Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

An administrator has registered an external identity source in a consolidated architecture and would like to make sure that any subsequent workload domains can be accessed using the same identity sources.

How can this goal be achieved with VMware Cloud Foundation?

A.

By configuring IWA as an identity source

B.

By configuring LDAPS as an identity source

C.

By keeping the pre-configured defaults

D.

By replicating vSphere SSO configuration

An architect is designing networking for a developer-ready infrastructure on VMware Cloud Foundation. During the discussion with the network team, a question comes up about the use of a routable CIDR range.

Which item uses this type of range?

A.

ClusterIP

B.

vSphere Pod

C.

Ingress

D.

Kubernetes services

Which order of operations deletes a VI Workload Domain from a VMware Cloud Foundation environment?

A.

1. Migrate VMs.

2. Remove NSX Edge clusters.

3. Remove the Workload Domain.

4. Decommission hosts.

5. Delete the network pool.

B.

1. Migrate VMs.

2. Remove NSX Edge clusters.

3. Remove the Workload Domain.

4. Delete the network pool.

5. Decommission hosts.

C.

1. Migrate VMs.

2. Remove the Workload Domain.

3. Decommission hosts.

4. Delete the network pool.

D.

1. Migrate VMs.

2. Decommission hosts.

3. Remove the Workload Domain.

4. Delete the network pool.

An administrator is tasked with creating a new VMware Cloud Foundation VI workload Domain using vVOLs as the principal storage.

Which three storage protocols are supported for the new commissioned hosts? (Choose three.)

A.

SCSI

B.

NFS

C.

FCoE

D.

FC

E.

SAS

F.

iSCSI

VCF design workshops were conducted, and the architect collected the following customer requirements for the newly planned VCF infrastructure:

• The new VCF infrastructure must target two zones: DEV/UAT and DMZ.

• The security team would like to have full management and network isolation between these two zones

• 12 hosts have been ordered for the solution.

• DEV/UAT workloads must comply with an erasure coding vSAN storage policy with the ability to tolerate the failure of two hosts.

Which workload domain sizing will be required to achieve these requirements?

A.

12-hosts workload domain for both zones, having a 4-hosts DEV cluster a 4-hosts UAT cluster, and a 4-hosts DMZ cluster

B.

12-hosts workload domain for both zones, having an 8-hosts DEV/UAT cluster, and a 4-hosts DMZ cluster

C.

8-hosts DEV/UAT workload domain, having a 4-hosts DEV cluster and a 4-hosts UAT cluster, in addition to a 4-hosts DMZ workload domain, having a 4-hosts DMZ cluster

D.

8-hosts DEV/UAT workload domain, having an 8-hosts DEV/UAT cluster, and a 4-hosts DMZ workload domain, having a 4-hosts DMZ cluster

A VMware Cloud Foundation (VCF) architect is presented with a customer's requirements for an architecture that needs to achieve:

• Network high availability across workloads in two data center locations.

• Maintain the least administrative overhead when performing day 2 operations.

• Decrease the RTO of both management plane and data plane when site-wide failure occurs

Which VCF design consideration should the architect recommend?

A.

VCF with NSX-T Bridging

B.

VCF with NSX-T L2-VPN

C.

VCF with NSX-T Federation

D.

VCF with NSX-T Multi-Site

Which two steps must be performed to create a vSphere with Tanzu namespace? (Choose two.)

A.

Deploy a vSphere Cluster

B.

Enable Harbor Image Registry

C.

Use a DNS-compliant name

D.

Assign permissions

E.

Define resource limits

A VMware administrator, who works for the U.S defense department, has been asked to upgrade the VMware Cloud Foundation software in a secure location. Due to security concerns, the VCF environment does not have any internet access.

The administrator can connect a laptop to the SDDC manager network but is not allowed to carry any storage media into the facility. To complete this work, the administrator has been given access to a network port where the laptop can be connected for internet access.

Which steps can the administrator follow to download the latest VCF software bundles?

A.

1. Download the latest VCF software bundles on the laptop.

2. Copy the bundles to SDDC manager using file sharing.

B.

1. Download all required OVAs onto the laptop.

2. Copy them to a USB drive.

3. Attach the drive to the SDDC manager appliance.

C.

1. Copy the bundle transfer utility from SDDC manager onto the laptop.

2. Use the utility to download the latest software bundles for the upgrade.

3. Copy the bundles to SDDC manager using file sharing.

D.

1. Download the latest bundle transfer utility from myvmware.com.

2. Use the utility to download the latest software bundles for the upgrade.

3. Copy the bundles to SDDC manager using file sharing.

A customer would like to use VCF in two new regional data centers, and they have a hard requirement to stretch layer 2 networks across the two sites. Both sites have a 130ms latency.

What would be the ideal solution?

A.

VCF with NSX-T Federation

B.

VCD with NSX-T IPSEC

C.

VCF with NSX-T Bridging

D.

VCF with NSX-T Multi-Site

A customer is leveraging vRA to provision workloads to a consolidated VCF domain cluster. Due to the increased demand of customer workloads, more capacity is now needed. The architect provides information on scaling the customer’s consolidated design.

Which statement accurately characterizes this design?

A.

Migrating to a standard design will require redeploying the infrastructure from scratch.

B.

Migrating to a standard design should be considered after reaching 8 or 10 nodes in the consolidated design.

C.

A VMware GSS team must be involved during the process of migrating to a consolidated design.

D.

A consolidated design will not support the addition of multiple clusters.