Download Advanced Design VMware vSphere 7.x.3V0-21.21.VCEplus.2025-04-06.45q.vcex

Vendor: VMware
Exam Code: 3V0-21.21
Exam Name: Advanced Design VMware vSphere 7.x
Date: Apr 06, 2025
File Size: 1 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

ProfExam Discount

Demo Questions

Question 1
A customer is deploying a new cluster and wants to be able to patch and update two hosts in parallel.
The cluster must be able to maintain N+1 resiliency across the remaining hosts while patching activities are performed. 
The current expected utilization of the platform requires a minimum of two hosts to support all of the virtual machines.
What is the minimum number of hosts the customer will require in the cluster in order to meet the required resiliency level?
  1. Five
  2. Six
  3. Four
  4. Seven
Correct answer: A
Explanation:
MTD -- Maximum Tolerable Downtime: Sum of the RTO and WRT, which is the total time required to recover from a disaster and start serving the business again. <https://vcdx133.com/2015/01/28/vcdx- availability-explained/>
MTD -- Maximum Tolerable Downtime: Sum of the RTO and WRT, which is the total time required to recover from a disaster and start serving the business again. 
<https://vcdx133.com/2015/01/28/vcdx- availability-explained/>
Question 2
A new vSphere platform is being created. The platform will host virtual machines that will run management services and line-of-business applications.
What should the architect consider when designing the number and type of clusters required?
  1. Maximum tolerable downtime
  2. Predicted platform growth
  3. Auditing requirements for the virtual machines
  4. The level of isolation required between virtual machine classifications
Correct answer: D
Question 3
An architect is creating a network design for a new vSphere environment.
Based on customer requirements, the environment must support the following types of traffic:
Management vMotion vSAN Fault Tolerance Virtual machine traffic, which cannot be impacted by other types of traffic 
Which design recommendation can the architect make for a resilient infrastructure with vSphere network service tiering?
  1. Use different logical networks to ensure traffic is isolated with separate VLANs
  2. Use Network I/O Control and ensure appropriate share value is defined for different types of traffic giving priority to the virtual machines traffic
  3. Use two dedicated virtual switches with a single adapter each, dedicating one virtual switch for Management, vMotion, vSAN and Fault Tolerance traffic, and the second one for virtual machine traffic
  4. Use a NIC teaming policy based on the physical NIC load
Correct answer: B
Explanation:
https://docs.vmware.com/en/VMware-vSphere/7.0/vsan-network-design-guide/GUID-6B00B437-53A3-4ACD-8CD7-AC9D0CE5BA8E.html
https://docs.vmware.com/en/VMware-vSphere/7.0/vsan-network-design-guide/GUID-6B00B437-53A3-4ACD-8CD7-AC9D0CE5BA8E.html
Question 4
An architect is designing a vSphere environment for a customer based on the following information:
The vSphere cluster will have three hosts only due to budget considerations.
A database cluster (node majority) consisting of three virtual machines will be running on the vSphere cluster.
Which two recommendations can the architect make so that the customer achieves the highest level of application availability while taking into consideration operational resiliency? (Choose two.)
  1. Create VM-VM anti-affinity rules
  2. Set das.respectvmvmantiaffinityrules to false
  3. Create VM-Host anti-affinity rules
  4. Disable vSphere HA during maintenance
  5. Set das.ignoreinsufficienthbdatastore to true
Correct answer: AB
Explanation:
A) Create VM-VM anti-affinity rules - A VM-VM affinity rule specifies whether selected individual virtual machines should run on the same host or be kept on separate hosts.  https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.resmgmt.doc/GUID- 94FCC204-115A-4918-9533-BFC588338ECB.html B. Set das.respectvmvmantiaffinityrules to false - Determines if vSphere HA enforces VM-VM anti-affinity rules. The default value is 'true'and rules are enforced even if vSphere DRS is not enabled. In this case, vSphere HA does not fail over a virtual machine if doing so violates a rule
A) Create VM-VM anti-affinity rules - A VM-VM affinity rule specifies whether selected individual virtual machines should run on the same host or be kept on separate hosts.  
https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.resmgmt.doc/GUID- 94FCC204-115A-4918-9533-BFC588338ECB.html 
B. Set das.respectvmvmantiaffinityrules to false - Determines if vSphere HA enforces VM-VM anti-affinity rules. The default value is 'true'
and rules are enforced even if vSphere DRS is not enabled. In this case, vSphere HA does not fail over a virtual machine if doing so violates a rule
Question 5
An architect will be taking over control of a former Linux server fleet and repurposing the hardware into a new vSphere cluster. The current environment is already connected to the network but the hosts do not have any local disks. Since the fleet hardware is uniform, the architect can use a single ESXi image. All hosts within the cluster have the same CPU and memory capacity.
Which ESXi deployment method should the architect use?
  1. Stateless cached vSphere Auto Deploy
  2. Stateless vSphere Auto Deploy
  3. Manual install of each ESXi host with an image from USB
  4. Stateful vSphere Auto Deploy
Correct answer: B
Explanation:
Reference: https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.esxi.install.doc/GUID-0813B4BE- 485D-4129-902B-49AA42EBF54E.html
Reference: https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.esxi.install.doc/GUID-0813B4BE- 485D-4129-902B-49AA42EBF54E.html
Question 6
An architect is finalizing the design for a new vCenter Server High Availability deployment.
What is one thing the architect must document in the design?
  1. The load balancing algorithm used by the Management Distributed Virtual Switches (DVS)
  2. The SSH configuration settings for the vCenter Server's active node
  3. The vCenter Management Network IPv4 addresses for the witness node vCenter Server
  4. The details of each of the vCenter Server licenses for active, passive and witness nodes
Correct answer: B
Explanation:
vCenter HA uses SSH keys for password-less authentication between the Active, Passive, and Witness nodes. The authentication is used for heartbeat exchange and file and data replication. To replace the SSH keys in the nodes of a vCenter HA cluster, you deactivate the cluster, generate new SSH keys on the Active node, transfer the keys to the passive node, and activate the cluster.  https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.avail.doc/GUID-B8E590BA-ACF4-48A1-8644-E492D2241031.html  https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.avail.doc/GUID-5F7DAFB2-60BD-4C50-A7E5-29A319CBB714.html
vCenter HA uses SSH keys for password-less authentication between the Active, Passive, and Witness nodes. The authentication is used for heartbeat exchange and file and data replication. To replace the SSH keys in the nodes of a vCenter HA cluster, you deactivate the cluster, generate new SSH keys on the Active node, transfer the keys to the passive node, and activate the cluster.  
https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.avail.doc/GUID-B8E590BA-ACF4-48A1-8644-E492D2241031.html  
https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.avail.doc/GUID-5F7DAFB2-60BD-4C50-A7E5-29A319CBB714.html
Question 7
An architect is considering placement of virtual machines within an existing VMware software-defined data center (SDDC).
During the discovery phase, the following information is documented:
Cluster One
Six ESXi hosts
vSphere HA with host failures cluster tolerates = 1
Proactive HA is enabled and set to automated
Fully Automated vSphere DRS
Transparent Page Sharing (TPS) is enabled
Cluster Two
Eight ESXi hosts
vSphere HA with host failures cluster tolerates = 1
Proactive HA is disabled
Partially Automated vSphere DRS 
Transparent Page Sharing (TPS) is disabled
Cluster Three
Three ESXi hosts
vSphere HA with admission control is disabled
Proactive HA is not supported
Transparent Page Sharing (TPS) is disabled
Virtual Machine Resource Profile 1
Memory sharing techniques should not be used
Virtual machines should be automatically restarted in the event of host failure if resources are available
Automated initial virtual machine placement
Virtual Machine Resource Profile 2
Memory sharing techniques should not be used
Virtual machines should be automatically restarted in the event of host failure regardless of available resources
Automated initial virtual machine placement
Which two recommendations should the architect make for placement of the virtual machines to meet resource profile requirements? (Choose two.)
  1. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster One.
  2. All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster One.
  3. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Two.
  4. All virtual machines matching Virtual Machine Resource Profile 1 should be placed on Cluster Two.
  5. All virtual machines matching Virtual Machine Resource Profile 2 should be placed on Cluster Three.
Correct answer: DE
Explanation:
PVLANs divide the broadcast domain into multiple broadcast sub-domains and allow further isolating different devices within the same VLAN. They provide layer 2 isolation between ports within the same broadcast domain. For example: 'Your ESXi host uses several networks. Use appropriate security measures for each network, and isolate traffic for specific applications and functions. For example, ensure that VMware vSphere vMotion traffic does not travel over networks wherevirtual machines are located. Isolation prevents snooping. Having separate networks is also recommended for performance reasons.'  https://docs.vmware.com/en/VMware-vSphere/7.0/vsphere-esxi-vcenter-server-70-security- guide.pdf
PVLANs divide the broadcast domain into multiple broadcast sub-domains and allow further isolating different devices within the same VLAN. They provide layer 2 isolation between ports within the same broadcast domain. For example: 'Your ESXi host uses several networks. Use appropriate security measures for each network, and isolate traffic for specific applications and functions. For example, ensure that VMware vSphere vMotion traffic does not travel over networks where
virtual machines are located. Isolation prevents snooping. Having separate networks is also recommended for performance reasons.'  
https://docs.vmware.com/en/VMware-vSphere/7.0/vsphere-esxi-vcenter-server-70-security- guide.pdf
Question 8
An architect is designing a new VMware solution for a customer that has a number of different resource profiles.
The following are the business requirements for the design:
The solution must support virtual machines with the following storage profiles:
  • Write-intensive
  • Backup
  • Write-Once-Read-Many (WORM) archive
The solution must support migration of virtual machine disks between storage profiles.
The WORM archive data must be located at an isolated secure site.
The backup storage array must only be connected to a backup media server.
All data should be recoverable from backup.
Which design decision should the architect make to meet the business requirements?
  1. The solution will leverage a single storage array for the WORM archive and write-intensive storage profiles 
  2. The solution will leverage the same array for the backup and write-intensive storage profiles
  3. The solution will leverage a different array for each storage profile
  4. The solution will leverage a single storage array for all storage profiles
Correct answer: C
Question 9
An architect is preparing a design for a company planning digital transformation. During the requirements gathering workshop, the following requirements (REQ) and constraints (CON) are identified:
  • REQ01 The platform must host different types of workloads including applications that must be compliant with internal security standard.
  • REQ02 The infrastructure must initially run 100 virtual machines.
  • REQ03 Ten of the virtual machines must be compliant with internal security standard.
  • REQ04 The internal security standard specifies logical network separation for in-scope applications.
  • CON01 The customer has already purchased the licenses as part of another project.
  • CON02 The customer has five physical servers that must be reused.
Additionally, based on resource requirements, four physical servers will be enough to run all workloads. 
Which recommendation should the architect make to meet requirements while minimizing project costs?
  1. Use Network I/O Control to ensure the internal security zone has higher share value
  2. Purchase additional servers and plan separate, isolated clusters for workloads that must be compliant with internal security
  3. Use a single cluster and ensure that different security zones are separated at least with dedicated VLANs and firewall
  4. Use a single cluster and configure DRS anti-affinity rules to ensure internal security compliant virtual machines cannot migrate between ESXi hosts.
Correct answer: C
Question 10
An architect is designing the expansion of an existing vSphere 7 environment. The customer is requesting a design for a new cluster to support the anticipated future business growth. The requirements specified for the existing environment design must be considered when designing the new cluster.
The existing design has the following requirements:
  • REQ01 The environment has an availability target of 99.5% for all infrastructure.
  • REQ02 The recovery time objective (RTO) for Tier 1 virtual machines is one hour.
  • REQ03 Windows and Linux virtual machines must reside on separate clusters.
  • REQ04 Access to the management cluster within the environment must be controlled.
Which of the listed requirements would be classified as a functional requirement?
  1. The environment has an availability target of 99.5% for all infrastructure
  2. The recovery time objective (RTO) for Tier 1 virtual machines is one hour
  3. Access to the management cluster within the environment must be controlled
  4. Windows and Linux virtual machines must reside on separate clusters
Correct answer: C
Explanation:
vCenter HA uses SSH keys for password-less authentication between the Active, Passive, and Witness nodes. The authentication is used for heartbeat exchange and file and data replication. To replace the SSH keys in the nodes of a vCenter HA cluster, you deactivate the cluster, generate new SSH keys on the Active node, transfer the keys to the passive node, and activate the cluster.  https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.avail.doc/GUID-B8E590BA-ACF4-48A1-8644-E492D2241031.html  https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.avail.doc/GUID-5F7DAFB2-60BD-4C50-A7E5-29A319CBB714.html
vCenter HA uses SSH keys for password-less authentication between the Active, Passive, and Witness nodes. The authentication is used for heartbeat exchange and file and data replication. To replace the SSH keys in the nodes of a vCenter HA cluster, you deactivate the cluster, generate new SSH keys on the Active node, transfer the keys to the passive node, and activate the cluster.  
https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.avail.doc/GUID-B8E590BA-ACF4-48A1-8644-E492D2241031.html  
https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.avail.doc/GUID-5F7DAFB2-60BD-4C50-A7E5-29A319CBB714.html
Question 11
Which two of the listed requirements would be classified as manageability non-functional requirements? (Choose two.)
  1. ESXi clusters must scale when compute resources are sustained above 70% for five business days
  2. vSphere Fault Tolerance must be supported to improve application uptime
  3. ESXi host updates must be installed within one week of release
  4. The vSphere environment must support administrator password rotation
  5. ESXi clusters must scale to 500 concurrent virtual machines
Correct answer: AC
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!