刷题
导入试题
【多选题】
Which two statements are true about Highly Available vSphere Auto Deploy infrastructure? (Choose two.)___
A. It helps prevent data loss.
B. It is a prerequisite for using vSphere Auto Deploy with stateful install.
C. It requires two or more Auto
D. eploy servers.
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
AD
解析
暂无解析
相关试题
【多选题】
The virtual machine log rotation size can be changed for all VMs by which two interfaces? (Choose two.)___
A. PowerCLI
B. vSphere Web Client
C. ESXi host client
D. esxcli
【多选题】
Which two configuration options can exclude virtual disks from snapshot operations? (Choose two.)___
A. Use RDM in virtual mode for virtual disk.
B. Use virtual disks in Independent – Persistent mode.
C. Use a virtual disk larger than 2 TB in size.
D. Use RDM in physical mode for virtual disk.
【多选题】
Which two storage configurations on the source server are unsupported with VMware Converter? (Choose two.)___
A. Linux LVM
B. software RAID
C. GPT/MBR hybrid disks
D. Windows basic volumes
E. Windows dynamic volumes
【多选题】
Which two statements about vCenter HA are correct? (Choose two.)___
A. ESXi 5.5 or later is required.
B. vCenter HA network latency between nodes must be less than 50 ms.
C. NFS datastore is supported.
D. It must be deployed on a 3
E. SXi host cluster with DRS enabled.
【多选题】
An attempt to delete NFS datastore from a ESXi host returns the error: Sysinfo error on operation returned the following status:< Busy> Which two statements could explain this failure? (Choose two.)___
A. NFS datastore is a part of Storage DRS Cluster.
B. NFS.VolumeRemountFrequency value is set to 30.
C. Storage I/O Control is enabled on NFS datastore.
D. NFS datastore has running or registered virtual machines.
【多选题】
An administrator finds that the Microsoft Exchange virtual machines are exhibiting network latency. What two in-guest changes can help decrease latency? (Choose two.)___
A. LRO
B. TSO
C. SR-IOV
D. PVRDMA
【多选题】
Which two types of iSCSI adapters require VMkernel networking configuration? (Choose two.)___
A. dependent hardware
B. in-guest
C. software
D. independent hardware
【多选题】
Which two statements are true for NFS v4.1 firewall behavior? (Choose two.)___
A. It closes port 2049.
B. It sets allowed. All flag to TRUE.
C. It sets allowed. All flag to FALSE.
D. It opens port 2049.
【多选题】
A vSphere Administrator attempts to enable Fault Tolerance for a virtual machine but receives the following error: Secondary VM could not be powered on as there are no compatible hosts that can accommodate it. What two options could cause this error? (Choose two.)___
A. The other ESXi host(s) are in Maintenance Mode.
B. Hardware virtualization is not enabled on the other ESXi host(s).
C. The other ESXi host(s) are in Quarantine Mode.
D. Hardware MMU is enabled on the other
E. SXi host(s).
【多选题】
Storage capabilities be populated in what two ways? (Choose two.)___
A. The administrator can use tags to describe capabilities.
B. Default capabilities are provided by vCenter Server.
C. Datastores can advertise their capabilities through VAAI.
D. Datastores can advertise their capabilities through VASA.
【多选题】
In network troubleshooting it is important to know what upstream switch the ESXi host is connected to. Which two features does ESXi provide to help identify the upstream switch? (Choose two.)___
A. Promiscuous mode
B. DPM
C. LLDP
D. CDP
【多选题】
Virtual Volumes supports which three VMware features? (Choose three.)___
A. Instant Clones
B. Distributed Resource Scheduler
C. Linked Clones
D. vMotion
E. Storage Distributed Resource Scheduler
【多选题】
vSphere DRS helps to balance virtual machines with available resources in a vSphere cluster. What three types of resources can be taken into account for balancing? (Choose three.)___
A. CPU
B. physical NIC saturation of an ESXi host
C. virtual NIC saturation of a virtual machine
D. RAM
E. storage latency
【多选题】
Which three design requirements must be satisfied to enable RAID-6 objects in a VMware vSAN cluster? (Choose three.)___
A. vSAN Advanced license or higher
B. vSAN stretched cluster
C. at least six hosts contributing storage
D. deduplication and compression
E. all flash configuration
【多选题】
When using "Cluster resource percentage" for host failover capacity in vSphere HA Admission Control, the total resource requirements are calculated from which two values? (Choose two.)___
A. Total vCPUs assigned to each VM.
B. Average CPU usage on each VM over time.
C. Memory reservations on each VM.
D. Total memory assigned to each VM.
E. Average active memory on each VM over time.
F. CPU reservations on each VM.
【多选题】
Which are four attributes of the Active vCenter HA node? (Choose four)___
A. It uses the vCenter HA network to communicate with the Witness node.
B. It constantly replicates vPostgres data with the Witness node.
C. It uses a public IP address for the management interface.
D. It runs the active vCenter Server Appliance instance.
E. It uses the vCenter HA network for replication of data to the Passive node.
F. It provides a quorum to protect against split-brain situations.
【多选题】
Which are two vCenter Server two-factor authentication methods? (Choose two.)___
A. RSA SecurID
B. Smart Card
C. SAML
D. Symantec VIP
【多选题】
An administrator is creating VMkernel adapters on an ESXi 6.5 host and wants to create separate VMkernel adapters for every type of traffic in the default TCP/IP stack. Which three types of traffic can be explicitly enabled on a separate VMkernel adapter? (Choose three.)___
A. Virtual SAN traffic
B. NFS traffic
C. vMotion traffic
D. vSphere HA traffic
E. Fault Tolerance logging traffic
【多选题】
When migrating a Windows vCenter Server 6.0 to the vCenter Server Appliance 6.5, which two will be migrated by default? (Choose two.)___
A. Local Windows OS users and groups
B. Configuration
C. Custom ports
D. FQDN
E. Historical and Performance data
【多选题】
Which three types of Content Libraries exist within vSphere 6.5? (Choose three.)___
A. Remote Content Library
B. Published Content Library
C. Local Content Library
D. Shared Content Library
E. Subscribed Content Library
【多选题】
An administrator cannot enable multi-processor Fault Tolerance (SMP-FT) for a virtual machine. Which are two possible causes for this? (Choose two.)___
A. The virtual machine is running on a vSAN datastore.
B. The Fault Tolerance network is using a 10Gbit uplink.
C. The virtual machine has 6 vCPUs assigned.
D. The virtual machine has a 1TB VMDK attached.
E. The virtual machine has snapshots present.
【多选题】
Which two statements are true for Predictive DRS? (Choose two.)___
A. It balances resource utilization for virtual machines with unpredictable utilization patterns.
B. It integrates DRS with vRealize Operations Manager to balance workloads for virtual machines before resource utilization spikes occur.
C. It balances resource utilization based on a threshold's algorithm that runs each night.
D. It determines the best placement and balance of virtual machines based on a threshold's algorithm that runs each night in vCenter Server 6.5 Database.
【多选题】
Which two situations could cause a virtual machine to appear with (orphaned) appended to its name? (Choose two.)___
A. if a host failover is unsuccessful
B. if a virtual machine was removed from vCenter Server's inventory
C. if a virtual machine was deployed from template, and the template has been deleted
D. if a virtual machine is unregistered directly on the host
【多选题】
Which three requirements are needed to apply RAID 5 or RAID 6 erasure coding on a vSAN 6.2 or 6.5 object? (Choose three.)___
A. on Disk Format 3.0
B. Hybrid vSAN
C. All Flash vSAN
D. vSAN Advanced License
E. Stretched Cluster Configurations
【多选题】
An administrator sees the following error in the log files: Which two events could be the source of the error message? (Choose two.)___
A. vCenter Server failure
B. VXLAN failure
C. Disk array failure
D. Network failure
E. ESXi host failure
【多选题】
An administrator is attempting to access an ESXi host via the DCUI but is unable to do so. Which could be two possible causes? (Choose two.)___
A. The host in Qhas no out-of-band management capability (i.e. iLO/iDRAC).
B. The SSH service is disabled on the host.
C. Strict lockdown mode is enabled on the host.
D. Normal lockdown mode is enabled and the administrator is a member of the
E. xception User list.
【多选题】
Which two permissions are required to migrate a virtual machine with Storage vMotion? (Choose two.)___
A. Network > Move Network
B. Virtual Machine > Inventory > Move
C. Resource > Migrate powered on virtual machine
D. Datastore > Allocate Space
【多选题】
Which are three supported storage requirements for vCenter Server HA? (Choose three.)___
A. NFS
B. RDM
C. vSAN
D. VMFS
E. JBOD
【多选题】
Which are the two network requirements for a VMware vSAN 6.5 cluster? (Choose two.)___
A. Multicast must be enabled on the physical switches and routers that handle vSAN traffic.
B. vSAN requires IPv6 only.
C. All hosts must have a dedicated 40GbE NIC.
D. The vSAN network supported IPv4 or IPv6.
E. vSAN requires IPv4 only.
【多选题】
Which three prerequisites must be in place prior to enabling secure boot for a virtual machine? (Choose three.)___
A. VirtualMachine.Config.Settings privileges
B. an encrypted USB drive
C. Virtual Hardware version 13 or later
D. Virtual Hardware version 12 or later
E. EFI firmware
【多选题】
A user is given the "Virtual machine user (sample)" role in a vSphere 6.x environment. Which three permissions would the user be able to perform? (Choose three.)___
A. Reset a virtual machine.
B. Power on a virtual machine.
C. Move a host into a cluster.
D. Configure CD media.
E. Migrate a virtual machine with Storage vMotion.
【多选题】
Which three are supported upgrade processes for ESXi host? (Choose three.)___
A. using vSphere Auto Deploy
B. using a TFTP server
C. using Update Manager
D. using an
E. SXCLI command
【多选题】
When enabling Storage DRS on a datastore cluster, which three components are enabled as a result? (Choose three.)___
A. Space load balancing among datastore within the datastore cluster.
B. Initial placement for virtual disks based on space and I/O workload.
C. I/O load balancing among datastores within the datastore cluster.
D. Queue Depth alerting on disks within the datastore cluster.
E. Data de-duplication within the datastore cluster.
【多选题】
What are two features introduced in Network I/O Control version 3? (Choose two.)___
A. Bandwidth reservation per traffic type
B. Network resource pools
C. CoS tagging
D. Bandwidth guarantee to virtual machines
【多选题】
Which two correct virtual machine advanced configuration parameters will accomplish this? (Choose two.)___
A. isolation.device.edit.disable = “FALSE”
B. isolation.device.edit.disable = “TRUE”
C. isolation.device.connectable.disable = “FALSE”
D. isolation.device.connectable.disable = “TRUE”
【多选题】
Which three statements are correct regarding booting an ESXi Host from Fibre Channel SAN? (Choose three.)___
A. Direct connect topology is supported.
B. Each host must have its own boot LUN.
C. ESXi hosts do not require local storage.
D. Multipathing to a boot LUN on an active-passive array is supported.
E. Hosts can share one common boot LUN.
【多选题】
Which two tasks should a vSphere administrator perform if the vmkernel log reports VMFS metadata errors? (Choose two.)___
A. contact VMware technical support
B. reformat the datastore
C. check the device with VOMA
D. ignore the messages
【多选题】
Which two statements are true for a vCenterServer user account that is used for vSphere Data Protection (VDP)? (Choose two.)___
A. The user account must be assigned with Administrator role.
B. The password for the user account cannot contain spaces.
C. The user account should be created in the Single Sign-On domain
D. The user account cannot inherit required permissions from a group role.
【多选题】
Which three storage protocols are supported by Virtual Volumes? (Choose three.)___
A. FCIP
B. FCoE
C. iSCSI
D. NFS v3
E. NFS v4
【多选题】
A vSphere administrator observes a CPU spike on one of the web servers (view the Exhibit.) Which two statements can describe the cause of this activity? (Choose two.)___
A. The network packet size is too large.
B. VMware Tools is not installed.
C. Disk latency is present on the datastore.
D. The network packet size is too small.
推荐试题
【判断题】
宏不属于恶意代码。
A. 对
B. 错
【判断题】
每种病毒都会给用户造成严重后果。
A. 对
B. 错
【判断题】
特洛伊木马是伪装成有用程序的恶意软件?。
A. 对
B. 错
【判断题】
我国正式公布了电子签名法,数字签名机制用于实现保密性需求。
A. 对
B. 错
【判断题】
在Windows 系统中可以察看开放端口情况的是:Netstat。
A. 对
B. 错
【判断题】
下列安全防护配置措施应当关闭系统审核策略。
A. 对
B. 错
【判断题】
Windows 系统下的用于存储用户名的文件是SAM。
A. 对
B. 错
【判断题】
高级安全Windows防火墙不属于本地安全策略的是()。
A. 对
B. 错
【判断题】
打开命令行界面后,查看本机 IP 地址的命令是ipconfig。
A. 对
B. 错
【判断题】
默认情况下防火墙允许所有传入连接。
A. 对
B. 错
【判断题】
关于强密码的特征,不包含用户的生日、电话、用户名、真实姓名或公司名等。
A. 对
B. 错
【判断题】
设置多位由数字和字母组成的超长密码能防止账户口令暴力破解。
A. 对
B. 错
【判断题】
SMTP连接服务器使用端口25。
A. 对
B. 错
【判断题】
使用net show命令可以查看那些计算机正在与本机连接。
A. 对
B. 错
【判断题】
口令长度越长,安全性越高。
A. 对
B. 错
【判断题】
关于木马病毒的特性是主动传播性。
A. 对
B. 错
【判断题】
在信息系统中,访问控制是在为系统资源提供最大限度共享的基础上对用户的访问权进行管理。
A. 对
B. 错
【判断题】
C/S架构是建立在广域网之上, 对安全的控制能力相对弱, 面向是不可知的用户群。
A. 对
B. 错
【判断题】
在计算机系统中,操作系统是核心系统软件。
A. 对
B. 错
【判断题】
入侵者在张某的博客中搜寻到他在某网站的交易信息,利用信息中的内容获取张某的个人信息,并进一步获取了其它额外的信息,这种行为属于非法窃取。
A. 对
B. 错
【判断题】
信息安全的发展经过了四个历史发展阶段,从信息安全的发展过程中可以看出,随着信息技术本身的发展和信息技术应用的发展,信息安全的内涵和外延都在不断地加深和扩大,包含的内容已从初期的数据加密演化到后来的数据恢复、信息纵深防御等。历史发展阶段顺序是通信安全阶段、计算机安全阶段、信息安全阶段、信息安全保障阶段。
A. 对
B. 错
【判断题】
社会工程学攻击成功的主要原因是人们的信息安全意识淡薄,而产生认知偏差。社会工程学攻击方式是身份盗用威胁、信息收集、AV终结者。
A. 对
B. 错
【判断题】
完整的数字签名过程(包括从发送方发送消息到接收方安全的接收到消息)包括签名和验证过程。
A. 对
B. 错
【判断题】
信息安全保障的目的不仅是保护信息和资产的安全,更重要的是通过保障信息系统安全来保障信息系统所支持的业务安全,从而实现业务的可持续性。信息安全保障不包括生命周期。
A. 对
B. 错
【判断题】
对称密码体制通信双方拥有同样的密钥,使用的密钥相对较短,密文的长度往往与明文长度相同。
A. 对
B. 错
【判断题】
访问控制列表,耗费资源少,是一种成熟且有效的访问控制方法。
A. 对
B. 错
【判断题】
数字签名是在签名者和签名接收者之间进行的,这种数字签名方式主要依赖公钥密码体制来实现,数字签名算法中,通常对消息的Hash值签名,而不对消息本身签名。
A. 对
B. 错
【判断题】
VPN它有两层含义:首先是“虚拟的”,即用户实际上并不存在一个独立专用的网络,既不需要建设或租用专线,也不需要装备专用的设备,而是将其建立在分布广泛的公共网络上,就能组成一个属于自己专用的网络。其次是“专用的”,相对于“公用的”来说,它强调私有性和安全可靠性。不属于VPN的核心技术是隧道技术。
A. 对
B. 错
【判断题】
网络地址转换是在IP地址日益缺乏的情况下产生的一种网络技术,主要目的是重用IP地址,解决IP地址空间不足问题。
A. 对
B. 错
【判断题】
信息安全的三个基本安全属性不包括机密性。
A. 对
B. 错
【判断题】
虚拟专用网络(VPN)通常是指在公共网路中利用隧道技术,建立一个临时的,安全的网络。这里的字母 P 的正确解释是Private 私有的、专有的。
A. 对
B. 错
【判断题】
与 PDR 模型相比, P2DR 模型多了反应环节。
A. 对
B. 错
【判断题】
从受威胁对象的角度,可以将我国面临的信息安全威胁分为3类:国家威胁、组织威胁和个人威胁。
A. 对
B. 错
【判断题】
Alice 用 Bob 的密钥加密明文,将密文发送给 Bob。 Bob 再用自己的私钥解密,恢复出明文。此密码体制为对称密码体制。
A. 对
B. 错
【判断题】
密码学是网络安全的基础,但网络安全不能单纯依靠安全的密码算法、密码协议也是网络安全的一个重要组成部分。密码协议定义了两方或多方之间为完成某项任务而指定的一系列步骤,协议中的每个参与方都必须了解协议,且按步骤执行。
A. 对
B. 错
【判断题】
若Bob给Alice发送一封邮件,并想让Alice确信邮件是由Bob发出的,则Bob应该选用Bob的私钥对邮件加密。
A. 对
B. 错
【判断题】
公钥密码学的思想最早是欧拉(Euler)提出的。
A. 对
B. 错
【判断题】
PKI的主要理论基础是公钥密码算法。
A. 对
B. 错
【填空题】
网络安全的基本要素有机密性,完整性,可用性,___不可抵赖性。
【填空题】
网络安全的发展历程包括:通信保密阶段,计算机安全阶段,___信息保障阶段。
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用