IT EXAM Questions Flashcards

Learn 50 Questions

1
Q

An administrator is responsible for performing maintenance tasks on a vSphere cluster.
The cluster has the following configuration:
Identically configured vSphere ESXi hosts (esx01, esx02, esx03 and esx04)
All workloads are deployed into a single VMFS datastore provided by the external storage array vSphere High Availability (HA) has not been enabled vSphere Distributed Resource Scheduler (DRS) has not been enabled
Currently, a critical production application workload (VM1) is running on esx01.
Given this scenario, which two actions are required to ensure VM1 continues to run when esx01 is placed into maintenance mode? (Choose two.)

A. Fully automated DRS must be enabled on the cluster so that VM1 will be automatically migrated to another host within the cluster when esx01 is placed into maintenance mode.
B. VM1 must be manually shut down and cold migrated to another host within the cluster using vSphere vMotion before esx01 is placed into maintenance mode.
C. vSphere HA must be enabled on the cluster so that VM1 will be automatically migrated to another host within the cluster when esx01 is placed into maintenance mode.
D. VM1 must be manually live migrated to another host within the cluster using vSphere vMotion before esx01 is placed into maintenance mode.
E. VM1 must be manually migrated to another host within the cluster using vSphere Storage vMotion before esx01 is placed into maintenance mode.

A

A,D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An administrator needs better performance and near-zero CPU utilization from the ESXi hosts for networking functions and processing. The administrator creates a new vSphere Distributed Switch and enables network offloads compatibility.
Which solution would help achieve this goal?

A. vSphere Distributed Services Engine
B. Data Processing Units (DPUs)
C. vSphere Network I/O Control
D. Universal Passthrough version 2

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An administrator needs to perform maintenance on a datastore that is running the vSphere Cluster Services (vCLS) virtual machines (VMs).
Which feature can the administrator use in this scenario to avoid the use of Storage vMotion on the vCLS VMs?

A. vSphere Distributed Resource Scheduler (DRS)
B. vSphere vMotion
C. vSphere Fault Tolerance
D. vCLS Retreat Mode

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the role of vSphere Distributed Services Engine?

A. Provide a live shadow instance of a virtual machine (VM) that mirrors the primary VM to prevent data loss and downtime during outages
B. Implement Quality of Service (QoS) on network traffic within a vSphere Distributed Switch
C. Provide hardware accelerated data processing to boost infrastructure performance
D. Redistribute virtual machines across vSphere cluster hosts to comply with user-defined affinity and anti-affinity rules following host failures or during maintenance operations

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A vSphere cluster has the following vSphere Distributed Resource Scheduler (DRS) group configuration:
Virtual machine (VM) group named DB
Host groups named PROD11 and PROD55
The administrator wants to force the VMs in the DB group to run on the hosts in the PROD11 group. However, if all the hosts in PROD11 go offline for maintenance, then the VMs in the DB group should run on hosts in PROD55.
Which VM/Host rule must the administrator create to ensure that these requirements are met?

A. A preferential rule between the DB group and the PROD11 group
B. A preferential rule between the DB group and the PROD55 group
C. A required rule between the DB group and the PROD11 group
D. A required rule between the DB group and the PROD55 group

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An administrator is asked to configure a security policy at the port group level of a standard switch.
The following requirements must be met:
The security policy must apply to all virtual machines on portgroup-1.
All traffic must be forwarded, regardless of the destination.
Which security policy must the administrator configure?

A. Forged transmits set to reject
B. MAC address changes set to accept
C. Promiscuous mode set to reject
D. Promiscuous mode set to accept

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Following a merger with another company, an administrator is tasked with configuring an identity source for VMware vCenter so that all vSphere administrators can authenticate using their existing Active Directory accounts. Each company has user accounts in their own Active Directory forests.
The following additional information has been provided:
The corporate policy states that only Windows-based machine accounts are allowed in Active Directory.
Which action should the administrator take to configure vCenter Single Sign-On (SSO) to meet this requirement?

A. Configure SSO to use Active Directory over LDAP as the identity source.
B. Configure SSO to use OpenLDAP as the identity source.
C. Join the vCenter Server Appliance to the LDAP domain.
D. Configure SSO to use Active Directory (Integrated Windows Authentication) as the identity source.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An administrator notices a performance issue in VMware vCenter. To try and understand more about the performance issue, the administrator needs to gather more information about the vCenter database to eliminate a potential disk space issue.

Which two tools can the administrator use? (Choose two.)

A. vCenter Management Interface (VAMI)
B. Perfmon
C. df
D. esxtop
E. vSphere Client

A

A,C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An administrator notices a Fibre Channel adapter in an ESXi host has been experiencing incon-sistent connectivity states.

Which trigger can be used to quickly identify the issue and alert the administrator so that the is-sue can be resolved?

A. Host Connection Lost
B. Lost Network Path Redundancy
C. Lost Network Connectivity
D. Lost Storage Connectivity

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An administrator is tasked with looking into the disaster recovery (DR) options for a software-defined data center (SDDC).

The following requirements must be met:
* All virtual machines (VMs) must be protected to a secondary site.
* The source VMs must remain online until the failover.
* When failing over to the secondary site, application downtime is allowed.
* The DR failover must be managed from the vSphere Client.
* Costs must remain as low as possible.

How can the administrator accomplish this task?

A. Configure VMware Cloud Disaster Recovery (VCDR) and combine it with array-based stor-age replication.
B. Configure VMware a Site Recovery Manager and combine it with vSphere Replication.
C. Configure a subscribed content library on the secondary site.
D. Configure VMware Site Recovery Manager and combine it with array-based storage replica-tion.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An administrator needs to update a VMware vCenter instance to a newer minor release version. Due to restrictions within the environment, the vCenter instance does not have access to the In-ternet. As a first step, the administrator downloads the required update on another machine.

What are the next steps the administrator must perform to complete the update?

A. Place the update ISO file in a Virtual Machine File System (VMFS) datastore.
Use the vSphere Client to select the update ISO file as the source for the update.
B. Mount the ISO update file to the CD-ROM drive of the vCenter instance.
Use the vCenter Management Interface to select the CD-ROM as the source for the update.
C. Place the ISO update file in a folder accessible to the vCenter instance over HTTPS.
Use the vCenter Management Interface to select the update file as the source for the update.
D. Place the ZIP update file in a folder accessible to the vCenter instance over HTTPS.
Use the vSphere Client to select the update file as the source for the update.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An administrator is tasked with allowing a single user the ability to take snapshots on a virtual machine. When looking in vCenter, the administrator can see that there are already users and groups assigned permissions on the virtual machine as follows:

  • The group VM_Users has the Virtual Machine Power User role.
  • The group VM_Viewers has the Read Only role.

The administrator confirms that the user requesting the additional access is currently one of five members of the VM_Viewers group.

Which two steps should the administrator take to grant this user the additional access required without impacting the user access of others? (Choose two.)

A. Add the user to the VM_Users group and leave the permissions on the virtual machine object unchanged.
B. Add a new permission on the virtual machine object selecting the user and the new custom role.
C. Edit the Read Only role to add the Virtual Machine Snapshot Management privileges.
D. Create a new custom role with the Virtual Machine Snapshot Management privileges.
E. Add a new permission on the virtual machine object selecting the VM_Viewers group and the new custom role.

A

B,D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An administrator is preparing to perform an update to vSphere clusters that are running vSAN. The administrator wants to ensure that the following requirements are met as part of the update:
* All hosts in the cluster are updated with the same software.
* The firmware versions on the hosts are updated.
* The new software versions are checked for compliance against the vSAN Hardware Compatibility List.

Which three steps should the administrator take to meet these requirements? (Choose three.)

A. Configure vSphere Lifecycle Manager with an image for the cluster.
B. Register the vendor hardware management system as a vCenter Server extension.
C. Download the firmware updates from the VMware website.
D. Download the firmware updates from the vendor website.
E. Run a hardware compatibility check using vSphere Lifecycle Manager.
F. Configure vSphere Lifecycle Manager with a baseline for the cluster.

A

A,B,E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An administrator is asked to segregate virtual machine (VM) traffic by VLAN on a vSphere standard switch.

The following requirements must be met:
* VLAN ID on the switch port group must be 4095.
* VLAN tagging must be done at the VM level.

Which tagging mode is required?

A. External Switch Tagging (EST)
B. None
C. Virtual Guest Tagging (VGT)
D. Virtual Switch Tagging (VST)

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An administrator wants to use tag-based placement rules on their virtual machine disks using VMware vCenter.

Which option would allow the administrator to achieve this?

A. Storage Policy Based Management
B. Storage I/O Control
C. vSphere Storage APIs for Storage Awareness (VASA)
D. vSphere Distributed Resource Scheduler (DRS)

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An administrator is tasked with applying updates to a vSphere cluster running vSAN using vSphere Lifecycle Manager. Downtime to the ESXi hosts must be minimal while the work is completed.
The administrator has already completed the following steps and no errors have been returned:
Downloaded all applicable software and created a new image.
Attached the new image to the cluster and run a compliance check against the image for the cluster.
Ran a remediation pre-check for the cluster.
Which two series of steps should the administrator perform to start the remediation of the cluster using the new image? (Choose two.)

A. 1. Use the Remediate option in vSphere Lifecycle Manager to remediate all of the ESXi hosts in the cluster in parallel.
2. Allow vSphere Lifecycle Manager to automatically control maintenance mode on the ESXi hosts.
B. 1. Place each of the ESXi hosts into maintenance mode manually.
2. Use the Stage option in vSphere Lifecycle Manager to stage the required software on all ESXi hosts one at a time.
C. 1. Leave all ESXi hosts in the cluster operational.
2. Use the Stage All option in vSphere Lifecycle Manager to stage the required software onto all ESXi hosts one at a time.
D. 1. Leave all ESXi hosts in the cluster operational.
2. Use the Stage All option in vSphere Lifecycle Manager to stage the required software onto all ESXi hosts in the cluster in parallel.
E. 1. Use the Remediate option in vSphere Lifecycle Manager to remediate all of the ESXi hosts in the cluster in sequence.
2. Allow vSphere Lifecycle Manager to automatically control maintenance mode on the ESXi hosts.

A

D,E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An administrator is working with VMware Support and is asked to provide log bundles for the ESXi hosts in an environment.
Which three options does the administrator have? (Choose three.)

A. Generate a combined log bundle for all ESXi hosts using the vCenter Management Interface.
B. Generate a separate log bundle for each ESXi host using the vSphere Host Client.
C. Generate a combined log bundle for all ESXi hosts using the vSphere Client.
D. Generate a separate log bundle for each ESXi host using the vSphere Client.
E. Generate a separate log bundle for each ESXi host using the vCenter Management Interface.
F. Generate a combined log bundle for all ESXi hosts using the vSphere Host Client.

A

B,C,D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An administrator needs to consolidate a number of physical servers by migrating the workloads to a software-defined data center solution.
Which VMware solution should the administrator recommend?

A. VMware Horizon
B. VMware vSAN
C. VMware vSphere
D. VMware NSX

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An administrator is tasked with configuring remote direct memory access (RDMA) over Converged Ethernet v2 (RoCE v2).
Which two types of adapters must the administrator configure? (Choose two.)

A. Paravirtual RDMA adapter
B. RDMA network adapter
C. Software iSCSi adapter
D. Fibre Channel over Ethernet (FCoE) adapter
E. Software NVMe over RDMA storage adapter

A

B,E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An administrator has a host profile named Standard-Config. The administrator wants to change the other host profiles to use only the storage configuration settings that are defined in the Standard-Config host profile.
What should the administrator do to make this change?

A. Export host customizations and import them to the other host profiles.
B. Copy the storage settings from Standard-Config to all other host profiles.
C. Duplicate the Standard-Config host profile and only modify the storage configuration settings.
D. Export the Standard-Config host profile and attach it to tile other hosts.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A vSphere cluster has the following configuration:
Virtual machines (VMs) are running Production and Test workloads vSphere Distributed Resource Scheduler (DRS) is enabled
There are no resource pools in the cluster
Performance monitoring data shows that the Production workload VMs are not receiving their fully allocated memory when the vSphere cluster is fully utilized.
A combination of which two steps could the administrator perform to ensure that the Production VMs are always guaranteed the full allocation of memory? (Choose two.)

A. Assign a custom memory share value to the resource pool containing the Production VMs.
B. Assign a memory reservation value to the resource pool containing the Production VMs.
C. Create a parent resource pool for the Production VMs.
D. Create a sibling resource pool for each of the Production and Test VMs.
E. Create a child resource pool for the Test VMs.

A

B,C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which two datastore types store the components of a virtual machine as a set of objects? (Choose two.)

A. VMware Virtual Machine File System (VMFS)
B. VMware vSAN
C. Network File System (NFS) 3
D. vSphere Virtual Volumes (vVols)
E. Network File System (NFS) 4.1

A

B,D

23
Q

Refer to the exhibit.

wwwwwwwwwwwwwwwwwwwwwwwww

After updating a predefined alarm on VMware vCenter, an administrator enables email notifications as shown in the attached alarm; however, notifications are NOT being sent.
Where must the mail server settings be configured by the administrator to resolve this issue?

A. In the ESXi host system config
B. In the alarm rule definition
C. In the vCenter settings in the vSphere Client
D. In the vCenter Management Interface

A

C

24
Q

An administrator creates a virtual machine that contains the latest company-approved software, tools and security updates. Company policy requires that only full clones are allowed for server workloads.
A combination of which two tasks should the administrator complete to prepare for the deployment of this virtual machine for multiple users? (Choose two.)

A. Set appropriate permissions on the virtual machine.
B. Create a virtual machine customization specification.
C. Upgrade the virtual hardware.
D. Convert the virtual machine to a template.
E. Take a snapshot of the virtual machine.

A

B,D

25
Q

During the staging of a patch on a vCenter Server Appliance, an error was encountered and the process stopped. An administrator resolved the root cause and is ready to continue with the staging of the patch.
From the vCenter Management Interface, which action should the administrator take to continue the process from the point at which the error occurred?

A. Use the Stage and Install option to resume the staging.
B. Use the Resume option to resume the staging.
C. Use the Unstage option to restart the staging.
D. Use the Stage Only option to restart the staging.

A

B

26
Q

An administrator is adding a new ESXi host to an existing vSphere cluster. When selecting the cluster, the administrator is unable to use the Cluster Quickstart workflow to add and configure the additional host.
What could be the root cause of this issue?

A. The administrator has previously dismissed the Cluster Quickstart workflow.
B. The administrator must manually add the host to the cluster before using the Cluster Quickstart workflow.
C. The administrator has not been assigned the required permissions to use the Cluster Quickstart workflow.
D. The administrator must enable the Cluster Quickstart workflow option in VMware vCenter.

A

A

27
Q

A company has two sites: Site A and Site B. The administrator would like to manage the VMware vCenter inventories in both sites from a single vSphere Client session.
Which vCenter feature must be configured?

A. VMware Certificate Authority
B. VMware Site Recovery Manager
C. vCenter Single Sign-On
D. Enhanced Linked Mode

A

D

28
Q

An administrator plans to update the Supervisor cluster and has noticed some of the Tanzu Kubernetes Grid clusters are running an incompatible version.
Which action must the administrator take before proceeding with the Supervisor cluster update?

A. Update all Tanzu Kubernetes Grid clusters to the latest version prior to the Supervisor cluster update.
B. No action is needed – Tanzu Kubernetes Grid clusters will be updated automatically as part of the update process.
C. No action is needed – Incompatible Tanzu Kubernetes Grid clusters can be manually updated after the Supervisor cluster update.
D. Update incompatible Tanzu Kubernetes Grid clusters prior to the Supervisor cluster update.

A

D

29
Q

Which three vSphere features are still supported for Windows-based virtual machines when enabling vSphere’s virtualization-based security feature? (Choose three.)

A. vSphere vMotion
B. PCI passthrough
C. vSphere High Availability (HA)
D. vSphere Fault Tolerance
E. vSphere Distributed Resources Scheduler (DRS)
F. Hot Add of CPU or memory

A

A,C,E

30
Q

An administrator wants to create virtual machine (VM) templates and store them in a content library. The administrator would like to use the content library to manage different versions of these templates so that reverting to an earlier version is an option.
How should the administrator create these templates?

A. Select a VM in the vCenter inventory.
Clone the VM to the content library as a VM template type.
B. Select a VM template in the vCenter inventory.
Clone the template to the content library.
C. Export a VM in the vCenter inventory to an OVF template.
Import the OVF template into the content library.
D. Convert a VM to a template in the vCenter inventory.
Clone the template to the content library.

A

A

31
Q

An administrator is tasked with configuring certificates for a VMware software-defined data center (SDDC) based on the following requirements:
All certificates should use certificates trusted by the Enterprise Certificate Authority (CA).
The solution should minimize the ongoing management overhead of replacing certificates.
Which three actions should the administrator take to ensure that the solution meets corporate policy? (Choose three.)

A. Replace the VMware Certificate Authority (VMCA) certificate with a self-signed certificate generated from the VMCA.
B. Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.
C. Replace the machine SSL certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
D. Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.
E. Replace the solution user certificates with custom certificates generated from the Enterprise CA.
F. Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).

A

C,D,F

32
Q

An administrator is tasked with moving an application and guest operating system (OS) running on top of a physical server to a software-defined data center (SDDC) in a remote secure location.
The following constraints apply:
The remote secure location has no network connectivity to the outside world.
The business owner is not concerned if all changes in the application make it to the SDDC in the secure location.
The application’s data is hosted in a database with a high number of transactions.
What could the administrator do to create an image of the guest OS and application that can be moved to this remote data center?

A. Create a hot clone of the physical server using VMware vCenter Converter.
B. Create a cold clone of the physical server using VMware vCenter Converter.
C. Restore the guest OS from a backup.
D. Use storage replication to replicate the guest OS and application.

A

B

33
Q

An administrator is tasked with configuring an appropriate Single Sign-On (SSO) solution for VMware vCenter based on the following criteria:
The solution should support the creation of Enhanced Link Mode groups.
All user accounts are stored within a single Active Directory domain and the solution must support only this Active Directory domain as the identity source.
All user account password and account lockout policies must be managed within the Active Directory domain.
The solution should support token-based authentication.
Which SSO solution should the administrator choose based on the criteria?

A. vCenter Identity Provider Federation with Active Directory Federation Services as the identity provider
B. vCenter Single Sign-On with Active Directory over LDAP as the identity source
C. vCenter Single Sign-On with Active Directory (Windows Integrated Authentication) as the identity source
D. vCenter Identity Provider Federation with Active Directory over LDAP as the identity provider

A

A

34
Q

An administrator is tasked with looking into the disaster recovery options for protecting a database server using VMware vSphere Replication.
The following requirements must be met:
The virtual machine must remain online during the protection.
The virtual machine’s snapshots must be used as part of the replication process.
Which step must the administrator complete to accomplish this task?

A. Configure the virtual machine storage policy.
B. Enable guest OS VSS quiescing for this virtual machine.
C. Perform a full initial synchronization of the source virtual machine to the target location.
D. Configure network traffic isolation for vSphere Replication.

A

C

35
Q

An administrator must gracefully restart a virtual machine (VM) through the vSphere Client but the option is greyed out. The administrator has full administrative access on VMware vCenter and all the objects available in vCenter, but has no access to log onto the operating system.
Which action should the administrator take to meet the objective?

A. Upgrade the virtual hardware
B. Migrate the VM to another host
C. Install VMware Tools
D. Restart vCenter

A

D

36
Q

An administrator is tasked with installing VMware vCenter. The vCenter Server Appliance must support an environment of:
400 hosts
4000 virtual machines
Which two resources must be allocated, at a minimum, to meet the requirements? (Choose two.)

A. 16 vCPUs
B. 30 GB Memory
C. 4 vCPUs
D. 8 vCPUs
E. 20 GB Memory

A

B,D

37
Q

Which VMware offering will allow an administrator to manage the lifecycle of multiple vCenter Server instances in a single software as a service (SaaS)-based solution to help drive operational efficiency?

A. VMware vSphere with Tanzu
B. VMware Cloud Foundation
C. VMware vSphere+
D. VMware Aria Suite Lifecycle

A

C

38
Q

Which feature would allow for the non-disruptive migration of a virtual machine between two clusters in a single VMware vCenter instance?

A. vSphere vMotion
B. Cross vCenter Migration
C. vSphere Storage vMotion
D. vSphere Fault Tolerance

A

A

39
Q

Which four elements can a vSphere Lifecycle Manager image contain? (Choose four.)

A. ESXi base image
B. ESXi configuration
C. Vendor agents
D. Vendor add-ons
E. BIOS updates
F. Firmware and drivers add-on
G. Independent components

A

A,D,F,G

40
Q

If a distributed switch uses the “Route based on physical NIC load” load balancing algorithm, what does the mean send or receive utilization of an uplink need to exceed for the flow of traffic to move to the second uplink?

A. 75 percent of the capacity over a 30 second period
B. 60 percent of the capacity over a 30 second period
C. 60 percent of the capacity over a 40 second period
D. 75 percent of the capacity over a 40 second period

A

A

41
Q

An administrator manually configures a reference ESXi host that meets company security standards for vSphere environments. The administrator now needs to apply all of the security standards to every identically configured host across multiple vSphere clusters within a single VMware vCenter instance.
Which four steps would the administrator complete to meet this requirement? (Choose four.)

A. Extract the host profile from the reference host.
B. Export the host profile from vCenter.
C. Import host customization on the reference host.
D. Attach the host profile to each cluster that requires the secure configuration.
E. Check the compliance of each host against the host profile.
F. Reset host customization on the reference host.
G. Remediate all non-compliant hosts.

A

A,D,E,G

42
Q

After a recent unexplained peak in virtual machine (VM) CPU usage, an administrator is asked to monitor the VM performance for a recurrence of the issue.
Which two tools can the administrator use? (Choose two.)

A. vCenter Management Interface
B. Direct Console User Interface (DCUI)
C. vSphere Performance Charts
D. vCenter Command Line Interface
E. ESXi Shell

A

C,E

43
Q

An administrator is tasked with configuring vSphere Trust Authority.
The administrator has completed the following steps:

Set up the workstation -
Enabled the Trust Authority Administrator
Enabled the Trust Authority State
Collected information about the ESXi hosts and vCenter to be trusted
Which step does the administrator need to complete next?

A. Import the Trusted Host information to the Trust Authority Cluster
B. Import the Trusted Cluster information to the Trusted Hosts
C. Create the Key Provider on the Trusted Cluster
D. Import the Trusted Host information to the Trusted Cluster

A

A

44
Q

Refer to the exhibit.
image2
An administrator set up the following configuration:
The distributed switch has three ESXi hosts, and each host has two 40 Gbps NICs.
The amount of bandwidth reserved for virtual machine (VM) traffic is 6 Gbps.
The administrator wants to guarantee that VMs in the Finance distributed port group can access 50 percent of the available reserved bandwidth for VM traffic.
Given this scenario, what should the size (in Gbps) of the Finance network resource pool be?
A. 18
B. 80
C. 36
D. 120

A

A

45
Q

A vSphere environment is experiencing intermittent short bursts of CPU contention, causing brief production outages for some of the virtual machines (VMs). To understand the cause of the issue, the administrator wants to observe near real-time statistics tor all VMs.
Which two vSphere reporting tools could the administrator use? (Choose two.)

A. Advanced Performance Charts
B. esxcli
C. resxtop
D. Overview Performance Charts
E. esxtop

A

C,E

46
Q

An administrator is attempting to configure Storage I/O Control (SIOC) on five datastores within a vSphere environment. The administrator is being asked to determine why SIOC configuration completed successfully on only four of the datastores.
What are two possible reasons why the configuration was not successful? (Choose two.)

A. The datastore contains Raw Device Mappings (RDMs).
B. SAS disks are used for the datastore.
C. The datastore has multiple extents.
D. The datastore is using ISCSI.
E. The administrator is using NFS storage.

A

A,C

47
Q

An administrator is performing maintenance activities and discovers that a Virtual Machine File System (VMFS) datastore has a lot more used capacity than expected. The datastore contains 10 virtual machines (VMs) and, when the administrator reviews the contents of the associated datastore, discovers that five virtual machines have a snapshot file (-delta.vmdk files) that has not been modified in over 12 months. The administrator checks the Snapshot Manager within the vSphere Client and confirms that there are no snapshots visible.
Which task should the administrator complete on the virtual machines to free up datastore space?

A. Consolidate the snapshots for each VM.
B. Inflate the disk files for each VM.
C. Delete all snapshots for each VM.
D. Storage vMotion each VM to another datastore.

A

A

48
Q

Refer to the exhibit.

An administrator is tasked with adding new capacity to an existing software-defined data center (SDDC).

  • The SDDC currently hosts two vSphere clusters (ClusterA and ClusterB) with different CPU compatibilities.
  • vSphere vMotion and vSphere Distributed Resource Scheduler (DRS) are currently in use in the SDDC.
  • The new capacity will be implemented by provisioning four ESXi hosts running a new generation of Intel Skylake CPUs.
  • All workload virtual machines (VMs) must support live migration to any cluster in the SDDC.

The administrator noticed the running critical “evc1” virtual machine (VM) shown in the exhibit is not migrating using vSphere vMotion to the original Clusters A or B.

Which three steps must the administrator take to support this functionality? (Choose three.)

A. Disable the Enhanced vMotion Compatibility (EVC) on the VM. Most Voted
B. Reboot the VM.
C. Configure the Enhanced vMotion Compatibility (EVC) on the VM to Intel Skylake.
D. Power on the VM. Most Voted
E. Configure the Enhanced vMotion Compatibility (EVC) on vSphere Cluster A and B to sup-port Intel Skylake. Most Voted
F. Power off the VM.

A

A,D,E

49
Q

An administrator has mapped three vSphere zones to three vSphere clusters.
Which two statements are true for this vSphere with Tanzu zonal Supervisor enablement? (Choose two.)

A. One Supervisor will be created in a specific zone. Most Voted
B. One Supervisor will be created across all zones. Most Voted
C. Three Supervisors will be created in Linked Mode.
D. Individual vSphere Namespaces will be placed into a specific zone. Most Voted
E. Individual vSphere Namespaces will be spread across all zones. Most Voted

A

B,E

50
Q

An administrator is investigating reports of users experiencing difficulties logging into a VMware vCenter instance using LDAP accounts.
Which service should the administrator check as part of troubleshooting?

A. vSphere Authentication Proxy Service
B. Lookup Service
C. Identity Management Service Most Voted
D. VMware Authentication Framework Daemon

A

C

51
Q

An administrator is looking to deploy a new VMware vCenter instance. The current environment consists of 75 hosts and is expected to grow up to 100 hosts over the next three years.
Which deployment size should the administrator select?

A. Medium
B. Tiny
C. Large
D. Small

A

D

52
Q

An administrator has been notified that a number of hosts are not compliant with the company policy for time synchronization.
The relevant portion of the policy states:
All physical servers must synchronize time with an external time source that is accurate to the microsecond.
Which step should the administrator take to ensure compliance with the policy?

A. Ensure that each vCenter Server Appliance is configured to use a Network Time Protocol (NTP) source.
B. Ensure that each ESXi host is configured to use a Precision Time Protocol (PTP) source.
C. Ensure that each ESXi host is configured to use a Network Time Protocol (NTP) source.
D. Ensure that each vCenter Server Appliance is configured to use a Precision Time Protocol (PTP) source.

A

B

53
Q

An administrator is creating a content library to manage VM templates and ISO images. The administrator wants to password-protect the images and templates and share them with a remote site.
Which two tasks must the administration perform when creating the content library? (Choose two.)

A. Publish the local content library.
B. Enable the security policy.
C. Create a subscribed content library.
D. Select an NFS datastore.
E. Enable authentication.

A

A, E

54
Q
A