刷题
导入试题
【多选题】
What two methods are used to configure VMware vSphere Storage I/O Control shares and limits? (Choose two.)___
A. Assign shares and limits to VM virtual disks.
B. Assign shares and limits to datastores.
C. Assign shares and limits to Storage (DRS) clusters.
D. Assign shares and limits using VM storage policies.
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
AD
解析
暂无解析
相关试题
【多选题】
ESXi 6.5 introduces VMFS6, which supports both 512e and 512n devices. What three configurations are supported when using these devices? (Choose three.) ___
A. Hosts with both 512e and 512n devices.
B. Storage vMotion between both 512e and 512n devices.
C. Datastore Extents spanned between both 512e and 512n devices.
D. Storage DRS clusters containing only both 512e and 512n devices.
【多选题】
A vSphere Administrator observes that the Primary VM configured with Fault Tolerance is executing slowly. After further investigation, it is determined that the Secondary VM is on an overcommitted ESXi host. What two methods will correct the problem? (Choose two.)___
A. Use Storage vMotion to migrate the Secondary VM to another datastore.
B. Use vMotion to migrate the Secondary VM to a different ESXi host.
C. Configure a CPU limit on the Primary VM which will also apply to the Secondary VM.
D. Turn off and turn on FT in order to recreate the Secondary VM on a different datastore.
【多选题】
Which two features require the use of Host Profiles? (Choose two.)___
A. Host Customizations
B. shared storage
C. Auto
D. eploy
【多选题】
What three processes on the vCenter Server Appliance (VCSA) does“vmware-watchdog monitor? (Choose three.) ___
A. vmware-eam
B. vmcad
C. vmware-vpostgres
D. vpxd
E. vsan-health
【多选题】
What three processes on the vCenter Server Appliance (VCSA) does“vmware-watchdog monitor? (Choose three.) ___
A. vmware-eam
B. vmcad
C. vmware-vpostgres
D. vpxd
E. vsan-health
【多选题】
Which two statements correctly describe VM-Host affinity rules? (Choose two.) ___
A. When there is more than one VM-Host affinity rule in a vSphere DRS cluster, the rules are applied equally.
B. After creating a VM-Host affinity rule, its ability to function in relation to other rules is predetermined.
C. When there is more than one VM-Host affinity rule in a vSphere
D. RS cluster, the rules will be ranked.
【多选题】
An administrator wants to enable proactive HA by moving virtual machines automatically if a hardware alert is triggered. What are the three required settings? (Choose three.)___
A. Set vSphere DRS Automation to Partially Automated.
B. Turn on Proactive HA.
C. Set the Proactive HA Automation Level to Manual.
D. Set the Proactive HA Automation Level to Automated.
E. Turn on vSphere HA and vSphere DRS.
【多选题】
If vCenter Server 5.5 installation has one or more services deployed remotely, which three services are relocated to vCenter Server 6.5 on upgrade? (Choose three.)___
A. vCenter Inventory Services
B. vSphere Authentication Proxy
C. vSphere Web Client
D. vSphere
E. SXi Dump Collector
【多选题】
What two debugging levels can a virtual machine be configured to? (Choose two.)___
A. Verbose
B. Debugging
C. Statistics
D. Trivia
【多选题】
What are three benefits of using a few large-capacity LUNs instead of many small-capacity LUNs? (Choose three.) ___
A. Better performance because there is less contention for a single volume.
B. More flexibility for resizing virtual disks.
C. Less wasted storage space.
D. More flexibility to create virtual machines without adding new LUNs.
E. Fewer VMFS datastores to manage.
【多选题】
Which two configurable options are available in Boot Options for a virtual machine? (Choose two.)___
A. Tools Upgrades
B. Encryption
C. Firmware
D. Force BIOS setup
【多选题】
Which three VMware-recommended best practices should an administrator follow before upgrading to vSphere 6.5? (Choose three.)___
A. Disconnect ESXi host from vCenter.
B. VMware Tools are installed in the virtual machine.
C. Ensure that the system hardware complies with ESXi requirements.
D. Back up the host.
E. Check the interoperability of any other software integrated with vSphere.
【多选题】
What are two requirements to enable EVC in vSphere DRS cluster? (Choose two.)___
A. CPUs must be from the same vendor.
B. EVC must use the lowest possible baseline supported by the hardware.
C. CPUs must be in the same family and of the same speed.
D. No VMs may be running in the cluster.
【多选题】
What three conditions could result in VMware Flash Read Cache being unable to claim a disk? (Choose three.)___
A. The disk is not listed in the VMware hardware compatibility guide.
B. The disk is not detected as an SSD.
C. The disk is not detected as local.
D. The disk is in use by VMFs.
【多选题】
Boot from SAN is supported on which three storage technologies? (Choose three.)___
A. VMware vSAN
B. FCoE
C. NFS 4.1
D. iSCSI
E. FC
【多选题】
Which two components are part of storage I/O multipathing on ESXi? (Choose two.)___
A. SATP
B. VASA
C. PSP
D. VAAI
【多选题】
Which two statements are true about Highly Available vSphere Auto Deploy infrastructure? (Choose two.)___
A. It helps prevent data loss.
B. It is a prerequisite for using vSphere Auto Deploy with stateful install.
C. It requires two or more Auto
D. eploy servers.
【多选题】
The virtual machine log rotation size can be changed for all VMs by which two interfaces? (Choose two.)___
A. PowerCLI
B. vSphere Web Client
C. ESXi host client
D. esxcli
【多选题】
Which two configuration options can exclude virtual disks from snapshot operations? (Choose two.)___
A. Use RDM in virtual mode for virtual disk.
B. Use virtual disks in Independent – Persistent mode.
C. Use a virtual disk larger than 2 TB in size.
D. Use RDM in physical mode for virtual disk.
【多选题】
Which two storage configurations on the source server are unsupported with VMware Converter? (Choose two.)___
A. Linux LVM
B. software RAID
C. GPT/MBR hybrid disks
D. Windows basic volumes
E. Windows dynamic volumes
【多选题】
Which two statements about vCenter HA are correct? (Choose two.)___
A. ESXi 5.5 or later is required.
B. vCenter HA network latency between nodes must be less than 50 ms.
C. NFS datastore is supported.
D. It must be deployed on a 3
E. SXi host cluster with DRS enabled.
【多选题】
An attempt to delete NFS datastore from a ESXi host returns the error: Sysinfo error on operation returned the following status:< Busy> Which two statements could explain this failure? (Choose two.)___
A. NFS datastore is a part of Storage DRS Cluster.
B. NFS.VolumeRemountFrequency value is set to 30.
C. Storage I/O Control is enabled on NFS datastore.
D. NFS datastore has running or registered virtual machines.
【多选题】
An administrator finds that the Microsoft Exchange virtual machines are exhibiting network latency. What two in-guest changes can help decrease latency? (Choose two.)___
A. LRO
B. TSO
C. SR-IOV
D. PVRDMA
【多选题】
Which two types of iSCSI adapters require VMkernel networking configuration? (Choose two.)___
A. dependent hardware
B. in-guest
C. software
D. independent hardware
【多选题】
Which two statements are true for NFS v4.1 firewall behavior? (Choose two.)___
A. It closes port 2049.
B. It sets allowed. All flag to TRUE.
C. It sets allowed. All flag to FALSE.
D. It opens port 2049.
【多选题】
A vSphere Administrator attempts to enable Fault Tolerance for a virtual machine but receives the following error: Secondary VM could not be powered on as there are no compatible hosts that can accommodate it. What two options could cause this error? (Choose two.)___
A. The other ESXi host(s) are in Maintenance Mode.
B. Hardware virtualization is not enabled on the other ESXi host(s).
C. The other ESXi host(s) are in Quarantine Mode.
D. Hardware MMU is enabled on the other
E. SXi host(s).
【多选题】
Storage capabilities be populated in what two ways? (Choose two.)___
A. The administrator can use tags to describe capabilities.
B. Default capabilities are provided by vCenter Server.
C. Datastores can advertise their capabilities through VAAI.
D. Datastores can advertise their capabilities through VASA.
【多选题】
In network troubleshooting it is important to know what upstream switch the ESXi host is connected to. Which two features does ESXi provide to help identify the upstream switch? (Choose two.)___
A. Promiscuous mode
B. DPM
C. LLDP
D. CDP
【多选题】
Virtual Volumes supports which three VMware features? (Choose three.)___
A. Instant Clones
B. Distributed Resource Scheduler
C. Linked Clones
D. vMotion
E. Storage Distributed Resource Scheduler
【多选题】
vSphere DRS helps to balance virtual machines with available resources in a vSphere cluster. What three types of resources can be taken into account for balancing? (Choose three.)___
A. CPU
B. physical NIC saturation of an ESXi host
C. virtual NIC saturation of a virtual machine
D. RAM
E. storage latency
【多选题】
Which three design requirements must be satisfied to enable RAID-6 objects in a VMware vSAN cluster? (Choose three.)___
A. vSAN Advanced license or higher
B. vSAN stretched cluster
C. at least six hosts contributing storage
D. deduplication and compression
E. all flash configuration
【多选题】
When using "Cluster resource percentage" for host failover capacity in vSphere HA Admission Control, the total resource requirements are calculated from which two values? (Choose two.)___
A. Total vCPUs assigned to each VM.
B. Average CPU usage on each VM over time.
C. Memory reservations on each VM.
D. Total memory assigned to each VM.
E. Average active memory on each VM over time.
F. CPU reservations on each VM.
【多选题】
Which are four attributes of the Active vCenter HA node? (Choose four)___
A. It uses the vCenter HA network to communicate with the Witness node.
B. It constantly replicates vPostgres data with the Witness node.
C. It uses a public IP address for the management interface.
D. It runs the active vCenter Server Appliance instance.
E. It uses the vCenter HA network for replication of data to the Passive node.
F. It provides a quorum to protect against split-brain situations.
【多选题】
Which are two vCenter Server two-factor authentication methods? (Choose two.)___
A. RSA SecurID
B. Smart Card
C. SAML
D. Symantec VIP
【多选题】
An administrator is creating VMkernel adapters on an ESXi 6.5 host and wants to create separate VMkernel adapters for every type of traffic in the default TCP/IP stack. Which three types of traffic can be explicitly enabled on a separate VMkernel adapter? (Choose three.)___
A. Virtual SAN traffic
B. NFS traffic
C. vMotion traffic
D. vSphere HA traffic
E. Fault Tolerance logging traffic
【多选题】
When migrating a Windows vCenter Server 6.0 to the vCenter Server Appliance 6.5, which two will be migrated by default? (Choose two.)___
A. Local Windows OS users and groups
B. Configuration
C. Custom ports
D. FQDN
E. Historical and Performance data
【多选题】
Which three types of Content Libraries exist within vSphere 6.5? (Choose three.)___
A. Remote Content Library
B. Published Content Library
C. Local Content Library
D. Shared Content Library
E. Subscribed Content Library
【多选题】
An administrator cannot enable multi-processor Fault Tolerance (SMP-FT) for a virtual machine. Which are two possible causes for this? (Choose two.)___
A. The virtual machine is running on a vSAN datastore.
B. The Fault Tolerance network is using a 10Gbit uplink.
C. The virtual machine has 6 vCPUs assigned.
D. The virtual machine has a 1TB VMDK attached.
E. The virtual machine has snapshots present.
【多选题】
Which two statements are true for Predictive DRS? (Choose two.)___
A. It balances resource utilization for virtual machines with unpredictable utilization patterns.
B. It integrates DRS with vRealize Operations Manager to balance workloads for virtual machines before resource utilization spikes occur.
C. It balances resource utilization based on a threshold's algorithm that runs each night.
D. It determines the best placement and balance of virtual machines based on a threshold's algorithm that runs each night in vCenter Server 6.5 Database.
【多选题】
Which two situations could cause a virtual machine to appear with (orphaned) appended to its name? (Choose two.)___
A. if a host failover is unsuccessful
B. if a virtual machine was removed from vCenter Server's inventory
C. if a virtual machine was deployed from template, and the template has been deleted
D. if a virtual machine is unregistered directly on the host
推荐试题
【单选题】
FTP默认使用的控制协议端口是 。___
A. 20
B. 21
C. 23
D. 22
【单选题】
TCP属于OSI参考模型的 。___
A. 网络层
B. 传输层
C. 会话层
D. 表示层
【单选题】
TCP协议通过 来区分不同的连接。___
A. 端口号
B. 端口号和IP地址
C. 端口号和MAC地址
D. IP地址和MAC地址
【单选题】
当路由器在自己的路由表中最终没有找到匹配项时,会根据 进行转发。___
A. 缺省路由
B. 静态路由
C. 路由表中第一条路由
D. 路由表中最后一条路由
【单选题】
IP地址203.108.2.110是 地址。___
A. A类
B. B类
C. C类
D. D类
【单选题】
ping实际上是基于 协议开发的应用程序。___
A. ICMP
B. IP
C. TCP
D. UDP
【单选题】
源主机ping目的设备时,如果网络工作正常,则目的设备在接收到该报文后,将会向源主机回应ICMP 报文。___
A. Echo Request
B. Echo Reply
C. TTL-Exceeded
D. Port-Unreachable
【单选题】
OSPF 协议将报文封装在 报文中。___
A. TCP
B. UDP
C. IP
D. PPP
【单选题】
如果想在H3C交换机(SWA)上查看目前存在哪些VLAN,则需要用到 命令。___
A. [SWA]show vlan
B. [SWA]display vlan all
C. [SWA]display vlan1
D. [SWA]display vlan 2
【单选题】
Windows操作系统下,如果让ping命令一直ping某一个主机,应该使用 参数。___
A. -S
B. -A
C. F
D. -T
【单选题】
管理员可以在DHCP客户机上对IP地址租约进行更新,操作命令为 。___
A. nbtstat –c
B. ipconfig /release
C. ipconfig /renew
D. ipconfig /flushdns
【单选题】
如果没有特殊声明,匿名FTP服务登录帐号为 。___
A. user
B. anonymous
C. guest
D. 用户自己的电子邮件地址
【单选题】
注册表数据导出后的扩展名为 。___
A. reg
B. dat
C. exe
D. bat
【单选题】
为了检测 Windows 系统是否有木马入侵,可以先通过 命令来查看当前的活动连接端口。___
A. ipconfig
B. netstat -rn
C. racert –d
D. netstat –an
【单选题】
下列哪一条与操作系统安全配置的原则不符合 。___
A. 关闭没必要的服务
B. 不安装多余的组件
C. 安装最新的补丁程序
D. 开放更多的服务
【单选题】
Windows 2000 系统中哪个文件可以查看端口与服务的对应 。___
A. c:\winnt\system\drivers\etc\services
B. c:\winnt\system32\services
C. c:\winnt\system32\config\services
D. c:\winnt\system32\drivers\etc\services
【单选题】
在windows操作系统的命令行下,打开组策略编辑器的命令是 。___
A. mstsc
B. gpedit.exe
C. msc
D. gpedit.msc
【单选题】
Windows中查看域名解析的命令是 。___
A. ipconfig
B. nslookup
C. route print
D. net user
【单选题】
windows操作系统在命令行下查看计算机的ip地址的命令是 。___
A. ifconfig
B. ipconfig/all
C. ipconfig/release
D. ipconfig/renew
【单选题】
Windows系统能设置为在几次无效登录后锁定帐号,这可以防止 。___
A. 木马
B. 暴力攻击
C. IP欺骗
D. 缓存溢出攻击
【单选题】
在Windows 操作系统中,哪一条命令能够显示ARP表项信息 。___
A. display arp
B. arp –a
C. arp –d
D. show arp
【单选题】
你是一台系统为windows server 2003的计算机的系统管理员,出于安全性的考虑,你希望使用这台计算机的用户账号在设置密码时不能重复前5次的密码,应该采取的措施是 。___
A. 设置计算机本地安全策略中的安全选项,设置“账户锁定时间”的值为5
B. 设置计算机本地安全策略中的密码策略,设置“强制密码历史”的值为5
C. 设置计算机本地安全策略中的密码策略,设置“密码最长存留期”的值为5
D. 设置计算机本地安全策略中的密码策略,设置“密码最短存留期”的值为5
【单选题】
拒绝服务攻击损害了信息系统的哪一项性能 。___
A. 完整性
B. 可用性
C. 保密性
D. 可靠性
【单选题】
以下措施不能防止计算机病毒的是 。___
A. 计算机不接入互联网就能保证安全
B. 先用杀病毒软件将从别人机器上拷来的文件清查病毒
C. 不用来历不明的U盘
D. 经常关注防病毒软件的版本升级情况,并尽量取得最高版本的防毒软件
【单选题】
宏病毒可感染下列 文件。___
A. exe
B. doc
C. bat
D. txt
【单选题】
U 盘病毒依赖于哪个文件达到自我运行的目的 。___
A. autoron.inf
B. autoexec.bat
C. config.sys
D. system.ini
【单选题】
关于计算机病毒,下列说法错误的是 。___
A. 计算机病毒是一个程序
B. 计算机病毒具有传染性
C. 计算机病毒的运行不消耗CPU资源
D. 病毒并不一定都具有破坏力
【单选题】
蠕虫和传统计算机病毒的区别主要体现在 上。___
A. 存在形式
B. 传染机制
C. 传染目标
D. 破坏方式
【单选题】
在描述信息传输中bps表示的是 。___
A. 每秒传输的字节数
B. 每秒传输的指令数
C. 每秒传输的字数
D. 每秒传输的位数
【单选题】
一个字节包括 个二进制位。___
A. 8
B. 16
C. 32
D. 64
【单选题】
在SQL中,建立表用的命令是 。___
A. create schema
B. create table
C. create view
D. create index
【单选题】
SQL语言中,删除表中数据的命令是 。___
A. delete
B. drop
C. clear
D. remove
【单选题】
SQL语言中,删除一个表的命令是 。___
A. delete
B. drop
C. clear
D. remove
【单选题】
SQL Server 2000中表查询的命令是 。___
A. use
B. select
C. update
D. drop
【单选题】
SQL Server 2000中表更新数据的命令是 。___
A. use
B. select
C. update
D. drop
【单选题】
向用户授予操作权限的SQL语句是 。___
A. create
B. revoke
C. select
D. grant
【单选题】
数据库的三要素,不包括 。___
A. 完整性规则
B. 数据结构
C. 恢复
D. 数据操作
【单选题】
安装MSSQL Server时,系统自动建立几个数据库,其中有一个数据库被删除后,不影响系统的正常运行,这个数据库是 。___
A. master数据库
B. model数据库
C. tempdb 数据库
D. pubs数据库
【单选题】
以下情况发生,往往要求我们立即对master数据库进行备份,错误的是 。___
A. 增加用户数据库
B. 删除用户数据库
C. 执行与登录有关的操作
D. 增加数据库用户
【单选题】
能够实现执行SQL语句、分析查询计划、显示查询统计情况和实现索引分析等功能的SQL工具是 。___
A. 企业管理器
B. 查询分析器
C. 服务管理器
D. 事件探查器
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用