and failover capacity? A: A few large 8 vCPU VMs per host protected by vSphere Fault Tolerance. B: A few large 8 vCPU VMs per host protected by vSphere HA. C: Many small 1 vCPU VMs participating in an OS level clustered application protected by vSphere Fault Tolerance. D: Many small 1 vCPU VMs participating in an OS level clustered application protected by vSphere HA.
A solution architect has determined that the logical requirements are:* Two data centers for high availability* Synchronous replication to meet the zero-minute PRO* Separating management workloads from application workloads* Dedicated 10Gb uplink for each low latency server* Single management point for the entire environmentWhich two actions would meet the design requirements? A: Configure SR-IOV for low latency servers B: Create one folder for Management workloads and one folder for application workloads C: Configure vSAN Stretched Clustering D: Create two data center objects in vCenter Server.
Which two types of workloads are efficiently consolidated when virtualized? (Choose two.) A: Workloads that do NOT require user input and are constantly processing large amounts of batched data. B: Workloads that will consume all available assigned resources. C: Workloads that are NOT CPU bound; most of their time is spent waiting for external events such as user interaction. D: Workloads that do NOT require access to specific physical resources such as a hardware dongle or graphics card
A company is designing a new vSphere cluster to support a mission-critical application.- The application requires 100% availability and cannot be restarted to recover from an ESXi host failure.- The application consists of a group of 16 virtual machines, each with 8 vCPU configured.Which solution satisfies the availability requirements? A: Guest OS - based software clustering B: vSphere High Availability C: vSphere High Availability Application Monitoring D: vSphere Fault Tolerance
A virtualization administrator has been tasked with migrating several business applications from physical to virtual. The administrator must also migrate the virtual machines from VMware Workstation to vSphere 6.5, using vCenter Converter Standalone 6.1.In this scenario, which two source types are supported? (Choose two.) A: powered-off Windows Server 2008 physical machine B: powered-on Windows Server 2000 Workstation virtual machine C: powered-off Windows Server 2008 Workstation virtual machine D: powered-on Windows Server 2008 physical machine
A customer is currently running a vCenter Server 5.5 environment with 48 identically- configured ESXi hosts.* These ESXi hosts are divided into six 8-host HA/DRS clusters.* The customer wants to upgrade to vSphete 6.5 and combine all of its ESXi hosts into a single 48- host HA/DRS cluster.Place these actions in the correct order to accomplish this. A: 4 - 1 - 2 - 3 - 5 B: 4 - 2 - 1 - 5 - 3 C: 4 - 2 - 3 - 1 - 5 D: 4 - 1 - 2 - 3 - 5
A customer has these requirements for storage: * Protocol used must have a file based access.* Protocol used must have built in native multipathing. * protocol used must support authentication.To meet these requirements, which protocol should be used for storage? A: iSCSI B: NFS v3 C: FCoE D: NFS v4.1