【单选题】
A vSphere administrator has been using vSphere in evaluation mode and now wants to deploy an environment that provides the same features. Which edition of vSphere provides similar functionality to evaluation mode? ___
A. Enterprise Plus
B. Enterprise
C. Standard
D. Essentials
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
An administrator has just configured the IP address on an ESXi host from the Direct Console User Interface. How can the configuration be validated as correct without any additional tools?___
A. Add the host to vCenter Server and if it works, then all networking settings are ok.
B. Select the Test Management Network option from the DCUI.
C. Connect to the host with the vSphere Client and click the Test Network option.
D. Use PowerCLI to connect to the host and initiate a network test.
【单选题】
An administrator is installing vCenter Server for an environment that has 40 ESXi 6.x Hosts and 150 virtual machines. Which database would meet the minimal requirements needed for this task? ___
A. vFabric Postgres
B. Microsoft SQL Express 2008
C. Microsoft SQL Server 2014
D. Oracle 11g
【单选题】
What is a requirement when enabling a Virtual SAN cluster in an existing High Availability (HA) and Distributed Resource Scheduler (DRS) Cluster? ___
A. Disable DRS and HA before enabling Virtual SAN
B. Enable DRS before enabling Virtual SAN
C. Disable HA before enabling Virtual SAN
D. Enable Storage DRS before enabling Virtual SAN
【单选题】
The vSphere administrator attempts to connect to an ESXi host via an SSH client and receives the following security alert: The vSphere administrator needs to determine whether the RSA key fingerprint shown in the security alert is the fingerprint of the intended ESXi host. Which tool should the vSphere administrator use? ___
A. Direct Console User Interface
B. vSphere Client
C. vSphere Web Client
D. vSphere Management Assistant
【单选题】
An administrator needs to monitor traffic on vSwitches in a vSphere 6.x environment. Which option, if configured, would accomplish this task? ___
A. Forged Transmits
B. MAC Address Changes
C. Promiscuous Mode
D. Notify Switches
【单选题】
What is true regarding datastores on ESXi 6.x? ___
A. NFS 4.1 datastore does not support Fault Tolerance (FT)
B. VMFS3 and VMFS5 datastores can be newly created
C. NFS datastore can be concurrently mounted using NFS 4.1 on one host and NFS on another
D. NFS 3.0 datastore does not support Fault Tolerance (FT)
【单选题】
An administrator is cloning and configuring five new web server virtual machines. What would be the benefit of configuring resource shares for the new VMs? ___
A. To prioritize access to a resource during contention.
B. To guarantee access to a resource during contention.
C. To prioritize access to a resource before contention occurs.
D. To guarantee access to a resource before contention occurs.
【单选题】
An administrator logs into the vSphere Web Client and sees the warning shown in the Exhibit. During a change control window, the warning was addressed. What should be done to verify that the host is no longer showing the warning? ___
A. Run a Remediate host operation.
B. Recheck the compliance of the host.
C. Restart the host to get rid of the warning.
D. Install VMware tools to clear the warning.
【单选题】
A vApp named Sales has a Memory Limit of 32 GB and a CPU Limit of 12,000 MHz. There are three virtual machines within the vApp: <Sales-DB -- Has a memory reservation of 20 GB. > <Sales-DC -- Has a memory reservation of 8 GB. > <Sales-Web -- Has a memory reservation of 8 GB.> Which statement is correct? ___
A. All three virtual machines can power on, but will have memory contention.
B. All three virtual machines can power on without memory contention.
C. Only two of the three virtual machines can power on.
D. Only one of the virtual machines can power on.
【单选题】
You are editing the management network configuration of an ESXi 6.x Host from the vSphere Web Client. You mistakenly put the incorrect VLAN in place for the management network. What action do you need to take to correct this? ___
A. You need to manually edit the configuration on the host with command line utilities.
B. No action is required. By default ESXi rolls back configuration changes that disconnect the host.
C. The ESXi host system configuration will need to be restored to the factory configuration to fix the issue.
D. The change can be reverted in the vSphere Web Client by simply editing the switch again.
【单选题】
What is true about resource pools created on a Distributed Resource Scheduler (DRS) cluster?___
A. A root resource pool is created with the specified values.
B. A root resource pool is automatically created using the aggregate total of the ESXi host resources in the cluster.
C. A root resource pool is automatically created using the aggregate total of all resources in the datacenter.
D. A root resource pool is not needed when creating resource pools on a DRS cluster.
【单选题】
An administrator attempts to enable Enhanced vMotion Compatibility (EVC) on a cluster. The operation results in a compatibility error, as shown in the exhibit. What is the likely cause of this error? ___
A. The CPUs in the ESXi host are not AMD CPUs.
B. The CPUs in the ESXi host do not support hardware virtualization capabilities.
C. The XD/NX CPU features have not been enabled in the BIOS of the server.
D. There is no shared storage between the hosts in the cluster.
【单选题】
What condition would prevent an administrator from creating a new VMFS3 datastore on an ESXi 6.x host using the vSphere Web Client? ___
A. A VMFS3 datastore cannot be created on an ESXi 6.x host.
B. The VMFS3 kernel module is not loaded.
C. A VMFS3 datastore cannot be mounted on an ESXi 6.x host.
D. VMFS3 datastores are not compatible with virtual machines created on an
E. SXi 6.x host.
【单选题】
During a new vSphere Distributed Switch configuration, where does the Maximum Transmission Unit (MTU) value get modified? ___
A. Uplink Settings
B. Switch Settings
C. Portgroup Settings
D. NIC Teaming Settings
【单选题】
A small company wants to use VMware products for its production systems. The system administrator needs to recommend a solution that will deliver High Availability to the company's production applications. What is minimum vSphere offering that will support this requirement? ___
A. vSphere Essentials
B. vSphere Essentials Plus
C. vSphere Hypervisor
D. vSphere Standard
【单选题】
Which scenario shows a reason for VMware Tools failing to install? ___
A. Virtual machine has a CD-ROM configured.
B. Guest OS Antivirus is blocking the VMware Tools installation.
C. Guest OS has 64-bit ldd (list dynamic dependencies) utility installed.
D. Virtual machine is powered on.
【单选题】
An administrator is configuring an ESXi 6.x host to use multiple NICs to resolve a management network redundancy error. After configuring a second NIC, the server is not able to communicate when the primary connection is taken down. The administrator analyzes the Exhibit shown here. Based on the exhibit, what is the likely cause of the issue? ___
A. vmnic4 is not attached to a vSwitch.
B. vmnic2 is not connected to a physical switch.
C. E1000 is the incorrect NIC
D. river for this card.
【单选题】
What information is required as part of an interactive ESXi 6.x installation? ___
A. Keyboard layout
B. IP Address
C. Root password
D. DNS information
【单选题】
What is the default load balancing policy for a newly created VMkernel port on a vSphere Distributed Switch? ___
A. Route based on orginating virtual port ID
B. Route based on IP Hash
C. Route based on source mac address
D. Route based on physical NIC load
【单选题】
An administrator deploys vCenter Server using the embedded Platform Services Controller. After testing the deployment for a couple of months, it is determined that the environment would be better served with an external Platform Services Controller. What should the administrator do to meet this new requirement? ___
A. Deploy a fresh instance of vCenter Server with an external Platform Services Controller.
B. Perform a fresh install of an external Platform Services Controller.
C. Migrate the embedded Platform Services Controller to an external Platform Services Controller.
D. Upgrade the embedded Platform Services Controller to an external Platform Services Controller.
【单选题】
Why are some virtual machines orphaned after rebooting a High Availability (HA) enabled host? ___
A. The Orphaned virtual machines have HA restart disabled.
B. The Orphaned virtual machines moved recently and the change did not persist.
C. The host is attached to failed storage.
D. The host just came out of maintenance mode.
【单选题】
Which vSphere 6 Standard Edition feature will allow an organization to ensure that critical multi-threaded applications have the maximum possible uptime? ___
A. Fault Tolerance
B. High Availability
C. Distributed Resource Scheduler
D. App HA
【多选题】
An application running in a virtual machine is experiencing performance issues. When utilizing performance monitoring utilities, it is noted that the CPU Utilization of the application is at 100%. Which two scenarios are probable causes of the CPU contention for the application? (Choose two.)___
A. There is a network I/O constraint.
B. There is a storage I/O constraint.
C. There is insufficient disk space assigned to the virtual machine.
D. The application is not virtualization aware.
【多选题】
A Fault Tolerance (FT) virtual machine with four vCPUs is experiencing high latency when performing ICMP and Application tests. What are three potential causes that may be attributing to this latency? (Choose three.)___
A. The FT network has insufficient bandwidth and is running on a 1GB Link.
B. The FT network is on a particularly high latency link.
C. The FT network has been configured with Network I/O Control.
D. The FT virtual machine is running an e1000 network adapter.
E. The
F. T virtual machine is running on poor performing network-based storage.
【多选题】
A virtual machine is experiencing performance issues. The following performance metrics are observed: <CPU usage value for the virtual machine is above 90%> < CPU ready value for the virtual machine is above 20%> Which two activities will likely resolve the performance issues? (Choose two.)___
A. Set a CPU reservation for the virtual machine.
B. Increase the CPU limit on the virtual machine.
C. Decrease CPU shares equally for all virtual machines on the host.
D. Increase CPU shares equally for all virtual machines on the host.
【多选题】
An administrator is upgrading a vSphere Distributed Switch. The existing switch is version 6.0 and the administrator wants to upgrade to the latest version possible. The environment contains several ESXi 6.1 hosts. Which two options are available to ensure that the upgraded switch will be compatible with these hosts? (Choose two.)___
A. Upgrade the vSphere Distributed Switch to 6.0
B. Upgrade the ESXi 5.5 hosts to version 6.0, then upgrade the vSphere Distributed Switch to 5.5
C. Upgrade the vSphere Distributed Switch to 5.1
D. Upgrade the
E. SXi host switches to 5.5, then upgrade the vSphere Distributed Switch to 5.5
【多选题】
An administrator attempts to create a Thick Provisioned Virtual Disk (VMDK) on an NFS datastore; but it fails. Which two reasons would explain the failure? (Choose two.)___
A. Datastore is on an NFS 3 storage server that does not support Hardware Acceleration
B. Datastore is on an NFS 4.1 storage server
C. Only VMFS datastores support "Thick Provisioned" VMDK
D. The NFS datastore was not created on a "Thick Provisioned" device
【多选题】
Which two NFS Protocol versions does vSphere 6 support? (Choose two.)___
A. Version 3
B. Version 3.1
C. Version 4
D. Version 4.1
【多选题】
Which three operations occur during a cold migration of a virtual machine? (Choose three.)___
A. The virtual machine disks are moved if the datastore is being changed.
B. The virtual machine is registered with the destination server.
C. The source virtual machine is removed from the old hosts.
D. The virtual machine hardware is upgraded.
E. The virtual machine files are quiesced prior to the migration.
【多选题】
A 4 GB Memory virtual machine is experiencing extended memory issues, as shown in the Exhibit. What potential issues could be attributed to this memory pressure?___
A. A limit is imposed on the virtual memory of this virtual machine.
B. The Balloon driver has been uninstalled.
C. A limit has been imposed on the Virtual CPU of the virtual machine.
D. Storage IO control has been enabled for the virtual machine causing the swapped memory.
【多选题】
You are creating a virtual machine in the Web Client using the New Virtual Machine wizard. Which two steps are required? (Choose two.)___
A. Select a valid name.
B. Select a cluster for the compute resource.
C. Select a network adapter.
D. Select the virtual machine compatibility.
【多选题】
An administrator has been given requirements to configure vMotion for a new virtual machine. The configuration should: <Provide Network Redundancy Use VLAN 550> <Be secured against anyone trying to spoof communication The vSwitch1 configuration is shown in the Exhibit.> Which three changes should be made to meet the stated requirements? (Choose three.)___
A. The VLAN ID must be set appropriately.
B. The default values for MAC Address Changes and Forged Transmits must be altered.
C. The teaming and failover adapters must be set appropriately.
D. The Traffic Shaping configuration must be altered.
E. The Load Balancing Policy must be set appropriately.
【多选题】
Which three traffic types are available services options when configuring a vmkernel port? (Choose three.)___
A. Provisioning Traffic
B. Virtual Volumes Traffic
C. vSphere Replication NFC Traffic
D. Virtual SAN Traffic
E. FCoE Traffic
【多选题】
An administrator logs into the vSphere Web Client, but is unable to see any hosts and clusters. Which two options could fix the problem? (Choose two.)___
A. Verify that the client web browser and vCenter Server are in the same broadcast domain.
B. Verify that the vCenter Server system is registered with the same Platform Services Controller as the vSphere Web Client.
C. Log in to the vCenter Server as a user within the Active
D. irectory domain.
【多选题】
Which three VLAN Tagging modes are available in vSphere 6.x? (Choose three.)___
A. External Switch Tagging
B. Private VLAN Tagging
C. Virtual Switch Tagging
D. VXLAN Tagging
E. Virtual Guest Tagging
【多选题】
Which two statements are true about VMFS5 datastores on ESXi 6.x? (Choose two.)___
A. Virtual Disk (VMDK) size can be larger than 2TB.
B. Datastore extent size can be larger than 2TB.
C. Only Physical Mode Raw
D. evice Map (Passthrough-RDM) can be larger than 2TB.
【多选题】
Which two statements are correct when turning off a Distributed Resource Scheduler (DRS) Cluster? (Choose two.)___
A. The resource pool hierarchy of the DRS cluster is maintained.
B. The resource pool hierarchy of the DRS cluster is removed.
C. The affinity settings of the
D. RS cluster are removed and not maintained when DRS is re-enabled.
【多选题】
An administrator is creating a new Virtual SAN cluster on a Layer 2 network. There is an existing Virtual SAN cluster on the same Layer 2 network. Which two actions would allow the new Virtual SAN cluster to coexist with the older cluster? (Choose two.)___
A. Change the default Multicast Address on the new Virtual SAN cluster.
B. Change the default Unicast Address on the new Virtual SAN Cluster.
C. Create a separate VLAN for each cluster.
D. Create an ARP Alias for the Virtual SAN VMkernel Network Adapter.
【多选题】
A vCenter Operations Manager 5.7 environment is upgraded to vRealize Operations. After the upgrade, the analytics services fail to start. Which three steps must be taken to resolve the problem? (Choose three.)___
A. Take the vRealize Operations cluster offline.
B. Delete the activity persistence files.
C. Bring the cluster back online.
D. Remove any unresponsive nodes.
E. Stop the CaSA service.
【多选题】
An organization has an ESXi 6.x host that contains two resource pools. The host is being relocated to a DRS cluster. What two actions can be taken to integrate the host into the cluster, and what would happen to the existing ESXi resource pool hierarchy as a result? (Choose two.)___
A. Place all of the host's virtual machines into the DRS cluster root resource pool. The resource pools present on the host will be deleted.
B. Create a resource pool for the ESXi host's virtual machines and resource pools. The resource pools present on the host will be deleted.
C. Place all of the host's virtual machines into the DRS cluster root resource pool. The resource pools present on the host will be preserved.
D. Create a resource pool for the
E. SXi host's virtual machines and resource pools. The resource pools present on the host will be preserved.
推荐试题
【单选题】
下列___不是常用程序的默认端口。
A. 80
B. 8080
C. 23
D. 21
【单选题】
实现DoS攻击的手段有哪些?___
A. 滥用合理的服务请求
B. 制造高流量无用数据
C. 利用传输协议缺陷
D. 以上都对
【单选题】
SYN洪水攻击是利用什么特性来发动攻击的?___
A. IP头的RST位
B. 主机自动进行回复的服务
C. 三次握手
D. 广播地址的特性
【单选题】
泪滴也称为分片攻击,它是一种典型的利用___的漏洞进行拒绝服务攻击的方式。
A. IMCP协议
B. TCP/IP协议
C. ARP协议
D. HTTP协议
【单选题】
以下选项中,不属于DoS技术攻击的是___
A. 组合攻击
B. UDP洪水
C. 泪滴
D. SYN洪水
【单选题】
以下对拒绝服务攻击的分类叙述正确的是___
A. 按漏洞利用方式分类,可分为特定资源消耗类和暴力攻击类
B. 按攻击数据包发送速率变化方式分类,可分为固定速率和可变速率
C. 按攻击可能产生的影响,可分为系统或程序奔溃类和服务降级类
D. 以上都对
【单选题】
构造一个特殊的SYN包,需要什么___
A. 源地址和目标地址相同
B. 源代码和目标代码相同
C. 数据源
D. 主机
【单选题】
以下选项中,属于DDoS工具产生的网络通信信息的是?___
A. 检测通信
B. 查询请求通信
C. 控制信息通信
D. 数据包
【单选题】
以下选项中,可被WinNuke攻击的目标端口是?___
A. 139
B. 138
C. 113
D. 以上都对
【单选题】
以下选项中,不属于分布式拒绝服务攻击的防御方法的是?___
A. 优化网络和路由结构
B. 保护主机系统安全
C. 滥用合理的服务请求
D. 与因特网服务供应商合作
【单选题】
下列选项中,能用来检测DDoS软件的是___
A. RID
B. TID
C. TFN
D. RAD
【单选题】
交换机由四个基本元素组成。以下不属于的是___
A. 端口
B. 工作区
C. 缓冲区
D. 信息帧的转发机构
【单选题】
以下哪一项不属于网络嗅探技术的优势?___
A. 原理简单
B. 易于实现
C. 易于被发现
D. 难以被察觉
【单选题】
以下哪一项不属于网卡的工作模式?___
A. 广播模式
B. 组播模式
C. 间接模式
D. 混杂模式
【单选题】
网卡数据包中无用的数据可以通过哪方面过滤___
A. 站过滤
B. 协议过滤
C. 服务过滤
D. 以上都对
【单选题】
低级动态链接库运行在哪一层?___
A. 网络层
B. 链路层
C. 用户层
D. 物理层
【单选题】
目前的网络嗅探防范技术主要有___
A. 采用安全的网络拓扑结构
B. 会话加密技术
C. 防止ARP欺骗
D. 以上都对
【单选题】
以下哪一项不属于数据通道加密方式。___
A. SSH
B. SLS
C. SSL
D. VPN
【单选题】
以下关于检测网络中可能存在的嗅探,说法错误的是___
A. 可以通过检测组播模式网卡
B. 可以通过检测网络通信丢包率
C. 可以通过检测网络带宽异常
D. 可以通过检测混杂模式网卡
【单选题】
关于交换网络下防监听的措施,以下说法错误的是___
A. 使用动态的ARP或IP-MAC对应表,自动跟新
B. 使用静态的ARP或IP-MAC对应表,手动跟新
C. 不要把网络安全建立在单一的IP或MAC基础上
D. 定期检查ARP要求,使用ARP监视工具
【单选题】
UNIX系统的典型代表BSD下的监听程序结构分为三部分,以下不属于的是___
A. MAC
B. 网卡驱动程序
C. BPF捕获机制
D. LibPcap
【单选题】
口令破解是入侵一个系统最常用的方式之一,获取口令有很多种方法,错误的是___
A. 利用搜索IP地址进行口令破解
B. 使用穷举法进行口令破解
C. 利用口令文件进行口令破解
D. 通过嗅探和木马等手段获取口令
【单选题】
自动破解的一般过程如下:①找到所用的加密算法。②创建可能的口令名单。③对所有的userID观察是否匹配。④获取加密口令。⑤找到可用的userID。⑥对每个单词加密。⑦重复以上过程,直到找到所有口令为止。正确顺序是___
A. ①②③④⑤⑥⑦
B. ⑤①④②⑥③⑦
C. ①④⑤②⑥③⑦
D. ⑤①④⑥②③⑦
【单选题】
三种口令攻击类型:词典攻击、强行攻击、组合攻击,对攻击速度方面,以下正确的是?___
A. 强行攻击的攻击速度比词典攻击快
B. 强行攻击的攻击速度比组合攻击快
C. 组合攻击的攻击速度比强行攻击快
D. 组合攻击的攻击速度比词典攻击快
【单选题】
三种口令攻击类型:词典攻击、强行攻击、组合攻击,可破解的口令数量方面,正确的是?___
A. 词典攻击:只找到以词典攻击为基础的口令
B. 强行攻击:只找到以词典攻击为基础的口令
C. 组合攻击:只找到以词典攻击为基础的口令
D. 词典攻击:找到所有的口令
【单选题】
口令破解器通常由哪三个方面组成,下面错误的是___
A. 口令破解模块
B. 口令加密模块
C. 口令比较模块
D. 候选口令产生器
【单选题】
众所周知,John The Ripper功能强大,运行速度快,可进行字典攻击和强行攻击,他提供了几种破解模式。以下哪一个不是他提供的破解模式___
A. 简单破解模式
B. 中等破解模式
C. 增强破解模式
D. 外挂模块破解模式
【单选题】
如何保障口令的安全,一般说来,就是要防止这些口令信息未经授权的哪项?___
A. 泄露
B. 修改
C. 删除
D. 以上都是
【单选题】
怎么样才能保证口令安全性?___
A. 不要将口令写下来
B. 不要将口令以明文的形式存于电脑文件中
C. 不要选取显而易见的信息作口令
D. 以上都是
【单选题】
基于目前的技术,强口令必须具备一些特征,错误的是___
A. 每50天换一次
B. 至少包含10个字符
C. 必须包含一个字母、一个数字、一个特殊的符号
D. 字母、数字、特殊符号必须混合起来,而不是简单地添加在首部或尾部
【单选题】
工具Pwdump6的语法格式。说法正确的是___
A. 横杠o:显示本程序的用法
B. 横杠u:指定用于连接目标的用户名
C. 横杠p:指定连接上使用的共享,而不是搜索共享
D. 横杠n:指定用于连接目标的口令
【单选题】
拒绝网络攻击的防御的困难之处有哪些?___
A. 不容易定义攻击者位置
B. 各种反射式攻击,无法定位源攻击者
C. 完全阻止是不可能的,但是适当的防范工作可以减少被攻击的机会
D. 以上都是
【单选题】
网络供给的防御方法有哪些?___
A. 有效完善的设计
B. 宽带限制
C. 只允许必要的通信
D. 以上都是
【单选题】
哪一个不是从实施DoS攻击所用的思路来分类的拒绝服务攻击?___
A. 滥用合理的服务请求
B. 制造高流量无用数据
C. 暴力攻击类
D. 利用传输协议缺陷
【单选题】
根据可恢复的程度,系统或程序崩溃类又可以分为?___
A. 自我恢复类
B. 人工恢复类
C. 不可恢复类
D. 以上都是
【单选题】
服务降级类是指系统对外提供的服务?___
A. 上升
B. 不变
C. 下降
D. 不知道
【单选题】
泪滴也被称为什么攻击?___
A. 集合攻击
B. 反攻击
C. 分片攻击
D. 偏移攻击
【单选题】
SYN洪水供给比较难防御,以下是解决方法的是?___
A. 负反馈策略
B. 退让策略
C. 防火墙
D. 以上都是
【单选题】
Land攻击是利用TCP的几次握手过程的缺陷进行攻击?___
A. 1
B. 2
C. 3
D. 4
【单选题】
Fraggle攻击是通过的是什么应答消息?___
A. ICMP
B. TCP
C. UDP
D. IP