New Year Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

3V0-21.21 Questions and Answers

Question # 6

Which two statements are true about gathering functional business and application requirements? (Choose two.)

A.

It focuses on functional requirements with C-level stakeholders

B.

It leverages a single set of QUESTION NO:s for all stakeholders

C.

It might require multiple rounds of stakeholder interviews

D.

It builds stakeholder consensus

E.

It is a non-iterative process

Full Access
Question # 7

During a requirements gathering workshop, the customer’s Chief Information Security Office (CISO) provides the following requirements that are pertinent to the design of a new vSphere environment:

  • All operating system critical patches must be installed within 24 hours of release.
  • All virtual machine templates must be updated every three months in line with company policy.

Which requirement classification is being gathered for the design documentation?

A.

Security

B.

Manageability

C.

Recoverability

D.

Availability

Full Access
Question # 8

An architect is considering placement of virtual machines within an existing VMware software-defined data center (SDDC).

During the discovery phase, the following information is documented:

Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? (Choose two.)

A.

All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster One.

B.

All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster One.

C.

All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Two.

D.

All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster Two.

E.

All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Three.

Full Access
Question # 9

A customer has six hosts available in a cluster. When running at full capacity, all virtual machines can be run on two hosts.

How many hosts can the customer place into maintenance mode at the same time while still providing N+2 resiliency to the cluster?

A.

Two

B.

Three

C.

One

D.

None

Full Access
Question # 10

An architect is designing a vSphere environment for a customer based on the following information:

  • The vSphere cluster will have three hosts only due to budget considerations.
  • A database cluster (node majority) consisting of three virtual machines will be running on the vSphere cluster.

Which two recommendations can the architect make so that the customer achieves the highest level of

application availability while taking into consideration operational resiliency? (Choose two.)

A.

Create VM-VM anti-affinity rules

B.

Set das.respectvmvmantiaffinityrules to false

C.

Create VM-Host anti-affinity rules

D.

Disable vSphere HA during maintenance

E.

Set das.ignoreinsufficienthbdatastore to true

Full Access
Question # 11

A Cloud Service Provider wants to introduce backup as a service for a customer’s vSphere-based virtual machines.

The following information is noted:

  • They have a single four-port (2 × 10 GbE and 2 × 1 GbE) NIC per ESXi host
  • All top-of-rack (ToR) switches are 10 GbE and fully populated
  • The backup traffic must not impact existing services

Which two recommendations should the architect make to help the customer incorporate the service? (Choose two.)

A.

Enable and tag traffic on the backup distributed port group

B.

Add a new two-port 10 GbE NIC per ESXi host

C.

Replace the existing NIC with a two-port 25 GbE NIC per ESXi host

D.

Match the Class of Service (CoS) and Differentiated Services Code Point (DSCP) values to the physical network

E.

Create a new virtual switch using the 1 GbE uplinks

Full Access
Question # 12

During a requirements gathering workshop, the customer provides the following requirement (REQ) and constraints (CON):

  • REQ01: The customer is looking for a way to limit database virtual machine (VM) placement to save on CPU licensing costs.
  • CON01: There is a single cluster with no budget to scale.
  • CON02: All virtual machines must run on the consolidated cluster.

Which two design decisions should the architect make to meet the customer requirement? (Choose two.)

A.

The solution must use VM-VM anti-affinity rules

B.

The solution must use vSphere DRS in manual mode

C.

The solution must use a vRealize Orchestrator workflow for VM placement

D.

The solution must use VM-Host affinity rules

E.

The solution must use vSphere VM and host DRS groups

Full Access
Question # 13

An architect is designing a solution based on the following information:

  • Each ESXi host has a single physical NIC with two 10 Gbps ports.
  • There is a performance-based service-level agreement (SLA) that guarantees 15 Gbps bandwidth for production virtual machines at all times.
  • There is no budget to purchase additional hardware.
  • The hardware replacement SLA is based on a delivery agreement of two business days.

Which recommendation for the configuration of vSphere High Availability (HA) should the architect include in the design?

A.

Configure vSphere HA

Configure % based admission control Configure two isolation addresses

Consider an OEM with NIC failure conditions in their Proactive HA plugin

B.

Configure vSphere HA

Set das.IgnoreRedundantNetWarning to true

Consider an OEM with NIC failure conditions in their Proactive HA plugin

C.

Configure vSphere HA

Configure two existing data stores for heartbeat

Consider an OEM with NIC failure conditions in their Proactive HA plugin

D.

Configure Proactive HA Automation Level: Automated

Remediation: Maintenance mode for all failures

Consider an OEM with NIC failure conditions in their Proactive HA plugin

Full Access