Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium VMware 3V0-21.21 Dumps Questions Answers

Page: 1 / 7
Total 88 questions

Advanced Design VMware vSphere 7.x Questions and Answers

Question 1

An architect is preparing a design for a company planning digital transformation. During the requirements gathering workshop, the following requirements (REQ) and constraints (CON) are identified:

  • REQ01 The platform must host different types of workloads including applications that must be compliant with internal security standard.
  • REQ02 The infrastructure must initially run 100 virtual machines.
  • REQ03 Ten of the virtual machines must be compliant with internal security standard.
  • REQ04 The internal security standard specifies logical network separation for in-scope applications.
  • CON01 The customer has already purchased the licenses as part of another project.
  • CON02 The customer has five physical servers that must be reused.

Additionally, based on resource requirements, four physical servers will be enough to run all workloads. Which recommendation should the architect make to meet requirements while minimizing project costs?

Options:

A.

Use Network I/O Control to ensure the internal security zone has higher share value

B.

Purchase additional servers and plan separate, isolated clusters for workloads that must be compliant with internal security

C.

Use a single cluster and ensure that different security zones are separated at least with dedicated VLANs and firewall

D.

Use a single cluster and configure DRS anti-affinity rules to ensure internal security compliant virtual machines cannot migrate between ESXi hosts.

Buy Now
Question 2

Which design decision must be included in a design to allow for the deployment of a minimum supported configuration of vCenter High Availability (HA)?

Options:

A.

A new subnet will be provisioned for vCenter HA services

B.

A vSphere cluster will consist of more than three nodes

C.

The deployed vCenter Server will be Tiny

D.

The vCenter HA network will support a latency of less than 50 ms

Question 3

An architect has 50 ESXi hosts to deploy and DHCP servers are not allowed on any network. Which automated host deployment method should the architect use?

Options:

A.

Stateless vSphere Auto Deploy

B.

Stateful vSphere Auto Deploy

C.

Scripted installation

D.

Interactive installation

Question 4

An architect is designing a new backup solution for a vSphere platform that has been recently upgraded to vSphere 7.

The architect wants the backup solution to perform the following:

  • Full virtual machine image backup and restore
  • Incremental virtual machine image backup and restore
  • File level backup and restore within both Windows and Linux virtual machines
  • LAN-free backup

Which functional requirement should the architect include in the design of the new backup solution?

Options:

A.

The backup solution must leverage the VMware Consolidated Backup (VCB) framework.

B.

The backup solution must leverage virtual machine snapshots.

C.

The backup solution must leverage VMware vSphere Storage APIs - Data Protection.

D.

The backup solution must leverage VMware vStorage APIs for Data Protection (VADP).

Question 5

A customer is deploying a new cluster and wants to be able to patch and update two hosts in parallel. The cluster must be able to maintain N+1 resiliency across the remaining hosts while patching activities are performed. The current expected utilization of the platform requires a minimum of two hosts to support all of the virtual machines.

What is the minimum number of hosts the customer will require in the cluster in order to meet the required resiliency level?

Options:

A.

Five

B.

Six

C.

Four

D.

Seven

Question 6

An architect is planning the physical server configuration for a vSAN-based infrastructure.

Which operations mode should a RAID controller support to minimize potential server downtime during physical disk failures?

Options:

A.

RAID controller with Passthru mode

B.

RAID controller with RAID 5 mode

C.

RAID controller with RAID 10 mode

D.

RAID controller with RAID 6 mode

Question 7

An architect is designing a new vSphere environment with the following resources:

  • 600 vCPU
  • 5,760 GB RAM

Average resource usage is:

  • 60 vCPU
  • 1,152 GB RAM

The design must meet the following requirements:

  • The environment has the ability to burst by 25%.
  • Each host can schedule 36 vCPUs and has 512 GB RAM.
  • Management overhead is 20%.

What is the minimum number of hosts required to meet the design requirements?

Options:

A.

Three

B.

Five

C.

Four

D.

Two

Question 8

What is a benefit of using a scale-out method for handling vSphere cluster growth?

Options:

A.

An increase in the recovery time objective (RTO) for the cluster

B.

Faster to reach the limit of virtual machines per host

C.

An overall reduction in the license costs for the cluster

D.

Less potential impact to virtual machines during a single host failure

Question 9

A customer requires the use of data encryption to ensure data is not accessible when a drive is removed from the primary storage platform. However, there is also a requirement to use deduplication and compression against all workloads in order to conserve space.

Which solution meets the customer requirements?

Options:

A.

Data-in-transit encryption

B.

OS-level encryption

C.

Encrypted backups

D.

Array-based encryption

Question 10

During a transformation project kick-off meeting, an architect highlights specific areas on which to focus while developing the new conceptual design.

Which two of the listed statements are business requirements? (Choose two.)

Options:

A.

The project should use the existing storage devices within the data center

B.

Sites must support a network latency of less than 12 ms round-trip time (RTT)

C.

The solution must allow data replication between sites

D.

There is no budget specifically assigned for disaster recovery

E.

There must not be a single point of failure for the virtual infrastructure

Question 11

The Chief Information Security Officer (CISO) for an organization is concerned about the security posture of the operating system images that are used for the provisioning of their Software-as-a-Service (SaaS) applications. The organization is in a growth period. The organization is opening a new data center to launch its next phase of new SaaS-based solutions.

The DevOps team currently creates encrypted virtual machine (VM) templates that are used for various operating systems and adds these to the vSphere inventory. The DevOps team already uses a published content library and has been granted a role with the ability to add and delete library items.

The following requirements have been noted:

  • Impacts to the DevOps team’s operational processes must be kept to a minimum.
  • The DevOps team must be able to regularly check out a copy of the image for updates and check in a new version of the image.
  • Images must be synchronized from the primary data center to the new data center.

Which three recommendations should the architect make to design a content library solution that will meet these requirements? (Choose three.)

Options:

A.

Clone virtual machines as VM templates to the published content library

B.

Create a subscribed library from the published library and synchronize Open Virtualization Format (OVF) templates on-demand

C.

Create a subscription and publish VM templates to a subscribed content library

D.

Create a subscribed library from the published library and synchronize Open Virtualization Format (OVF) templates automatically

E.

Clone virtual machines as Open Virtualization Format (OVF) templates to the published content library

F.

Update the role for the DevOps team with new privileges

Question 12

An architect is considering placement of virtual machines within an existing VMware software-defined data center (SDDC).

During the discovery phase, the following information is documented:

Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? (Choose two.)

Options:

A.

All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster One.

B.

All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster One.

C.

All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Two.

D.

All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster Two.

E.

All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Three.

Question 13

An architect is designing a solution for an environment with two types of resource profiles that must be virtualized. The first type consists of Tier 1 virtual machines that are disk I/O intensive, but do NOT require high CPU or memory. The second type consists of Tier 2 virtual machines that require a lower CPU and memory allocation and have minimal disk I/O.

Which design recommendation should the architect make for distributing the resource profiles?

Options:

A.

Separate the two resource profiles into two clusters. The Tier 1 cluster will have fast storage while the Tier 2 cluster will not.

B.

Run both resource profiles on the same cluster with the same host hardware platform.

C.

Separate the two resource profiles into two clusters. The Tier 2 cluster will have faster CPU and more memory while the Tier 1 cluster will have slower CPU and less memory but more disk space.

D.

Run both resource profiles on the same cluster with host hardware that has fast CPU, large amounts of memory, and the fastest storage platform.

Question 14

During a requirements gathering workshop, the customer provides the following requirement:

  • A new vSphere platform must be designed securely and all interfaces must be protected against potential snooping.

How should this non-functional security requirement be documented?

Options:

A.

Interfaces must be audited.

B.

Encrypted channels must be used for all communications.

C.

Unauthorized access to interfaces must be reported within 15 minutes.

D.

Communications must be through Private VLANs (PVLAN).

Question 15

An architect is creating a network design for a new vSphere environment.

Based on customer requirements, the environment must support the following types of traffic:

  • Management
  • vMotion
  • vSAN
  • Fault Tolerance
  • Virtual machine traffic, which cannot be impacted by other types of traffic

Which design recommendation can the architect make for a resilient infrastructure with vSphere network service tiering?

Options:

A.

Use different logical networks to ensure traffic is isolated with separate VLANs

B.

Use Network I/O Control and ensure appropriate share value is defined for different types of traffic giving priority to the virtual machines traffic

C.

Use two dedicated virtual switches with a single adapter each, dedicating one virtual switch for Management, vMotion, vSAN and Fault Tolerance traffic, and the second one for virtual machine traffic

D.

Use a NIC teaming policy based on the physical NIC load

Question 16

Application owners require support of a Microsoft Windows Server Failover Cluster (WSFC).

Their current environment consists of the following components:

  • vSphere 7.0 and vSAN 7.0
  • External array supporting NFS 3.0/4.1, Server Message Block (SMB) 2.1
  • 10 GbE storage connectivity for all devices

The solution architect is tasked with coming up with a solution to meet this requirement while utilizing their existing investments.

Which two recommendations could the architect make? (Choose two.)

Options:

A.

Use vSAN native support for WSFC

B.

Use NFS 4.1 shares for quorum and shared disk

C.

Use raw device mapping (RDM)

D.

Use the SMB 2.1 protocol for sharing disks

E.

Run WSFC on vSAN iSCSI Target Service

Question 17

A customer requests a review of its current vSphere platform design.

The following information is noted:

  • There are three different workload profiles for the virtual machines:
  • uk.co.certification.simulator.questionpool.PList@195e8a10
  • Tier-1, Tier-2 and Tier-3 virtual machines are all hosted on a single large vSphere cluster.
  • The Chief Information Security Officer (CISO) has raised concerns that hosting externally facing applications alongside management tools does not meet internal compliance standards.
  • The Operations team has raised concerns about Tier-1 virtual machines negatively impacting the performance of vCenter Server.
  • The Operations lead has stated that management changes have consistently been rejected by application teams.

As a result of the review, which recommendation should the architect make regarding the design of this platform?

Options:

A.

Separate Tier-1, Tier-2 and Tier-3 virtual machines using dedicated distributed virtual switches (DVS)

B.

Separate Tier-2 virtual machines onto a dedicated cluster

C.

Separate Tier-1, Tier-2 and Tier-3 virtual machines onto dedicated clusters

D.

Separate Tier-1, Tier-2 and Tier-3 virtual machines using resource pools and shares

Question 18

An architect is tasked with designing a new VMware software-defined data center (SDDC) solution for an online retail customer who has a primary and secondary data center as well as 10 distribution hubs.

The customer has provided the following business requirements to help inform the design:

  • The solution must support the running of up to 1,000 concurrent virtual machines across the primary and secondary data center.
  • The solution must support the running of up to 20 concurrent virtual machines in each distribution hub.
  • The solution must support the separation of management and lines-of-business application virtual machines.
  • All management components (including directory services, backup, automation, operations and logging) must be deployed to the primary data center.
  • All virtual infrastructure components must have redundancy of N+1.
  • All sites are connected to each other using a wide area network that has multiple diversely routed links.
  • The solution should support a monthly uptime target of 99.9%.
  • The recovery time objective (RTO) for the solution must be four hours.
  • The recovery point objective (RPO) for the solution must be 24 hours.

Given the information from the customer, which assumption should the architect include in the design?

Options:

A.

All business application virtual machines can be deployed into a single cluster within the primary data center.

B.

Each distribution hub should be configured with a backup device.

C.

The wide area network has sufficient bandwidth to support centralized management.

D.

Each cluster will have a minimum of four hosts.

Question 19

An organization's existing vSphere environments are configured for Enhanced Linked Mode. The DevOps team automates the creation of hardened virtual machine images for various operating systems. Their continuous integration/continuous delivery (CI/CD) pipeline runs a task at the end of a successful build, which uploads the Open Virtualization Format (OV) image to a sandbox content library, deploys a virtual machine from the image, and then destroys these objects after quality checks are complete.

The following requirements have been noted:

  • All content libraries and images must be centrally created and managed.
  • All images must be capable of being updated.
  • All images must be refreshed and available to subscribed libraries within 24 hours.
  • All images must provide details of the image contents and versions.
  • All images must be capable of being reverted to a previous version.
  • All images must be capable of having the hardware and guest operating system customized during deployment.

Which three recommendations should the architect make to design a content library solution that will meet these requirements? (Choose three.)

Options:

A.

Create a local content library in the primary vSphere environment and enable publishing.

B.

Create and publish a new subscription to a new subscriber library for each target vSphere environment.

C.

Deploy the OVF images to vSphere and clone as an OVF template to a local content library.

D.

Deploy the OVF images to vSphere and clone as a VM template to a local content library.

E.

Edit the Auto Sync Refresh Interval advanced setting for each subscribed library.

F.

Add a new subscriber library from each vSphere environment.

Question 20

A new real-time financial service application is being developed by the engineering team at a financial firm and will be released as a public Software-as-a-Service (SaaS) offering. The solutions architect has designed and deployed a new vSphere environment and the supporting network infrastructure for hosting all public services. ESXi hosts are configured to use Precision Time Proalhazi@1tocol (PTP) and a local stratum-1 network time server.

Application provisioning and scaling will be managed by VMware vRealize Automation and can be run on Microsoft Windows or multiple distributions of Linux.

Which three recommendations should the architect include in the design to ensure that the service maintain timekeeping within an accuracy of one second? (Choose three.)

Options:

A.

Use Microsoft Windows Server as the guest operating system.

B.

Configure the chrony time-sync agent on each virtual machine guest operating system.

C.

Set the virtual hardware device to use Host System Time (NTP) for each virtual machine running the application.

D.

Add a precision clock virtual device to each virtual machine running the application.

E.

Use a Linux distribution as the guest operating system.

F.

Add a virtual watchdog timer (VWDT) device to each virtual machine running the application.

Question 21

An architect is designing a solution based on the following information:

  • Each ESXi host has a single physical NIC with two 10 Gbps ports.
  • There is a performance-based service-level agreement (SLA) that guarantees 15 Gbps bandwidth for production virtual machines at all times.
  • There is no budget to purchase additional hardware.
  • The hardware replacement SLA is based on a delivery agreement of two business days.

Which recommendation for the configuration of vSphere High Availability (HA) should the architect include in the design?

Options:

A.

Configure vSphere HA

Configure % based admission control Configure two isolation addresses

Consider an OEM with NIC failure conditions in their Proactive HA plugin

B.

Configure vSphere HA

Set das.IgnoreRedundantNetWarning to true

Consider an OEM with NIC failure conditions in their Proactive HA plugin

C.

Configure vSphere HA

Configure two existing data stores for heartbeat

Consider an OEM with NIC failure conditions in their Proactive HA plugin

D.

Configure Proactive HA Automation Level: Automated

Remediation: Maintenance mode for all failures

Consider an OEM with NIC failure conditions in their Proactive HA plugin

Question 22

An architect is designing the expansion of an existing vSphere 7 environment. The customer is requesting a design for a new cluster to support the anticipated future business growth. The requirements specified for the existing environment design must be considered when designing the new cluster.

The existing design has the following requirements:

  • REQ01 The environment has an availability target of 99.5% for all infrastructure.
  • REQ02 The recovery time objective (RTO) for Tier 1 virtual machines is one hour.
  • REQ03 Windows and Linux virtual machines must reside on separate clusters.
  • REQ04 Access to the management cluster within the environment must be controlled.

Which of the listed requirements would be classified as a functional requirement?

Options:

A.

The environment has an availability target of 99.5% for all infrastructure

B.

The recovery time objective (RTO) for Tier 1 virtual machines is one hour

C.

Access to the management cluster within the environment must be controlled

D.

Windows and Linux virtual machines must reside on separate clusters

Question 23

An architect is considering placement of virtual machines within an existing VMware software-defined data center (SDDC).

During the discovery phase, the following information is documented:

Cluster One

  • Six ESXi hosts
  • vSphere HA with host failures cluster tolerates = 1
  • Proactive HA is enabled and set to automated
  • Fully Automated vSphere DRS
  • Transparent Page Sharing (TPS) is enabled

Cluster Two

  • Eight ESXi hosts
  • vSphere HA with host failures cluster tolerates = 1
  • Proactive HA is disabled
  • Partially Automated vSphere DRS
  • Transparent Page Sharing (TPS) is disabled

Cluster Three

  • Three ESXi hosts
  • vSphere HA with admission control is disabled
  • Proactive HA is not supported
  • Transparent Page Sharing (TPS) is disabled

Virtual Machine Resource Profile 1

  • Memory sharing techniques should not be used
  • Virtual machines should be automatically restarted in the event of host failure if resources are available
  • Automated initial virtual machine placement

Virtual Machine Resource Profile 2

  • Memory sharing techniques should not be used
  • Virtual machines should be automatically restarted in the event of host failure regardless of available resources
  • Automated initial virtual machine placement

Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? (Choose two.)

Options:

A.

All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster One.

B.

All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster One.

C.

All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Two.

D.

All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster Two.

E.

All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Three.

Question 24

An architect is designing a vSphere environment for a customer based on the following information:

  • The vSphere cluster will have three hosts only due to budget considerations.
  • A database cluster (node majority) consisting of three virtual machines will be running on the vSphere cluster.

Which two recommendations can the architect make so that the customer achieves the highest level of

application availability while taking into consideration operational resiliency? (Choose two.)

Options:

A.

Create VM-VM anti-affinity rules

B.

Set das.respectvmvmantiaffinityrules to false

C.

Create VM-Host anti-affinity rules

D.

Disable vSphere HA during maintenance

E.

Set das.ignoreinsufficienthbdatastore to true

Question 25

An architect is tasked with reviewing the design of a VMware software-defined data center (SDDC) for a software development company. The platform is used to developing applications and services. It is important that the customer be able to accurately benchmark performance of developed applications.

The platform has recently commissioned new hosts to update the development cluster.

The development cluster host configuration is:

  • 4 ESXi hosts with 2 sockets × 16 cores
  • 512 GB RAM divided evenly between sockets
  • There is no resource contention

The benchmarking cluster host configuration is:

  • 8 ESXi hosts with 2 sockets × 8 cores
  • 256 GB RAM divided evenly between sockets
  • There is no resource contention

The customer is developing an application that includes a database virtual machine. The application developer states that the database virtual machine performs as required only when allocated 8 vCPUs 256 GB RAM. The database virtual machine performance meets the required levels when run from the development cluster. Performance benchmarking for the database virtual machine yields highly variable results when run from the benchmarking cluster. The application cannot be released without reliable performance benchmarking data.

What is a possible reason for the difference in performance test results between the development and benchmarking clusters?

Options:

A.

The database tier breaches a single NUMA node boundary for the benchmarking cluster

B.

The database tier breaches a single NUMA node boundary for the development cluster

C.

The development cluster can support a lower %Ready time per vCPU

D.

The development cluster has more available RAM per host

Question 26

An architect is tasked with designing a greenfield VMware software-defined data center (SDDC) solution that will be used to deliver a private cloud service for a customer.

During the initial meeting with the service owner and business sponsor, the customer has provided the following information to help inform the design:

  • The solution must support the concurrent running of 1,000 virtual machines
  • The production environment must be delivered across two geographically dispersed data centers All virtual machines must be capable of running in either data center.
  • The two data centers are currently connected to each other through a single but diversely routed, high bandwidth and low latency link.
  • The link between the two data centers is capable of supporting a round-trip time (RTT) of 150 ms The existing server hardware standard document states that all virtual infrastructure hosts must be deployed using vSAN ReadyNodes
  • The service owner has stated that it is critical to ensure the availability target of 99.9% All virtual machine backups must be completed using the existing backup service
  • The recovery time objective (RTO) for the service is five minutes
  • The recovery point objective (RPO) of the service is four hours

Which two elements represent risks to the successful delivery of this solution? (Choose two.)

Options:

A.

The use of only two data centers

B.

The network connectivity between data center sites

C.

The use of vSAN ReadyNodes

D.

The RTT on the link between the two data centers

E.

The use of the existing backup service

Page: 1 / 7
Total 88 questions