VCP 8 Flashcards

1
Q

An administrator is tasked with applying updates to a vSphere cluster running vSAN using vSphere Lifecycle Manager. Downtime to the ESXi hosts must be minimal while the work is completed.
The administrator has already completed the following steps and no errors have been returned:
Downloaded all applicable software and created a new image.
Attached the new image to the cluster and run a compliance check against the image for the cluster.
Ran a remediation pre-check for the cluster.
Which two series of steps should the administrator perform to start the remediation of the cluster using the new image? (Choose two.)

A. 1. Use the Remediate option in vSphere Lifecycle Manager to remediate all of the ESXi hosts in the cluster in parallel.
2. Allow vSphere Lifecycle Manager to automatically control maintenance mode on the ESXi hosts.
B. 1. Place each of the ESXi hosts into maintenance mode manually.
2. Use the Stage option in vSphere Lifecycle Manager to stage the required software on all ESXi hosts one at a time.
C. 1. Leave all ESXi hosts in the cluster operational.
2. Use the Stage All option in vSphere Lifecycle Manager to stage the required software onto all ESXi hosts one at a time.
D. 1. Leave all ESXi hosts in the cluster operational.
2. Use the Stage All option in vSphere Lifecycle Manager to stage the required software onto all ESXi hosts in the cluster in parallel.
E. 1. Use the Remediate option in vSphere Lifecycle Manager to remediate all of the ESXi hosts in the cluster in sequence.
2. Allow vSphere Lifecycle Manager to automatically control maintenance mode on the ESXi hosts.
A
  1. Leave all ESXi hosts in the cluster operational.
  2. Use the Stage All option in vSphere Lifecycle Manager to stage
  3. Use the Remediate option in vSphere Lifecycle Manager to remediate all of the ESXi hosts in the cluster in sequence.
  4. Allow vSphere Lifecycle Manager to automatically control maintenance mode on the ESXi hosts.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An administrator is working with VMware Support and is asked to provide log bundles for the ESXi hosts in an environment.
Which three options does the administrator have? (Choose three.)

A. Generate a combined log bundle for all ESXi hosts using the vCenter Management Interface.
B. Generate a separate log bundle for each ESXi host using the vSphere Host Client.
C. Generate a combined log bundle for all ESXi hosts using the vSphere Client.
D. Generate a separate log bundle for each ESXi host using the vSphere Client.
E. Generate a separate log bundle for each ESXi host using the vCenter Management Interface.
F. Generate a combined log bundle for all ESXi hosts using the vSphere Host Client.
A

Generate a separate log bundle for each ESXi host using the vSphere Host Client.

Generate a combined log bundle for all ESXi hosts using the vSphere Client.

Generate a separate log bundle for each ESXi host using the vSphere Client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An administrator needs to consolidate a number of physical servers by migrating the workloads to a software-defined data center solution.
Which VMware solution should the administrator recommend?

A. VMware Horizon
B. VMware vSAN
C. VMware vSphere
D. VMware NSX
A

VMware vSphere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An administrator is tasked with configuring remote direct memory access (RDMA) over Converged Ethernet v2 (RoCE v2).
Which two types of adapters must the administrator configure? (Choose two.)

A. Paravirtual RDMA adapter
B. RDMA network adapter
C. Software iSCSi adapter
D. Fibre Channel over Ethernet (FCoE) adapter
E. Software NVMe over RDMA storage adapter
A

RDMA network adapter
Software NVMe over RDMA storage adapter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An administrator has a host profile named Standard-Config. The administrator wants to change the other host profiles to use only the storage configuration settings that are defined in the Standard-Config host profile.
What should the administrator do to make this change?

A. Export host customizations and import them to the other host profiles.
B. Copy the storage settings from Standard-Config to all other host profiles.
C. Duplicate the Standard-Config host profile and only modify the storage configuration settings.
D. Export the Standard-Config host profile and attach it to tile other hosts.
A

Copy the storage settings from Standard-Config to all other host profiles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A vSphere cluster has the following configuration:
Virtual machines (VMs) are running Production and Test workloads vSphere Distributed Resource Scheduler (DRS) is enabled
There are no resource pools in the cluster
Performance monitoring data shows that the Production workload VMs are not receiving their fully allocated memory when the vSphere cluster is fully utilized.
A combination of which two steps could the administrator perform to ensure that the Production VMs are always guaranteed the full allocation of memory? (Choose two.)

A. Assign a custom memory share value to the resource pool containing the Production VMs.
B. Assign a memory reservation value to the resource pool containing the Production VMs.
C. Create a parent resource pool for the Production VMs.
D. Create a sibling resource pool for each of the Production and Test VMs.
E. Create a child resource pool for the Test VMs.
A

Assign a memory reservation value to the resource pool containing the Production VMs.

Create a parent resource pool for the Production VMs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which two datastore types store the components of a virtual machine as a set of objects? (Choose two.)

A. VMware Virtual Machine File System (VMFS)
B. VMware vSAN
C. Network File System (NFS) 3
D. vSphere Virtual Volumes (vVols)
E. Network File System (NFS) 4.1

A

VMware vSAN

vSphere Virtual Volumes (vVols)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

After updating a predefined alarm on VMware vCenter, an administrator enables email notifications as shown in the attached alarm; however, notifications are NOT being sent.
Where must the mail server settings be configured by the administrator to resolve this issue?

A. In the ESXi host system config
B. In the alarm rule definition
C. In the vCenter settings in the vSphere Client
D. In the vCenter Management Interface

A

In the vCenter settings in the vSphere Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An administrator creates a virtual machine that contains the latest company-approved software, tools and security updates. Company policy requires that only full clones are allowed for server workloads.
A combination of which two tasks should the administrator complete to prepare for the deployment of this virtual machine for multiple users? (Choose two.)

A. Set appropriate permissions on the virtual machine.
B. Create a virtual machine customization specification.
C. Upgrade the virtual hardware.
D. Convert the virtual machine to a template.
E. Take a snapshot of the virtual machine.

A

Create a virtual machine customization specification.

Convert the virtual machine to a template.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

During the staging of a patch on a vCenter Server Appliance, an error was encountered and the process stopped. An administrator resolved the root cause and is ready to continue with the staging of the patch.
From the vCenter Management Interface, which action should the administrator take to continue the process from the point at which the error occurred?

A. Use the Stage and Install option to resume the staging.
B. Use the Resume option to resume the staging.
C. Use the Unstage option to restart the staging.
D. Use the Stage Only option to restart the staging.

A

Use the Resume option to resume the staging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An administrator is adding a new ESXi host to an existing vSphere cluster. When selecting the cluster, the administrator is unable to use the Cluster Quickstart workflow to add and configure the additional host.
What could be the root cause of this issue?

A. The administrator has previously dismissed the Cluster Quickstart workflow.
B. The administrator must manually add the host to the cluster before using the Cluster Quickstart workflow.
C. The administrator has not been assigned the required permissions to use the Cluster Quickstart workflow.
D. The administrator must enable the Cluster Quickstart workflow option in VMware vCenter.

A

The administrator has previously dismissed the Cluster Quickstart workflow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A company has two sites: Site A and Site B. The administrator would like to manage the VMware vCenter inventories in both sites from a single vSphere Client session.
Which vCenter feature must be configured?

A. VMware Certificate Authority
B. VMware Site Recovery Manager
C. vCenter Single Sign-On
D. Enhanced Linked Mode

A

Enhanced Linked Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An administrator plans to update the Supervisor cluster and has noticed some of the Tanzu Kubernetes Grid clusters are running an incompatible version.
Which action must the administrator take before proceeding with the Supervisor cluster update?

A. Update all Tanzu Kubernetes Grid clusters to the latest version prior to the Supervisor cluster update.
B. No action is needed – Tanzu Kubernetes Grid clusters will be updated automatically as part of the update process.
C. No action is needed – Incompatible Tanzu Kubernetes Grid clusters can be manually updated after the Supervisor cluster update.
D. Update incompatible Tanzu Kubernetes Grid clusters prior to the Supervisor cluster update.

A

Update incompatible Tanzu Kubernetes Grid clusters prior to the Supervisor cluster update.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which three vSphere features are still supported for Windows-based virtual machines when enabling vSphere’s virtualization-based security feature? (Choose three.)

A. vSphere vMotion
B. PCI passthrough
C. vSphere High Availability (HA)
D. vSphere Fault Tolerance
E. vSphere Distributed Resources Scheduler (DRS)
F. Hot Add of CPU or memory

A

vSphere vMotion

vSphere High Availability (HA)

vSphere Distributed Resources Scheduler (DRS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An administrator wants to create virtual machine (VM) templates and store them in a content library. The administrator would like to use the content library to manage different versions of these templates so that reverting to an earlier version is an option.
How should the administrator create these templates?

A. Select a VM in the vCenter inventory.
Clone the VM to the content library as a VM template type.
B. Select a VM template in the vCenter inventory.
Clone the template to the content library.
C. Export a VM in the vCenter inventory to an OVF template.
Import the OVF template into the content library.
D. Convert a VM to a template in the vCenter inventory.
Clone the template to the content library.

A

Select a VM in the vCenter inventory.
Clone the VM to the content library as a VM template type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An administrator is tasked with configuring certificates for a VMware software-defined data center (SDDC) based on the following requirements:
All certificates should use certificates trusted by the Enterprise Certificate Authority (CA).
The solution should minimize the ongoing management overhead of replacing certificates.
Which three actions should the administrator take to ensure that the solution meets corporate policy? (Choose three.)

A. Replace the VMware Certificate Authority (VMCA) certificate with a self-signed certificate generated from the VMCA.
B. Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.
C. Replace the machine SSL certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
D. Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.
E. Replace the solution user certificates with custom certificates generated from the Enterprise CA.
F. Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).

A

Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.

Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.

Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An administrator is tasked with moving an application and guest operating system (OS) running on top of a physical server to a software-defined data center (SDDC) in a remote secure location.
The following constraints apply:
The remote secure location has no network connectivity to the outside world.
The business owner is not concerned if all changes in the application make it to the SDDC in the secure location.
The application’s data is hosted in a database with a high number of transactions.
What could the administrator do to create an image of the guest OS and application that can be moved to this remote data center?

A. Create a hot clone of the physical server using VMware vCenter Converter.
B. Create a cold clone of the physical server using VMware vCenter Converter.
C. Restore the guest OS from a backup.
D. Use storage replication to replicate the guest OS and application.

A

Create a cold clone of the physical server using VMware vCenter Converter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An administrator is tasked with configuring an appropriate Single Sign-On (SSO) solution for VMware vCenter based on the following criteria:
The solution should support the creation of Enhanced Link Mode groups.
All user accounts are stored within a single Active Directory domain and the solution must support only this Active Directory domain as the identity source.
All user account password and account lockout policies must be managed within the Active Directory domain.
The solution should support token-based authentication.
Which SSO solution should the administrator choose based on the criteria?

A. vCenter Identity Provider Federation with Active Directory Federation Services as the identity provider
B. vCenter Single Sign-On with Active Directory over LDAP as the identity source
C. vCenter Single Sign-On with Active Directory (Windows Integrated Authentication) as the identity source
D. vCenter Identity Provider Federation with Active Directory over LDAP as the identity provider

A

A. vCenter Identity Provider Federation with Active Directory Federation Services as the identity provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An administrator is tasked with looking into the disaster recovery options for protecting a database server using VMware vSphere Replication.
The following requirements must be met:
The virtual machine must remain online during the protection.
The virtual machine’s snapshots must be used as part of the replication process.
Which step must the administrator complete to accomplish this task?

A. Configure the virtual machine storage policy.
B. Enable guest OS VSS quiescing for this virtual machine.
C. Perform a full initial synchronization of the source virtual machine to the target location.
D. Configure network traffic isolation for vSphere Replication.

A

Perform a full initial synchronization of the source virtual machine to the target location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An administrator must gracefully restart a virtual machine (VM) through the vSphere Client but the option is greyed out. The administrator has full administrative access on VMware vCenter and all the objects available in vCenter, but has no access to log onto the operating system.
Which action should the administrator take to meet the objective?

A. Upgrade the virtual hardware
B. Migrate the VM to another host
C. Install VMware Tools
D. Restart vCenter

A

Install VMware Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An administrator is tasked with installing VMware vCenter. The vCenter Server Appliance must support an environment of:
400 hosts
4000 virtual machines
Which two resources must be allocated, at a minimum, to meet the requirements? (Choose two.)

A. 16 vCPUs
B. 30 GB Memory
C. 4 vCPUs
D. 8 vCPUs
E. 20 GB Memory

A

30 GB Memory
8 vCPUs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which VMware offering will allow an administrator to manage the lifecycle of multiple vCenter Server instances in a single software as a service (SaaS)-based solution to help drive operational efficiency?

A. VMware vSphere with Tanzu
B. VMware Cloud Foundation
C. VMware vSphere+
D. VMware Aria Suite Lifecycle

A

VMware vSphere+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which feature would allow for the non-disruptive migration of a virtual machine between two clusters in a single VMware vCenter instance?

A. vSphere vMotion
B. Cross vCenter Migration
C. vSphere Storage vMotion
D. vSphere Fault Tolerance

A

vSphere vMotion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which four elements can a vSphere Lifecycle Manager image contain? (Choose four.)

A. ESXi base image
B. ESXi configuration
C. Vendor agents
D. Vendor add-ons
E. BIOS updates
F. Firmware and drivers add-on
G. Independent components

A

ESXi base image
Vendor add-on
Firmware and drivers add-on
Independent components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

If a distributed switch uses the “Route based on physical NIC load” load balancing algorithm, what does the mean send or receive utilization of an uplink need to exceed for the flow of traffic to move to the second uplink?

A. 75 percent of the capacity over a 30 second period
B. 60 percent of the capacity over a 30 second period
C. 60 percent of the capacity over a 40 second period
D. 75 percent of the capacity over a 40 second period

A

75 percent of the capacity over a 30 second period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

An administrator manually configures a reference ESXi host that meets company security standards for vSphere environments. The administrator now needs to apply all of the security standards to every identically configured host across multiple vSphere clusters within a single VMware vCenter instance.
Which four steps would the administrator complete to meet this requirement? (Choose four.)

A. Extract the host profile from the reference host.
B. Export the host profile from vCenter.
C. Import host customization on the reference host.
D. Attach the host profile to each cluster that requires the secure configuration.
E. Check the compliance of each host against the host profile.
F. Reset host customization on the reference host.
G. Remediate all non-compliant hosts.

A

Extract the host profile from the reference host.

Attach the host profile to each cluster that requires the secure configuration.

Check the compliance of each host against the host profile.

Remediate all non-compliant hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

After a recent unexplained peak in virtual machine (VM) CPU usage, an administrator is asked to monitor the VM performance for a recurrence of the issue.
Which two tools can the administrator use? (Choose two.)

A. vCenter Management Interface
B. Direct Console User Interface (DCUI)
C. vSphere Performance Charts
D. vCenter Command Line Interface
E. ESXi Shell

A

vSphere Performance Charts

ESXi Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

An administrator is tasked with configuring vSphere Trust Authority.
The administrator has completed the following steps:

Set up the workstation -
Enabled the Trust Authority Administrator
Enabled the Trust Authority State
Collected information about the ESXi hosts and vCenter to be trusted
Which step does the administrator need to complete next?

A. Import the Trusted Host information to the Trust Authority Cluster
B. Import the Trusted Cluster information to the Trusted Hosts
C. Create the Key Provider on the Trusted Cluster
D. Import the Trusted Host information to the Trusted Cluster

A

Import the Trusted Host information to the Trust Authority Cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

An administrator set up the following configuration:
The distributed switch has three ESXi hosts, and each host has two 40 Gbps NICs.
The amount of bandwidth reserved for virtual machine (VM) traffic is 6 Gbps.
The administrator wants to guarantee that VMs in the Finance distributed port group can access 50 percent of the available reserved bandwidth for VM traffic.
Given this scenario, what should the size (in Gbps) of the Finance network resource pool be?

(this is the one with the picture of the distributed switch and port gro

A

18

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A vSphere environment is experiencing intermittent short bursts of CPU contention, causing brief production outages for some of the virtual machines (VMs). To understand the cause of the issue, the administrator wants to observe near real-time statistics tor all VMs.
Which two vSphere reporting tools could the administrator use? (Choose two.)

A. Advanced Performance Charts
B. esxcli
C. resxtop
D. Overview Performance Charts
E. esxtop

A

resxtop
esxtop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

An administrator is performing maintenance activities and discovers that a Virtual Machine File System (VMFS) datastore has a lot more used capacity than expected. The datastore contains 10 virtual machines (VMs) and, when the administrator reviews the contents of the associated datastore, discovers that five virtual machines have a snapshot file (-delta.vmdk files) that has not been modified in over 12 months. The administrator checks the Snapshot Manager within the vSphere Client and confirms that there are no snapshots visible.
Which task should the administrator complete on the virtual machines to free up datastore space?

A. Consolidate the snapshots for each VM.
B. Inflate the disk files for each VM.
C. Delete all snapshots for each VM.
D. Storage vMotion each VM to another datastore.

A

Consolidate the snapshots for each VM.

32
Q

An administrator is attempting to configure Storage I/O Control (SIOC) on five datastores within a vSphere environment. The administrator is being asked to determine why SIOC configuration completed successfully on only four of the datastores.
What are two possible reasons why the configuration was not successful? (Choose two.)

A. The datastore contains Raw Device Mappings (RDMs).
B. SAS disks are used for the datastore.
C. The datastore has multiple extents.
D. The datastore is using ISCSI.
E. The administrator is using NFS storage.

A

The datastore contains Raw Device Mappings (RDMs)
The datastore has multiple extents

33
Q

An administrator has mapped three vSphere zones to three vSphere clusters.
Which two statements are true for this vSphere with Tanzu zonal Supervisor enablement? (Choose two.)

A. One Supervisor will be created in a specific zone.
B. One Supervisor will be created across all zones.
C. Three Supervisors will be created in Linked Mode.
D. Individual vSphere Namespaces will be placed into a specific zone.
E. Individual vSphere Namespaces will be spread across all zones.

A

One Supervisor will be created across all zones.
Individual vSphere Namespaces will be spread across all zones.

34
Q

An administrator is investigating reports of users experiencing difficulties logging into a VMware vCenter instance using LDAP accounts.
Which service should the administrator check as part of troubleshooting?

A. vSphere Authentication Proxy Service
B. Lookup Service
C. Identity Management Service
D. VMware Authentication Framework Daemon

A

Identity Management Service

35
Q

An administrator is looking to deploy a new VMware vCenter instance. The current environment consists of 75 hosts and is expected to grow up to 100 hosts over the next three years.
Which deployment size should the administrator select?

A. Medium
B. Tiny
C. Large
D. Small

36
Q

An administrator has been notified that a number of hosts are not compliant with the company policy for time synchronization.
The relevant portion of the policy states:
All physical servers must synchronize time with an external time source that is accurate to the microsecond.
Which step should the administrator take to ensure compliance with the policy?

A. Ensure that each vCenter Server Appliance is configured to use a Network Time Protocol (NTP) source.
B. Ensure that each ESXi host is configured to use a Precision Time Protocol (PTP) source.
C. Ensure that each ESXi host is configured to use a Network Time Protocol (NTP) source.
D. Ensure that each vCenter Server Appliance is configured to use a Precision Time Protocol (PTP) source.

A

Ensure that each ESXi host is configured to use a Precision Time Protocol (PTP) source.

37
Q

An administrator is creating a content library to manage VM templates and ISO images. The administrator wants to password-protect the images and templates and share them with a remote site.
Which two tasks must the administration perform when creating the content library? (Choose two.)

A. Publish the local content library.
B. Enable the security policy.
C. Create a subscribed content library.
D. Select an NFS datastore.
E. Enable authentication.

A

Publish the local content library.

Enable authentication.

38
Q

An administrator is responsible for the management of a VMware vCenter instance that is currently experiencing performance issues. The administrator quickly identifies that the CPU and memory utilization of vCenter is consistently over 80%. Upon further analysis, it seems that the vpxd process is contributing significantly to the performance issue.
A combination of which four steps should the administrator take to resolve the performance issues and ensure that a similar issue can be rectified without requiring downtime to vCenter moving forward? (Choose four.)

A. Gracefully shut down vCenter using the vSphere Client.
B. Enable CPU Hot Add on the vCenter virtual machine.
C. Power on the vCenter Server Appliance using the vSphere Host Client.
D. Enable CPU and Memory Hot Add on the vCenter virtual machine.
E. Add additional CPU and memory to the vCenter Server Appliance.
F. Power on the vCenter Server Appliance using the vSphere Client.
G. Enable Memory Not Add on the vCenter virtual machine.

A

Gracefully shut down vCenter using the vSphere Client

Power on the vCenter Server Appliance using the vSphere Host Client

Enable CPU and Memory Hot Add on the vCenter virtual machine.

Add additional CPU and memory to the vCenter Server Appliance.

39
Q

An administrator successfully installs VMware ESXi onto the first host of a new vSphere cluster but makes no additional configuration changes. When attempting to log into the vSphere Host Client using the Fully Qualified Domain Name (FQDN) of the host, the administrator receives the following error message:
“Server Not Found – We can’t connect to the server at esxi101.corp.local.”
The following information has been provided to complete the configuration:

Host FQDN: esxi101.corp.local -

Management VLAN ID: 10 -

DHCP: No -
Management IP Address: 172.16.10.101 / 24
Management IP Gateway: 172.16.10.1
Corporate DNS Servers: 172.16.10.5, 172.16.10.6

ONS Domain: corp.local -
In addition, all host configurations must also meet the following requirements:
The management network must use only IPv4 network protocols.
The management network must be fault tolerant.
Which three high level tasks should the administrator complete, at a minimum, in order to successfully log into the vSphere Host Client using the FQDN for esxi101 and complete the configuration? (Choose three.)

A. Ensure a DNS A Record is created for the VMware ESXi host on the corporate DNS servers.
B. Update the VMware ESXi Management Network DNS configuration to use the corporate DNS servers for names resolution.
C. Update the VMware ESXi Management Network IPv4 configuration to use a static a IPv4 address.
D. Configure at least two network adapters for the VMware ESXi Management Network.
E. Set the value of the VMware ESXi Management Network VLAN ID to 10.
F. Disable IPv6 for the VMware ESXi Management Network.

A

Ensure a DNS A Record is created for the VMware ESXi host on the corporate DNS servers.

Update the VMware ESXi Management Network IPv4 configuration to use a static a IPv4 address.

Set the value of the VMware ESXi Management Network VLAN ID to 10

40
Q

When configuring vCenter High Availability (HA), which two statements are true regarding the active, passive, and witness nodes? (Choose two.)

A. Network latency must be less than 10 milliseconds.
B. They must have a supported Wide Area Network (WAN).
C. They must have a minimum of a 10 Gbps network adapter.
D. They must have a minimum of a 1 Gbps network adapter.
E. Network latency must be more than 10 milliseconds.

A

Network latency must be less than 10 milliseconds.

They must have a minimum of a 1 Gbps network adapter.

41
Q

An administrator is deploying a new all flash vSAN cluster based on the vSAN Original Storage Architecture (OSA).
What is the minimum supported network throughput in Gb/s for each host?

A. 50
B. 10
C. 25
D. 1

42
Q

An administrator enables Secure Boot on an ESXi host. On booting the ESXi host, the following error message appears:
Fatal error: 39 (Secure Boot Failed)
What is the cause of this issue?

A. The kernel hos been tampered with.
B. The Trusted Platform Module chip has failed.
C. The administrator attempted to boot with a bootloader that is unsigned or has been tampered with.
D. A package (VIB or driver) has been tampered with.

A

The kernel hos been tampered with

43
Q

To keep virtual machines (VMs) up and running at all times in a vSphere cluster, an administrator would like VMs to be migrated automatically when the host hardware health status becomes degraded.
Which cluster feature can be used to meet this requirement?

A. Predictive DRS
B. Proactive HA
C. vSphere HA Orchestrated Restart
D. vSphere Fault Tolerance

A

Proactive HA

44
Q

An administrator wants to allow a DevOps engineer the ability to delete Tanzu Kubernetes Grid (TKG) cluster objects in a vSphere Namespace.
Which role would provide the minimum required permissions to perform this operation?

A. Administrator
B. Can View
C. Owner
D. Can Edit

45
Q

A group of new virtual machines have been deployed using thin-provisioned disks due to the limited storage space available in an environment. The storage team has expressed concern about extensive use of this type of provisioning.
An administrator is tasked with creating a custom alarm to notify the storage team when thin provisioning reaches a certain capacity threshold.
Where must the administrator define this alarm?

A. Datastore
B. Data center
C. Datastore cluster
D. Virtual machine

46
Q

What are three options an administrator can configure after creating a vSphere Namespace? (Choose three.)

A. Backup schedule
B. Certificates
C. Storage policies
D. Update policies
E. Permissions
F. Resource and Object limits

A

Storage policies

Permissions

Resource and Object limits

47
Q

A VMkernel port is labelled PROD01 and uses the default TCP/IP stack. Currently, this VMkernel port is configured for supporting live virtual machine (VM) migrations.
Which configuration change should the administrator make to isolate live VM migration traffic from other network traffic?

A. Remove PROD01 and create a new VMkernel port and set the TCP/IP stack to vSphere vMotion.
B. Remove PROD01 and create a new VMkernel port with the TCP/IP stack set to provisioning.
C. Create a new VMkernel port and set the TCP/IP stack to provisioning.
D. Modify PROD01 by changing the TCP/IP stack to vSphere vMotion.

A

Remove PROD01 and create a new VMkernel port and set the TCP/IP stack to vSphere vMotion

48
Q

After adding a new vSphere ESXi host with identical hardware configuration to an existing vSphere cluster, which task would an administrator complete prior to checking the compliance with an existing host profile?

A. Attach the host profile to the new host
B. Duplicate the host profile
C. Copy the host setting from the new host
D. Import the host profile

A

Attach the host profile to the new host

49
Q

An administrator is tasked with deploying a new on-premises software-defined data center (SDDC)
that will contain a total of eight VMware vCenter instances.
The following requirements must be met:
- All vCenter instances should be visible in a single vSphere Client session.
- All vCenter inventory should be searchable from a single vSphere Client session.
- Any administrator must be able to complete operations on any vCenter instance using a single
set of credentials.
What should the administrator configure to meet these requirements?

A. Two Enhanced Linked Mode groups consisting of four vCenter instances each in a Single Sign-On
domain.
B. A single Hybrid Linked Mode group consisting of four vCenter instances each in a Single Sign-On
domain.
C. A single Enhanced Linked Mode group consisting of eight vCenter instances in one Single Sign-
On domain.
D. A single Hybrid Linked Mode group consisting of eight vCenter instances in one Single Sign-On
domain.

A

A single Enhanced Linked Mode group consisting of eight vCenter instances in one Single Sign-On domain.

50
Q

An administrator has Windows virtual machines (VMs) and VMware Tools is installed in each VM.
The administrator performs a status check of VMware Tools using vSphere Lifecycle Manager.
What is the VMware Tools status for the Windows VMs if the version of VMware Tools has a known
problem and must be immediately upgraded?
A. Version Unsupported
B. Guest Managed
C. Unknown
D. Upgrade Available

A

Version Unsupported

51
Q

Which three features are only available when using vSphere Distributed Switches instead of
vSphere Standard Switches? (Choose three.)
A. 802.1Q tagging
B. Port mirroring
C. Netflow
D. Configuration backup and restore
E. IPv6 support
F. IPv4 support

A

Port mirroring

Netflow

Configuration backup and restore

52
Q

An administrator is configuring vSphere Lifecycle Manager to install patches to a vSphere cluster.
The cluster runs workload virtual machines (VMs) that are incompatible with vSphere vMotion, and
therefore cannot be live migrated between hosts during the installation of the patches.
Which configuration in vSphere Lifecycle Manager will allow the administrator to reduce the
downtime associated with the patching operation without migrating the VMs?

A. Enable Distributed Power Management (DPM) and set the VM power state to the suspend to disk
option
B. Enable Quick Boot ana set the VM power stale to the suspend to disk option
C. Enable vSphere High Availability (HA) admission control and set the VM power stale to the suspend
to memory option
D. Enable Quick Boot and set the VM power state to the suspend to memory option

A

Enable Quick Boot and set the VM power state to the suspend to memory option

53
Q

An administrator creates a new corporate virtual machine (VM) template every month to include all
of the latest patches. The administrator needs to ensure that the new VM template is synchronized
from the primary data center site (London) to two secondary data center sites (Tokyo and New
York). The administrator is aware that datastore space is limited within the secondary data center
sites. The administrator needs to ensure that the VM template is available in the secondary sites
the first time a new virtual machine is requested.
Which four steps should the administrator take to meet these requirements? (Choose four.)

A. Create a new published content library at the primary site.
B. Add the virtual machine template to the subscribed content library.
C. Create a new published content library in each secondary site.
D. Create a new subscribed content library in each secondary site.
E. Configure the subscribed content library to download content when needed.
F. Configure each subscribed content library to download content immediately.
G. Add the virtual machine template to the published content library.

A

Create a new published content library at the primary site.

Create a new subscribed content library in each secondary site.

Configure the subscribed content library to download content when needed.

Add the virtual machine template to the published content library.

54
Q

An administrator is tasked with migrating a single virtual machine (VM) from an existing VMware
vCenter to a secure environment where corporate security policy requires that all VMs be encrypted.
The secure environment consists of a dedicated vCenter instance with a 4-node vSphere cluster
and already contains a number of encrypted VMs.
Which two steps must the administrator take to ensure the migration is a success? (Choose two.)

A. Ensure that the source and destination vCenter instances share the same Key Management Server
(KMS).
B. Ensure that Encrypted vMotion is turned off for the VM.
C. Ensure that the VM is encrypted before attempting the migration.
D. Ensure that the VM is powered off before attempting the migration.
E. Ensure that the source and destination vCenter Servers have a different Key Management Server
(KMS).

A

Ensure that the source and destination vCenter instances share the same Key Management Server
(KMS).

Ensure that the VM is encrypted before attempting the migration.

55
Q

An administrator is tasked with providing users access to objects within an existing VMware
vCenter instance. The vCenter inventory has a single data center with one management vSphere
cluster and five workload vSphere clusters.
The following requirements must be met for assigning the users access:
- Users must only be able to view all of the inventory objects associated with the management
vSphere cluster.
- Users must be able to edit all of the inventory objects associated with the workload vSphere
clusters.
- The administrator creates a custom role to provide the permissions needed to allow users to edit
inventory objects.
Which series of steps should the administrator complete to assign the custom role and provide the
required level of access to users?

A. Apply Global permissions to assign the Read Only role to the root vCenter object.
Apply vCenter permissions to assign the custom role to the workload vSphere clusters and enable
propagation.
B. Apply Global permissions to assign the Read Only role to the root vCenter object and enable
propagation.
Apply vCenter permissions to assign the custom role to the workload vSphere clusters and enable
propagation.
C. Apply Global permissions to assign the Read Only role to the root vCenter object.
Apply vCenter permissions to assign the custom role to the workload vSphere clusters.
D. Apply Global permissions to assign the Read Only role to the root vCenter object and enable
propagation.

A

Apply Global permissions to assign the Read Only role to the root vCenter object and enable
propagation.

56
Q

An administrator has a requirement to revert a running virtual machine to a previous snapshot after
a failed attempt to upgrade an application. When the administrator originally took the snapshot, the
following choices in the Take Snapshot dialog were made:
Snapshot the virtual machine’s memory = false
Quiesce guest file system = false
What will be the result of the administrator selecting the 揜evert to Latest Snapshot” option to
return the virtual machine to a previous snapshot?

A. The virtual machine will be restored to the parent snapshot in a powered on state.
B. The virtual machine will be restored to the parent snapshot in a powered off state.
C. The virtual machine will be restored to the child snapshot in a powered off state.
D. The virtual machine will be restored to the child snapshot in a powered on state.

A

The virtual machine will be restored to the parent snapshot in a powered off state.

57
Q

An administrator is planning to upgrade a VMware vCenter instance to version 8. It is currently
integrated with the following solutions:
- VMware Aria Automation
- VMware Cloud Director
Which tool can the administrator use to run interoperability reports before the upgrade process?

A. vSphere Update Manager
B. VMware Aria Suite Lifecycle
C. vCenter Server Update Planner
D. vSphere Lifecycle Manager

A

vCenter Server Update Planner

58
Q

An administrator decides to restore VMware vCenter from a file-based backup following a failed
upgrade.
Which interface should the administrator use to complete the restore?

A. Direct Console User Interface (DCUI)
B. vCenter Management Interface (VAMI)
C. vSphere Client
D. vCenter GUI Installer

A

vCenter GUI Installer

59
Q

An administrator needs to provide encryption for workloads within an existing vSphere cluster.
The following requirements must be met:
- Workloads should be encrypted at rest.
- Encrypted workloads must automatically be encrypted during transit.
- Encryption should not require any specific hardware.

What should the administrator configure to meet these requirements?
A. Encrypted vSphere vMotion
B. Unified Extensible Firmware Interface (UEFI) Secure Boot
C. Host Encryption
D. VM Encryption

A

VM Encryption

60
Q

After a number of outages within a production VMware software-defined data center, an
administrator is tasked with identifying a solution to meet the following requirements:
- Reduce the risk of outages by proactively identifying issues with the environment and resolving
them.
- Reduce the complexity of uploading log bundles when raising support tickets.
Which solution should the administrator recommend to meet these requirements?
A. VMware Aria Operations for Logs
B. VMware Skyline Advisor Pro
C. VMware Skyline Health
D. VMware Aria Operations

A

VMware Skyline Health

61
Q

An administrator is responsible for performing maintenance tasks on a vSphere cluster.
The cluster has the following configuration:

  • Identically configured vSphere ESXi hosts (esx01, esx02, esx03 and esx04)
  • All workloads are deployed into a single VMFS datastore provided by the external storage array
    vSphere High Availability (HA) has not been enabled vSphere Distributed Resource Scheduler
    (DRS) has not been enabled
    Currently, a critical production application workload (VM1) is running on esx01.
    Given this scenario, which two actions are required to ensure VM1 continues to run when esx01 is
    placed into maintenance mode? (Choose two.)

A. Fully automated DRS must be enabled on the cluster so that VM1 will be automatically migrated to
another host within the cluster when esx01 is placed into maintenance mode.
B. VM1 must be manually shut down and cold migrated to another host within the cluster using
vSphere vMotion before esx01 is placed into maintenance mode.
C. vSphere HA must be enabled on the cluster so that VM1 will be automatically migrated to another
host within the cluster when esx01 is placed into maintenance mode.
D. VM1 must be manually live migrated to another host within the cluster using vSphere vMotion
before esx01 is placed into maintenance mode.
E. VM1 must be manually migrated to another host within the cluster using vSphere Storage vMotion
before esx01 is placed into maintenance mode.

A

Fully automated DRS must be enabled on the cluster so that VM1 will be automatically migrated to
another host within the cluster when esx01 is placed into maintenance mode.

VM1 must be manually live migrated to another host within the cluster using vSphere vMotion
before esx01 is placed into maintenance mode.

62
Q

An administrator needs better performance and near-zero CPU utilization from the ESXi hosts for
networking functions and processing. The administrator creates a new vSphere Distributed Switch
and enables network offloads compatibility.
Which solution would help achieve this goal?

A. vSphere Distributed Services Engine
B. Data Processing Units (DPUs)
C. vSphere Network I/O Control
D. Universal Passthrough version 2

A

Data Processing Units (DPUs)

63
Q

An administrator needs to perform maintenance on a datastore that is running the vSphere Cluster
Services (vCLS) virtual machines (VMs).
Which feature can the administrator use in this scenario to avoid the use of Storage vMotion on the
vCLS VMs?

A. vSphere Distributed Resource Scheduler (DRS)
B. vSphere vMotion
C. vSphere Fault Tolerance
D. vCLS Retreat Mode

A

vCLS Retreat Mode

64
Q

What is the role of vSphere Distributed Services Engine?

A. Provide a live shadow instance of a virtual machine (VM) that mirrors the primary VM to prevent
data loss and downtime during outages
B. Implement Quality of Service (QoS) on network traffic within a vSphere Distributed Switch
C. Provide hardware accelerated data processing to boost infrastructure performance
D. Redistribute virtual machines across vSphere cluster hosts to comply with user-defined affinity and
anti-affinity rules following host failures or during maintenance operations

A

Provide hardware accelerated data processing to boost infrastructure performance

65
Q

A vSphere cluster has the following vSphere Distributed Resource Scheduler (DRS) group
configuration:
- Virtual machine (VM) group named DB
- Host groups named PROD11 and PROD55
The administrator wants to force the VMs in the DB group to run on the hosts in the PROD11 group.
However, if all the hosts in PROD11 go offline for maintenance, then the VMs in the DB group
should run on hosts in PROD55.

Which VM/Host rule must the administrator create to ensure that these requirements are met?
A. A preferential rule between the DB group and the PROD11 group
B. A preferential rule between the DB group and the PROD55 group
C. A required rule between the DB group and the PROD11 group
D. A required rule between the DB group and the PROD55 group

A

A preferential rule between the DB group and the PROD11 group

66
Q

An administrator is asked to configure a security policy at the port group level of a standard switch.
The following requirements must be met:
- The security policy must apply to all virtual machines on portgroup-1.
- All traffic must be forwarded, regardless of the destination.
Which security policy must the administrator configure?
A. Forged transmits set to reject
B. MAC address changes set to accept
C. Promiscuous mode set to reject
D. Promiscuous mode set to accept

A

Promiscuous mode set to accept

67
Q

An administrator identifies a snapshot file named “Win10-000001-sesparse.vmdk” on a datastore.
Which type of information can be determined about this datastore? (Choose the best answer.)
A. The datastore is formatted as VMFS3.
B. The datastore is formatted as VMFS6.
C. The datastore is a raw device mapping.
D. The datastore is a vSAN datastore.

A

The datastore is formatted as VMFS6.

68
Q

Which feature can an administrator configure to have a copy of critical virtual machines in another
cluster? (Choose the best answer.)
A. vSphere Storage vMotion
B. vSphere Fault Tolerance
C. vSphere Replication
D. Instant Clone

A

vSphere Replication

69
Q

An administrator sees a virtual machine message that reads, “Consolidation is required” in the
vSphere Client.
Which action does ESXi take when the administrator completes snapshot consolidation? (Choose
the best answer.)
A. Collapses all snapshots in the current snapshot tree
B. Commits redundant delta disks to the base disk
C. Collapses all snapshots into a single snapshot
D. Deletes all snapshots without committing to the base disk

A

Commits redundant delta disks to the base disk

70
Q

An administrator wants to create a master copy of an existing virtual machine (VM) named
“TestApp” and deploy VMs from this master copy whenever a user requests one.
Which method can the administrator use to create a master copy of TestApp? (Choose the best
answer.)

A. Deploy from an Open Virtual Machine Format (OVF) template
B. Convert a template to a VM
C. Clone the VM to a template
D. Create a new VM

A

Clone the VM to a template

71
Q

Which feature is a prerequisite for Proactive High Availability (HA)? (Choose the best answer.)

A. vCenter High Availability
B. vSAN Cluster
C. Predictive Distributive Resource Scheduler (DRS)
D. vSphere Distributive Resource Scheduler (DRS)

A

vSphere Distributive Resource Scheduler (DRS)

72
Q

A host profile is updated with a new password that urgently needs to be changed on all hosts attached to the host profile.

Which option would an administrator select to complete the password change? (Choose the best
answer.)
A. Copy Settings from Host
B. Remediate
C. Check Host Profile Compliance
D. Edit Host Customizations

73
Q

Following a merger with another company, an administrator is tasked with configuring an identity
source for VMware vCenter so that all vSphere administrators can authenticate using their existing
Active Directory accounts. Each company has user accounts in their own Active Directory forests.
The following additional information has been provided:
The corporate policy states that only Windows-based machine accounts are allowed in Active
Directory.

Which action should the administrator take to configure vCenter Single Sign-On (SSO) to meet this
requirement?
A. Configure SSO to use Active Directory over LDAP as the identity source.
B. Configure SSO to use OpenLDAP as the identity source.
C. Join the vCenter Server Appliance to the LDAP domain.
D. Configure SSO to use Active Directory (Integrated Windows Authentication) as the identity source.

A

Configure SSO to use Active Directory over LDAP as the identity source.

74
Q

Which two performance tools can be used to monitor virtual machines outside the guest operating
system? (Choose two.)

A. vCenter Server performance charts
B. Task Manager
C. top
D. esxtop
E. Perfmon

A

vCenter Server performance charts
esxtop

75
Q

What is the default shutdown order of virtual machines (VMs) on a host? (Choose the best answer.)
A. Alphabetical based on VM names
B. Highest utilization to lowest utilization
C. Largest VM to smallest VM
D. Reverse of the startup order

A

Reverse of the startup order