VMware Certified Advanced Professional 6.5 – Data Center Virtualization Design 3V0-624 Exam Questions

Page: 1 / 14
Total 142 questions
Question 1

View the Exhibit.

Referring to the Exhibit, identify the two single points of failure in this design. (Choose two.)



Answer : D, E


Question 2

A customer has requested a vSphere 6.5 deployment design that utilizes vCenter Server and the use of VMware-recommended best practices for securing vCenter Server.

Which three actions would satisfy these requirements? (Choose three.)



Question 3

A company has asked a systems architect to ensure that a backup solution leverages VMware vSphere Storage APIs -- Data Protections (VCAP).

Which logical design concept applies to the situation?



Answer : A


Question 4

A number of factors determine how many physical adapters are needed in a host design. Which of the following is not one of them?



Answer : A


Question 5

A business organization has different types of network traffic, and all the types of traffic must be kept separated. The design architect knows that the number of required networks is greater than the number of physical ports in the system.

Which three choices can the architect use to keep the traffic separated? (Choose three.)



Answer : B, C, D


Question 6

A solutions architect has made the following design decisions:

* Leverage existing hardware that is certified on earlier versions of vSphere but is NOT on HCL for ESXi 6.5.

* Upgrade vCenter Server to version 6.5.

* Configure separate clusters based on ESXi versions 5.5, 6.0, and 6.5 for newly purchased, certified hardware.

* The underlying CPU family is compatible.

* There is enough resources available to vMotion virtual machines (VMs)

Given this scenario, what is the correct statement about the ability to vMotion virtual machines between versions of ESXi?



Question 7

A customer is using blade servers with only one HBA.

Which two design concepts apply to this scenario? (Choose two.)



Answer : B, C

One HBA is a single point of failure and therefore a risk.Using this hardware configuration is a constraint (which although might also be a non-functional requirement


Page:    1 / 14   
Total 142 questions