시험덤프
매달, 우리는 1000명 이상의 사람들이 시험 준비를 잘하고 시험을 잘 통과할 수 있도록 도와줍니다.
  / 3V0-21.23 덤프  / 3V0-21.23 문제 연습

VMware 3V0-21.23 시험

VMware vSphere 8.x Advanced Design 온라인 연습

최종 업데이트 시간: 2025년06월05일

당신은 온라인 연습 문제를 통해 VMware 3V0-21.23 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.

시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 3V0-21.23 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 185개의 시험 문제와 답을 포함하십시오.

 / 3

Question No : 1


An architect is designing a new vSphere 8 environment and needs to plan the migration of virtual machines from the source vSphere 7 infrastructure.
The following has been captured about the source infrastructure and project:
All virtual machines operate supported versions of Microsoft Windows All virtual machines have VMware Tools 11 or higher installed vCenter Enhanced Linked Mode is configured VMware PowerCLI is available in the environment No budget is available for discovery tooling
The architect must capture and review active services from inside running virtual machines to inform the migration design.
Considering the information available, which method can the architect use to acquire the information required?

정답:
Explanation:
Given that VMware Tools 11 or higher is installed on all virtual machines and VMware PowerCLI is available in the environment, the architect can leverage PowerCLI to interact with VMware Tools and collect information about active services running inside the virtual machines.
VMware PowerCLI allows you to query virtual machines for information about their services by accessing the guest operating system, provided VMware Tools is installed and running. You can use PowerCLI cmdlets to retrieve service data, such as which services are running on the VM, their statuses, and other details necessary for planning the migration.
This option is cost-effective since there is no budget available for additional discovery tooling, and it aligns well with the existing tools and infrastructure already in place.

Question No : 2


An architect is tasked with designing a solution to monitor the operational state of a VMware Cloud Foundation environment through ad-hoc reporting and custom dashboards, alerts, and notifications.
Using VMware Validated Solutions, which validated solution can the architect leverage to meet this requirement?

정답:
Explanation:
Intelligent Operations Management for VMware Cloud Foundation is designed to help monitor the operational state of a VMware Cloud Foundation environment. It provides capabilities for ad-hoc reporting, custom dashboards, alerts, and notifications. This validated solution ensures comprehensive monitoring and management of the environment, addressing the requirements for reporting and monitoring the operational state of the infrastructure.

Question No : 3


An architect is documenting the design for a new multi-site vSphere solution. The customer has informed the architect that the workloads hosted on the solution are managed by application teams who must perform a number of steps to return the application to service following a failover of the workloads to the secondary site. These steps are defined as the Work Recovery Time (WRT). The customer has provided the architect with the following information about the workloads, including the recovery time objective (RTO) and recovery point objective (RPO):
Critical workloads have a WRT of 12 hours
Production workloads have a WRT of 24 hours
Development workloads have a WRT of 24 hours
All workloads have an RPO of 4 hours
Critical workloads have an RTO of 1 hour
Production workloads have an RTO of 12 hours
Development workloads have an RTO of 24 hours
The customer has also confirmed that production and development workloads are managed by the same team and the disaster recovery solution will not begin the recovery of the development workloads until all critical and production workloads have been recovered at the secondary site.
Which three statements would the architect document as the maximum tolerable downtime (MTD)
for workloads within the design? (Choose three.)

정답:
Explanation:
Critical Workloads: 12 hours
For critical workloads, the recovery time objective (RTO) is 1 hour, and the work recovery time (WRT) is 12 hours. Since the customer can tolerate a maximum of 12 hours to restore these workloads after a disaster, the MTD for critical workloads is 12 hours.
Development Workloads: 24 hours
For development workloads, the RTO is 24 hours and the WRT is also 24 hours. Therefore, the MTD for development workloads is 24 hours because it is the maximum time that the customer can tolerate for these workloads to be unavailable.
Production Workloads: 24 hours
Production workloads have an RTO of 12 hours and a WRT of 24 hours. Since the disaster recovery solution waits for the recovery of critical and production workloads before recovering development workloads, the MTD for production workloads can be up to 24 hours, including the time to fully recover both critical and production workloads.

Question No : 4


An architect is conducting interviews to gather requirements for a new vSphere-based private cloud solution.
The following information has been provided by the customer:
The customer, after 10 years within an outsourced managed service contract, has decided to bring application hosting back in-house but lacks the VMware skills to support this.
The customer currently has 5,000 workloads under contract and managed by their partner.
The customer would like to keep IT infrastructure costs at a minimum.
The customer would like to ensure that the solution supports the company's green IT agenda by reducing their carbon footprint.
Which statement is classified as a business factor that would impact the design?

정답:
Explanation:
This is a business factor because it directly relates to the financial goals and constraints of the customer. Keeping IT infrastructure costs at a minimum will impact the design by influencing decisions regarding hardware selection, deployment scale, and resource allocation, among other factors.

Question No : 5


As part of designing a greenfield vSphere-based hosting solution, an architect is responsible for defining a patch management solution for the virtual infrastructure.
During initial meetings with the customer, the following information is provided:
There are two geographically dispersed physical sites (primary and secondary) in scope for the solution.
The inter-site connectivity has been classified as low bandwidth and high latency.
The customer has the following requirements:
REQ001 - Only IT Security Team-approved versions of VMware Tools should be installed across all workloads within the infrastructure.
REQ002 - The solution should minimize traffic across the inter-site link.
REQ003 - Upgrades to the virtual infrastructure should continue in the event of a failure with either site.
A combination of which three design decisions could the architect make to ensure the requirements are met? (Choose three.)

정답:
Explanation:
The solution will ensure that all VMware ESXi hosts within a site have access to the local VMFS datastore containing the shared VMware Tools repository.
This decision ensures that each site has local access to the VMware Tools repository, which minimizes traffic across the low-bandwidth, high-latency inter-site link. By keeping the repository within each site, the local ESXi hosts can access the repository without needing to traverse the inter-site link frequently.
The solution will set the UserVars.ProductLockerLocation advanced system setting on each VMware ESXi host to point to the local site shared repository.
This ensures that each ESXi host points to the local site repository for VMware Tools. This approach minimizes inter-site traffic by ensuring that all updates and patches are performed using local
resources, avoiding the need to transfer VMware Tools files over the low-bandwidth, high-latency connection.
The solution will create a shared repository on a VMFS datastore within each site that contains all approved versions of VMware Tools.
This decision ensures that both sites have a local copy of the approved VMware Tools versions, in line with REQ001, which mandates that only IT Security Team-approved versions of VMware Tools should be installed. Additionally, it minimizes inter-site traffic, as both sites will use their local repositories.

Question No : 6


What are two benefits of the VMware Validated Solutions? (Choose two.)

정답:
Explanation:
VMware Validated Solutions offer prescriptive, step-by-step runbooks that help guide users through the deployment process. These runbooks ensure that the implementation follows VMware's recommended practices, reducing complexity and ensuring consistency across deployments.
VMware Validated Solutions are designed based on VMware's best practices, ensuring that the deployed solution is optimized for performance, security, and scalability. This helps organizations achieve a reliable and efficient infrastructure aligned with VMware's recommended guidelines.

Question No : 7


An architect is designing a new vSphere-based solution for a customer.
During a requirement gathering workshop, the following information is provided:
The solution must have a primary and secondary site.
The solution must support a maximum of 1,000 concurrent workloads.
The profile of the workloads are as follows:
- Production Workloads
-- 300 x Small: 1 vCPU, 2 GB RAM
-- 400 x Medium: 2 vCPU, 6 GB RAM
-- 100 x Large: 4 vCPU, 8 GB RAM
- Development Workloads
-- 200 x Small: 1 vCPU, 2 GB RAM
The corporate security policy states that, during normal operations, production workloads must be physically segregated from development workloads.
All production workloads are split evenly across the primary and secondary site.
All development workloads run only within the secondary site.
In the event of a disaster affecting workloads in the primary site, the secondary site must be capable of running all production and development workloads.
The vCPU to physical core ratio should be a maximum of 10:1 for production workloads and 20:1 for development workloads.
The solution should provide a minimum of N + 1 resiliency at each component level.
The target physical host hardware platform has already been defined by the company's hardware standards and therefore each host has the following configuration:
-- 2 x 24 physical cores
-- 768 GB RAM
-- 2 x 100 GB SSD drives
-- 6 x 10 GbE network cards
What is the minimum number of hosts required to meet the requirements?

정답:
Explanation:

Question No : 8


An architect is tasked with devising a vSphere design strategy that will allow the company to quickly scale global data center functionality when a new location is identified.
The following requirements must be met:
The solution must include VMware licensing costs.
The design must keep data locally to each specific location.
The design must utilize current company processes around vSphere.
Any new global location must be functional within one month of identification.
Which design strategy will meet these requirements?

정답:
Explanation:
This strategy meets the requirements because:
Keeps data locally: By selecting a partner with a global data center presence, data can remain local to each specific location, meeting the geographical data residency requirement.
Quick scalability: The partner already has data centers in place, enabling the company to scale quickly and be functional within one month, which meets the timeline requirement.
Utilizes current processes: The existing processes around vSphere can still be leveraged since the partner can deploy compatible company architecture that aligns with the company's current infrastructure and processes.
VMware licensing costs: VMware licenses would be managed as part of the partnership arrangement, ensuring costs are aligned with the company's existing VMware infrastructure.

Question No : 9


An architect is creating a design for a new vSphere solution to meet the following business requirement:
REQ001 - Reduce operational expenditure
Which design decision could the architect include in the logical design to satisfy this requirement?

정답:
Explanation:
vSphere Lifecycle Manager helps reduce operational expenditure (OPEX) by automating the patching and management of the vSphere environment. It provides centralized management for host updates, ensuring consistency across the environment and reducing the manual effort required for ongoing operations. This leads to reduced operational overhead, which directly addresses the requirement to reduce OPEX.

Question No : 10


An architect is reviewing the security and compliance requirements for a new application that will be hosted on a vSphere 8 environment.
The following information has been noted about the new application:
The application stores and processes confidential data
The supporting virtual infrastructure is shared with other departments
No other application stores or processes confidential data
The application virtual machines must be able to run on any ESXi host in the cluster
The storage layer is a iSCSI attached SAN
Data at Rest Encryption is in place for each presented LUN validated to FIPS 140-2
No budget is available for additional infrastructure components or software
Application data must not be accessible outside of the application's virtual machines
The architect has been tasked with providing a secure virtual machine design to host the application.
Which three design elements must the architect include to meet the requirements? (Choose three.)

정답:
Explanation:
Virtual Machine Encryption
To ensure that the application’s confidential data is protected, Virtual Machine Encryption should be applied. This will ensure that even if someone gains access to the storage layer or the underlying infrastructure, the data in the virtual machine is encrypted and cannot be accessed outside of the VM, as required by the security and compliance requirements.
The vSphere Native Key Provider
The vSphere Native Key Provider can be used to manage encryption keys within the vSphere environment. Since no budget is available for additional infrastructure components or software, leveraging vSphere's native capabilities for key management ensures that encryption is securely handled without introducing external dependencies. This also aligns with the requirement to not introduce additional infrastructure.
External Key Management Service (KMS) provider
While the vSphere Native Key Provider can manage keys within the environment, if there is a requirement for a more secure or compliant key management solution, an External Key Management Service (KMS) may be used. The KMS provider allows for centralized management of encryption keys, ensuring that the keys are securely stored and controlled according to compliance standards (e.g., FIPS 140-2). Although the Native Key Provider may suffice, this option ensures that key management adheres to stricter compliance needs, especially for confidential data.

Question No : 11


An architect is designing the datastore configuration of a new vSphere-based solution.
The following information was obtained during the initial meeting with the customer:
There is currently 500 production and DMZ virtual machine workloads spread evenly across the primary and secondary site.
The profile of the workloads (per site) is as follows:
- DMZ:
-- 75 x Small: 1 vCPU, 2GB RAM, 200 GB disk
- Production:
-- 50 x Small: 1 vCPU, 2 GB RAM, 200 GB disk
-- 100 x Medium: 2 vCPU, 4 GB RAM, 200 GB disk
-- 25 x Large: 4 vCPU, 8 GB RAM, 500 GB disk
The average IO Profile per workload is 70/30 read/write.
The solution should cater to 10% storage growth in the first year.
The solution should cater to 15% virtual machine snapshot overhead.
The storage team has confirmed:
- A scalable external storage array has been deployed per site to support the storage requirements.
- The storage array will connect to all hosts using a dedicated Fibre Channel storage area network fabric.
- Usable storage capacity is available in 10 TB LUNs.
- As many LUNs as required can be provided.
- Every effort should be made to ensure the number of required LUNs is minimized.
The security team has stated that all DMZ and production workloads must remain logically isolated from each other.
Given the information provided, which three design decisions should the architect make to meet the requirements? (Choose three.)

정답:
Explanation:
Six 10TB VMFS datastores will be configured on each site for all production workloads.
This choice is based on the need to distribute production workloads across multiple datastores while ensuring that each datastore is large enough to accommodate the space required by the workloads. Given the average sizes of the virtual machines and the growth and snapshot overhead, six 10TB VMFS datastores would be appropriate for production workloads, ensuring scalability while minimizing the number of LUNs.
Each 10TB LUN will be configured as a VMFS datastore.
VMFS (Virtual Machine File System) is the standard choice for vSphere environments when using Fibre Channel LUNs. It provides the necessary features, such as concurrency and high-performance access, for production workloads. This option is appropriate given that the storage array uses Fibre Channel for connection and VMFS is the standard file system for such configurations.
Two 10TB VMFS datastores will be configured on each site for all DMZ workloads.
The DMZ workloads are smaller in number and storage requirements compared to the production workloads, so configuring two 10TB VMFS datastores for DMZ workloads will provide enough capacity while maintaining logical isolation. This approach also minimizes the number of LUNs required to meet the storage growth needs.

Question No : 12


An architect has made the following assumptions:
The customer will provide licensing for the vSphere platform.
The storage hardware has sufficient capacity for future workload scale.
The data center offers sufficient power, cooling and rack space for workload scale.
Which two risks must be documented in the design document in response to these assumptions? (Choose two.)

정답:
Explanation:
The storage may not have capacity to accommodate 20% year-over-year virtual machine growth.
This is a risk because, while the assumption is that the storage hardware has sufficient capacity, there is a possibility that the hardware may not be able to support future growth, especially if the customer's workload grows faster than expected. Documenting this risk ensures that the design considers potential capacity constraints.
The customer may not have an existing licensing subscription that covers features the architect intends to use.
This is a risk because although the assumption is that the customer will provide licensing, there may be discrepancies between the features required for the design and the customer’s existing licensing. This risk ensures that the architect verifies that the customer’s licensing aligns with the solution requirements.

Question No : 13


An architect has been tasked with designing a greenfield hosting platform.
As part of a workshop, it is identified that the new solution must support the following:
Provide a centralized way to enforce virtual network security policy
Provide network security for both virtual machines and containerized applications
Deny network access between all workloads by default
Linked services should be connected to the same virtual port groups by default
Support for the security teams network monitoring solution
Which elements should the architect include in the design to meet the identified requirements?

정답:
Explanation:
VMware NSX: NSX provides a centralized platform for network virtualization and security, which aligns with the requirement for enforcing virtual network security policies. It can manage network segmentation, security policies, and micro-segmentation across the entire environment, including both virtual machines and containerized applications.
Distributed Firewalls: NSX's distributed firewall allows for micro-segmentation, meaning that network access is denied between workloads by default, and access controls can be applied based on security policies. This meets the requirement of denying network access by default.
Port Mirroring: Port mirroring in NSX can integrate with the security team's network monitoring solutions. It enables the security team to capture traffic for monitoring and analysis, addressing the requirement for network monitoring support.

Question No : 14


An architect is designing a new vSphere solution. The customer has provided the following information to describe how the solution will be used:
The solution will host development workloads
Administrators will utilize snapshots frequently, with snapshots sometimes retained for extended periods of time
Some of the workloads are sensitive to latency on the I/O of the storage
Storage for the workloads will be provided by a physical array
The physical array does not include a storage provider
All workloads must be hosted on the solution, there are no other vSphere environments available for use
Which design decision should the architect make to meet the needs of the customer?

정답:
Explanation:
VAAI (vSphere APIs for Array Integration) improves storage performance and offloads certain tasks (such as cloning, snapshots, and more) directly to the storage array. This is important because the customer will be utilizing snapshots frequently, and VAAI can help accelerate snapshot operations, reducing the impact on the ESXi host and improving overall performance.
Since the physical array does not include a storage provider and does not support vSphere Storage APIs - Storage Awareness (VASA) or Virtual Volumes (vVols), the solution should focus on using VMFS datastores with a VAAI-capable storage array. This setup allows better performance for snapshot operations and other storage tasks.

Question No : 15


A company is expanding an existing vSphere deployment to meet new demands from the business.
The following requirements have been identified for the expanded infrastructure:
REQ001- It must support enhanced vMotion compatibility (EVC) mode for Intel "Nehalem"
Generation (Intel Xeon Core i7) processors.
REQ002- It must be accessible via an API.
REQ003- It must support a variety of operating systems.
REQ004- It must notify administrators whenever a virtual machine is connected to more than one network.
Which requirement would be classified as a technical (formerly non-functional) requirement?

정답:
Explanation:
This is a technical (formerly non-functional) requirement because it specifies a particular feature (EVC mode for specific processor generations) that the infrastructure must support to ensure compatibility across the vSphere environment. This requirement addresses a technical aspect of how the environment will function but does not directly relate to business functionality.

 / 3