The Chief Operating Officer (COO) at an organization raises concerns that their virtual infrastructure environment is vulnerable. Recently, a security-related issue with a virtual machine caused all management services to become unavailable. No budget is available in the short term for additional platform investment. An architect is asked to review the current environment and make recommendations to mitigate concerns.A virtualization administrator has provided the following details:✑ There is a single four node cluster of ESXi servers✑ There are two, Layer 2, physical network switches connecting resources✑ The data center network is presented as a single /16 subnetGiven the information provided, which functional requirement should the architect include in the design to mitigate the COOs concerns?
An architect is tasked with designing a greenfield VMware software-defined data center (SDDC) solution that will be used to deliver a private cloud service for a customer.During the initial meeting with the service owner and business sponsor, the customer has provided the following information to help inform the design:✑ The solution must initially support the concurrent running of 300 production and 600 development virtual machines.✑ The production environment should be delivered across two geographically dispersed data centers.✑ The development environment must be vSphere-based but does not have to be deployed on-premises.✑ The two data centers are connected to each other through multiple diversely routed, high bandwidth and low latency links.✑ The customer's server hardware standard document states that all virtual infrastructure hosts must be based on blade architecture only.✑ The service owner has said that is important to ensure that neither the availability target of 99.5% nor the resource capacity is affected when the operations team completes maintenance activities, such as the monthly software patching and ad-hoc hardware break/fix.✑ All virtual machine backups must be completed using the existing backup service.✑ The recovery time objective (RTO) for the service is four hours.✑ The recovery point objective (RPO) of the service is 24 hours.Given the information from the customer, which two would be classified as assumptions within the design? (Choose two.)
In a meeting to discuss the minimum viable product (MVP) deployment of a new customer-facing application, the key stakeholder shares details of the application components and the application administrators share details of performance and integrity tests for the application.The application will be made up of the following components:A web server -- Steps to confirm the web server is operating correctly will take 15 minutes after the application server is online.✑ An application server- Steps to confirm application server integrity will take 15 minutes after the database is online.✑ A database server- The database server will be managed by a database administrator, with an agreed service-level agreement (SLA) to restore and validate database services within one hour.The existing VMware infrastructure offers a recovery point objective (RPO) of 5 minutes and recovery time objective (RTO) of 15 minutes through a combination of backups and replication.In the event of an outage impacting all three application components, how long will it take for the application to recover and complete all checks?
During a requirements gathering workshop to design a physical to virtual migration, the customer provides the following information:✑ There is no physical firewall in the data center with no anticipated plans for a future network refresh.✑ Leveraging the virtual infrastructure to mitigate the lack of network security must be addressed in the design.✑ All physical servers to be migrated exist on the same VLAN.Which recommendation should the architect make to address the customer requirement with regard to virtual networking?A.✑ Split the virtual machines into several VLANs✑ Use tag actionsB.✑ Create port groups with different names and same VLAN IDs✑ Enable traffic shaping for ingress and egress trafficC.✑ Enable traffic filtering and marking✑ Use allow or drop actionsD.Disable traffic filtering and marking✑ Use tag actions
A customer has a database cluster with 40/60 read/write ratio and a high IOPs requirement with no contention on an all-flash vSAN cluster.Which two storage settings should be configured for best performance? (Choose two.)
There is a request for approved virtual machine applications through a new vSphere platform's integrated automation portal. The platform was built following all provided company security guidelines and has been assessed against Sarbanes-Oxley Act of 2002 (SOX) regulations.The platform has the following characteristics:✑ vRealize Operations is being used to monitor all clusters.✑ There is a dedicated ESXi cluster, supporting all management services.- All network traffic is via distributed virtual switches (DVS).✑ There is a dedicated ESXi cluster for all line-of-business applications.- Network traffic is serviced by NSX-T.✑ There is a dedicated ESXi cluster for virtual desktop infrastructure (VDI).- Network traffic is serviced by NSX-T.The application owner is requesting approval to install a new service that must be protected as per the Payment Card Industry (PCI) Data Security Standard.Which additional non-functional requirement should the architect include in the design to support the new service?