刷题
导入试题
【单选题】
What is the correct way to replace the certificate on an existing vCenter Server that is part of a vCenter HA configuration?___
A. Put the vCenter HA in Maintenance mode, replace the certificate, exit Maintenance mode.
B. Shut down Passive and Witness nodes and replace the certificate on the Active node.
C. Remove the Passive and Witness nodes, replace the certificate, reconfigure the cluster.
D. Replace the certificate while all nodes are participating in the cluster.
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
The vSphere Data Protection performance analysis results in the “Conditionally Passed” status. What can cause this condition?___
A. The results did not meet the minimum performance expectations.
B. The read, write, and seek tests were successful.
C. The read and write tests were successful but the seek test failed.
D. The read and write tests were successful but the seek test skipped.
【单选题】
A vSphere Administrator wants to reserve 0.5 Gbps for virtual machines on each uplink on a disturbed switch that has 10 uplinks. What is the quota that should be reserved for the network resource pool?___
A. 10 Gbps
B. 5 Gbps
C. 100 Gbps
D. 0.5 Gbps
【单选题】
A vSphere administrator manages a cluster which includes critical and non-critical virtual machines. The cluster requires different permissions for contractors and non-contractors. How can the administrator exclude the contractor group from some of the critical VMs?___
A. Apply permission for both contractors and non-contractors on the cluster level.
B. Apply permission for both contractors and non-contractors on the cluster level. Remove permission on the critical VMs for contractors.
C. Remove permission for contractors on the cluster level. Apply permission on the critical VMs for noncontractors.
D. Apply permission for both contractors and non-contractors on the VMs. Remove permission on the critical VMs for contractors.
【单选题】
In an ESXi 6.5 cluster only "NFS datastore has running or registered virtual machines" returns. A vSphere HA cluster with four hosts has admission control configured to tolerate one host failure. Which statement is true if a fifth host is added?___
A. CPU and Memory capacity will be set to 50%.
B. CPU and Memory capacity will be set to 30%.
C. CPU and Memory capacity will be set to 25%.
D. CPU and Memory capacity will be set to 20%.
【单选题】
Which command can be run to troubleshoot connectivity problems with vmkernal network interfaces?___
A. esxcli network
B. vmkping
C. net-status
D. vicfg-vmknic
【单选题】
What counter should an administrator check to determine if a virtual machine is ballooning?___
A. swapinRate
B. vmmemctltarget
C. swapped
D. vmmemctl
【单选题】
By default, how often is the vCenter vpx user password automatically changed?___
A. 15 days
B. 60 days
C. 30 days
D. 45 days
【单选题】
Which metric in the Exhibit would identify high latency for a virtual machine operating system?___
A. QAVG/cmd
B. KAVG/cmd
C. DAVG/cmd
D. GAVG/cmd
【单选题】
What VM Monitoring setting would ensure that the failure interval for a virtual machine is defined as 120 seconds?___
A. High
B. Normal
C. Low
D. Medium
【单选题】
The business managers have asked the IT administrator to ensure configuration compliance in the vSphere infrastructure. The IT administrator wants to use Host Profiles to accomplish this, but is unable to do so. Why is the administrator unable to use Host Profiles?___
A. The infrastructure uses a vSphere Standard license.
B. The infrastructure has servers with various CPU families.
C. The user has only the “Administrator” role.
D. Host Profiles apply only to storage settings.
【单选题】
What is the result of a “Consolidate” action on a virtual machine?___
A. All snapshots on the virtual machines will be deleted.
B. The virtual machine will be reverted to its last snapshot.
C. Redundant delta disks will be combined and deleted.
D. A new snapshot with memory state will be created.
【单选题】
A Telco customer is implementing NFV using vSphere as the virtualization platform. Which feature can help achieve a high packet rate with lower CPU consumption?___
A. Network I/O Control
B. SplitRX
C. ERSPAN
D. LACP
【单选题】
What is the VMware-recommended best practice for Fibre Channel zoning?___
A. soft zoning
B. single-initiator-multiple-target zoning
C. single-initiator zoning
D. single-initiator-single-target zoning
【单选题】
How can a vSphere administrator ensure that a set of virtual machines run on different hosts in a DRS cluster?___
A. Use a VM-Host affinity rule.
B. Add the VMs to a vApp.
C. Use a VM-VM affinity rule.
D. Place the VMs in different folders.
【单选题】
vCenter Server Appliance Instance can be backed up using which Client Interface?___
A. vSphere Client Interface
B. vSphere Web Client Interface
C. VMware Host Client Interface
D. Virtual Appliance Management Interface
【单选题】
What tool can capture network traffic at the uplinks, or vSwitch, or virtual port levels?___
A. tcpdump-uw
B. wireshark
C. pktcap-uw
D. pcap
【单选题】
Which storage feature always requires the use of third-party software on ESXi?___
A. Hardware Acceleration for NAS devices
B. VVOL
C. Hardware Acceleration for Block
D. evices
【单选题】
An ESXi host's VMCA-Signed certificate has expired. How can the certificate be renewed?___
A. In the vSphere Web Client, browse to the host in question. Click the Manage tab and select settings. Select System and click Certificate, then click the Renew button.
B. In the vSphere Web Client, browse to the host in question. Click the Manage tab and select settings. Select System and click Certificate, then click the Refresh CA Certificates button.
C. Run the command /sbin/generate-certificates on the affected host.
D. Disconnect the host from vCenter Server and reconnect it.
【单选题】
Which is the correct order for upgrading vSphere components?___
A. vCenter Server, ESXi hosts, VMware Tools, Virtual Machine hardware
B. VMware Tools, Virtual Machine hardware, ESXi hosts, vCenter Server
C. vCenter Server, Virtual Machine hardware, VMware tools, ESXi hosts
D. ESXi hosts, vCenter Server, Virtual Machine hardware, VMware Tools
【单选题】
Which iSCSI initiator type can be used with any network interface card?___
A. Software iSCSI initiator
B. Software FCoE adapter
C. Hardware Independent iSCSI initiator
D. Hardware Dependent iSCSI initiator
【单选题】
An administrator is attempting to power on a virtual machine with 32GB of memory. The operation fails with the following error: <Could not power on VM: No space left on device> <Checking the space on the virtual machine's datastore, there is 30GB free.> Which action would allow the VM to power on?___
A. Set a 2GB memory reservation on the VM.
B. Mount the virtual disk from the affected VM on to another virtual machine and free up space from within the OS.
C. Enable vSphere HD admission control on the cluster in which the VM resides.
D. Set a 2GB memory limit on the VM.
【单选题】
An administrator attempts to manually reclaim space on thin-provisioned VMFS6 volumes but finds that no additional space is being recovered. Which could be causing this?___
A. vSphere 6.5 does not support manual UNMAP.
B. The manual UNMAP operation has been moved to the vSphere web client.
C. The VASA version is use is incompatible.
D. UNMAP is automated for VMFS6.
【单选题】
An administrator has upgraded to vSphere 6.5 and also wants to use Kerberos authentication for NFS. Which can be done to the existing NFSv3 volumes to enable this feature?___
A. Perform a storage rescan on VMFS volumes.
B. Unmount the NFSv3 datastore, and then mount as NFSv4.1 datastore.
C. Nothing. All NFSv3 mounted datastores are upgraded automatically during vSphere upgrades.
D. Perform a scan of new storage devices.
【单选题】
An administrator wants to restore the vCenter Server Appliance 6.5 from backup. Where can this be accomplished?___
A. from the ESXi Host Client
B. from the VMware vSphere Appliance Management Interface
C. from within the VMware vSphere Web Client
D. from the vCenter Server Appliance Installer
【单选题】
The administrator wants to power on VM-K2, which has a 2GHz CPU reservation. VM-M1, VM-M2, and VM-K1 are all powered on. VM-K2 is not powered on. The exhibit shows the parent and child resource reservations. If Resource Pool RP-KID is configured with an expandable reservation, which statement is true?___
A. VM-K2 will be unable to power on because there are insufficient resources.
B. VM-K2 will be able to power on since resource pool RP-KID has 2GHz available.
C. VM-K2 will be unable to power on because only 2GHz are reserved for RP-KID.
D. VM-K2 will receive resource priority and will be able to power on this scenario.
【单选题】
Which is the block size on the VMFS6 datastore?___
A. All small and large file blocks are 8MB.
B. All small and large file blocks are 1MB.
C. Small file blocks are 512KB. large file blocks are 64MB.
D. Small file blocks are 1MB, large file blocks are 512MB.
【单选题】
When installing vCenter Converter Standalone, why must an administrator perform a client-server installation instead of a local installation?___
A. to manage conversion tasks remotely
B. to convert virtual machines as well as physical machines
C. to allow installation of the Converter agent on remote source machines
D. to hot clone physical or virtual machines
【单选题】
Which is required by vCenter Converter Standalone to convert a physical Red Hat Enterprise Linux 7 machine to a virtual machine?___
A. The Linux machine must be powered off.
B. The Linux machine must have the SSH daemon started.
C. The Linux machine must use a static IP address.
D. The Linux machine must have a fully-qualified domain name.
【单选题】
An administrator is troubleshooting network communications between a vCenter Server and an ESXi 6.5 host. Which log shows the related events between these components?___
A. /var/log/fdm.log
B. /var/log/vpxa.log
C. /var/log/hostd.log
D. /var/log/auth.log
【单选题】
An administrator has recently upgraded from vSphere 6.0 to 6.5, and can no longer see the software iSCSI named vmhba33. Which could be the reason for this?___
A. The upgrade has changed the vmhba name.
B. vSphere 6.5 automates iSCSI configurations.
C. vSphere 6.5 no longer supports software iSCSI.
D. The upgrade has deleted the vmhba.
【单选题】
An administrator is trying to vMotion a VM from his datacenter to a recovery site. Which is the maximum allowed RTT (Round-Trip Time) latency between source and destination host?___
A. 100 milliseconds
B. 150 milliseconds
C. 15 milliseconds
D. 10 milliseconds
【单选题】
Which is required for configuring iSCSI Software Adapter network port binding?___
A. VMkernel of the iSCSI traffic must be load balanced using Route based on IP Hash algorithm.
B. VMkernel of the iSCSI traffic must be load balanced using Route based on Source Virtual Port ID algorithm.
C. VMkernel of the iSCSI traffic must be load balanced using Route based on Source MAC Hash algorithm.
D. VMkernel of the iSCSI traffic must be bound to only one active network adapter.
【单选题】
In vSphere Data Protection 6.1, which is the function of a Backup Verification job?___
A. None. Backup Verification job is not a feature of vSphere Data Protection
B. It is a manual task -Power it on -Verify the guest OS -Check started applications
C. It is an automatic process -Restore a virtual machine -Power it on -Verify that the guest OS is booted by communicating with the Backup Verification agent
D. It is an automatic process -Restore a virtual machine -Power it on -Verify that the guest OC is booted by detecting the VMware ToolsTM "heartbeats"
【单选题】
An administrator has enabled vSphere Distributed Switch Health Check. The hosts connected to that Distributed Switch all display an alert:< vSphere Distributed Switch MTU supported status > .The administrator has all of the VMkernel ports MTU sizes set to 1600. Which action will remedy this problem?___
A. Configure the Distributed Switch to MTU 9100.
B. Disconnect and reconnect the physical network cable.
C. Configure the physical switch to MTU 1600.
D. Disable the Distributed Switch MTU.
【单选题】
Which Host Profile Subprofile configuration is used to configure firewall settings for ESXi hosts?___
A. Advanced Configuration Settings
B. General System Settings
C. Security
D. Networking
【单选题】
Where would a vSphere administrator find general vCenter Server logs on a vCenter Server Appliance?___
A. /var/log/vmware/vpxd/
B. /var/log/messages
C. /etc/vmware-vpx/
D. /var/log/vmware/vsan-health/
【单选题】
An administrator wishes to enable network port mirroring based on source port. Which feature should be enabled?___
A. vSphere standard switch port
B. ERSPAN
C. NSX Virtual Wire
D. VLAN
【单选题】
Which CLI command shows the physical uplink status for a vmnic?___
A. esxcli network ip connection list
B. esxcli network ip neighbor list
C. esxcli network nic get
D. esxcli network nic list
【单选题】
Which is the maximum number of block devices (LUNs) that are supported by ESXi hosts that are running version 6.5?___
A. 1024
B. 512
C. 2048
D. 256
【单选题】
When performing a vCenter Server 5.5 for Windows with Microsoft SQL Server Express database migration to vCenter Server Appliance 6.5, which will be the target database?___
A. Microsoft SQL Server Express 2012R2
B. Microsoft SQL Server Standard 2012R2
C. PostgreSQL
D. Oracle DB 11g
推荐试题
【单选题】
在Solaris 8下,对于/etc/shadow文件中的一行内容如下“root:3vd4NTwk5UnLC:9038::::::”以下说法正确的是:___。
A. 这里的 3vd4NTwk5UnLC 是可逆的加密后的密码
B. 这里的 9038 是指从 1970 年 1 月 1 日到现在的天数
C. 这里的 9038 是指从 1980 年 1 月 1 日到现在的天数
D. 这里的 9038 是指从 1980 年 1 月 1 日到最后一次修改密码的天数
E. -以上都不正确
【单选题】
root:3vd4NTwk5UnLC:0:1:Super-User:/:”,以下说法正确的是:___。
A. 是/etc/passwd 文件格式
B. 是/etc/shadow 文件格式
C. 既不是/etc/passwd 也不是/etc/shadow 文件格式
D. 这个 root 用户没有 SHELL,不可登录
E. 这个用户不可登录,并不是因为没有 SHELL
【单选题】
在 Solaris 系统中,终端会话的失败登录尝试记录在下列哪个文件里面?___
A. -/etc/default/login
B. /etc/nologin
C. /etc/shadow
D. var/adm/loginlog
【单选题】
在 Windows 2000 中,以下哪个进程不是基本的系统进程:___
A. smss. exe
B. csrss. Exe
C. winlogon. exe
D. -conime.exe
【单选题】
在 Windows 2000 中可以察看开放端口情况的是:___。
A. nbtstat
B. net
C. net show
D. netstat
【单选题】
在 Windows 2003 下 netstat 的哪个参数可以看到打开该端口的 PID?___(格式到此)
A. a
B. n
C. o
D. p
【单选题】
制定数据备份方案时,需要重要考虑的两个因素为适合的备份时间和___。
A. 备份介质
B. 备份的存储位置
C. 备份数据量
D. 恢复备份的最大允许时间
【单选题】
周期性行为,如扫描,会产生哪种处理器负荷?___
A. Idle Ioad
B. Usage Ioad
C. Traffic load
D. 以上都不对
【单选题】
主要由于___原因,使 Unix 易于移植
A. Unix 是由机器指令书写的
B. Unix 大部分由汇编少部分用 C 语言编写
C. Unix 是用汇编语言编写的
D. Unix 小部分由汇编大部分用 C 语言编写
【单选题】
HP-UX 系统中,使用___命令查看系统版本、硬件配置等信息。
A. uname -a
B. ifconfig
C. netstat
D. ps -ef
【单选题】
Linux 文件权限一共 10 位长度,分成四段,第三段表示的内容是___。
A. 文件类型
B. 文件所有者的权限
C. 文件所有者所在组的权限
D. 其他用户的权限
【单选题】
在云计算虚拟化应用中,VXLAN 技术处于 OS 工网络模型中 2-3 层间,它综合了 2 层 交换的简单性与 3 层路由的跨域连接性。它是通过在 UDP/IP 上封装 Mac 地址而实现这一点 的。在简单应用场合,vxLAN 可以让虚拟机在数据中心之间的迁移变得更为简单。该技术是哪个公司主推的技术?___
A. 惠普
B. Juniper
C. Cisco 与 Vmware
D. 博科 Brocade
【单选题】
Linux 中,什么命令可以控制口令的存活时间了___。
A. chage
B. passwd
C. chmod
D. umask
【单选题】
、Qfabric 技术是使用市场上现成的计算和存储网元并利用行业标准的网络接口将它们 连接后组建大规模的数据中心,以满足未来云计算的要求。该技术概念是哪个厂家主推的概念?___
A. 惠普
B. uniper
C. Cisco 与 Vmware
D. 博科 Brocade
【单选题】
网络营业厅提供相关服务的可用性应不低于___。
A. 99.99%
B. 99.9%
C. 99%
D. 98.9%
【单选题】
IRF(Intelligent Resilient Framework)是在该厂家所有数据中心交换机中实现的私有技术是应用在网络设备控制平面的多虚拟技术。该技术属于哪个厂家?___
A. 惠普
B. Juniper
C. Cisco 与 Vmware
D. 博科 Brocade
【单选题】
Windows NT 的安全标识符(SID)是由当前时间、计算机名称和另外一个计算机变量共同产生的,这个变量是:___。
A. 击键速度
B. 当前用户名
C. 用户网络地址
D. 处理当前用户模式线程所花费 CPU 的时间
【单选题】
脆弱性扫描,可由系统管理员自行进行检查,原则上应不少于___。
A. 每周一次
B. 每月一次
C. 每季度一次
D. 每半年一次
【单选题】
下面哪一个情景属于身份验证(Authentication)过程?___
A. 用户依照系统提示输入用户名和口令
B. 用户在网络上共享了自己编写的一份 Office 文档,并设定哪些用户可以阅读,哪些用户可以修改
C. 用户使用加密软件对自己编写的 Office 文档进行加密,以阻止其他人得到这份拷贝 后看到文档中的内容
D. 某个人尝试登录到你的计算机中,但是口令输入的不对,系统提示口令错误,并将 这次失败的登录过程纪录在系统日志中
【单选题】
下面哪一个情景属于授权(Authorization)过程?___
A. 用户依照系统提示输入用户名和口令
B. 用户在网络上共享了自己编写的一份 Office 文档,并设定哪些用户可以阅读,哪些用户可以修改
C. 用户使用加密软件对自己编写的 Office 文档进行加密,以阻止其他人得到这份拷贝 后看到文档中的内容
D. 某个人尝试登录到你的计算机中,但是口令输入的不对,系统提示口令错误,并将 这次失败的登录过程纪录在系统日志中
【单选题】
下列哪一条与操作系统安全配置的原则不符合?___
A. 关闭没必要的服务
B. 不安装多余的组件
C. 安装最新的补丁程序
D. 开放更多的服务
【单选题】
关于 PPP 协议下列说法正确的是:___。
A. PPP 协议是物理层协议
B. PPP 协议是在 HDLC 协议的基础上发展起来的
C. PPP 协议支持的物理层可以是同步电路或异步电路
D. PPP 主要由两类协议组成:链路控制协议族 CLCP)和网络安全方面的验证协议族(PAP
【单选题】
接口被绑定在 2 层的 zone,这个接口的接口模式是___。
A. NAT mode
B. Route mode
C. -Transparent mode
D. NAT 或 Route mode
【单选题】
接入控制方面,路由器对于接口的要求包括:___。
A. 串口接入
B. 局域网方式接入
C. Internet 方式接入
D. VPN 接入
【单选题】
局域网络标准对应 OSI 模型的哪几层?___。
A. 上三层
B. 只对应网络层
C. 下三层
D. 只对应物理层
【单选题】
拒绝服务不包括以下哪一项?___。
A. DDoS
B. 畸形报文攻击
C. Land 攻击
D. ARP 攻击
【单选题】
抗 DDoS 防护设备提供的基本安全防护功能不包括___。
A. 对主机系统漏洞的补丁升级
B. 检测 DDoS 攻击
C. DDoS 攻击警告
D. DDoS 攻击防护
【单选题】
路由器产品提供完备的安全架构以及相应的安全模块,在软、硬件层面设置重重过滤保护路由器业务安全。其中不对的说法是:___。--》缺少 D 选项
A. 路由器产品支持 URPF,可以过滤大多数虚假 IP 泛洪攻击
B. 路由器产品支持
C. AR 功能,可以有效限制泛洪攻击
【单选题】
路由器对于接入权限控制,包括:___。
A. 根据用户账号划分使用权限
B. 根据用户接口划分使用权限
C. 禁止使用匿名账号
D. 以上都是
【单选题】
路由器启动时默认开启了一些服务,有些服务在当前局点里并没有作用,对于这些服务:___。缺少 D 选项
A. 就让他开着,也耗费不了多少资源
B. 就让他开着,不会有业务去访问
C. 必须关闭,防止可能的安全隐患
D. 缺
【单选题】
设置 Cisco 设备的管理员账号时,应___。
A. 多人共用一个账号
B. 多人共用多个账号
C. 一人对应单独账号
D. 一人对应多个账号
【单选题】
什么命令关闭路由器的 finger 服务?___
A. disable finger
B. no finger
C. no finger service
D. no service finger
【单选题】
什么是 IDS?___
A. 入侵检测系统
B. 入侵防御系统
C. 网络审计系统
D. 主机扫描系统
【单选题】
实现资源内的细粒度授权,边界权限定义为:___。
A. 账户
B. 角色
C. 权限
D. 操作
【单选题】
使网络服务器中充斥着大量要求回复的信息,消息带宽,导致网络或系统停止正常服务,这属于什么攻击类型?___
A. 拒绝服务
B. 文件共享
C. BIND 漏洞
D. 远程过程调用
【单选题】
使用 TCP 79 端口的服务是:___。
A. telnet
B. SSH
C. Web
D. Finger
【单选题】
使用一对一或者多对多方式的 NAT 转换,当所有外部 IP 地址均被使用后,后续的内网用户如需上网,NAT 转换设备会执行什么样的动作?___
A. 挤掉前一个用户,强制进行 NAT 转换
B. 直接进行路由转发
C. 不做 NAT 转换
D. 将报文转移到其他 NAT 转换设备进行地址转换
【单选题】
私网地址用于配置本地网络、下列地址中属于私网地址的是?___
A. 100.0.0.0
B. 172.15.0.0
C. 192.168.0.0
D. 244.0.0.0
【单选题】
随着安全要求的提高、技术的演进,应逐步实现物理隔离,或者通过采用相当于溃,请问这种攻击属于何种攻击?___
A. 拒绝服务(DoS)攻击
B. 扫描窥探攻击
C. 系统漏洞攻击
D. 畸形报文攻击
【单选题】
通信领域一般要求 3 面隔离,即转发面、控制面、用户面实现物理隔离,或者是逻辑隔离,主要目的是在某一面受到攻击的时候,不能影响其他面。路由器的安全架构在实现上就支持:___
A. 转发面和控制面物理隔离
B. 控制面和用户面逻辑隔离
C. 转发面和用户面逻辑隔离
D. 以上都支持
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用