What is the primary mechanism used to secure data between data centers?
What is the primary mechanism used to secure data between data centers?
What is an important technical capability gained from doing this?
A company has invested in virtualization for all their non-mission critical applications and many of
their mission critical applications. They now want to convert their virtualized silos that are still
owned by each line-of-business into a true VDC.
What is an important technical capability gained from doing this?
Which capability must be in place prior to transitioning to this phase?
The CIO has asked you to review the status of your company’s VDC and validate that the
implementation has entered the IT-as-a-Service phase.
Which capability must be in place prior to transitioning to this phase?
Which distance networking technology is the most appropriate?
A small company asks you to design a VDC in each of their two data centers, using stretched
VLANs and native Fibre Channel extension to interconnect the environments. The data centers
are located 30 km apart. After inquiring with the local service providers, you find that only two
strands of dark fiber are available.
Which distance networking technology is the most appropriate?
What are the four key areas reported on a scorecard used to compare the assessments of internal IT to Service
What are the four key areas reported on a scorecard used to compare the assessments of internal
IT to Service Providers?
How should you instruct the administrator to configure the Private VLANs?
As part of a VDC design, you configured a number of virtual machine OS clusters. Each cluster
must have a non-routable network to accommodate system heartbeats. However, some of the
clusters house sensitive data that should not be accessible by any other cluster. For fault
tolerance purposes, the cluster nodes will never be hosted on the same hypervisor.
How should you instruct the administrator to configure the Private VLANs?
Which application virtualization architecture has been implemented?
An application executes code on a remote host while receiving keyboard and mouse input from
the endpoint. Which application virtualization architecture has been implemented?
How should you configure this environment to meet the requirements?
A VDC design requires 300 blade server chassis, each with two embedded Fibre Channel
switches, which are connected to two separate SAN fabrics. For ease of management, each fabric
can only be configured with a single VSAN.
How should you configure this environment to meet the requirements?
What can be done to expand the access layer and not impact the performance of the existing environment?
You are expanding the compute layer of a VDC, and need to add more access layer switches to
provide connectivity to the hypervisors. However, there are no available ports on the two
aggregation layer switches to accommodate the uplink connections from the new access layer
switches, and there is no available funding to purchase additional aggregation layer switches. The
active uplinks are operating at 95% of capacity.
What can be done to expand the access layer and not impact the performance of the existing
environment?
How should you configure this environment to meet the requirements?
A VDC design requires 300 blade server chassis, each with two embedded Fibre Channel
switches, which are connected to two separate SAN fabrics. For ease of management, each fabric
can only be configured with two VSANs. Each blade server chassis must connect to both VSANs.
How should you configure this environment to meet the requirements?