Which two of the listed requirements would be classified as performance non-functional requirements? (Choose two.)
An architect will be taking over control of a former Linux server fleet and repurposing the hardware into a new vSphere cluster. The current environment is already connected to the network but the hosts do not have any local disks. Since the fleet hardware is uniform, the architect can use a single ESXi image. All hosts within the cluster have the same CPU and memory capacity.
Which ESXi deployment method should the architect use?
An architect is finalizing the design for a new vCenter Server High Availability deployment.
What is one thing the architect must document in the design?
An architect is considering placement of virtual machines within an existing VMware software-defined data center (SDDC).
During the discovery phase, the following information is documented:
Cluster One
Six ESXi hosts
vSphere HA with host failures cluster tolerates = 1
Proactive HA is enabled and set to automated
Fully Automated vSphere DRS
Transparent Page Sharing (TPS) is enabled
Cluster Two
Eight ESXi hosts
vSphere HA with host failures cluster tolerates = 1
Proactive HA is disabled
Partially Automated vSphere DRS
Transparent Page Sharing (TPS) is disabled
Cluster Three
Three ESXi hosts
vSphere HA with admission control is disabled
Proactive HA is not supported
Transparent Page Sharing (TPS) is disabled
Virtual Machine Resource Profile 1
Memory sharing techniques should not be used
Virtual machines should be automatically restarted in the event of host failure if resources are available
Automated initial virtual machine placement
Virtual Machine Resource Profile 2
Memory sharing techniques should not be used
Virtual machines should be automatically restarted in the event of host failure regardless of available resources
Automated initial virtual machine placement
Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? (Choose two.)
During a requirements gathering workshop, the customer provides the following requirement:
A new vSphere platform must be designed securely and all interfaces must be protected against potential snooping.
How should this non-functional security requirement be documented?
For example:
'Your ESXi host uses several networks. Use appropriate security measures for each network, and isolate traffic for specific applications and functions. For example, ensure that VMware vSphere vMotion traffic does not travel over networks where virtual machines are located. Isolation prevents snooping. Having separate networks is also recommended for performance reasons.'
https://docs.vmware.com/en/VMware-vSphere/7.0/vsphere-esxi-vcenter-server-70-security-guide.pdf
Shay
6 months ago