An architect is working on a security design for a shared storage environment. The storage array provides connectivity by the NFS protocol.
Which two design decisions could the architect include for this solution? (Choose two.)
An architect is designing a new vSphere solution. The customer has stated that the solution will be used to host different types of applications, some of which have special considerations. The customer has provided the following information in relation to the special considerations:
The applications are sensitive to the time it takes for CPUs to be accessible to process instructions
The applications send and receive large amounts of data across the network
The applications are sensitive to the time it takes for the data to be sent and received at the destination
What could the architect include in the design for these considerations?
An architect is designing a new vSphere-based solution for a customer.
During a requirements gathering workshop, the following information is provided:
0The solution must have a primary and secondary (isolated) environment
The solution must support orchestration to address application dependencies
The isolated environment must be able to scale on demand in case of a DR scenario
The solution is managed through a single interface
Which solution should the architect include in this design?
Following a review of security requirements, an architect has confirmed the following requirements:
REQ001- A clustered firewall solution must be placed at the perimeter of the hosting platform, and all ingress and egress network traffic will route via this device.
REQ002- A distributed firewall solution must secure traffic for all virtualized workloads.
REQ003- All virtualized workload, hypervisor, firewall and any management component system events must be monitored by security administrators.
REQ004- The hosting platforms security information and event management (SIEM) system must be scalable to 20,000 events per second.
REQ005- The hosting platforms storage must be configured with data-at-rest encryption.
REQ006- The hosting platform limits access to authorized users.
Which three requirements would be classified as technical (formerly non-functional) requirements? (Choose three.)