刷题
导入试题
【单选题】
An administrator is adding an NFS datastore as shown in the Exhibit. What is the purpose of the Servers to be added list?___
A. It contains the IP addresses of the NFS Storage Server to provide multipathing capability.
B. It contains the IP addresses of the ESXi hosts that mount the datastore.
C. It contains the IP addresses used for
D. ynamic Discovery of targets.
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
An administrator reports that the System Event log data is only available for 24 hours when reviewing the Hardware Status tab. Which condition could be responsible for the loss of data?___
A. A Reset event log was executed.
B. The statistical collection level was set to a value of 1.
C. The boot disk of the host is corrupt.
D. Syslog has been configured at the vCenter Server level.
【单选题】
During an upgrade, the ESXi 6.x installer finds an existing version of ESXi and a VMFS3 volume. No virtual machines exist on the host or VMFS3 volume. The requirement is to upgrade to VMFS5. Which option should be chosen to meet this requirement?___
A. Upgrade ESXi and preserve the VMFS datastore
B. Install ESXi and preserve the VMFS datastore
C. Install ESXi and overwrite the VMFS datastore
D. Upgrade
E. SXi and overwrite the VMFS datastore
【单选题】
A vSphere 6.x Standard Switch is configured with 4 virtual machine portgroups, as shown in the exhibit. Which portgroup would be utilized by default when creating a new virtual machine?___
A. Access Network
B. DMZ Network
C. VM Network
D. Virtual Machine Network
【单选题】
Which vSphere 6.x feature will allow an organization to utilize native snapshots?___
A. Virtual Volumes
B. Virtual SAN
C. VMFS3
D. VMFS5
【单选题】
An administrator is creating a new vSphere Distributed Switch that will be utilized with a specific vSphere Cluster. The cluster itself contains a mix of ESXi 5.x and 6.x Hosts. Which Distributed Switch version should be created to support this configuration?___
A. Distributed Switch: 6.0.0
B. Distributed Switch: 5.0.0
C. Distributed Switch: 5.1.0
D. Distributed Switch: 5.5.0
【单选题】
Which load balancing policy, previously limited to vSphere Distributed Switches, is now available on vSphere Standard Switches with vSphere 6.x?___
A. Route based on physical NIC workload
B. Route based on IP Hash
C. Route based on the originating virtual port
D. Route based on Source MAC Hash
【单选题】
A storage administrator is not seeing full utilization of all bandwidth from an ESXi host. The vSphere administrator observes the adapter details, as shown in the Exhibit. What is the probable cause of this issue?___
A. Another path needs to be used to allow full utilization of the bandwidth.
B. The array is not setup to use the correct multipathing policy.
C. There are no virtual machines on the host.
D. No traffic is being sent across it because a path failed.
【单选题】
A storage administrator is not seeing full utilization of all bandwidth from an ESXi host. The vSphere administrator observes the adapter details, as shown in the Exhibit. What is the probable cause of this issue?___
A. Another path needs to be used to allow full utilization of the bandwidth.
B. The array is not setup to use the correct multipathing policy.
C. There are no virtual machines on the host.
D. No traffic is being sent across it because a path failed.
【单选题】
An administrator has just completed performing an interactive installation of ESXi 6.x and is booting the host. How is the network initially configured?___
A. The network is configured by Automatic Private IP Addressing (APIPA).
B. The network is configured based on the settings detected in DNS.
C. The network is configured with the address as specified in the installer.
D. The network is automatically configured by DHCP.
【单选题】
You have just installed an ESXi 6.x Host. As part of your company security regulations, a security banner must be presented on the console of the host. How can this action be accomplished?___
A. Configure the Advanced Settings > Annotations screen of the ESXi host.
B. This is configured from the Direct Console User Interface configuration menu.
C. It is not possible to configure a security banner for the ESXi host.
D. From vCenter Server, this setting is configured globally in the vCenter Server configuration.
【单选题】
An administrator is only able to see the Health Badge when using the vRealize Operations user interface. What is the likely cause of this behavior?___
A. The vRealize Operations Foundation License is in use.
B. The vmware-sps service failed to start.
C. The vRealize Operations Standard License is in use.
D. The vmware-rbd-watchdog service failed to start.
【单选题】
An administrator has configured an alarm to be notified when a virtual machine meets either of these conditions: <High virtual CPU> <High active memory consumption.> <The alarm is only triggering when both of the conditions are met.> What can be done to correct the alarm behavior?___
A. Edit the alarm and select Trigger if ANY of the following conditions are satisfied.
B. Edit the alarm and select Trigger if ALL of the following conditions are satisfied.
C. Create two separate alarms, one for CPU and one for memory and link them together with ESXCLI.
D. Delete the existing alarm and create a new event based alarm.
【单选题】
An administrator creates an ESXi cluster using vSphere Auto Deploy. The ESXi hosts are configured to get a management IP address from a DHCP server. The administrator needs to troubleshoot the management network on one of the hosts. Which DCUI option should the administrator use to renew the DHCP lease? ___
A. Restart Management Network
B. Restore Network Settings
C. Test Management Network
D. Configure Management Network
【单选题】
An administrator is attempting to restore a number of files in a directory within the Operating System of a virtual machine. How can the administrator restore the files from a previous backup? ___
A. Use the File Level Restore option from the selected backup of the virtual machine in the vSphere Web Client.
B. Connect to the File Level Restore tool from a web browser in the virtual machine.
C. Connect to the File Level Restore tool from the VMware
D. ata Protection appliance.
【单选题】
After selecting an object in vRealize Operations, how can a user compare the badge values of related child objects? ___
A. Use the Scoreboard tab
B. Use the Relationship tab
C. Use the Members tab
D. Use the Overview tab
【单选题】
You want to deploy a vApp and dynamically assign IP addresses without a DHCP server on the network. Which action would you take to accomplish this task? ___
A. Enable IP pools.
B. Configure a local DHCP server in the vApp.
C. Enable NAT on the vApp router.
D. Configure the guest OS for workgroup and WINS.
【单选题】
What is the optimal configuration when building a virtual machine for a single-threaded Windows application? ___
A. Deploy single-threaded applications on uniprocessor virtual machines.
B. Deploy single-threaded applications on symmetric multi-processor virtual machines.
C. Tune single-threaded applications to take advantage of symmetric multi-processor resources.
D. Tune Single-threaded applications at the hypervisor level.
【单选题】
An administrator has created the resource pool configuration shown in the Exhibit. Based on the exhibit, which virtual machine(s) can be successfully powered on? ___
A. VM-M1 only
B. VM-K1 only
C. VM-K1 and VM-K2 only
D. VM-K1, VM-K2, and VM-M1
【单选题】
Which vSphere 6 Enterprise Edition feature will allow an organization to ensure that critical multi-threaded applications have the maximum possible uptime? ___
A. Fault Tolerance
B. High Availability
C. Distributed Resource Scheduler
D. App HA
【单选题】
An administrator has a virtual machine that requires four times the compute resources than other virtual machines on the same ESXi 6.x host. How should the administrator configure the virtual machine settings, in order to be prepared for any resource contention? ___
A. Set the shares of the priority virtual machine to High and the rest to Low.
B. Set the shares of the priority virtual machine to High.
C. Set the shares of the priority virtual machine to High and the rest to Normal.
D. Set the shares of the priority virtual machine to Normal and the rest to Low.
【单选题】
Which type of Adapter does not require vmkernel networking? ___
A. Independent Hardware iSCSI Adapter
B. Dependent Hardware iSCSI Adapter
C. Software iSCSI Adapter
D. Software FCoE Adapter
【单选题】
During the installation of ESXi 6.0, the following error message is reported: Hardware Virtualization is not a feature of the CPU, or is not enabled in the BIOS. Which condition would generate this message? ___
A. LAHF/SAHF is not enabled in the BIOS.
B. NX/XD is not enabled in the BIOS.
C. SSE3 is not enabled in the BIOS.
D. Hyperthreading is not enabled in the BIOS.
【单选题】
An administrator is unable to login to vCenter Server when using the vSphere web client. The administrator successfully accessed vCenter Server using the client earlier the same day. What is the most appropriate first step the administrator should take to resolve this issue? ___
A. Verify the web browser being used has Adobe Flash plugin version 11.5 or later
B. Verify the vCenter Single Sign-On service is running on the vCenter Server
C. Verify the vSphere Web Server service is running on the vCenter Server
D. Verify the administrator has permissions configured in vCenter Server
【单选题】
An administrator has configured an alarm to be notified when a virtual machine meets two conditions: <high virtual CPU> <high active memory consumption> The alarm is malfunctioning and triggering when either condition is met instead of both. What can be done to correct the issue? ___
A. Edit the alarm and select Trigger if ALL of the following conditions are satisfied.
B. Edit the alarm and select Trigger if ANY of the following conditions are satisfied.
C. Create two separate alarms, one for CPU and one for memory.
D. Delete the existing alarm and create a new event based alarm.
【单选题】
What must be enabled to ensure that VM Component Protection (VMCP) works in a High Availability cluster? ___
A. VMware Tools Virtual Machine Communication Interface (VMCI)
B. Fault Tolerance
C. Atomic Test and Set (ATS)
D. All Paths Down (APD) Timeout
【单选题】
An administrator wants to add a web server to an existing multi-tier application consisting of three virtual machines: <A web server> <A database server An application server> The web server should be added to the application when the primary web server reaches: <70% vCPU utilization> <55% active memory> Which option will achieve this result? ___
A. Create a virtual machine alarm with an action to run a script that starts a new instance of the web server.
B. Create a host cpu and memory alarm with an action to run a script that starts a new instance of the webserver.
C. Configure HA application monitoring for the web server and set it to trigger deployment of a new instance of the web server.
D. Configure Fault Tolerance on the virtual machine and leave the secondary machine disabled until needed.
【单选题】
An administrator has an application that requires connection directly to PCI devices through a virtual machine. What is a limitation of this configuration? ___
A. Devices must be reserved for PCI passthrough on at least one host on which the virtual machine will run.
B. Snapshots are not supported with DirectPath I/O passthrough devices.
C. A maximum of 18 PCI vSphere
D. irectPath devices can be added to a virtual machine.
【单选题】
The vSphere administrator is configuring directory services for an ESXi host: What should the vSphere administrator do to configure the host to use CAM services? ___
A. Check the Use vSphere Authentication Proxy checkbox.
B. Set Select Directory Service Type to CAM services.
C. Specify CAM$ for the
D. omain.
【单选题】
Which statement is true regarding the licensing of vCenter Server? ___
A. The license for vCenter Server must be provided at the time of installation.
B. Changing the license assigned to vCenter Server requires a restart of the vCenter Server service.
C. Virtual machines can still be powered on if the vCenter Server license expires.
D. Licensing for a single vCenter Server installation is determined by the number of managed virtual machines.
【单选题】
When configuring vSphere Replication for a virtual machine, what is the lowest Recovery Point Objective (RPO) that can be selected? ___
A. 1 min
B. 5 min
C. 10 min
D. 15min
【单选题】
A developer needs to create a multi-tier development stack for a home lab. Which vSphere product will support the architecture required for the least software cost? ___
A. vSphere Hypervisor
B. vSphere Essentials
C. VMware Player
D. VMware Workstation
【单选题】
An administrator is installing Windows into a virtual machine. The DVD has been mounted on the Host and configured for the virtual machine as shown in the Exhibit. Based on the exhibit, when the virtual machine is booted, why would it attempt to search for a PXE server? ___
A. The CD/DVD device is not connected.
B. The ISO is in the incorrect storage location.
C. The OS minimum requirements have not been met.
D. The CD/DVD device is not set to Client Device.
【单选题】
What component must be installed prior to deploying a vCenter Server in vSphere 6.x? ___
A. vCenter Identity Services
B. Platform Services Controller
C. vCenter Single Sign-On
D. Client Integration Plug-In
【单选题】
What is a valid plug-in status for a plug-in that has been added to a vSphere client? ___
A. Disabled
B. Unknown
C. Stopped
D. Installed
【单选题】
Users of an application are reporting performance issues. The following performance values are observed in the vSphere Web Client: <Host CPU utilization is 90%> <Virtual Machine memory utilization is consistently greater than 90% CPU Ready values are higher than 20%> What could be the cause of the application performance issue? ___
A. The host is lacking the CPU resources required to meet the demand.
B. The host is lacking the memory resources required to meet the demand.
C. The virtual machine is lacking the CPU resources required to meet the demand.
D. The virtual machine is lacking the memory resources required to meet the demand.
【单选题】
An administrator creates an ESXi cluster using vSphere Auto Deploy. The ESXi hosts are configured to get a management IP address from a DHCP server. The administrator needs to troubleshoot the management network on one of the hosts. Which DCUI option should the administrator use to renew the DHCP lease? ___
A. Restart Management Network
B. Restore Network Settings
C. Test Management Network
D. Configure Management Network
【单选题】
An administrator is re-provisioning an ESXi host and moving it to another datacenter. Which DCUI option should the administrator use to revert the system configuration to the default settings? ___
A. Reset System Configuration
B. Rebuild Default System Configuration
C. Revert System Configuration
D. Renew Default System Configuration
【单选题】
An administrator has just completed installing an ESXi 6.x host, but doesn't know what address has been configured. Where is the ESXi host IP address configured? ___
A. RVC console
B. Direct Console User Interface
C. vSphere Web Client
D. vSphere Client
【单选题】
When is it possible to place a VMFS5 datastore in maintenance mode? ___
A. When it is a member of a Storage DRS cluster
B. When it is a member of Virtual SAN cluster
C. When it is a member of a multi-extent datastore
D. When it is a member of a Virtual Volume
【单选题】
Immediately after installing ESXi, an administrator observes that the Configure Lockdown Mode option is grayed out in the Direct Console User Interface (DCUI). What is the most likely explanation? ___
A. The host has not yet been added to a vCenter Server.
B. The BIOS on the host does not have NX/XD enabled.
C. The ESXi host is running in evaluation mode.
D. The host requires a reboot before this feature is available.
推荐试题
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default
【多选题】
Which two models of A sa tend to be used in a data center?___
A. 5555X
B. 5585X
C. ASA service module
D. 5512X
E. 5540
F. 5520
【多选题】
Which two statements about hardware-based encrption are true?___
A. It is widely accessible
B. It is potentially easier to compromise than software-based encryption. It requires minimal configuration
C. It requires minimal configuration
D. It can be implemented without impacting performance
E. It is highly cost-effective
【多选题】
In which two modes can the Cisco We b Security appliance be de ployed?___
A. as a transparent proxy using the Secure Sockets Layer protocol
B. as a transparent proxy using the Web Cache Communication Protocol
C. explicit proxy mode
D. as a transparent proxy using the Hyper Text Transfer Protocol
E. explicit active mode
【单选题】
1.三相刀开关的图形符号与交流接触器的主触点符号是___。
A. 一样的
B. 可以互换
C. 有区别的
D. 没有区别
【单选题】
2.刀开关的文字符号是___。
A. QS
B. SQ
C. SA
D. KM
【单选题】
3.行程开关的文字符号是___。
A. QS
B. SQ
C. SA
D. KM
【单选题】
4.交流接触器的文字符号是___。
A. QS
B. SQ
C. SA
D. KM
【单选题】
5.熔断器的作用是___。
A. 短路保护
B. 过载保护
C. 失压保护
D. 零压保护
【单选题】
6.热继电器的作用是___。
A. 短路保护
B. 过载保护
C. 失压保护
D. 零压保护
【单选题】
7.交流接触器的作用是可以___接通和断开负载。
A. 频繁地
B. 偶尔
C. 手动
D. 不需
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用