刷题
导入试题
【单选题】
What is the minimum disk space required to deploy vSphere Data Protection (VDP) with 8 TB configuration?___
A. 4 TB
B. 16 TB
C. 8 TB
D. 12 TB
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
What advanced option for vSphere HA defines a maximum number of reset attempts by VMCP for a virtual machine?___
A. das.maxterminates
B. das.isolationshutdowntimeout
C. das.maxresets
D. fdm.isolationpolicydelaysec
【单选题】
What vSphere technology enables the administrator to ensure consistent configuration at scale?___
A. PowerCLI
B. Host Profiles
C. esxcli
D. vSphere Web Client
【单选题】
Which port is used for vSphere HA agent-to-agent communication?___
A. 443
B. 8182
C. 22
D. 902
【单选题】
Which log file would assist in identifying an issue that occurred during the database export phase of a vCenter Server upgrade process?___
A. vcdb_import.out
B. export.json
C. export-upgrade-runner.log
D. vcdb_export.out
【单选题】
Bidirectional CHAP is support by which storage initiator?___
A. software FCoE HBA
B. Fibre Channel HBA
C. independent hardware iSCSI HBA
D. dependent hardware iSCSI HBA
【单选题】
What is a pool of raw storage capacity that a storage system can provide to Virtual Volumes?___
A. protocol endpoint
B. storage container
C. storage provider
D. datastore
【单选题】
vSphere 6.5 DRS is now Network-Aware. Based on network utilization, when will DRS balance VMs?___
A. DRS will balance VMs when a network resource pool is configured for VMs.
B. DRS will balance VMs when Network I/O Control is enabled.
C. DRS will place VMs on initial boot for hosts that have network utilization lower that the threshold.
D. DRS will vMotion VMs when network utilization is higher than the threshold on a particular host.
【单选题】
A scripted upgrade of ESXi fails due to an incorrect parameter in the upgrade script. What file must the administrator modify to correct the problem?___
A. vmreconfig.pl
B. hostinfo.pl
C. ks.cfg
D. boot.cfg
【单选题】
A VM folder contains VM1 and VM2. Group A has permission to power on virtual machines, defined on the VM folder and its children. Group B has permission to power off virtual machine VM2. If a user is a member of group A and B, what action can the user perform?___
A. Suspend VM2.
B. Power off VM1.
C. Power on and power off VM1.
D. Power on and power off VM2.
【单选题】
The networking team has requested to have a dedicated network for iSCSI traffic. This task has been assigned to the vSphere Administrator. What is the VMware-recommended way to accomplish this?___
A. Configure Static Routes on each ESXi Server.
B. Configure the right subnet.
C. Create a custom IP Stack.
D. Define a dedicated gateway for the iSCSI vmkernel.
【单选题】
To prevent possible failures or issues during a vSphere upgrade, which component should be upgraded first?___
A. ESXi Hosts
B. virtual machines
C. datastores
D. vCenter Server
【单选题】
What is the command for updating an ESXi host?___
A. esxcli software vib update –d /vmfs/volumes/Datastore/DirectoryName/PatchName.zip
B. esxupdate software update –d”/vmfs/volumes/Datastore/DirectoryName/PatchName.zip”
C. esxcli software update –d “/vmfs/volumes/Datastore/DirectoryName/PatchName.zip”
D. esxupdate software vib update –d /vmfs/volumes/Datastore/DirectoryName/PatchName.zip
【单选题】
A vSphere Administrator would like to identify which physical NUMA node their virtual machine is currently residing on. What esxtop metric would provide this information?___
A. GST_ND[x]
B. OVD_ND[x]
C. NRMEM
D. NHN
【单选题】
How can a vSphere administrator ensure that two virtual machines never run on the same datastore in a datastore cluster, while permitting the VMs to be load-balanced?___
A. Use an Intra-VM Anti-Affinity Rule.
B. Configure a storage DRS VM override.
C. Disable storage
D. RS for the VMs.
【单选题】
What is the VMware-recommended way to move a physical adapter out of Network I/O Control’s scope?___
A. Set the teaming policy to “Route Based on Physical NIC Load.”
B. Add the vmnic to the Net.NetNiocAllowOverCommit parameter in Advanced System Settings.
C. Add the vmnic to the Net.IOControlPnicOptOut parameter in Advanced System Settings.
D. Move the vmnic to a different vmUplink port on the Distributed Switch.
【单选题】
A VM folder contains VM1 and VM2. Group A has permission to power on virtual machines, defined on the VM folder and its children. Group B has permission to power off virtual machines, defined on the VM folder and its children. If a user is a member of Groups A and B, what will be the user’s effective permission on VM1 and VM2?___
A. Power on
B. Power off.
C. Power on and Power off.
D. Reset.
【单选题】
Group 1 is granted console interaction on a VM folder. User 1 is granted no console interaction on the same VM folder. What will be the outcome if User 1 tries to access the console of a virtual machine?___
A. User 1 will not be able to access the virtual machines in the VM folder.
B. User 1 will not have access to the virtual machine console.
C. User 1 will have access to the virtual machine console.
D. User 1 will have console access only via the vSphere Web Client.
【单选题】
Which statement is true regarding the use of VMFS3 datastores with vSphere 6.5?___
A. VMFS3 datastores can be used but not created.
B. VMFS3 datastores can be neither used nor created.
C. VMFS3 datastores will be present but unmounted.
D. VMFS3 datastores can be created and used.
【单选题】
In the Exhibit, each VM has a 1GHz non-expandable reservation. If all VMs are powered on in sequence, what would be the outcome?___
A. VM4 cannot be powered on.
B. VM5 cannot be powered on.
C. VM6 cannot be powered on.
D. VM3 cannot be powered on.
【单选题】
vSphere 6.5 introduced MAClearning capabilities for VMware’s virtual switches. What three benefits will it provide? (Choose three.)___
A. Reduced memory consumption.
B. Reduced consumption of extra CPU cycles.
C. Increased network throughput.
D. Prevent packet flooding inside the vSwitch.
【单选题】
What is the default pathing policy for most active-active arrays?___
A. Fixed
B. Most Recently Used
C. Dynamic
D. isk Morroring
【单选题】
Which command will show the iSCSI sessions on a ESXi 6.5 host?___
A. esxcli storage iscsi session get
B. esxcli iscsi session get
C. esxcli storage iscsi session
D. esxcli iscsi session list
【单选题】
Which of the following is not a parameter for traffic filtering or marking?___
A. virtual port ID
B. Protocol
C. Traffic Direction
D. DSCP value
E. Traffic redirection
【单选题】
A vSphere administrator wants to enable a virtual machine with Secure Boot, but in VM setting, Secure Boot option was not found under Boot Options. What could be the cause?___
A. The virtual hardware is not compatible.
B. The virtual machine has missing drivers.
C. The virtual machine OS does not support secure boot.
D. VMware Tools is not upgraded.
【单选题】
A virtual machine is connected on a distributed port group where the average bandwidth configured in the traffic shaping policy is 100 Mbps. The VM network adapter is configured with a reservation of 200 Mbps. What is the VM’s effective bandwidth?___
A. 200 Mbps
B. 100 Mbps
C. 150 Mbps
D. 400 Mbps
【多选题】
What are two reasons why a datastore in a Storage DRS cluster cannot enter maintenance mode?(Choose two.)___
A. Storage latency is too high to allow Storage DRS initiate Storage vMotion.
B. Storage DRS is configured for a VMFS3 datastore.
C. Storage
D. RS is disabled on the virtual disk.
【多选题】
What two methods are used to configure VMware vSphere Storage I/O Control shares and limits? (Choose two.)___
A. Assign shares and limits to VM virtual disks.
B. Assign shares and limits to datastores.
C. Assign shares and limits to Storage (DRS) clusters.
D. Assign shares and limits using VM storage policies.
【多选题】
ESXi 6.5 introduces VMFS6, which supports both 512e and 512n devices. What three configurations are supported when using these devices? (Choose three.) ___
A. Hosts with both 512e and 512n devices.
B. Storage vMotion between both 512e and 512n devices.
C. Datastore Extents spanned between both 512e and 512n devices.
D. Storage DRS clusters containing only both 512e and 512n devices.
【多选题】
A vSphere Administrator observes that the Primary VM configured with Fault Tolerance is executing slowly. After further investigation, it is determined that the Secondary VM is on an overcommitted ESXi host. What two methods will correct the problem? (Choose two.)___
A. Use Storage vMotion to migrate the Secondary VM to another datastore.
B. Use vMotion to migrate the Secondary VM to a different ESXi host.
C. Configure a CPU limit on the Primary VM which will also apply to the Secondary VM.
D. Turn off and turn on FT in order to recreate the Secondary VM on a different datastore.
【多选题】
Which two features require the use of Host Profiles? (Choose two.)___
A. Host Customizations
B. shared storage
C. Auto
D. eploy
【多选题】
What three processes on the vCenter Server Appliance (VCSA) does“vmware-watchdog monitor? (Choose three.) ___
A. vmware-eam
B. vmcad
C. vmware-vpostgres
D. vpxd
E. vsan-health
【多选题】
What three processes on the vCenter Server Appliance (VCSA) does“vmware-watchdog monitor? (Choose three.) ___
A. vmware-eam
B. vmcad
C. vmware-vpostgres
D. vpxd
E. vsan-health
【多选题】
Which two statements correctly describe VM-Host affinity rules? (Choose two.) ___
A. When there is more than one VM-Host affinity rule in a vSphere DRS cluster, the rules are applied equally.
B. After creating a VM-Host affinity rule, its ability to function in relation to other rules is predetermined.
C. When there is more than one VM-Host affinity rule in a vSphere
D. RS cluster, the rules will be ranked.
【多选题】
An administrator wants to enable proactive HA by moving virtual machines automatically if a hardware alert is triggered. What are the three required settings? (Choose three.)___
A. Set vSphere DRS Automation to Partially Automated.
B. Turn on Proactive HA.
C. Set the Proactive HA Automation Level to Manual.
D. Set the Proactive HA Automation Level to Automated.
E. Turn on vSphere HA and vSphere DRS.
【多选题】
If vCenter Server 5.5 installation has one or more services deployed remotely, which three services are relocated to vCenter Server 6.5 on upgrade? (Choose three.)___
A. vCenter Inventory Services
B. vSphere Authentication Proxy
C. vSphere Web Client
D. vSphere
E. SXi Dump Collector
【多选题】
What two debugging levels can a virtual machine be configured to? (Choose two.)___
A. Verbose
B. Debugging
C. Statistics
D. Trivia
【多选题】
What are three benefits of using a few large-capacity LUNs instead of many small-capacity LUNs? (Choose three.) ___
A. Better performance because there is less contention for a single volume.
B. More flexibility for resizing virtual disks.
C. Less wasted storage space.
D. More flexibility to create virtual machines without adding new LUNs.
E. Fewer VMFS datastores to manage.
【多选题】
Which two configurable options are available in Boot Options for a virtual machine? (Choose two.)___
A. Tools Upgrades
B. Encryption
C. Firmware
D. Force BIOS setup
【多选题】
Which three VMware-recommended best practices should an administrator follow before upgrading to vSphere 6.5? (Choose three.)___
A. Disconnect ESXi host from vCenter.
B. VMware Tools are installed in the virtual machine.
C. Ensure that the system hardware complies with ESXi requirements.
D. Back up the host.
E. Check the interoperability of any other software integrated with vSphere.
【多选题】
What are two requirements to enable EVC in vSphere DRS cluster? (Choose two.)___
A. CPUs must be from the same vendor.
B. EVC must use the lowest possible baseline supported by the hardware.
C. CPUs must be in the same family and of the same speed.
D. No VMs may be running in the cluster.
推荐试题
【判断题】
入侵检测具有对操作系统的校验管理,判断是否有破坏安全的用户活动。
A. 对
B. 错
【判断题】
IPS和IDS都是主动防御系统。
A. 对
B. 错
【判断题】
一个入侵检测系统至少包含事件提取、入侵分析、入侵响应和远程管理四部分功能。
A. 对
B. 错
【判断题】
在一个有多个防火墙存在的环境中,每个连接两个防火墙的计算机或网络都是DMZ。
A. 对
B. 错
【判断题】
防火墙规则集应该尽可能的简单,-规则集越简单,错误配置的可能性就越小,系统就越安全。
A. 对
B. 错
【判断题】
即使在企业环境中,个人防火墙作为企业纵深防御的一部分也是十分必要的。
A. 对
B. 错
【判断题】
防火墙必须要提供VPN、NAT等功能。
A. 对
B. 错
【判断题】
防火墙是设置在内部网络与外部网络(如互联网)之间,实施访问控制策略的一个或一组系统。
A. 对
B. 错
【判断题】
由于网络钓鱼通常利用垃圾邮件进行传播,因此,各种反垃圾邮件的技术也都可以用来反网络钓鱼。
A. 对
B. 错
【简答题】
如何利用ftp server的安全加固?
【简答题】
请阐述一个完整的XSS Worm的攻击流程。
【简答题】
请阐述跨站点脚本攻击步骤。
【简答题】
入侵检测系统与防火墙的区别是什么?
【简答题】
渗透测试的五个阶段分别是什么?
【简答题】
渗透测试与黑客入侵的区别是什么?以及阐述渗透测试必要性。
【简答题】
什么是渗透测试?
【简答题】
入侵检测系统主要执行功能是?
【简答题】
根据实际应用,以个人防火墙为主,简述防火墙的主要功能及应用特点。
【简答题】
基于数据源所处的位置,入侵检测系统可以分为哪5类?
【简答题】
列举五个以上防火墙的主要功能。
【简答题】
对安全的攻击可分为哪几种?
【简答题】
请列举IDS(入侵检测系统)的两种分析入侵行为的方法(检测方法)。
【简答题】
什么是漏洞?
【简答题】
什么是弱密码漏洞?
【简答题】
防火墙的实现技术有哪两类?防火墙存在的局限性又有哪些?
【简答题】
简述缓冲区溢出攻击的防范措施。
【简答题】
信息安全有哪些常见的威胁?信息安全的实现有哪些主要技术措施?
【简答题】
什么是网络入侵检测?
【简答题】
漏洞检测的方法分为哪几种?
【简答题】
洪水式DoS攻击的基本原理是什么?
【简答题】
什么是DoS攻击?
【简答题】
网络安全防护的主要方法有哪些?
【简答题】
网络安全威胁包括哪些内容?
【简答题】
保证网络信息传输安全需要注意哪些问题?
【简答题】
网络安全的定义和目标是什么?
【单选题】
下面的四个IP地址,属于D类地址的是__。
A. :10.10.5.168
B. :168.10.0.1
C. :224.0.0.2
D. :202.1 19.130.80
【单选题】
UPS 是一种__的不间断电源。
A. :恒压恒频
B. :恒压变频
C. :变压恒频
D. :变压变频
【单选题】
在客户/服务器模式下的网络操作系统主要指的是__。
A. :服务器操作系统
B. :操作系统执行体
C. :客户机操作系统
D. :操作系统内核
【单选题】
UNIX是一种__。
A. :单用户单进程系统
B. :多用户单进程系统
C. :多用户多进程系统
D. :单用户多进程系统
【单选题】
下面哪个功能属于操作系统中的作业调度功能?
A. :对CPU,内存,外设以及各类程序和数据进行管理
B. :实现主机和外设的并行处理以及异常情况的处理
C. :处理输入/输出事务
D. :控制用户的作业排序和运行
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用