vcp 8.0 (correct) Flashcards
An administrator is tasked with applying updates to a vSphere cluster running vSAN using vSphere Lifecycle Manager. Downtime to the ESXi hosts must be minimal while the work is completed.
The administrator has already completed the following steps and no errors have been returned:
Downloaded all applicable software and created a new image.
Attached the new image to the cluster and run a compliance check against the image for the cluster.
Ran a remediation pre-check for the cluster.
Which two series of steps should the administrator perform to start the remediation of the cluster using the new image? (Choose two.)
A. 1. Use the Remediate option in vSphere Lifecycle Manager to remediate all of the ESXi hosts in the cluster in parallel.
2. Allow vSphere Lifecycle Manager to automatically control maintenance mode on the ESXi hosts.
B. 1. Place each of the ESXi hosts into maintenance mode manually.
2. Use the Stage option in vSphere Lifecycle Manager to stage the required software on all ESXi hosts one at a time.
C. 1. Leave all ESXi hosts in the cluster operational.
2. Use the Stage All option in vSphere Lifecycle Manager to stage the required software onto all ESXi hosts one at a time.
D. 1. Leave all ESXi hosts in the cluster operational.
2. Use the Stage All option in vSphere Lifecycle Manager to stage the required software onto all ESXi hosts in the cluster in parallel.
E. 1. Use the Remediate option in vSphere Lifecycle Manager to remediate all of the ESXi hosts in the cluster in sequence.
2. Allow vSphere Lifecycle Manager to automatically control maintenance mode on the ESXi hosts.
- Leave all ESXi hosts in the cluster operational.
- Use the Stage All option in vSphere Lifecycle Manager to stage the required software onto all ESXi hosts in the cluster in parallel.
- Use the Remediate option in vSphere Lifecycle Manager to remediate all of the ESXi hosts in the cluster in sequence.
- Allow vSphere Lifecycle Manager to automatically control maintenance mode on the ESXi hosts.
An administrator is working with VMware Support and is asked to provide log bundles for the ESXi hosts in an environment.
Which three options does the administrator have? (Choose three.)
A. Generate a combined log bundle for all ESXi hosts using the vCenter Management Interface.
B. Generate a separate log bundle for each ESXi host using the vSphere Host Client.
C. Generate a combined log bundle for all ESXi hosts using the vSphere Client.
D. Generate a separate log bundle for each ESXi host using the vSphere Client.
E. Generate a separate log bundle for each ESXi host using the vCenter Management Interface.
F. Generate a combined log bundle for all ESXi hosts using the vSphere Host Client.
Generate a separate log bundle for each ESXi host using the vSphere Host Client.
Generate a combined log bundle for all ESXi hosts using the vSphere Client.
Generate a separate log bundle for each ESXi host using the vSphere Client.
An administrator needs to consolidate a number of physical servers by migrating the workloads to a software-defined data center solution.
Which VMware solution should the administrator recommend?
A. VMware Horizon
B. VMware vSAN
C. VMware vSphere
D. VMware NSX
VMware vSphere
An administrator is tasked with configuring remote direct memory access (RDMA) over Converged Ethernet v2 (RoCE v2).
Which two types of adapters must the administrator configure? (Choose two.)
A. Paravirtual RDMA adapter
B. RDMA network adapter
C. Software iSCSi adapter
D. Fibre Channel over Ethernet (FCoE) adapter
E. Software NVMe over RDMA storage adapter
RDMA network adapter
Software NVMe over RDMA storage adapter
An administrator has a host profile named Standard-Config. The administrator wants to change the other host profiles to use only the storage configuration settings that are defined in the Standard-Config host profile.
What should the administrator do to make this change?
A. Export host customizations and import them to the other host profiles.
B. Copy the storage settings from Standard-Config to all other host profiles.
C. Duplicate the Standard-Config host profile and only modify the storage configuration settings.
D. Export the Standard-Config host profile and attach it to tile other hosts.
Copy the storage settings from Standard-Config to all other host profiles.
A vSphere cluster has the following configuration:
Virtual machines (VMs) are running Production and Test workloads vSphere Distributed Resource Scheduler (DRS) is enabled
There are no resource pools in the cluster
Performance monitoring data shows that the Production workload VMs are not receiving their fully allocated memory when the vSphere cluster is fully utilized.
A combination of which two steps could the administrator perform to ensure that the Production VMs are always guaranteed the full allocation of memory? (Choose two.)
A. Assign a custom memory share value to the resource pool containing the Production VMs.
B. Assign a memory reservation value to the resource pool containing the Production VMs.
C. Create a parent resource pool for the Production VMs.
D. Create a sibling resource pool for each of the Production and Test VMs.
E. Create a child resource pool for the Test VMs.
Create a parent resource pool for the Production VMs.
Assign a memory reservation value to the resource pool containing the Production VMs.
Which two datastore types store the components of a virtual machine as a set of objects? (Choose two.)
A. VMware Virtual Machine File System (VMFS)
B. VMware vSAN
C. Network File System (NFS) 3
D. vSphere Virtual Volumes (vVols)
E. Network File System (NFS) 4.1
VMware vSAN
vSphere Virtual Volumes (vVols)
After updating a predefined alarm on VMware vCenter, an administrator enables email notifications as shown in the attached alarm; however, notifications are NOT being sent.
Where must the mail server settings be configured by the administrator to resolve this issue?
A. In the ESXi host system config
B. In the alarm rule definition
C. In the vCenter settings in the vSphere Client
D. In the vCenter Management Interface
In the vCenter settings in the vSphere Client
An administrator creates a virtual machine that contains the latest company-approved software, tools and security updates. Company policy requires that only full clones are allowed for server workloads.
A combination of which two tasks should the administrator complete to prepare for the deployment of this virtual machine for multiple users? (Choose two.)
A. Set appropriate permissions on the virtual machine.
B. Create a virtual machine customization specification.
C. Upgrade the virtual hardware.
D. Convert the virtual machine to a template.
E. Take a snapshot of the virtual machine.
Create a virtual machine customization specification.
Convert the virtual machine to a template.
During the staging of a patch on a vCenter Server Appliance, an error was encountered and the process stopped. An administrator resolved the root cause and is ready to continue with the staging of the patch.
From the vCenter Management Interface, which action should the administrator take to continue the process from the point at which the error occurred?
A. Use the Stage and Install option to resume the staging.
B. Use the Resume option to resume the staging.
C. Use the Unstage option to restart the staging.
D. Use the Stage Only option to restart the staging.
Use the Resume option to resume the staging.
An administrator is adding a new ESXi host to an existing vSphere cluster. When selecting the cluster, the administrator is unable to use the Cluster Quickstart workflow to add and configure the additional host.
What could be the root cause of this issue?
A. The administrator has previously dismissed the Cluster Quickstart workflow.
B. The administrator must manually add the host to the cluster before using the Cluster Quickstart workflow.
C. The administrator has not been assigned the required permissions to use the Cluster Quickstart workflow.
D. The administrator must enable the Cluster Quickstart workflow option in VMware vCenter.
The administrator has previously dismissed the Cluster Quickstart workflow.
A company has two sites: Site A and Site B. The administrator would like to manage the VMware vCenter inventories in both sites from a single vSphere Client session.
Which vCenter feature must be configured?
A. VMware Certificate Authority
B. VMware Site Recovery Manager
C. vCenter Single Sign-On
D. Enhanced Linked Mode
Enhanced Linked Mode
An administrator plans to update the Supervisor cluster and has noticed some of the Tanzu Kubernetes Grid clusters are running an incompatible version.
Which action must the administrator take before proceeding with the Supervisor cluster update?
A. Update all Tanzu Kubernetes Grid clusters to the latest version prior to the Supervisor cluster update.
B. No action is needed – Tanzu Kubernetes Grid clusters will be updated automatically as part of the update process.
C. No action is needed – Incompatible Tanzu Kubernetes Grid clusters can be manually updated after the Supervisor cluster update.
D. Update incompatible Tanzu Kubernetes Grid clusters prior to the Supervisor cluster update.
Update incompatible Tanzu Kubernetes Grid clusters prior to the Supervisor cluster update.
Which three vSphere features are still supported for Windows-based virtual machines when enabling vSphere’s virtualization-based security feature? (Choose three.)
A. vSphere vMotion
B. PCI passthrough
C. vSphere High Availability (HA)
D. vSphere Fault Tolerance
E. vSphere Distributed Resources Scheduler (DRS)
F. Hot Add of CPU or memory
vSphere vMotion
vSphere High Availability (HA)
vSphere Distributed Resources Scheduler (DRS)
An administrator wants to create virtual machine (VM) templates and store them in a content library. The administrator would like to use the content library to manage different versions of these templates so that reverting to an earlier version is an option.
How should the administrator create these templates?
A. Select a VM in the vCenter inventory.
Clone the VM to the content library as a VM template type.
B. Select a VM template in the vCenter inventory.
Clone the template to the content library.
C. Export a VM in the vCenter inventory to an OVF template.
Import the OVF template into the content library.
D. Convert a VM to a template in the vCenter inventory.
Clone the template to the content library.
Select a VM in the vCenter inventory.
Clone the VM to the content library as a VM template type.
An administrator is tasked with configuring certificates for a VMware software-defined data center (SDDC) based on the following requirements:
All certificates should use certificates trusted by the Enterprise Certificate Authority (CA).
The solution should minimize the ongoing management overhead of replacing certificates.
Which three actions should the administrator take to ensure that the solution meets corporate policy? (Choose three.)
A. Replace the VMware Certificate Authority (VMCA) certificate with a self-signed certificate generated from the VMCA.
B. Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.
C. Replace the machine SSL certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
D. Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.
E. Replace the solution user certificates with custom certificates generated from the Enterprise CA.
F. Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
Replace the machine SSL certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.
Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
An administrator is tasked with moving an application and guest operating system (OS) running on top of a physical server to a software-defined data center (SDDC) in a remote secure location.
The following constraints apply:
The remote secure location has no network connectivity to the outside world.
The business owner is not concerned if all changes in the application make it to the SDDC in the secure location.
The application’s data is hosted in a database with a high number of transactions.
What could the administrator do to create an image of the guest OS and application that can be moved to this remote data center?
A. Create a hot clone of the physical server using VMware vCenter Converter.
B. Create a cold clone of the physical server using VMware vCenter Converter.
C. Restore the guest OS from a backup.
D. Use storage replication to replicate the guest OS and application.
Create a cold clone of the physical server using VMware vCenter Converter.
An administrator is tasked with configuring an appropriate Single Sign-On (SSO) solution for VMware vCenter based on the following criteria:
The solution should support the creation of Enhanced Link Mode groups.
All user accounts are stored within a single Active Directory domain and the solution must support only this Active Directory domain as the identity source.
All user account password and account lockout policies must be managed within the Active Directory domain.
The solution should support token-based authentication.
Which SSO solution should the administrator choose based on the criteria?
A. vCenter Identity Provider Federation with Active Directory Federation Services as the identity provider
B. vCenter Single Sign-On with Active Directory over LDAP as the identity source
C. vCenter Single Sign-On with Active Directory (Windows Integrated Authentication) as the identity source
D. vCenter Identity Provider Federation with Active Directory over LDAP as the identity provider
vCenter Identity Provider Federation with Active Directory Federation Services as the identity provider
An administrator is tasked with looking into the disaster recovery options for protecting a database server using VMware vSphere Replication.
The following requirements must be met:
The virtual machine must remain online during the protection.
The virtual machine’s snapshots must be used as part of the replication process.
Which step must the administrator complete to accomplish this task?
A. Configure the virtual machine storage policy.
B. Enable guest OS VSS quiescing for this virtual machine.
C. Perform a full initial synchronization of the source virtual machine to the target location.
D. Configure network traffic isolation for vSphere Replication.
Perform a full initial synchronization of the source virtual machine to the target location.
An administrator must gracefully restart a virtual machine (VM) through the vSphere Client but the option is greyed out. The administrator has full administrative access on VMware vCenter and all the objects available in vCenter, but has no access to log onto the operating system.
Which action should the administrator take to meet the objective?
A. Upgrade the virtual hardware
B. Migrate the VM to another host
C. Install VMware Tools
D. Restart vCenter
Install VMware Tools
An administrator is tasked with installing VMware vCenter. The vCenter Server Appliance must support an environment of:
400 hosts
4000 virtual machines
Which two resources must be allocated, at a minimum, to meet the requirements? (Choose two.)
A. 16 vCPUs
B. 30 GB Memory
C. 4 vCPUs
D. 8 vCPUs
E. 20 GB Memory
30 GB Memory
8 vCPUs
Which VMware offering will allow an administrator to manage the lifecycle of multiple vCenter Server instances in a single software as a service (SaaS)-based solution to help drive operational efficiency?
A. VMware vSphere with Tanzu
B. VMware Cloud Foundation
C. VMware vSphere+
D. VMware Aria Suite Lifecycle
VMware vSphere+
Which feature would allow for the non-disruptive migration of a virtual machine between two clusters in a single VMware vCenter instance?
A. vSphere vMotion
B. Cross vCenter Migration
C. vSphere Storage vMotion
D. vSphere Fault Tolerance
vSphere vMotion
Which four elements can a vSphere Lifecycle Manager image contain? (Choose four.)
A. ESXi base image
B. ESXi configuration
C. Vendor agents
D. Vendor add-ons
E. BIOS updates
F. Firmware and drivers add-on
G. Independent components
ESXi base image
Vendor add-ons
Firmware and drivers add-on
Independent components
If a distributed switch uses the “Route based on physical NIC load” load balancing algorithm, what does the mean send or receive utilization of an uplink need to exceed for the flow of traffic to move to the second uplink?
A. 75 percent of the capacity over a 30 second period
B. 60 percent of the capacity over a 30 second period
C. 60 percent of the capacity over a 40 second period
D. 75 percent of the capacity over a 40 second period
75 percent of the capacity over a 30 second period
An administrator manually configures a reference ESXi host that meets company security standards for vSphere environments. The administrator now needs to apply all of the security standards to every identically configured host across multiple vSphere clusters within a single VMware vCenter instance.
Which four steps would the administrator complete to meet this requirement? (Choose four.)
A. Extract the host profile from the reference host.
B. Export the host profile from vCenter.
C. Import host customization on the reference host.
D. Attach the host profile to each cluster that requires the secure configuration.
E. Check the compliance of each host against the host profile.
F. Reset host customization on the reference host.
G. Remediate all non-compliant hosts.
Extract the host profile from the reference host.
Attach the host profile to each cluster that requires the secure configuration.
Check the compliance of each host against the host profile.
Remediate all non-compliant hosts.
After a recent unexplained peak in virtual machine (VM) CPU usage, an administrator is asked to monitor the VM performance for a recurrence of the issue.
Which two tools can the administrator use? (Choose two.)
A. vCenter Management Interface
B. Direct Console User Interface (DCUI)
C. vSphere Performance Charts
D. vCenter Command Line Interface
E. ESXi Shell
vSphere Performance Charts
ESXi Shell
An administrator is tasked with configuring vSphere Trust Authority.
The administrator has completed the following steps:
Set up the workstation -
Enabled the Trust Authority Administrator
Enabled the Trust Authority State
Collected information about the ESXi hosts and vCenter to be trusted
Which step does the administrator need to complete next?
A. Import the Trusted Host information to the Trust Authority Cluster
B. Import the Trusted Cluster information to the Trusted Hosts
C. Create the Key Provider on the Trusted Cluster
D. Import the Trusted Host information to the Trusted Cluster
Import the Trusted Host information to the Trust Authority Cluster
An administrator set up the following configuration:
The distributed switch has three ESXi hosts, and each host has two 40 Gbps NICs.
The amount of bandwidth reserved for virtual machine (VM) traffic is 6 Gbps.
The administrator wants to guarantee that VMs in the Finance distributed port group can access 50 percent of the available reserved bandwidth for VM traffic.
Given this scenario, what should the size (in Gbps) of the Finance network resource pool be?
A. 18
B. 80
C. 36
D. 120
18
A vSphere environment is experiencing intermittent short bursts of CPU contention, causing brief production outages for some of the virtual machines (VMs). To understand the cause of the issue, the administrator wants to observe near real-time statistics tor all VMs.
Which two vSphere reporting tools could the administrator use? (Choose two.)
A. Advanced Performance Charts
B. esxcli
C. resxtop
D. Overview Performance Charts
E. esxtop
resxtop
esxtop
An administrator is performing maintenance activities and discovers that a Virtual Machine File System (VMFS) datastore has a lot more used capacity than expected. The datastore contains 10 virtual machines (VMs) and, when the administrator reviews the contents of the associated datastore, discovers that five virtual machines have a snapshot file (-delta.vmdk files) that has not been modified in over 12 months. The administrator checks the Snapshot Manager within the vSphere Client and confirms that there are no snapshots visible.
Which task should the administrator complete on the virtual machines to free up datastore space?
A. Consolidate the snapshots for each VM.
B. Inflate the disk files for each VM.
C. Delete all snapshots for each VM.
D. Storage vMotion each VM to another datastore.
Delete all snapshots for each VM.
An administrator is attempting to configure Storage I/O Control (SIOC) on five datastores within a vSphere environment. The administrator is being asked to determine why SIOC configuration completed successfully on only four of the datastores.
What are two possible reasons why the configuration was not successful? (Choose two.)
A. The datastore contains Raw Device Mappings (RDMs).
B. SAS disks are used for the datastore.
C. The datastore has multiple extents.
D. The datastore is using ISCSI.
E. The administrator is using NFS storage.
The datastore contains Raw Device Mappings
The datastore has multiple extents.
An administrator has mapped three vSphere zones to three vSphere clusters.
Which two statements are true for this vSphere with Tanzu zonal Supervisor enablement? (Choose two.)
A. One Supervisor will be created in a specific zone.
B. One Supervisor will be created across all zones.
C. Three Supervisors will be created in Linked Mode.
D. Individual vSphere Namespaces will be placed into a specific zone.
E. Individual vSphere Namespaces will be spread across all zones.
One Supervisor will be created across all zones.
Individual vSphere Namespaces will be spread across all zones.
An administrator is investigating reports of users experiencing difficulties logging into a VMware vCenter instance using LDAP accounts.
Which service should the administrator check as part of troubleshooting?
A. vSphere Authentication Proxy Service
B. Lookup Service
C. Identity Management Service
D. VMware Authentication Framework Daemon
Identity Management Service
An administrator is looking to deploy a new VMware vCenter instance. The current environment consists of 75 hosts and is expected to grow up to 100 hosts over the next three years.
Which deployment size should the administrator select?
A. Medium
B. Tiny
C. Large
D. Small
Small
An administrator has been notified that a number of hosts are not compliant with the company policy for time synchronization.
The relevant portion of the policy states:
All physical servers must synchronize time with an external time source that is accurate to the microsecond.
Which step should the administrator take to ensure compliance with the policy?
A. Ensure that each vCenter Server Appliance is configured to use a Network Time Protocol (NTP) source.
B. Ensure that each ESXi host is configured to use a Precision Time Protocol (PTP) source.
C. Ensure that each ESXi host is configured to use a Network Time Protocol (NTP) source.
D. Ensure that each vCenter Server Appliance is configured to use a Precision Time Protocol (PTP) source.
Ensure that each ESXi host is configured to use a Precision Time Protocol (PTP) source.
An administrator is creating a content library to manage VM templates and ISO images. The administrator wants to password-protect the images and templates and share them with a remote site.
Which two tasks must the administration perform when creating the content library? (Choose two.)
A. Publish the local content library.
B. Enable the security policy.
C. Create a subscribed content library.
D. Select an NFS datastore.
E. Enable authentication.
Publish the local content library.
Enable authentication.
An administrator is responsible for the management of a VMware vCenter instance that is currently experiencing performance issues. The administrator quickly identifies that the CPU and memory utilization of vCenter is consistently over 80%. Upon further analysis, it seems that the vpxd process is contributing significantly to the performance issue.
A combination of which four steps should the administrator take to resolve the performance issues and ensure that a similar issue can be rectified without requiring downtime to vCenter moving forward? (Choose four.)
A. Gracefully shut down vCenter using the vSphere Client.
B. Enable CPU Hot Add on the vCenter virtual machine.
C. Power on the vCenter Server Appliance using the vSphere Host Client.
D. Enable CPU and Memory Hot Add on the vCenter virtual machine.
E. Add additional CPU and memory to the vCenter Server Appliance.
F. Power on the vCenter Server Appliance using the vSphere Client.
G. Enable Memory Not Add on the vCenter virtual machine.
Gracefully shut down vCenter using the vSphere Client.
Power on the vCenter Server Appliance using the vSphere Host Client.
Enable CPU and Memory Hot Add on the vCenter virtual machine.
Add additional CPU and memory to the vCenter Server Appliance.
An administrator successfully installs VMware ESXi onto the first host of a new vSphere cluster but makes no additional configuration changes. When attempting to log into the vSphere Host Client using the Fully Qualified Domain Name (FQDN) of the host, the administrator receives the following error message:
“Server Not Found – We can’t connect to the server at esxi101.corp.local.”
The following information has been provided to complete the configuration:
Host FQDN: esxi101.corp.local -
Management VLAN ID: 10 -
DHCP: No -
Management IP Address: 172.16.10.101 / 24
Management IP Gateway: 172.16.10.1
Corporate DNS Servers: 172.16.10.5, 172.16.10.6
ONS Domain: corp.local -
In addition, all host configurations must also meet the following requirements:
The management network must use only IPv4 network protocols.
The management network must be fault tolerant.
Which three high level tasks should the administrator complete, at a minimum, in order to successfully log into the vSphere Host Client using the FQDN for esxi101 and complete the configuration? (Choose three.)
A. Ensure a DNS A Record is created for the VMware ESXi host on the corporate DNS servers.
B. Update the VMware ESXi Management Network DNS configuration to use the corporate DNS servers for names resolution.
C. Update the VMware ESXi Management Network IPv4 configuration to use a static a IPv4 address.
D. Configure at least two network adapters for the VMware ESXi Management Network.
E. Set the value of the VMware ESXi Management Network VLAN ID to 10.
F. Disable IPv6 for the VMware ESXi Management Network.
Ensure a DNS A Record is created for the VMware ESXi host on the corporate DNS servers.
Update the VMware ESXi Management Network IPv4 configuration to use a static a IPv4 address.
Set the value of the VMware ESXi Management Network VLAN ID to 10.
When configuring vCenter High Availability (HA), which two statements are true regarding the active, passive, and witness nodes? (Choose two.)
A. Network latency must be less than 10 milliseconds.
B. They must have a supported Wide Area Network (WAN).
C. They must have a minimum of a 10 Gbps network adapter.
D. They must have a minimum of a 1 Gbps network adapter.
E. Network latency must be more than 10 milliseconds.
Network latency must be less than 10 milliseconds.
They must have a minimum of a 1 Gbps network adapter.
An administrator is deploying a new all flash vSAN cluster based on the vSAN Original Storage Architecture (OSA).
What is the minimum supported network throughput in Gb/s for each host?
A. 50
B. 10
C. 25
D. 1
10