Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

VMware 2V0-13.24 - VMware Cloud Foundation 5.2 Architect Exam

Page: 2 / 3
Total 90 questions

The following are a list of design decisions made relating to networking:

NSX Distributed Firewall (DFW) rule to block all traffic by default.

Implement overlay network technology to scale across data centers.

Configure Cisco Discovery Protocol (CDP) - Listen mode on all Distributed Virtual Switches (DVS).

Use of 2x 64-port Cisco Nexus 9300 for top-of-rack ESXi host switches.

Which design decision would an architect document within the logical design?

A.

Use of 2x 64-port Cisco Nexus 9300 for top-of-rack ESXi host switches.

B.

NSX Distributed Firewall (DFW) rule to block all traffic by default.

C.

Implement overlay network technology to scale across data centers.

D.

Configure Cisco Discovery Protocol (CDP) - Listen mode on all Distributed Virtual Switches (DVS).

A customer defined a requirement for the newly deployed SDDC infrastructure which will host one of the applications responsible for video streaming. Application will run as part of a VI Workload Domain with dedicated NSX instance and virtual machines. Required network throughput was defined as 250 Gb/s. Additionally, the application should provide the lowest possible latency. Which design decision should be recommended by an architect for the NSX Edge deployment?

A.

Deploy 2 NSX Edges using NSX console and add to Edge cluster created in SDDC Manager.

B.

Deploy 4 extra large edges using vCenter Server console.

C.

Deploy NSX bare-metal Edges and create Edge Cluster using NSX console.

D.

Deploy 2 large NSX Edges using SDDC Manager.

Which Operating System (OS) is not supported by Aria Operations for OS and Application Monitoring?

A.

Windows Server 2012 R2

B.

CentOS

C.

Windows Server 2012

D.

MacOS

A VMware Cloud Foundation design incorporates the following technical requirements:

All management components must have their login sessions timeout after 2 minutes of inactivity.

Communication between management components should be limited to required ports only.

Modifications required by compliancy should not impact the management components’ functionality.

What would be the recommendation from a design perspective that would aid in achieving the above requirements?

A.

Consult the vSphere Security Configuration kit

B.

Leverage the results of a vulnerability assessment and apply the recommendations

C.

Consult the Compliance Kit for VMware Cloud Foundation

D.

Apply NSX DFW (Distributed Firewall) to achieve zero-trust

An architect is updating a design document in preparation for an expansion of their organization's existing VCF environment. Following the completion of a capacity assessment, a new cluster will be deployed to support the hosting of future application deployments. Due to restrictions on the availability of budget for the project, the hardware for the additional cluster has already been procured and there is no additional budget available for future procurements. What should the architect include within the design documentation based on this approach?

A.

A constraint that the procured hardware must be used due to budget restrictions.

B.

A risk that additional hardware is not available for purchase.

C.

A requirement that the cluster must be deployed within the existing workload domain.

D.

An assumption that the new cluster will provide sufficient capacity for the applications.

An architect had gathered the following requirements and constraints for a VMware Cloud Foundation (VCF) deployment.

Requirements:

• User interface (UI) SSL certificates must have a maximum validity of 6 months.

• Have the least possible administrative time to install and renew certificates.

• Each certificate must be created on a per VCF component basis.

Constraints:

• Limited administrative skillsets on SSL certificate administration

• Limited operational expenditure budget for SSL certificates

Which design decision should be made to satisfy the stated requirement(s) and constraint(s)?

A.

Use wildcard certificates

B.

Use and configure integration with a certificate vendor such as DigiCert

C.

Disable the use of SSL certificates for user interfaces

D.

Use and configure integration with Microsoft Certificate Authority (CA)

During a security-focused design workshop for a new VMware Cloud Foundation (VCF) solution, a key stakeholder described the current and potential future approach to user authentication within their organization. The following information was captured by an architect:

All users within the organization currently have Active Directory-backed user accounts.

A separate project is planned to evaluate the use of different 3rd-party identity solutions to enforce Multi-Factor Authentication (MFA) on all user accounts.

The MFA project will only provide a recommendation on which identity solution the organization should implement.

The MFA project will need to request budget for any licenses that need to be procured for the recommended identity solution.

The new VCF environment may be deployed before the MFA project has completed and therefore must be able to integrate with both the current and any proposed future identity solutions.

Which TWO items should the architect include in their design documentation? (Choose TWO.)

A.

An assumption that the new 3rd-party identity solution will be compatible with VCF

B.

An assumption that the MFA project will not receive budget to implement a new 3rd-party identity solution

C.

A requirement that VCF will integrate only with the new 3rd-party identity solution

D.

A risk that the new 3rd-party identity solution may not be compatible with Active Directory

E.

A risk that the new 3rd-party identity solution may not be compatible with VCF

During a transformation project kick-off meeting, an architect highlights specific areas on which to focuswhile developing the new conceptual design. Which statement is the business requirement?

A.

The solution must continue to operate even in case of an entire datacenter failure.

B.

The project should use the existing storage devices within the data center.

C.

Sites must support a network latency of less than 12 ms RTT.

D.

There is no budget specifically assigned for disaster recovery.

The following are a set of design decisions related to networking:

DD01: Set NSX Distributed Firewall (DFW) to block all traffic by default.

DD02: Use VLANs to separate physical network functions.

DD03: Connect the management interface eth0 of each NSX Edge node to VLAN 100.

DD04: Deploy 2x 64-port Cisco Nexus 9300 switches for top-of-rack ESXi host connectivity.

Which design decision would an architect include in the logical design?

A.

DD04

B.

DD01

C.

DD03

D.

DD02

A customer is deploying VCF at a new datacenter location. They will migrate their workloads from the existing datacenter to the new VCF platform over six months. Both datacenters will run simultaneously for six months during the migration. Which of the following should be a documented risk?

A.

Six months may not be enough time to complete the migration.

B.

There will be connectivity between the two locations.

C.

Bandwidth between the two locations is sufficient to accommodate the workload migration.

D.

Workloads will be powered off during migration.