VMP8 Flashcards
Question NO: 1
What services can be configured from the security profile?
A. Syslog server B. SSH C. DNS D. Management network E. DCUI
Select 3 answers.
Answer:
A,B,E
Explanation: These options are available at the host level in the web client under services. Management is configured at the virtual switch.
Question NO: 2
If strict lockdown mode is enabled without an exception list configured and the connection to vCenter is lost, what must be done to regain management of the host?
A. Use the VMRC
B. Reinstall ESXi
C. Connect directly with the vSphere client
D. Restart management agents
Answer:
B
Explanation: The only option left here is to reinstall the host. There is no other way to get access.
Question NO: 3
Which service is stopped when strict lockdown mode is enabled?
A. Firewall
B. NTP
C. DCUI
D. CIM
Answer:
C
Explanation: Lockdown mode is taken to the next level and the DCUI service is stopped to prevent direct access to the host.
Question NO: 4
After configuring the ESXi host as an NTP client, time synchronization is off. What could cause this issue?
A. The host is not connected to vCenter
B. The NTP daemon is stopped
C. The virtual machines are synchronized with the host
D. Multiple NTP servers with varying times have been specified
Select 2 answers.
Answer:
B,D
Explanation: The NTP daemon can be stopped in the security profile. The host does not need to be connected o vCenter to become an NTP client.
Question NO: 5
Which can be edited at the settings of a virtual distributed switch?
A. Netflow B. MTU size C. Pvlan D. Multicast filtering mode E. Name
Select 3 answers.
Answer:
B,D,E
Explanation: Pvlans and netflow are configured at the distributed port group level and can be overridden at the port. MTU, name, and multicast filtering mode are higher level and configured at the switch level.
Question NO: 6
An administrator logs into the DCUI with the root username and password. The IP address of the host is mistakenly changed from the 172.20.10.0/24 network to the 172.20.100.0/24 network. What will happen to the ability to manage this ESXi host?
A. The host will automatically rollback to the correct configuration
B. The host will no longer be manageable
C. The host will initiate a HA response
D. Virtual machines will lose network connectivity
Answer:
A
Explanation: The rollback feature of ESXi hosts will automatically detect the loss of a management and not allow the change to continue.
Question NO: 7
All VMkernel ports for Virtual SAN are configured, and there is unallocated local storage for capacity. What might prevent Virtual SAN from being enabled?
A. There are only three hosts contributing local storage
B. ESXi has been installed on local storage
C. The hosts have only 32GB of memory
D. ESXi has been installed on a SD card
Answer:
B
Explanation: For Virtual SAN to work, full control over all of the local disks is given to the kernel. This means that ESXi must be installed somewhere other than on a local LUN. Often in these cases, ESXi will be installed on a USB or SD card.
Question NO: 8
An administrator wants the ability to recover a replication job at different points in time. What replication feature will meet this need?
A. Backups
B. Snapshots
C. Points in time instances
D. Replication schedule
Answer:
C
Explanation: Points in time instances are used at the target site to maintain the ability to recover a virtual machine at different instances in time.
Question NO: 10
When will DRS migrate a virtual machine to satisfy Network I/O control?
A. A new Physical adapter has been added to an ESXi host in the cluster
B. Periods of high contention for host bandwidth
C. The bandwidth limit for a virtual machine has been removed
D. The bandwidth reservation has been increased beyond what the host can provide
Answer:
D
Explanation: DRS will only make a move if virtual machines cannot obtain the resources that have been guaranteed to them with a reservation. Otherwise, DRS will not take action. Even if there is contention for bandwidth, DRS will not migrate VMs.
Question NO: 11
Dependent hardware iSCSI adapters have been purchased for an ESXi host. What aspect of accessing iSCSI storage still must be configured in software?
A. VMkernel port
B. iSCSI initiator
C. initiator binding
D. HBA driver
Answer:
A
Explanation: Dependent hardware iSCSI has the initiator on the card but does not bypass the need for host networking configuration, so a VMkernel port must be created and bound to the physical adapter.
Question NO: 12
An administrator wants to present storage directly to a virtual machine but wants to keep the benefit of vSphere Snapshots. What would meet these needs?
A. VMFS VMDK
B. Physical RDM
C. Virtual RDM
D. NFS 4.1 VMDK
Answer:
C
Explanation: By presenting a LUN directly to the virtual machine, instantly the choices are narrowed to the RDM. In this case, the added ability to snapshot from the vSphere side as well as advanced file locking are available with the virtual mode RDM.
Question NO: 13
When implementing native multipathing and in NFS 4.1, what nic teaming policy is used?
A. IP Hash
B. Originating Virtual Port
C. Originating MAC Address
D. Round Robin
Answer:
A
Explanation: To make multipathing work, two IP addresses are associated with the NFS target and we use the IP Hash nic teaming policy to spread the load across the physical adapters.
Question NO: 14
What is the maximum size of a virtual volumes storage container?
A. No effective limit in size
B. 64TB
C. 2TB
D. 62TB
Answer:
A
Explanation: The virtual volumes storage container is a logical entity configured on the array. The storage container is not limited by size and can span the entirety of the array regardless of size.
Question NO: 15
When trying to ensure proper capacity planning, which capabilities should be used in a Virtual SAN storage policy? Choose two.
A. Number of Disk Stripes per Object
B. Force Provisioning
C. Object space reservation %
D. Number of failures to tolerate
Select 2 answers.
Answer:
C,D
Explanation: The higher the number of failures to tolerate, the more capacity will be used, as there will be more copies of those objects with that capability applied. The higher he space reserved for thick provisioning, the more space will be needed for those objects as well.
Question NO: 16
When configuring a disk group in Virtual SAN, 500GB will be used for storage capacity. What is the minimum recommended size of the SSD for that disk group?
A. 25GB
B. 50GB
C. 100GB
D. 200GB
Answer:
B
Explanation: The SSD used for caching should be at least 10% of the disk space used for capacity in a disk group. 10% of 500GB is 50GB.
Question NO: 17
An administrator wants to change the host default path selection policy to a VMware PSP that will allow active-active use of multiple paths. What command will make this change?
A. esxcli storage nmp satp set –default -psp=VMW_PSP_Fixed
B. esxcli storage nmp satp set –default-psp=VMW_PSP_MRU
C. esxcli storage nmp satp set –default-psp=VMW_PSP_RR
D. esxcli storage nmp satp set –default-psp=VMW_PSP_IPH
Answer:
C
Explanation: In this case, the path selection policy that will give us the ability to take advantage of multiple paths is Round Robin. This is not the default for ESXi hosts, so the command to change it is esxcli storage nmp satp set –default-psp=VMW_PSP_RR.
Question NO: 18
What is a requirement for an all-flash Virtual SAN configuration?
A. Hosts must have at least 2 SAS/SATA drive or PCIe flash disks
B. 10Gig physical adapter for VSAN must be shared with other traffic
C. 10Gbps physical adapters
D. Only SSD must be on the Virtual SAN HCL
Answer:
C
Explanation: A 10Gbps network for Virtual SAN is required for an all-flash configuration. The added performance benefit of the SSDs being used for storage is best taken advantage of with a more powerful network for accessing storage.
Question NO: 19
To use a SSD for capacity within Virtual SAN, what option must be chosen when adding the disk to a Virtual SAN disk group?
A. Add disk for storage
B. Add disk for capacity
C. Add disk as SSD
D. Add disk as HDD
Answer:
D
Explanation: SSDs being used for storage capacity must be manually marked in Virtual SAN. Without being marked as an HDD, Virtual SAN will assume that this is a SSD that will be used for caching. By marking the SSD as an HDD, Virtual SAN will allow it to be added as part of a disk group as storage capacity.
Question NO: 20
What backs the virtual volume?s datastore?
A. Storage container
B. Protocol endpoint
C. VASA provider
D. Presented LUNs
Answer:
A
Explanation: Software defined storage does away with the idea of LUN-centric storage. The logical entity called the storage container, which is created from the array is what backs the VVol?s datastore.
Question NO: 21
With the advent of Storage Policy Based Management, polices have gone from being created based on ______ to ______.
A. LUN, Datastore
B. Array, Local Host
C. Datastores, Virtual Machines
D. Node, LUN
Answer:
C
Explanation: Without software defined storage, datastores have certain capabilities and it must be ensured that a VM is sitting on the proper datastore. With Software Defined Storage in combination with Storage Policy Based Management, the policy is applied directly at the virtual machine based on the VM?s needs.
Question NO: 22
Which of these statements is false regarding VMFS datastores?
A. VMFS was specifically created for virtual machines
B. VMFS uses multiple block sizes for optimized storage
C. The size limit for a VMFS datastore is 64TB
D. VMFS datastores must use the entirety of the designated LUN
Answer:
D
Explanation: Upon datastore creation, the size is determined. Any amount of storage space up to the maximum size of the LUN can be utilized. Native VMFS5 has a block size of 1MB and a subblock of 8kb. The size limit of a VMFS datastore is 64TB.
Question NO: 23
A datastore has been unmounted form all ESXi hosts in the environment. What will happen to this datastore?
A. It will be marked as inactive and the files will remain intact
B. It will be marked as inactive and the files will be deleted
C. The datastore will be deleted along with the files
D. The datastore will be deleted but the files will remain on the LUN
Answer:
A
Explanation: Though inactive, the files have not been deleted from this datastore and the datastore has not been deleted either. With no hosts accessing it, the state becomes inactive.
Question NO: 24
Where are shares configured for storage I/O control?
A. At the Storage I/O control enabled datastore
B. Under the manage tab of Storage I/O control
C. At the virtual machine
D. Under the manage tab of the ESXi host
Answer:
C
Explanation: When viewing the related objects in a storage I/O control enabled datastore, the share values will be shown. To edit the share value, in the edit settings of the VM, expand the virtual disk and change the share value associated.
Question NO: 25
What is bypassed when using direct path I/O?
A. Physical adapters
B. VMkernel
C. Virtual machine
D. PCI device
Answer:
B
Explanation: Direct path I/O is specifically used to skip over the kernel and is usually reserved for incredibly I/O intensive virtual machines.
Question NO: 26
Four vCenters are in enhanced linked mode. The vCenter license is about to expire. An administrator obtains a four instance vCenter license key. How many times must this key be entered to properly license these vCenters?
A. 1
B. 2
C. 3
D. 4
Answer:
NONE OF THE ABOVE
Explanation: Because these vCenters are in enhanced linked mode, the key only needs to be entered one time. The license service which exists as a part of the platform services controller will manage the license from a central location.
You answered this question correctly.
Question NO: 27
What is the command used to place a host into maintenance mode?
A. vim-cmd hostsvc/maintenance_mode_exit
B. vim-cmd hostsvc/maintenance_mode_enter
C. esxcli hostsvc/maintenance_mode_enter
D. vim-cmd hostsvc/maintenance_mode_strict
Answer:
B
Explanation: Use the command vim-cmd hostsvc/maintenance_mode_enter to place the host into maintenance mode.
Question NO: 28
When upgrading the vCenter appliance to 6.0, which two must be properly configured for a successful upgrade?
A. Ensure vCenter Server appliance is registered with an External vCenter Single Sign-on Server
B. DNS
C. Ensure the ESXi Host are version 4.x or higher
D. Time synchronization
Answer:
D
Explanation: A stable and successful deployment of vCenter are dependent on a stable NTP source and a valid FQDN.
Question NO: 29
One PSC is deployed and three vCenters are associated with it through a SSO domain. What is this configuration called?
A. Enhanced linked mode
B. Linked mode
C. Embedded mode
D. Distributed mode
Answer:
A
Explanation: Any time two vCenters are associated with the same PSC in the same SSO domain, they are considered in enhanced linked mode automatically.
Question NO: 30
Which is not an improvement that comes with virtual machine hardware version 11?
A. Up to 128 vcpus
B. USB 3.0 support
C. Hot add across NUMA nodes
D. Up to 20 vnics
Answer:
D
Explanation: Even with hardware version 11 there is still a maximum on 10 vnics per VM. All of the other features are new for hardware version 11.
Question NO: 31
What is the earliest version of VCSA that can be upgraded to 6?
A. 5.1 update 3
B. 5.5
C. 5.1 update 2
D. 4.1
Answer:
A
Explanation: Any VCSA version 5.1U3 and beyond can be upgraded directly to vCenter 6.
Question NO: 32
A resource pool with 1000 shares has a sibling and a child pool. The sibling pool has a share value of 500 and one virtual machine (VM1) running in the pool. The child pool has a share value of 1000 and two virtual machines: Child Pool VMA has 500 shares and Child pool VMB has 1000. When VMB of the child pool and the VM within the sibling pool compete for resources, which VM will get more resources?
A. VM1 of the sibling pool
B. VMB of the child pool
C. The parent pool
D. The child pool
Answer:
B
Explanation: Use fractions. VM1 gets all 500 of its resource pool and VMB gets 2/3 of 1000 shares or 667. VM b gets 667 vs VM1 500 shares on that level.
Question NO: 33
Two virtual machines are created. VMA is provisioned with 10GB of memory and given a limit of 5GB. VMB is provisioned with 10GB of memory but no limit is enforced. What is the effective overall limit of these virtual machines?
A. 5GB
B. 10GB
C. 15GB
D. 20GB
Answer:
C
Explanation: The effective limit is simply what the virtual machine has been provisioned with. In this case, it is 10+5= 15GB
Question NO: 34
Which statement is false?
A. If a reservation is set to expandable, resource consumers can look to the parent pool for more shares
B. If configured at every level in the hierarchy, expandable reservations can go up to the root resource pool
C. If a reservation is set to expandable, resource consumers can look to sibling pools for more shares
D. Expandable reservations are not possible at the root resource pool
Answer:
C
Explanation: Resource consumers can look to the parent for resources if the reservation is expandable, but not to siblings.
Question NO: 36
A snapshot of a virtual machine with no previous snapshots is taken. What is the base disk comprised of?
A. All of the data up to the point in time that the snapshot was taken
B. All of the data including the first snapshot
C. All of the data within the first snapshot
D. The fist copy of the data
Answer:
A
Explanation: Snapshot delta files only contain the changes that are made after the snapshot was taken. The base disk is everything leading up to the moment where the first snapshot is taken.
Question NO: 37
Which are true when snapshotting a virtual machine?s memory state? Choose two.
A. The snapshot operation will complete faster
B. The snapshot operation will use more storage
C. The operation will quiesce the guest I/O
D. The ability to revert to a powered on virtual machine
Select 2 answers.
Answer:
B,D
Explanation: Snapshotting the memory adds the ability to revert to a powered on virtual machine but it will utilize more storage and take longer.
Question NO: 38
VMware Data Protection is comprised of which three components?
A. Data Protection Appliance, Data Protection Proxy and App Agent
B. Data Protection Appliance, Data Protection Proxy and VMTools Driver
C. vCenter, Data Protection Appliance, and App Agent
D. vCenter, Data Protection Appliance and Data Protection Proxy
Answer:
A
Explanation: VDP is comprised of the Data Protection Appliance, Data Protection Proxy and App Agent
Question NO: 39
What are two advantages of using the FastLz compression library for vSphere replication?
A. Speed
B. Compression efficiency
C. High CPU overhead
D. Only has to be deployed at the source site
Select 2 answers.
Answer:
A,B
Explanation: FastLz provides a balance of speed, minimal CPU overhead, and compression efficiency.
Question NO: 40
Which is true for using VMware Data Protection to backup vCenter and PSC instances?
A. If vCenter or a PSC goes down, it can be restored to any ESXi host
B. vCenters and PSC instances should be backed up on a rotating schedule
C. VMware tools is not required for backups
D. All backups must be full backups
Answer:
D
Explanation: Backups restored only to the host running the VDP appliance, VMware tools required, backup at the same time.
Question NO: 42
How many virtual machines can be replicated with each additional replication server?
A. 100
B. 200
C. 250
D. 500
Answer:
B
Explanation: The initial replication appliance can handle 2000 VMs and each additional server adds the ability to replicate 200 more.
Question NO: 43
What works within the VMkernel to make sure virtual machines get the virtual resources they request?
A. Serial Port
B. VMM
C. CIM
D. VMware Tools
Answer:
B
Explanation: The two main components involved in delivering resources are the kernel and the Virtual Machine Monitor. Collectively, the VMM processes make up the virtual machine, with other worlds for specific virtual hardware.
Question NO: 45
Which port is used for enhanced linked mode between vCenter instances?
A. 443
B. 902
C. 636
D. 9443
Answer:
C
Explanation: Port 636 is used between vCenter instances.
Question NO: 46
When deploying vCenter server it is unable to connect with the preciously deployed PSC. What may be the issue?
A. The PSC specified in the installation process used an IP address while the new PSC was installed with a FQDN
B. The vCenter appliance and the PSC were installed on the same trunked VLAN
C. The vCenter appliance time was synced to an ESXi host
D. The vCenter IP address was assigned by a DHCP server
Answer:
A
Explanation: To avoid deployment issues in vCenter 6, have DNS configured across all instances.
Question NO: 47
If a high priority vMotion fails but a regular priority vMotion is successful, what may be the cause?
A. Over utilized virtual machine
B. Network saturation
C. Resource contention on the target host
D. 1Gbps NICs rather than 10Gbps NICs
Answer:
C
Explanation: The vMotion priority level chosen is dependent on the resource utilization at the target host. This setting is determinate on the ability for the virtual machine to get the resources it needs on the target, not what is happening on the network.
Question NO: 48
Which of these cases call for the use of VOMA?
A. Outage of a Storage adapter
B. Inability to access files on a VMFS datastore
C. Corruption of an NFS datastore
D. Issues adding an extent to a VMFS datastore
Answer:
B
Explanation: The on disk metadata analyzer is going to provide more detail and give insight on why a VMFS datastore is inaccessible.
Question NO: 49
How many concurrent shared-nothing vMotion migrations can take place at the same time for a datastore?
A. 1
B. 2
C. 4
D. 8
Answer:
B
Explanation: Shared nothing vMotion are also migrating files, so the maximum is two. This also counts against the ability to migrate files with a storage vMotion.
Question NO: 50
Which CPU metric may indicate memory contention on an ESXi host?
A. %MLMTD
B. SWW/s
C. SWCUR
D. %SWPWT
Answer:
D
Explanation: The first clue is to look for the % symbol which will denote CPU metrics, and the correct answer here is %SWPWT which is how the CPU is affected by swapping.
Question NO: 51
Which two esxtop storage metrics will help distinguish if latency is within the kernel or at the storage array?
A. QUED
B. KAVG
C. GAVG
D. DAVG
Select 2 answers.
Answer:
B,D
Explanation: DAVD shows disk latency at the array and KAVG shows latency of the Kernel. The two combined gives the GAVG value.
Question NO: 52
Which of the following are vRealize Operations Manager node types? (choose 3)
A. Master node B. Proxy node C. Data node D. Copy Node E. Remote collector node
Select 3 answers.
Answer:
A,C,E
Explanation: Node types include Master, Data, and Remote collector.
Question NO: 53
Which CPU metric might indicate that performance could be improved if vcpus were removed from the virtual machine?
A. Ready
B. Co-stop
C. Wait
D. Swap wait
Answer:
B
Explanation: Skew value that leads to co-stopping is only a factor for multiprocessor virtual machines. The more vCPUs a virtual machine has, the harder the scheduler has to work to keep skew value low.
Question NO: 54
Which memory reclamation technique is always running within virtual machines and is enabled by default.
A. Transparent Page Sharing
B. Swapping
C. Ballooning
D. Compression
Answer:
A
Explanation: Intra-VM TPS is always running and enabled by default. Inter-VM TPS must be enabled.
Question NO: 55
In which state does the ESXi host begin compression?
A. High
B. Clear
C. Soft
D. Hard
Answer:
D
Question NO: 56
When a Guest OS runs out of memory, what file will be used?
A. Balloon
B. Vswp
C. Guest OS page
D. vFlash
Answer:
C
Explanation: The VM running out of memory is not the same as the host running out of memory. Think about what a physical machine would do if it ran out of memory and realize that a VM does not know that it is virtualized.
Question NO: 57
An administrator wants to explore anomalies in the vSphere environment. What major badge in vRealize operations manager should be explored?
A. Faults
B. Risk
C. Efficiency
D. Health
Answer:
D
Explanation: The three major badges are Health. Risk, and Efficiency. Anomalies resides under the health badge. Faults is also a minor badge under Health.
Question NO: 58
When viewing statistics in ESXTOP, high %DRPTX and %DRPRX values are observed. What does this mean for the environment?
A. All packets are being processed normally
B. The CPU is experiencing issues
C. The vSwitch queue is exhausted
D. Memory contention may be occurring
Answer:
C
Explanation: The %DRPTX and %DRPRX are measures of dropped send and receive packets. This is an indication that the network is too busy and the vSwitch queue is too long and packets are being dropped.
Question NO: 59
What is the highest level vSphere object in vRealize Operations Manager?
A. vSphere World
B. vCenter
C. Datacenter
D. Cluster
Answer:
A
Explanation: The vSphere World object contains all monitored vCenters and their associated lower level objects within the vRealize Cloud Operations console.
Question NO: 60
Which of the following is not a chart within the overview of a host?
A. Memory Ballooning
B. CPU Ready
C. Disk Latency
D. Network Utilization
Answer:
B
Explanation: From the host monitoring view, there are select default charts displaying host statistics. To view CPU Ready times an advanced chart can be created, but all of the others are in the overview charts.
Question NO: 61
A virtual machine is not running a CPUID compatible application. What kind of failure may this cause?
A. SMP
B. Ability to communicate with VMkernel
C. CPU statistics monitoring
D. EVC vMotion
Answer:
D
Explanation: Without the ability to detect the feature set of the physical CPU, and application cannot properly mask out the features to migrate across an enhanced vMotion compatibility cluster, when the ability to make instruction sets is critical. The VMM communicates with the kernel and the virtual machine can still function under non EVC conditions.
Question NO: 62
Name two host requirements for an Enhanced vMotion Compatibility cluster to be created.
A. ESXi 6
B. Execute protection
C. Redundant management networks
D. Hardware virtualization
Select 2 answers.
Answer:
B,D
Explanation: Hardware virtualization and NX/XD must be enabled on the hosts in the cluster in order to enable EVC.
Question NO: 63
Which is true about an EVC cluster?
A. Virtual machines can hide the nx/xd flag individually within the cluster
B. As long as a virtual machine has the features defined in the baseline for the cluster, it can run in that cluster
C. EVC Baselines are created based on the most feature-rich CPU in the cluster
D. The highest number of cores helps to determine an EVC baseline
Answer:
A
Explanation: Masking the AMD No eXecute (NX) and the Intel eXecute Disable (XD) bits prevents the virtual machine from using these features, but provides compatibility that allows migrations of virtual machines to ESXi hosts that do not include this capability.
Question NO: 65
When configuring boot from SAN, which of the following is true?
A. Each ESXi host needs its own datastore
B. Each ESXi host needs its own raw LUN
C. Multiple hosts can utilize one LUN
D. Multiple hosts can utilize one datastore
Answer:
B
Explanation: A raw LUN is needed for each host that is being configured to boot from SAN. Just like it would need its own non-formatted LUN on a local disk, it needs it on the SAN as well.
Question NO: 66
From where is a host profile delivered in auto-deploy?
A. SAN
B. PXE server
C. TFTP server
D. vCenter Server
Answer:
D
Explanation: vCenter is responsible for maintaining the host profile that will be applied to the hosts that are stood up with auto-deploy.
Question NO: 67
Which is false regarding the installation of auto deploy?
A. Auto deploy can be installed on the same windows machine as vCenter Server
B. Auto deploy cannot be enabled in the vCenter server appliance
C. Auto deploy can be installed on a machine separate virtual machine from vCenter
D. Auto deploy can be installed on a physical machine separate from vCenter
Answer:
B
Explanation: Use of the vCenter appliance is fully supported with auto deploy.