Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Last Attempt 2V0-13.25 Questions

Page: 5 / 5
Total 60 questions

VMware Cloud Foundation 9.0 Architect Questions and Answers

Question 17

Requirement: The solution must include high security hardening levels to meet military compliance standards.

Which two physical design decisions will meet this security requirement in the workload domain? (Choose two.)

Options:

A.

The vSAN storage policy will be configured as Secondary Failures to Tolerate = 1.

B.

VCF Operations will be configured to renew the SSL certificate for vCenter Server per security policies.

C.

NTP will be configured to the internal NTP servers of 192.168.12.1 and 192.168.24.1.

D.

The advanced setting UserVars.SuppressShellWarning will be configured to 0 across all ESXi hosts.

E.

The certificate of the VI workload domain vCenter Server will be issued by RootCA.Military.Domain.Com.

Question 18

An architect has been tasked with designing a new VMware Cloud Foundation (VCF) solution. The following design decisions were documented after requirements gathering workshops with the customer:

• Deploy a VCF Fleet into each of the DC1 and DC2 datacenters.

• Deploy two VCF instances (VCF1 and VCF2) into each VCF Fleet.

• Use the existing, supported third-party solution to provide Multifactor Authentication (MFA) for users accessing the VCF components.

The architect also documented the following information from the workshops:

• The customer wants to minimize the risk of a single operational task performed by an administrator impacting multiple components.

• The customer wants to avoid single points of failure by using high availability architectures.

Which two design decisions should the architect include for the authentication approach based on the information provided? (Choose two.)

Options:

A.

Use the external VCF Identity Broker model.

B.

Deploy a shared VCF Identity Broker for all VCF Instances across all VCF Fleets.

C.

Deploy a dedicated VCF Identity Broker for each VCF instance within a VCF Fleet.

D.

Deploy a shared VCF Identity Broker for all VCF instances within a VCF Fleet.

E.

Use the embedded VCF Identity Broker model.

Page: 5 / 5
Total 60 questions