3V0-21.23 Online Practice Questions

Home / Broadcom / 3V0-21.23

Latest 3V0-21.23 Exam Practice Questions

The practice questions for 3V0-21.23 exam was last updated on 2025-04-26 .

Viewing page 1 out of 6 pages.

Viewing questions 1 out of 32 questions.

Question#1

An architect is working on a new VMware vSphere design and notes the following information during interviews with stakeholders:
The company has previously worked with multiple VMware partners
The company has an internal security policy that is referenced in long running contracts
The company has an Enterprise License Agreement (ELA) with VMware
The company has a multi-year cloud subscription agreement
Which of these is a business factor that will impact this design?

A. The company has previously worked with multiple VMware partners.
B. The company has an Enterprise License Agreement (ELA) with VMware.
C. The company has an internal security policy that is referenced in long running contracts.
D. The company has a multi-year cloud subscription agreement.

Explanation:
The Enterprise License Agreement (ELA) is a business factor that will impact the design because it defines the licensing structure, which directly influences the solution’s cost, scalability, and use of VMware products. The ELA could provide benefits such as discounted licensing costs, a predefined set of VMware products, or specific terms and conditions that must be adhered to in the design.

Question#2

An architect is creating a design for a new vSphere solution to meet the following business requirement:
REQ001 - Reduce operational expenditure
Which design decision could the architect include in the logical design to satisfy this requirement?

A. Use vSphere Standard licenses on all clusters.
B. Use heterogeneous hardware for the hosts in all clusters.
C. Use vSphere Lifecycle Manager on all clusters.
D. Use an N + 1 design to define the required capacity on all clusters.

Explanation:
vSphere Lifecycle Manager helps reduce operational expenditure (OPEX) by automating the patching and management of the vSphere environment. It provides centralized management for host updates, ensuring consistency across the environment and reducing the manual effort required for ongoing operations. This leads to reduced operational overhead, which directly addresses the requirement to reduce OPEX.

Question#3

An architect is responsible for the design of a greenfield vSphere-based solution for hosting a new web-based application. The customer has provided the following high-level information:
The solution will host a highly transactional web application that is spread across multiple workloads within a vSphere cluster.
The workloads should be distributed evenly across the hosts to maximize the performance and availability of the web application.
The architect has made various design decisions, including:
The solution will deploy vSphere distributed switches for all virtual networking.
Which network load balancing method should the architect document in the physical design to meet the requirements?

A. Route Based on IP Hash
B. Route Based on Physical NIC Load
C. Route Based on Originating Virtual Port
D. Route Based on Source MAC Hash

Explanation:
Route Based on IP Hash is the most suitable network load balancing method when the goal is to evenly distribute network traffic across multiple physical NICs in a way that maximizes the performance and availability of the application.
This method creates a hash based on the source and destination IP addresses (and possibly port numbers) of each network packet. As a result, it ensures that network traffic is evenly distributed across multiple physical NICs, improving both performance and fault tolerance. In the case of a highly transactional web application, distributing traffic efficiently can help reduce network congestion and increase throughput.

Question#4

An architect is documenting the design for a new multi-site vSphere solution. The customer has informed the architect that the workloads hosted on the solution are managed by application teams, who must perform a number of steps to return the application to service following a failover of the workloads to the secondary site. These steps are defined as the Work Recovery Time (WRT).
The customer has provided the architect with the following information about the workloads:
Critical workloads have a WRT of 12 hours
Production workloads have a WRT of 24 hours
Development workloads have a WRT of 24 hours
All workloads have an RPO of 4 hours
Critical workloads have an RTO of 1 hour
Production workloads have an RTO of 12 hours
Development workloads have an RTO of 24 hours
The customer has also confirmed that the Disaster Recovery solution will not begin the recovery of the development workloads until all critical and production workloads have been recovered at the secondary site.
What would the architect document as the maximum tolerable downtime (MTD) for each type of workload in the design?

A. Critical Workloads: 13 hours Production Workloads: 36 hours Development Workloads: 48 hours
B. Critical Workloads: 13 hours Production Workloads: 36 hours Development Workloads: 60 hours
C. Critical Workloads: 12 hours Production Workloads: 24 hours Development Workloads: 24 hours
D. Critical Workloads: 16 hours Production Workloads: 28 hours Development Workloads: 28 hours

Explanation:
The Maximum Tolerable Downtime (MTD) is the maximum time that an application or system can be unavailable before it negatively impacts the business. The MTD is calculated by adding the Recovery Time Objective (RTO) to the Work Recovery Time (WRT).
Here’s how it applies to each workload type:
- Critical Workloads:
- RTO: 1 hour (time to restore the system to a usable state after failure).
- WRT: 12 hours (the time to get the application fully back to service).
- MTD = RTO + WRT = 1 hour + 12 hours = 13 hours.
- Production Workloads:
- RTO: 12 hours (time to restore the system to a usable state after failure).
- WRT: 24 hours (time to get the application fully back to service).
- MTD = RTO + WRT = 12 hours + 24 hours = 36 hours.
- Development Workloads:
- RTO: 24 hours (time to restore the system to a usable state after failure).
- WRT: 24 hours (time to get the application fully back to service).
- MTD = RTO + WRT = 24 hours + 24 hours = 48 hours.

Question#5

1.Following a review of security requirements, an architect has confirmed the following requirements:
- REQ001- A clustered firewall solution must be placed at the perimeter of the hosting platform, and all ingress and egress network traffic will route via this device.
- REQ002- A distributed firewall solution must secure traffic for all virtualized workloads.
- REQ003- All virtualized workload, hypervisor, firewall and any management component system events must be monitored by security administrators.
- REQ004- The hosting platforms security information and event management (SIEM) system must be scalable to 20,000 events per second.
- REQ005- The hosting platforms storage must be configured with data-at-rest encryption.
- REQ006- The hosting platform limits access to authorized users.
Which three requirements would be classified as technical (formerly non-functional) requirements? (Choose three.)

A. A clustered firewall solution must be placed at the perimeter of the hosting platform, and all ingress and egress network traffic will route via this device.
B. A distributed firewall solution must secure traffic for all virtualized workloads.
C. The hosting platforms security information and event management (SIEM) system must be scalable to 20,000 events per second.
D. The hosting platforms storage must be configured with data-at-rest encryption.
E. The hosting platform limits access to authorized users.
F. All virtualized workload, hypervisor, firewall and any management component system events must be monitored by security administrators.

Explanation:
A clustered firewall solution must be placed at the perimeter of the hosting platform, and all ingress and egress network traffic will route via this device:
This is a technical requirement because it specifies how network traffic is to be managed through a specific infrastructure element (the firewall). It outlines how the security device is implemented in the network architecture.
The hosting platform's security information and event management (SIEM) system must be scalable to 20,000 events per second:
This is a technical requirement because it deals with the scalability and performance of the SIEM system. It specifies how the system must handle a large volume of data, which is a technical characteristic of the infrastructure.
The hosting platform's storage must be configured with data-at-rest encryption:
This is also a technical requirement because it defines how the data should be stored securely, which is an implementation detail. It specifies that encryption needs to be applied to stored data, a feature related to storage infrastructure.

Exam Code: 3V0-21.23Q & A: 92 Q&AsUpdated:  2025-04-26

 Get All 3V0-21.23 Q&As