(Choose two)
You are VMware architect working at a large enterprise where a new VMware platform is being
installed.
Based on conversations with the business, you establish that the RTO requirement is 8 hours, and
the RPO requirement is 15 minutes. After months of successful use, the system crashes at 4 p.m.
To meet the project SLA, _____________. (Choose two)
The recovery time objective is the point in time to which a system needs to be restored following a failure.
The recovery time objective is the point in time to which a system needs to be restored following a
failure.
The recovery point objective is the point in time to which a system needs to be restored following a failure.
The recovery point objective is the point in time to which a system needs to be restored following
a failure.
which of the following should be considered?
When considering incorporating redundancy into design, which of the following should be
considered?
Which of the following factors should influence the decision of whether to virtualize an application?
Which of the following factors should influence the decision of whether to virtualize an application?
(Choose three)
Which of the following describes the anticipated time until a solution component may fail?
Which of the following describes the anticipated time until a solution component may fail?
(Choose three)
A well-thought-out request for change document contains __________. (Choose three)
The current design meets both requirements.
You are a VMware platform designer at a large service provider reviewing a network design.
Two of the requirements are as follows:
R001: All traffic must be encrypted or separated.
R002: All components must be fault tolerant.
The current design involves software-based iSCSI storage with teamed 1 GB network cards for
the storage network. The iSCSI network has a uniqiue vLAN and network ID. The design ensures
that a different password is used for each LUN.
The current design meets both requirements.
The use of software-based iSCSI storage allows encryption to be used in logical designs.
The use of software-based iSCSI storage allows encryption to be used in logical designs.
Which of the following is not true if the vCenter fails when using this design?
You are reviewing a vSphere platform design. The system is planning to use a virtual vCenter
server. Which of the following is not true if the vCenter fails when using this design?