vcp 8.0 (correct) Flashcards

1
Q

An administrator is tasked with applying updates to a vSphere cluster running vSAN using vSphere Lifecycle Manager. Downtime to the ESXi hosts must be minimal while the work is completed.
The administrator has already completed the following steps and no errors have been returned:
Downloaded all applicable software and created a new image.
Attached the new image to the cluster and run a compliance check against the image for the cluster.
Ran a remediation pre-check for the cluster.

Which two series of steps should the administrator perform to start the remediation of the cluster using the new image? (Choose two.)

A. 1. Use the Remediate option in vSphere Lifecycle Manager to remediate all of the ESXi hosts in the cluster in parallel.
2. Allow vSphere Lifecycle Manager to automatically control maintenance mode on the ESXi hosts.

B. 1. Place each of the ESXi hosts into maintenance mode manually.
2. Use the Stage option in vSphere Lifecycle Manager to stage the required software on all ESXi hosts one at a time.

C. 1. Leave all ESXi hosts in the cluster operational.
2. Use the Stage All option in vSphere Lifecycle Manager to stage the required software onto all ESXi hosts one at a time.

D. 1. Leave all ESXi hosts in the cluster operational.
2. Use the Stage All option in vSphere Lifecycle Manager to stage the required software onto all ESXi hosts in the cluster in parallel.

E. 1. Use the Remediate option in vSphere Lifecycle Manager to remediate all of the ESXi hosts in the cluster in sequence.
2. Allow vSphere Lifecycle Manager to automatically control maintenance mode on the ESXi hosts.

A
  1. Leave all ESXi hosts in the cluster operational.
  2. Use the Stage All option in vSphere Lifecycle Manager to stage the required software onto all ESXi hosts in the cluster in parallel.
  3. Use the Remediate option in vSphere Lifecycle Manager to remediate all of the ESXi hosts in the cluster in sequence.
  4. Allow vSphere Lifecycle Manager to automatically control maintenance mode on the ESXi hosts.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An administrator is working with VMware Support and is asked to provide log bundles for the ESXi hosts in an environment.
Which three options does the administrator have? (Choose three.)

A. Generate a combined log bundle for all ESXi hosts using the vCenter Management Interface.

B. Generate a separate log bundle for each ESXi host using the vSphere Host Client.

C. Generate a combined log bundle for all ESXi hosts using the vSphere Client.

D. Generate a separate log bundle for each ESXi host using the vSphere Client.

E. Generate a separate log bundle for each ESXi host using the vCenter Management Interface.

F. Generate a combined log bundle for all ESXi hosts using the vSphere Host Client.

A

Generate a separate log bundle for each ESXi host using the vSphere Host Client.

Generate a combined log bundle for all ESXi hosts using the vSphere Client.

Generate a separate log bundle for each ESXi host using the vSphere Client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An administrator needs to consolidate a number of physical servers by migrating the workloads to a software-defined data center solution.

Which VMware solution should the administrator recommend?

A. VMware Horizon
B. VMware vSAN
C. VMware vSphere
D. VMware NSX

A

VMware vSphere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An administrator is tasked with configuring remote direct memory access (RDMA) over Converged Ethernet v2 (RoCE v2).
Which two types of adapters must the administrator configure? (Choose two.)

A. Paravirtual RDMA adapter
B. RDMA network adapter
C. Software iSCSi adapter
D. Fibre Channel over Ethernet (FCoE) adapter
E. Software NVMe over RDMA storage adapter

A

RDMA network adapter

Software NVMe over RDMA storage adapter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An administrator has a host profile named Standard-Config. The administrator wants to change the other host profiles to use only the storage configuration settings that are defined in the Standard-Config host profile.

What should the administrator do to make this change?

A. Export host customizations and import them to the other host profiles.
B. Copy the storage settings from Standard-Config to all other host profiles.
C. Duplicate the Standard-Config host profile and only modify the storage configuration settings.
D. Export the Standard-Config host profile and attach it to tile other hosts.

A

Copy the storage settings from Standard-Config to all other host profiles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A vSphere cluster has the following configuration:
Virtual machines (VMs) are running Production and Test workloads vSphere Distributed Resource Scheduler (DRS) is enabled
There are no resource pools in the cluster
Performance monitoring data shows that the Production workload VMs are not receiving their fully allocated memory when the vSphere cluster is fully utilized.

A combination of which two steps could the administrator perform to ensure that the Production VMs are always guaranteed the full allocation of memory? (Choose two.)

A. Assign a custom memory share value to the resource pool containing the Production VMs.

B. Assign a memory reservation value to the resource pool containing the Production VMs.

C. Create a parent resource pool for the Production VMs.

D. Create a sibling resource pool for each of the Production and Test VMs.

E. Create a child resource pool for the Test VMs.

A

Create a parent resource pool for the Production VMs.

Assign a memory reservation value to the resource pool containing the Production VMs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which two datastore types store the components of a virtual machine as a set of objects? (Choose two.)

A. VMware Virtual Machine File System (VMFS)
B. VMware vSAN
C. Network File System (NFS) 3
D. vSphere Virtual Volumes (vVols)
E. Network File System (NFS) 4.1

A

VMware vSAN
vSphere Virtual Volumes (vVols)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

After updating a predefined alarm on VMware vCenter, an administrator enables email notifications as shown in the attached alarm; however, notifications are NOT being sent.

Where must the mail server settings be configured by the administrator to resolve this issue?

A. In the ESXi host system config
B. In the alarm rule definition
C. In the vCenter settings in the vSphere Client
D. In the vCenter Management Interface

A

In the vCenter settings in the vSphere Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An administrator creates a virtual machine that contains the latest company-approved software, tools and security updates. Company policy requires that only full clones are allowed for server workloads.

A combination of which two tasks should the administrator complete to prepare for the deployment of this virtual machine for multiple users? (Choose two.)

A. Set appropriate permissions on the virtual machine.
B. Create a virtual machine customization specification.
C. Upgrade the virtual hardware.
D. Convert the virtual machine to a template.
E. Take a snapshot of the virtual machine.

A

Create a virtual machine customization specification.
Convert the virtual machine to a template.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

During the staging of a patch on a vCenter Server Appliance, an error was encountered and the process stopped. An administrator resolved the root cause and is ready to continue with the staging of the patch.

From the vCenter Management Interface, which action should the administrator take to continue the process from the point at which the error occurred?
A. Use the Stage and Install option to resume the staging.
B. Use the Resume option to resume the staging.
C. Use the Unstage option to restart the staging.
D. Use the Stage Only option to restart the staging.

A

Use the Resume option to resume the staging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An administrator is adding a new ESXi host to an existing vSphere cluster. When selecting the cluster, the administrator is unable to use the Cluster Quickstart workflow to add and configure the additional host.

What could be the root cause of this issue?
A. The administrator has previously dismissed the Cluster Quickstart workflow.
B. The administrator must manually add the host to the cluster before using the Cluster Quickstart workflow.
C. The administrator has not been assigned the required permissions to use the Cluster Quickstart workflow.
D. The administrator must enable the Cluster Quickstart workflow option in VMware vCenter.

A

The administrator has previously dismissed the Cluster Quickstart workflow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company has two sites: Site A and Site B. The administrator would like to manage the VMware vCenter inventories in both sites from a single vSphere Client session.

Which vCenter feature must be configured?
A. VMware Certificate Authority
B. VMware Site Recovery Manager
C. vCenter Single Sign-On
D. Enhanced Linked Mode

A

Enhanced Linked Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An administrator plans to update the Supervisor cluster and has noticed some of the Tanzu Kubernetes Grid clusters are running an incompatible version.

Which action must the administrator take before proceeding with the Supervisor cluster update?

A. Update all Tanzu Kubernetes Grid clusters to the latest version prior to the Supervisor cluster update.
B. No action is needed – Tanzu Kubernetes Grid clusters will be updated automatically as part of the update process.
C. No action is needed – Incompatible Tanzu Kubernetes Grid clusters can be manually updated after the Supervisor cluster update.
D. Update incompatible Tanzu Kubernetes Grid clusters prior to the Supervisor cluster update.

A

Update incompatible Tanzu Kubernetes Grid clusters prior to the Supervisor cluster update.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which three vSphere features are still supported for Windows-based virtual machines when enabling vSphere’s virtualization-based security feature? (Choose three.)

A. vSphere vMotion
B. PCI passthrough
C. vSphere High Availability (HA)
D. vSphere Fault Tolerance
E. vSphere Distributed Resources Scheduler (DRS)
F. Hot Add of CPU or memory

A

vSphere vMotion
vSphere High Availability (HA)
vSphere Distributed Resources Scheduler (DRS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An administrator wants to create virtual machine (VM) templates and store them in a content library. The administrator would like to use the content library to manage different versions of these templates so that reverting to an earlier version is an option.

How should the administrator create these templates?
A. Select a VM in the vCenter inventory.
Clone the VM to the content library as a VM template type.

B. Select a VM template in the vCenter inventory.
Clone the template to the content library.

C. Export a VM in the vCenter inventory to an OVF template.
Import the OVF template into the content library.

D. Convert a VM to a template in the vCenter inventory.
Clone the template to the content library.

A

Select a VM in the vCenter inventory.
Clone the VM to the content library as a VM template type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An administrator is tasked with configuring certificates for a VMware software-defined data center (SDDC) based on the following requirements:
All certificates should use certificates trusted by the Enterprise Certificate Authority (CA).
The solution should minimize the ongoing management overhead of replacing certificates.

Which three actions should the administrator take to ensure that the solution meets corporate policy? (Choose three.)

A. Replace the VMware Certificate Authority (VMCA) certificate with a self-signed certificate generated from the VMCA.

B. Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.

C. Replace the machine SSL certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).

D. Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.

E. Replace the solution user certificates with custom certificates generated from the Enterprise CA.

F. Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).

A

Replace the machine SSL certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).

Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.

Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An administrator is tasked with moving an application and guest operating system (OS) running on top of a physical server to a software-defined data center (SDDC) in a remote secure location.
The following constraints apply:

The remote secure location has no network connectivity to the outside world.
The business owner is not concerned if all changes in the application make it to the SDDC in the secure location.
The application’s data is hosted in a database with a high number of transactions.

What could the administrator do to create an image of the guest OS and application that can be moved to this remote data center?

A. Create a hot clone of the physical server using VMware vCenter Converter.
B. Create a cold clone of the physical server using VMware vCenter Converter.
C. Restore the guest OS from a backup.
D. Use storage replication to replicate the guest OS and application.

A

Create a cold clone of the physical server using VMware vCenter Converter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An administrator is tasked with configuring an appropriate Single Sign-On (SSO) solution for VMware vCenter based on the following criteria:
The solution should support the creation of Enhanced Link Mode groups.
All user accounts are stored within a single Active Directory domain and the solution must support only this Active Directory domain as the identity source.
All user account password and account lockout policies must be managed within the Active Directory domain.
The solution should support token-based authentication.

Which SSO solution should the administrator choose based on the criteria?
A. vCenter Identity Provider Federation with Active Directory Federation Services as the identity provider
B. vCenter Single Sign-On with Active Directory over LDAP as the identity source
C. vCenter Single Sign-On with Active Directory (Windows Integrated Authentication) as the identity source
D. vCenter Identity Provider Federation with Active Directory over LDAP as the identity provider

A

vCenter Identity Provider Federation with Active Directory Federation Services as the identity provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An administrator is tasked with looking into the disaster recovery options for protecting a database server using VMware vSphere Replication.
The following requirements must be met:
The virtual machine must remain online during the protection.
The virtual machine’s snapshots must be used as part of the replication process.

Which step must the administrator complete to accomplish this task?
A. Configure the virtual machine storage policy.
B. Enable guest OS VSS quiescing for this virtual machine.
C. Perform a full initial synchronization of the source virtual machine to the target location.
D. Configure network traffic isolation for vSphere Replication.

A

Perform a full initial synchronization of the source virtual machine to the target location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An administrator must gracefully restart a virtual machine (VM) through the vSphere Client but the option is greyed out. The administrator has full administrative access on VMware vCenter and all the objects available in vCenter, but has no access to log onto the operating system.

Which action should the administrator take to meet the objective?
A. Upgrade the virtual hardware
B. Migrate the VM to another host
C. Install VMware Tools
D. Restart vCenter

A

Install VMware Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An administrator is tasked with installing VMware vCenter. The vCenter Server Appliance must support an environment of:
400 hosts
4000 virtual machines

Which two resources must be allocated, at a minimum, to meet the requirements? (Choose two.)
A. 16 vCPUs
B. 30 GB Memory
C. 4 vCPUs
D. 8 vCPUs
E. 20 GB Memory

A

30 GB Memory
8 vCPUs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which VMware offering will allow an administrator to manage the lifecycle of multiple vCenter Server instances in a single software as a service (SaaS)-based solution to help drive operational efficiency?

A. VMware vSphere with Tanzu
B. VMware Cloud Foundation
C. VMware vSphere+
D. VMware Aria Suite Lifecycle

A

VMware vSphere+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which feature would allow for the non-disruptive migration of a virtual machine between two clusters in a single VMware vCenter instance?

A. vSphere vMotion
B. Cross vCenter Migration
C. vSphere Storage vMotion
D. vSphere Fault Tolerance

A

vSphere vMotion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which four elements can a vSphere Lifecycle Manager image contain? (Choose four.)
A. ESXi base image
B. ESXi configuration
C. Vendor agents
D. Vendor add-ons
E. BIOS updates
F. Firmware and drivers add-on
G. Independent components

A

ESXi base image
Vendor add-ons
Firmware and drivers add-on
Independent components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

If a distributed switch uses the “Route based on physical NIC load” load balancing algorithm, what does the mean send or receive utilization of an uplink need to exceed for the flow of traffic to move to the second uplink?
A. 75 percent of the capacity over a 30 second period
B. 60 percent of the capacity over a 30 second period
C. 60 percent of the capacity over a 40 second period
D. 75 percent of the capacity over a 40 second period

A

75 percent of the capacity over a 30 second period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

An administrator manually configures a reference ESXi host that meets company security standards for vSphere environments. The administrator now needs to apply all of the security standards to every identically configured host across multiple vSphere clusters within a single VMware vCenter instance.

Which four steps would the administrator complete to meet this requirement? (Choose four.)

A. Extract the host profile from the reference host.
B. Export the host profile from vCenter.
C. Import host customization on the reference host.
D. Attach the host profile to each cluster that requires the secure configuration.
E. Check the compliance of each host against the host profile.
F. Reset host customization on the reference host.
G. Remediate all non-compliant hosts.

A

Extract the host profile from the reference host.
Attach the host profile to each cluster that requires the secure configuration.
Check the compliance of each host against the host profile.
Remediate all non-compliant hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

After a recent unexplained peak in virtual machine (VM) CPU usage, an administrator is asked to monitor the VM performance for a recurrence of the issue.

Which two tools can the administrator use? (Choose two.)
A. vCenter Management Interface
B. Direct Console User Interface (DCUI)
C. vSphere Performance Charts
D. vCenter Command Line Interface
E. ESXi Shell

A

vSphere Performance Charts
ESXi Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

An administrator is tasked with configuring vSphere Trust Authority.
The administrator has completed the following steps:

Set up the workstation -
Enabled the Trust Authority Administrator
Enabled the Trust Authority State
Collected information about the ESXi hosts and vCenter to be trusted

Which step does the administrator need to complete next?
A. Import the Trusted Host information to the Trust Authority Cluster
B. Import the Trusted Cluster information to the Trusted Hosts
C. Create the Key Provider on the Trusted Cluster
D. Import the Trusted Host information to the Trusted Cluster

A

Import the Trusted Host information to the Trust Authority Cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

An administrator set up the following configuration:

The distributed switch has three ESXi hosts, and each host has two 40 Gbps NICs.
The amount of bandwidth reserved for virtual machine (VM) traffic is 6 Gbps.

The administrator wants to guarantee that VMs in the Finance distributed port group can access 50 percent of the available reserved bandwidth for VM traffic.
Given this scenario, what should the size (in Gbps) of the Finance network resource pool be?
A. 18
B. 80
C. 36
D. 120

A

18

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A vSphere environment is experiencing intermittent short bursts of CPU contention, causing brief production outages for some of the virtual machines (VMs). To understand the cause of the issue, the administrator wants to observe near real-time statistics tor all VMs.

Which two vSphere reporting tools could the administrator use? (Choose two.)
A. Advanced Performance Charts
B. esxcli
C. resxtop
D. Overview Performance Charts
E. esxtop

A

resxtop
esxtop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An administrator is performing maintenance activities and discovers that a Virtual Machine File System (VMFS) datastore has a lot more used capacity than expected. The datastore contains 10 virtual machines (VMs) and, when the administrator reviews the contents of the associated datastore, discovers that five virtual machines have a snapshot file (-delta.vmdk files) that has not been modified in over 12 months. The administrator checks the Snapshot Manager within the vSphere Client and confirms that there are no snapshots visible.

Which task should the administrator complete on the virtual machines to free up datastore space?
A. Consolidate the snapshots for each VM.
B. Inflate the disk files for each VM.
C. Delete all snapshots for each VM.
D. Storage vMotion each VM to another datastore.

A

Delete all snapshots for each VM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

An administrator is attempting to configure Storage I/O Control (SIOC) on five datastores within a vSphere environment. The administrator is being asked to determine why SIOC configuration completed successfully on only four of the datastores.

What are two possible reasons why the configuration was not successful? (Choose two.)
A. The datastore contains Raw Device Mappings (RDMs).
B. SAS disks are used for the datastore.
C. The datastore has multiple extents.
D. The datastore is using ISCSI.
E. The administrator is using NFS storage.

A

The datastore contains Raw Device Mappings
The datastore has multiple extents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

An administrator has mapped three vSphere zones to three vSphere clusters.

Which two statements are true for this vSphere with Tanzu zonal Supervisor enablement? (Choose two.)
A. One Supervisor will be created in a specific zone.
B. One Supervisor will be created across all zones.
C. Three Supervisors will be created in Linked Mode.
D. Individual vSphere Namespaces will be placed into a specific zone.
E. Individual vSphere Namespaces will be spread across all zones.

A

One Supervisor will be created across all zones.
Individual vSphere Namespaces will be spread across all zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

An administrator is investigating reports of users experiencing difficulties logging into a VMware vCenter instance using LDAP accounts.

Which service should the administrator check as part of troubleshooting?
A. vSphere Authentication Proxy Service
B. Lookup Service
C. Identity Management Service
D. VMware Authentication Framework Daemon

A

Identity Management Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

An administrator is looking to deploy a new VMware vCenter instance. The current environment consists of 75 hosts and is expected to grow up to 100 hosts over the next three years.
Which deployment size should the administrator select?
A. Medium
B. Tiny
C. Large
D. Small

A

Small

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

An administrator has been notified that a number of hosts are not compliant with the company policy for time synchronization.
The relevant portion of the policy states:
All physical servers must synchronize time with an external time source that is accurate to the microsecond.

Which step should the administrator take to ensure compliance with the policy?
A. Ensure that each vCenter Server Appliance is configured to use a Network Time Protocol (NTP) source.
B. Ensure that each ESXi host is configured to use a Precision Time Protocol (PTP) source.
C. Ensure that each ESXi host is configured to use a Network Time Protocol (NTP) source.
D. Ensure that each vCenter Server Appliance is configured to use a Precision Time Protocol (PTP) source.

A

Ensure that each ESXi host is configured to use a Precision Time Protocol (PTP) source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

An administrator is creating a content library to manage VM templates and ISO images. The administrator wants to password-protect the images and templates and share them with a remote site.

Which two tasks must the administration perform when creating the content library? (Choose two.)
A. Publish the local content library.
B. Enable the security policy.
C. Create a subscribed content library.
D. Select an NFS datastore.
E. Enable authentication.

A

Publish the local content library.
Enable authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

An administrator is responsible for the management of a VMware vCenter instance that is currently experiencing performance issues. The administrator quickly identifies that the CPU and memory utilization of vCenter is consistently over 80%. Upon further analysis, it seems that the vpxd process is contributing significantly to the performance issue.

A combination of which four steps should the administrator take to resolve the performance issues and ensure that a similar issue can be rectified without requiring downtime to vCenter moving forward? (Choose four.)

A. Gracefully shut down vCenter using the vSphere Client.
B. Enable CPU Hot Add on the vCenter virtual machine.
C. Power on the vCenter Server Appliance using the vSphere Host Client.
D. Enable CPU and Memory Hot Add on the vCenter virtual machine.
E. Add additional CPU and memory to the vCenter Server Appliance.
F. Power on the vCenter Server Appliance using the vSphere Client.
G. Enable Memory Not Add on the vCenter virtual machine.

A

Gracefully shut down vCenter using the vSphere Client.
Power on the vCenter Server Appliance using the vSphere Host Client.
Enable CPU and Memory Hot Add on the vCenter virtual machine.
Add additional CPU and memory to the vCenter Server Appliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

An administrator successfully installs VMware ESXi onto the first host of a new vSphere cluster but makes no additional configuration changes. When attempting to log into the vSphere Host Client using the Fully Qualified Domain Name (FQDN) of the host, the administrator receives the following error message:
“Server Not Found – We can’t connect to the server at esxi101.corp.local.”
The following information has been provided to complete the configuration:

Host FQDN: esxi101.corp.local -

Management VLAN ID: 10 -

DHCP: No -
Management IP Address: 172.16.10.101 / 24
Management IP Gateway: 172.16.10.1
Corporate DNS Servers: 172.16.10.5, 172.16.10.6

ONS Domain: corp.local -
In addition, all host configurations must also meet the following requirements:
The management network must use only IPv4 network protocols.
The management network must be fault tolerant.

Which three high level tasks should the administrator complete, at a minimum, in order to successfully log into the vSphere Host Client using the FQDN for esxi101 and complete the configuration? (Choose three.)

A. Ensure a DNS A Record is created for the VMware ESXi host on the corporate DNS servers.
B. Update the VMware ESXi Management Network DNS configuration to use the corporate DNS servers for names resolution.
C. Update the VMware ESXi Management Network IPv4 configuration to use a static a IPv4 address.
D. Configure at least two network adapters for the VMware ESXi Management Network.
E. Set the value of the VMware ESXi Management Network VLAN ID to 10.
F. Disable IPv6 for the VMware ESXi Management Network.

A

Ensure a DNS A Record is created for the VMware ESXi host on the corporate DNS servers.

Update the VMware ESXi Management Network IPv4 configuration to use a static a IPv4 address.

Set the value of the VMware ESXi Management Network VLAN ID to 10.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

When configuring vCenter High Availability (HA), which two statements are true regarding the active, passive, and witness nodes? (Choose two.)
A. Network latency must be less than 10 milliseconds.
B. They must have a supported Wide Area Network (WAN).
C. They must have a minimum of a 10 Gbps network adapter.
D. They must have a minimum of a 1 Gbps network adapter.
E. Network latency must be more than 10 milliseconds.

A

Network latency must be less than 10 milliseconds.
They must have a minimum of a 1 Gbps network adapter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

An administrator is deploying a new all flash vSAN cluster based on the vSAN Original Storage Architecture (OSA).
What is the minimum supported network throughput in Gb/s for each host?
A. 50
B. 10
C. 25
D. 1

A

10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

An administrator enables Secure Boot on an ESXi host. On booting the ESXi host, the following error message appears:
Fatal error: 39 (Secure Boot Failed)

What is the cause of this issue?
A. The kernel hos been tampered with.
B. The Trusted Platform Module chip has failed.
C. The administrator attempted to boot with a bootloader that is unsigned or has been tampered with.
D. A package (VIB or driver) has been tampered with.

A

The kernel hos been tampered with.

42
Q

To keep virtual machines (VMs) up and running at all times in a vSphere cluster, an administrator would like VMs to be migrated automatically when the host hardware health status becomes degraded.

Which cluster feature can be used to meet this requirement?
A. Predictive DRS
B. Proactive HA
C. vSphere HA Orchestrated Restart
D. vSphere Fault Tolerance

A

Proactive HA

43
Q

An administrator wants to allow a DevOps engineer the ability to delete Tanzu Kubernetes Grid (TKG) cluster objects in a vSphere Namespace.

Which role would provide the minimum required permissions to perform this operation?
A. Administrator
B. Can View
C. Owner
D. Can Edit

A

Can Edit

44
Q

A group of new virtual machines have been deployed using thin-provisioned disks due to the limited storage space available in an environment. The storage team has expressed concern about extensive use of this type of provisioning.
An administrator is tasked with creating a custom alarm to notify the storage team when thin provisioning reaches a certain capacity threshold.

Where must the administrator define this alarm?
A. Datastore
B. Data center
C. Datastore cluster
D. Virtual machine

A

Datastore

45
Q

What are three options an administrator can configure after creating a vSphere Namespace? (Choose three.)
A. Backup schedule
B. Certificates
C. Storage policies
D. Update policies
E. Permissions
F. Resource and Object limits

A

Storage policies
Permissions
Resource and Object limits

46
Q

A VMkernel port is labelled PROD01 and uses the default TCP/IP stack. Currently, this VMkernel port is configured for supporting live virtual machine (VM) migrations.

Which configuration change should the administrator make to isolate live VM migration traffic from other network traffic?

A. Remove PROD01 and create a new VMkernel port and set the TCP/IP stack to vSphere vMotion.
B. Remove PROD01 and create a new VMkernel port with the TCP/IP stack set to provisioning.
C. Create a new VMkernel port and set the TCP/IP stack to provisioning.
D. Modify PROD01 by changing the TCP/IP stack to vSphere vMotion.

A

Remove PROD01 and create a new VMkernel port and set the TCP/IP stack to vSphere vMotion.

47
Q

After adding a new vSphere ESXi host with identical hardware configuration to an existing vSphere cluster, which task would an administrator complete prior to checking the compliance with an existing host profile?
A. Attach the host profile to the new host
B. Duplicate the host profile
C. Copy the host setting from the new host
D. Import the host profile

A

Attach the host profile to the new host

48
Q

An administrator is tasked with deploying a new on-premises software-defined data center (SDDC) that will contain a total of eight VMware vCenter instances.
The following requirements must be met:
- All vCenter instances should be visible in a single vSphere Client session.
- All vCenter inventory should be searchable from a single vSphere Client session.
- Any administrator must be able to complete operations on any vCenter instance using a single set of credentials.

What should the administrator configure to meet these requirements?
A. Two Enhanced Linked Mode groups consisting of four vCenter instances each in a Single Sign-On domain.
B. A single Hybrid Linked Mode group consisting of four vCenter instances each in a Single Sign-On domain.
C. A single Enhanced Linked Mode group consisting of eight vCenter instances in one Single Sign-On domain.
D. A single Hybrid Linked Mode group consisting of eight vCenter instances in one Single Sign-On domain.

A

A single Enhanced Linked Mode group consisting of eight vCenter instances in one Single Sign-On domain.

49
Q

An administrator has Windows virtual machines (VMs) and VMware Tools is installed in each VM. The administrator performs a status check of VMware Tools using vSphere Lifecycle Manager.

What is the VMware Tools status for the Windows VMs if the version of VMware Tools has a known problem and must be immediately upgraded?
A. Version Unsupported
B. Guest Managed
C. Unknown
D. Upgrade Available

A

Version Unsupported

50
Q

Which three features are only available when using vSphere Distributed Switches instead of vSphere Standard Switches? (Choose three.)
A. 802.1Q tagging
B. Port mirroring
C. Netflow
D. Configuration backup and restore
E. IPv6 support
F. IPv4 support

A

Port mirroring
Netflow
Configuration backup and restore

51
Q

An administrator is configuring vSphere Lifecycle Manager to install patches to a vSphere cluster. The cluster runs workload virtual machines (VMs) that are incompatible with vSphere vMotion, and therefore cannot be live migrated between hosts during the installation of the patches.

Which configuration in vSphere Lifecycle Manager will allow the administrator to reduce the downtime associated with the patching operation without migrating the VMs?

A. Enable Distributed Power Management (DPM) and set the VM power state to the suspend to disk option
B. Enable Quick Boot ana set the VM power stale to the suspend to disk option
C. Enable vSphere High Availability (HA) admission control and set the VM power stale to the suspend to memory option
D. Enable Quick Boot and set the VM power state to the suspend to memory option

A

Enable Quick Boot and set the VM power state to the suspend to memory option

52
Q

An administrator creates a new corporate virtual machine (VM) template every month to include all of the latest patches. The administrator needs to ensure that the new VM template is synchronized from the primary data center site (London) to two secondary data center sites (Tokyo and New York). The administrator is aware that datastore space is limited within the secondary data center sites. The administrator needs to ensure that the VM template is available in the secondary sites the first time a new virtual machine is requested.

Which four steps should the administrator take to meet these requirements? (Choose four.)

A. Create a new published content library at the primary site.
B. Add the virtual machine template to the subscribed content library.
C. Create a new published content library in each secondary site.
D. Create a new subscribed content library in each secondary site.
E. Configure the subscribed content library to download content when needed.
F. Configure each subscribed content library to download content immediately.
G. Add the virtual machine template to the published content library.

A

Create a new published content library at the primary site.
Create a new subscribed content library in each secondary site.
Configure the subscribed content library to download content when needed.
Add the virtual machine template to the published content library.

53
Q

An administrator is tasked with migrating a single virtual machine (VM) from an existing VMware vCenter to a secure environment where corporate security policy requires that all VMs be encrypted. The secure environment consists of a dedicated vCenter instance with a 4-node vSphere cluster and already contains a number of encrypted VMs.
Which two steps must the administrator take to ensure the migration is a success? (Choose two.)

A. Ensure that the source and destination vCenter instances share the same Key Management Server (KMS).
B. Ensure that Encrypted vMotion is turned off for the VM.
C. Ensure that the VM is encrypted before attempting the migration.
D. Ensure that the VM is powered off before attempting the migration.
E. Ensure that the source and destination vCenter Servers have a different Key Management Server (KMS).

A

Ensure that the source and destination vCenter instances share the same Key Management Server (KMS).

Ensure that the VM is encrypted before attempting the migration.

54
Q

An administrator is tasked with providing users access to objects within an existing VMware vCenter instance. The vCenter inventory has a single data center with one management vSphere cluster and five workload vSphere clusters.
The following requirements must be met for assigning the users access:
Users must only be able to view all of the inventory objects associated with the management vSphere cluster.
Users must be able to edit all of the inventory objects associated with the workload vSphere clusters.
The administrator creates a custom role to provide the permissions needed to allow users to edit inventory objects.

Which series of steps should the administrator complete to assign the custom role and provide the required level of access to users?

A. Apply Global permissions to assign the Read Only role to the root vCenter object.
Apply vCenter permissions to assign the custom role to the workload vSphere clusters and enable propagation.

B. Apply Global permissions to assign the Read Only role to the root vCenter object and enable propagation.
Apply vCenter permissions to assign the custom role to the workload vSphere clusters and enable propagation.

C. Apply Global permissions to assign the Read Only role to the root vCenter object.
Apply vCenter permissions to assign the custom role to the workload vSphere clusters.

D. Apply Global permissions to assign the Read Only role to the root vCenter object and enable propagation.
Apply vCenter permissions to assign the custom role to the workload vSphere clusters.

A

Apply Global permissions to assign the Read Only role to the root vCenter object and enable propagation.
Apply vCenter permissions to assign the custom role to the workload vSphere clusters and enable propagation.

55
Q

An administrator has a requirement to revert a running virtual machine to a previous snapshot after a failed attempt to upgrade an application. When the administrator originally took the snapshot, the following choices in the Take Snapshot dialog were made:
Snapshot the virtual machine’s memory = false
Quiesce guest file system = false

What will be the result of the administrator selecting the “Revert to Latest Snapshot” option to return the virtual machine to a previous snapshot?
A. The virtual machine will be restored to the parent snapshot in a powered on state.
B. The virtual machine will be restored to the parent snapshot in a powered off state.
C. The virtual machine will be restored to the child snapshot in a powered off state.
D. The virtual machine will be restored to the child snapshot in a powered on state.

A

The virtual machine will be restored to the parent snapshot in a powered off state.

56
Q

An administrator is planning to upgrade a VMware vCenter instance to version 8. It is currently integrated with the following solutions:

VMware Aria Automation -
VMware Cloud Director -

Which tool can the administrator use to run interoperability reports before the upgrade process?
A. vSphere Update Manager
B. VMware Aria Suite Lifecycle
C. vCenter Server Update Planner
D. vSphere Lifecycle Manager

A

vCenter Server Update Planner

57
Q

An administrator decides to restore VMware vCenter from a file-based backup following a failed upgrade.

Which interface should the administrator use to complete the restore?
A. Direct Console User Interface (DCUI)
B. vCenter Management Interface (VAMI)
C. vSphere Client
D. vCenter GUI Installer

A

vCenter GUI Installer

58
Q

An administrator needs to provide encryption for workloads within an existing vSphere cluster.
The following requirements must be met:

Workloads should be encrypted at rest.
Encrypted workloads must automatically be encrypted during transit.
Encryption should not require any specific hardware.

What should the administrator configure to meet these requirements?
A. Encrypted vSphere vMotion
B. Unified Extensible Firmware Interface (UEFI) Secure Boot
C. Host Encryption
D. VM Encryption

A

VM Encryption

59
Q

After a number of outages within a production VMware software-defined data center, an administrator is tasked with identifying a solution to meet the following requirements:
Reduce the risk of outages by proactively identifying issues with the environment and resolving them.
Reduce the complexity of uploading log bundles when raising support tickets.

Which solution should the administrator recommend to meet these requirements?
A. VMware Aria Operations for Logs
B. VMware Skyline Advisor Pro
C. VMware Skyline Health
D. VMware Aria Operations

A

VMware Skyline Advisor Pro

60
Q

An administrator is responsible for performing maintenance tasks on a vSphere cluster.
The cluster has the following configuration:
Identically configured vSphere ESXi hosts (esx01, esx02, esx03 and esx04)
All workloads are deployed into a single VMFS datastore provided by the external storage array vSphere High Availability (HA) has not been enabled vSphere Distributed Resource Scheduler (DRS) has not been enabled
Currently, a critical production application workload (VM1) is running on esx01.

Given this scenario, which two actions are required to ensure VM1 continues to run when esx01 is placed into maintenance mode? (Choose two.)
A. Fully automated DRS must be enabled on the cluster so that VM1 will be automatically migrated to another host within the cluster when esx01 is placed into maintenance mode.
B. VM1 must be manually shut down and cold migrated to another host within the cluster using vSphere vMotion before esx01 is placed into maintenance mode.
C. vSphere HA must be enabled on the cluster so that VM1 will be automatically migrated to another host within the cluster when esx01 is placed into maintenance mode.
D. VM1 must be manually live migrated to another host within the cluster using vSphere vMotion before esx01 is placed into maintenance mode.
E. VM1 must be manually migrated to another host within the cluster using vSphere Storage vMotion before esx01 is placed into maintenance mode.

A

Fully automated DRS must be enabled on the cluster so that VM1 will be automatically migrated to another host within the cluster when esx01 is placed into maintenance mode.

VM1 must be manually live migrated to another host within the cluster using vSphere vMotion before esx01 is placed into maintenance mode.

61
Q

An administrator needs better performance and near-zero CPU utilization from the ESXi hosts for networking functions and processing. The administrator creates a new vSphere Distributed Switch and enables network offloads compatibility.

Which solution would help achieve this goal?
A. vSphere Distributed Services Engine
B. Data Processing Units (DPUs)
C. vSphere Network I/O Control
D. Universal Passthrough version 2

A

vSphere Distributed Services Engine

62
Q

An administrator needs to perform maintenance on a datastore that is running the vSphere Cluster Services (vCLS) virtual machines (VMs).

Which feature can the administrator use in this scenario to avoid the use of Storage vMotion on the vCLS VMs?
A. vSphere Distributed Resource Scheduler (DRS)
B. vSphere vMotion
C. vSphere Fault Tolerance
D. vCLS Retreat Mode

A

vCLS Retreat Mode

63
Q

What is the role of vSphere Distributed Services Engine?

A. Provide a live shadow instance of a virtual machine (VM) that mirrors the primary VM to prevent data loss and downtime during outages
B. Implement Quality of Service (QoS) on network traffic within a vSphere Distributed Switch
C. Provide hardware accelerated data processing to boost infrastructure performance
D. Redistribute virtual machines across vSphere cluster hosts to comply with user-defined affinity and anti-affinity rules following host failures or during maintenance operations

A

Provide hardware accelerated data processing to boost infrastructure performance

64
Q

A vSphere cluster has the following vSphere Distributed Resource Scheduler (DRS) group configuration:
Virtual machine (VM) group named DB
Host groups named PROD11 and PROD55
The administrator wants to force the VMs in the DB group to run on the hosts in the PROD11 group. However, if all the hosts in PROD11 go offline for maintenance, then the VMs in the DB group should run on hosts in PROD55.

Which VM/Host rule must the administrator create to ensure that these requirements are met?
A. A preferential rule between the DB group and the PROD11 group
B. A preferential rule between the DB group and the PROD55 group
C. A required rule between the DB group and the PROD11 group
D. A required rule between the DB group and the PROD55 group

A

A preferential rule between the DB group and the PROD11 group

65
Q

An administrator is asked to configure a security policy at the port group level of a standard switch.
The following requirements must be met:
The security policy must apply to all virtual machines on portgroup-1.

All traffic must be forwarded, regardless of the destination.
Which security policy must the administrator configure?
A. Forged transmits set to reject
B. MAC address changes set to accept
C. Promiscuous mode set to reject
D. Promiscuous mode set to accept

A

Promiscuous mode set to accept

66
Q

Following a merger with another company, an administrator is tasked with configuring an identity source for VMware vCenter so that all vSphere administrators can authenticate using their existing Active Directory accounts. Each company has user accounts in their own Active Directory forests.
The following additional information has been provided:
The corporate policy states that only Windows-based machine accounts are allowed in Active Directory.

Which action should the administrator take to configure vCenter Single Sign-On (SSO) to meet this requirement?

A. Configure SSO to use Active Directory over LDAP as the identity source.
B. Configure SSO to use OpenLDAP as the identity source.
C. Join the vCenter Server Appliance to the LDAP domain.
D. Configure SSO to use Active Directory (Integrated Windows Authentication) as the identity source.

A

Configure SSO to use Active Directory over LDAP as the identity source.

67
Q

An administrator notices a performance issue in VMware vCenter. To try and understand more about the performance issue, the administrator needs to gather more information about the vCenter database to eliminate a potential disk space issue.

Which two tools can the administrator use? (Choose two.)
A. vCenter Management Interface (VAMI)
B. Perfmon
C. df
D. esxtop
E. vSphere Client

A

df
vCenter Management Interface (VAMI)

68
Q

An administrator notices a Fibre Channel adapter in an ESXi host has been experiencing incon-sistent connectivity states.

Which trigger can be used to quickly identify the issue and alert the administrator so that the is-sue can be resolved?
A. Host Connection Lost
B. Lost Network Path Redundancy
C. Lost Network Connectivity
D. Lost Storage Connectivity

A

Lost Storage Connectivity

69
Q

An administrator is tasked with looking into the disaster recovery (DR) options for a software-defined data center (SDDC).

The following requirements must be met:
* All virtual machines (VMs) must be protected to a secondary site.
* The source VMs must remain online until the failover.
* When failing over to the secondary site, application downtime is allowed.
* The DR failover must be managed from the vSphere Client.
* Costs must remain as low as possible.

How can the administrator accomplish this task?
A. Configure VMware Cloud Disaster Recovery (VCDR) and combine it with array-based stor-age replication.
B. Configure VMware a Site Recovery Manager and combine it with vSphere Replication.
C. Configure a subscribed content library on the secondary site.
D. Configure VMware Site Recovery Manager and combine it with array-based storage replication.

A

Configure VMware a Site Recovery Manager and combine it with vSphere Replication.

70
Q

An administrator needs to update a VMware vCenter instance to a newer minor release version. Due to restrictions within the environment, the vCenter instance does not have access to the Internet. As a first step, the administrator downloads the required update on another machine.

What are the next steps the administrator must perform to complete the update?

A. Place the update ISO file in a Virtual Machine File System (VMFS) datastore.
Use the vSphere Client to select the update ISO file as the source for the update.

B. Mount the ISO update file to the CD-ROM drive of the vCenter instance.
Use the vCenter Management Interface to select the CD-ROM as the source for the update.

C. Place the ISO update file in a folder accessible to the vCenter instance over HTTPS.
Use the vCenter Management Interface to select the update file as the source for the update.

D. Place the ZIP update file in a folder accessible to the vCenter instance over HTTPS.
Use the vSphere Client to select the update file as the source for the update.

A

Mount the ISO update file to the CD-ROM drive of the vCenter instance.
Use the vCenter Management Interface to select the CD-ROM as the source for the update.

71
Q

An administrator is tasked with allowing a single user the ability to take snapshots on a virtual machine. When looking in vCenter, the administrator can see that there are already users and groups assigned permissions on the virtual machine as follows:

  • The group VM_Users has the Virtual Machine Power User role.
  • The group VM_Viewers has the Read Only role.

The administrator confirms that the user requesting the additional access is currently one of five members of the VM_Viewers group.

Which two steps should the administrator take to grant this user the additional access required without impacting the user access of others? (Choose two.)

A. Add the user to the VM_Users group and leave the permissions on the virtual machine object unchanged.
B. Add a new permission on the virtual machine object selecting the user and the new custom role.
C. Edit the Read Only role to add the Virtual Machine Snapshot Management privileges.
D. Create a new custom role with the Virtual Machine Snapshot Management privileges.
E. Add a new permission on the virtual machine object selecting the VM_Viewers group and the new custom role.

A

Add a new permission on the virtual machine object selecting the user and the new custom role.

Create a new custom role with the Virtual Machine Snapshot Management privileges.

72
Q

An administrator is preparing to perform an update to vSphere clusters that are running vSAN. The administrator wants to ensure that the following requirements are met as part of the update:
* All hosts in the cluster are updated with the same software.
* The firmware versions on the hosts are updated.
* The new software versions are checked for compliance against the vSAN Hardware Compatibility List.

Which three steps should the administrator take to meet these requirements? (Choose three.)

A. Configure vSphere Lifecycle Manager with an image for the cluster.
B. Register the vendor hardware management system as a vCenter Server extension.
C. Download the firmware updates from the VMware website.
D. Download the firmware updates from the vendor website.
E. Run a hardware compatibility check using vSphere Lifecycle Manager.
F. Configure vSphere Lifecycle Manager with a baseline for the cluster.

A

Configure vSphere Lifecycle Manager with an image for the cluster.

Register the vendor hardware management system as a vCenter Server extension.

Run a hardware compatibility check using vSphere Lifecycle Manager.

73
Q

An administrator is asked to segregate virtual machine (VM) traffic by VLAN on a vSphere standard switch.

The following requirements must be met:
* VLAN ID on the switch port group must be 4095.
* VLAN tagging must be done at the VM level.

Which tagging mode is required?
A. External Switch Tagging (EST)
B. None
C. Virtual Guest Tagging (VGT)
D. Virtual Switch Tagging (VST)

A

Virtual Guest Tagging (VGT)

74
Q

An administrator wants to use tag-based placement rules on their virtual machine disks using VMware vCenter.

Which option would allow the administrator to achieve this?
A. Storage Policy Based Management
B. Storage I/O Control
C. vSphere Storage APIs for Storage Awareness (VASA)
D. vSphere Distributed Resource Scheduler (DRS)

A

Storage Policy Based Management

75
Q

A combination of which two components of the software-defined data center (SDDC) are responsible for the initial abstraction of CPU, memory, disk, and network resources and their subsequent management? (Choose two.)

A. VMware Aria Operations
B. VMware Aria Suite Lifecycle
C. VMware vCenter
D. VMware ESXi
E. VMware vCenter Cloud Gateway

A

VMware vCenter

VMware ESX

76
Q

What are two use cases for VMware vSphere+? (Choose two.)

A. Enhance on-premises workloads by managing them through the VMware Cloud Console.
B. Allow live migration between on-premises and VMware Cloud.
C. Increase the performance of the native vCenter vMotion capability.
D. Allow the creation of affinity and anti-affinity rules to be used during failover events.
E. Simplify vCenter lifecycle management through cloud-enabled automation.

A

Enhance on-premises workloads by managing them through the VMware Cloud Console.

Simplify vCenter lifecycle management through cloud-enabled automation.

77
Q

An administrator is completing the configuration of a new vSphere cluster and has enabled vSphere High Availability (HA) and vSphere Distributed Resource Scheduler (DRS).

After adding the ESXi hosts to the cluster, which networking information will the administrator be prompted to provide when using the Cluster Quickstart workflow?

A. vMotion networking
B. Management networking
C. vSAN networking
D. Virtual machine networking

A

vMotion networking

78
Q

An administrator plans to bring VMware vCenter offline in order to perform hardware maintenance on the host where the vCenter Server Appliance is running.

Which vSphere feature must be configured to ensure that vCenter users experience minimal downtime?

A. vSphere Distributed Resource Scheduler
B. Hybrid Linked Mode
C. vCenter Server High Availability
D. Enhanced Linked Mode

A

vCenter Server High Availability

79
Q

Which two tasks can be completed using vSphere LifeCycle Manager? (Choose two.)

A. Manage the firmware lifecycle of ESXi hosts that are part of a managed cluster with a single image.
B. Check that the ESXi hosts are compliant with the recommended baseline and update the hosts.
C. Upgrade VMware vCenter from version 7 to 8.
D. Check the hardware compatibility of the hosts in a cluster against the VMware Compatibility Guide (VCG) using baselines.
E. Manage the firmware lifecycle of ESXi hosts are part of a managed cluster using baselines.

A

Manage the firmware lifecycle of ESXi hosts that are part of a managed cluster with a single image.

Check that the ESXi hosts are compliant with the recommended baseline and update the hosts.

80
Q

An administrator is tasked with implementing a backup solution capable of backing up the Supervisor cluster, vSphere Pods, and persistent volumes.

Which two solutions must be used to meet this requirement? (Choose two.)

A. VMware vCenter
B. Standalone Velero and Restic
C. NSX-T Manager
D. vSphere Host Client
E. Velero Plugin for vSphere

A

Standalone Velero and Restic

Velero Plugin for vSphere

81
Q

An administrator receives reports from the application team of poor performance of a virtual machine (VM). The administrator reviews the virtual machine and discovers that it has 20 snapshots that are over 12 months old.

What could the administrator do to improve the VM’s performance?
A. Inflate the base disk to make space for future snapshots.
B. Revert to the latest snapshot.
C. Consolidate all of the snapshots into the base VM.
D. Identify and delete the largest delta .vmdk file.

A

Consolidate all of the snapshots into the base VM.

82
Q

A vSphere cluster hosts a three-tier application. The cluster has 50% resources available. If a host in the cluster fails, the database server must be online before the application server, and the application server must be online before the Web server.

Which feature can be used to meet these requirements?
A. Predictive DRS
B. vSphere HA Orchestrated Restart
C. vSphere HA Restart Priority
D. Proactive HA

A

vSphere HA Orchestrated Restart

83
Q

What is the minimum network throughput in Gb/s for vSAN using the Express Storage Architecture (ESA)?

A. 50
B. 25
C. 1
D. 10

A

25

84
Q

Which step is completed during Stage 1 of the vCenter Server Appliance deployment?

A. Join a vCenter Single Sign-On domain
B. Create a new vCenter Single Sign-On domain
C. Select the deployment size
D. Configure SSH access

A

Select the deployment size

85
Q

An administrator is tasked with adding two additional hosts into an existing production vSphere cluster to support the need for additional capacity.

The vSphere cluster currently has four identically configured ESXi hosts (esx01, esx02, esx03 and esx04) that utilize Intel Skylake-based CPUs. The two new hosts (esx05 and esx06) are configured identically in terms of memory and storage to the existing hosts, but utilize Intel Ice Lake-based CPUs.

The administrator must ensure that:

  • Any virtual machine migrates to any of the six ESXi hosts running in the cluster.
  • There is no virtual machine downtime during the process of adding the new hosts.

Which step should the administrator take to meet these requirements?
A. Create a new vSphere cluster with Enhanced vMotion Compatibility (EVC) enabled and move all hosts into the new cluster.
B. Create a new vSphere cluster and move only three hosts into the new cluster.
C. Configure Enhanced vMotion Compatibility (EVC) mode on the existing cluster and add the two new hosts into the cluster.
D. Create a new vSphere cluster with vSphere High Availability (HA) enabled and move all hosts into the new cluster.

A

Create a new vSphere cluster with Enhanced vMotion Compatibility (EVC) enabled and move all hosts into the new cluster.

86
Q

An administrator is investigating user logon failures for a VMware vCenter instance.

Where can the administrator find log files containing information related to user login activities?
A. On the vCenter Management Interface
B. On the ESXi host using the Direct Console User Interface
C. On the vCenter Server Appliance
D. In the vSphere Client when viewing the vCenter virtual machine

A

On the vCenter Server Appliance

87
Q

What are two uses cases for VMware Tools? (Choose two.)

A. Time synchronization with an NTP server
B. Direct deployment of the Aria Automation Config minion
C. Share folders between ESXi hosts and guest OS file systems
D. Ability to shut down a virtual machine remotely
E. Support for unsupported network device drivers

A

Share folders between ESXi hosts and guest OS file systems
Ability to shut down a virtual machine remotely

88
Q

An administrator has configured Storage I/O Control (SIOC) on a Virtual Machine File System (VMFS) datastore.
* The datastore supports 30,000 IOPS
* Storage I/O Control has been set to manual
* Storage I/O Control is triggered when latency hits 30 ms
* The datastore contains 3 virtual machines (VMs)
1. A gold tier VM
2. A silver tier VM
3. A bronze tier VM

Assuming the datastore latency does not exceed 29ms, what is the maximum number of IOPS the bronze tier VM is entitled to?
A. 30,000
B. 20,000
C. 10,000
D. 5,000

A

30,000

89
Q

An administrator needs to configure a content library solution based on the following information:

  • A new corporate virtual machine (VM) template is created every month to include all of the latest patches.
  • The new VM template should be downloaded from the primary data center site (London) to two secondary data center sites (Tokyo and New York) as soon as possible.
  • There is limited disk space available at one of the secondary data center sites (Tokyo) due to an ongoing data center consolidation project.

Which four steps should the administrator take to configure the content library solution before adding a VM template? (Choose four.)

A. Create a new published content library in each secondary site.
B. Configure the New York subscribed content library to download content immediately.
C. Configure the Tokyo subscribed content library to download content immediately.
D. Configure the Tokyo subscribed content library to download content when needed.
E. Create a new published content library at the primary site.
F. Configure the New York subscribed content library to download content when needed.
G. Create a new subscribed content library in each secondary site.

A

Create a new published content library at the primary site.

Create a new subscribed content library in each secondary site.

Configure the New York subscribed content library to download content immediately.

Configure the Tokyo subscribed content library to download content when needed.

90
Q

An administrator is required to configure several Microsoft Windows virtual machines (VMs) to support Secure Boot for a critical secure application.

The following information is provided:
* The corporate security policy states that all forms of data encryption must utilize a key provider.
* The firmware of each VM is currently set to use Unified Extensible Firmware Interface (UEFI).
* Due to the nature of the application running within the VMs, the guest operating system for each VM is currently a minimum of Windows Server 2008 and Windows 7.

Which security feature should the administrator implement to meet these requirements?
A. vSphere Virtual Machine Encryption
B. vSphere Visualization-Based Security
C. Virtual Intel Software Guard Extensions (vSGX)
D. Virtual Trusted Platform Module (vTPM)

A

Virtual Trusted Platform Module (vTPM)

91
Q

An administrator is preparing for a deployment of a new vCenter Server Appliance. The follow-ing information has been provided to complete the deployment:

  • ESXi Host name (FQDN): esx01.corp.local
  • ESXi IP Address: 172.20.10.200
  • vCenter Server Name (FQDN): vcsa01.corp.local
  • vCenter Server IP Address: 172.20.10.100
  • NTP Server: 172.20.10.20
  • DNS Server: 172.20.10.1
  • Deployment Size: Tiny
  • Storage Size: Default

Which two actions must the administrator complete before starting the installation of the vCenter Server Appliance? (Choose two.)

A. Create a DNS CNAME record for the vCenter Server (vcsa01.corp.local).
B. Create a DNS CNAME record for the ESXi Host server (esx01.corp.local).
C. Create a reverse DNS A record for the vCenter Server (vcsa01).
D. Create a reverse DNS A record for the ESXi Host server (esx01)
E. Create a forward DNS A record for the vCenter Server (vcsa01).

A

Create a reverse DNS A record for the vCenter Server (vcsa01).

Create a forward DNS A record for the vCenter Server (vcsa01).

92
Q

An administrator manages VM templates and ISO images for a remote office. Their main requirements are to store these templates in a single repository and manage different versions of the templates.

What solution should the administrator deploy to meet these requirements?
A. A vSAN datatore
B. A shared VMFS datastore
C. A local content library
D. A subscribed content library

A

A local content library

93
Q

An administrator needs to create affinity rules for the following vSphere cluster setup:

  • The cluster contains two virtual machines (VMs) named app01 and app02.
  • The cluster contains six hosts named esx11 through esx16.
  • The app01 and app02 VMs run software that is licensed to run only on esx11, esx12, or esx13.
  • vSphere Distributed Resource Scheduler (DRS) is configured.

Which set of steps must the administrator perform to ensure that the licensing requirements are met for app01 and app02?
A. 1. Add all the hosts to a host group.
2. Create a VM-VM anti-affinity rule for app01 and app02.

B. 1. Add the esx11 – esx13 hosts to a host group.
2. Create a VM-VM affinity rule for app01 and app02.

C. 1. Add the VMs to a VM group and the esx11 – esx13 hosts to a host group.
2. Create a VM-Host required rule between the VM group and the host group.

D. 1. Add the VMs to a VM group and the esx11 – esx13 hosts to a host group.
2. Create a VM-Host preferential rule between the VM group and the host group.

A
  1. Add the VMs to a VM group and the esx11 – esx13 hosts to a host group.
  2. Create a VM-Host required rule between the VM group and the host group.
94
Q

The vCenter inventory contains a virtual machine (VM) template called Linux-01. The administrator wants to install a software patch into Linux-01 while allowing users to continue to access Linux-01 to deploy VMs.

Which series of steps should the administrator take to accomplish this task?
A. 1. Verify that Linux-01 is in a content library.
2. Clone Linux-01
3. Convert the clone to a VM.
4. Install the software patch.

B. 1. Convert Linux-01 to a VM
2. Install the software patch.
3. Convert the VM back to a VM template.
4. Add Linux-01 to the content library.

C. 1. Verify that Linux-01 is in a content library.
2. Check out Linux-01.
3. Install the software patch.
4. Check in Linux-01.

D. 1. Clone Linux-01.
2. Convert the clone to a VM.
3. Install the software patch.
4. Convert the VM back to a template.

A
  1. Verify that Linux-01 is in a content library.
  2. Check out Linux-01.
  3. Install the software patch.
  4. Check in Linux-01.
95
Q

An administrator remotely deploys VMware ESXi using an out of band management connection and now needs to complete the configuration of the management network so that the host is accessible through the vSphere Host Client.

The following information has been provided to complete the configuration:

  • Host FQDN: esxi01.corp.local
  • Management VLAN ID: 10
  • DHCP: No
  • Management IP Address: 172.16.10.101/24
  • Management IP Gateway: 172.16.10.1
  • Corporate DNS Servers: 172.16.10.5, 172.16.10.6
  • DNS Domain: corp.local

In addition, all host configurations must also meet the following requirements:

  • The management network must use only IPv4 network protocols.
  • The management network must be fault tolerant.

Which four high level tasks should the administrator complete in the Direct Console User Interface (DCUI) in order to meet the requirements and successfully log into the vSphere Host Client? (Choose four.)

A. Set the value of the VMware ESXi Management Network VLAN ID to 10.
B. Configure at least two network adapters for the VMware ESXi Management Network.
C. Update the VMware ESXi Management Network IPv4 configuration to use a static IPv4 address.
D. Create a DNS A Record for the VMware ESXi host on the corporate DNS servers.
E. Disable IPv6 for the VMware ESXi Management Network.
F. Restore the original Management vSphere Standard Switch.
G. Update the VMware ESXi Management Network DNS configuration to use the corporate DNS servers for names resolution.

A

Set the value of the VMware ESXi Management Network VLAN ID to 10.

Configure at least two network adapters for the VMware ESXi Management Network.

Update the VMware ESXi Management Network IPv4 configuration to use a static IPv4 address.

Update the VMware ESXi Management Network DNS configuration to use the corporate DNS servers for names resolution.

96
Q

Given the configuration shown in the exhibit, what should the administrator do if the latest VM template contains changes that are no longer needed?

A. Delete App-LibTemplate (2)
B. Revert to App-LibTemplate (2)
C. Delete App-LibTemplate (3)
D. Check out App-LibTemplate (3)

A

Revert to App-LibTemplate (2)

97
Q

An administrator configures a distributed switch and adds the first VMware ESXi server to it.

The administrator also performs the following activities:
* The administrator assigns two uplinks to the distributed switch.
* The administrator enables uplink teaming.

When attempting to perform a health check of the teaming policy, the health status of the Teaming and Failover reports as “Unknown”, as seen in the exhibit.

What can the administrator changes in the distributed switch for the health status to report correctly?

A. Add a minimum of three hosts with two uplinks each
B. Add a minimum of two hosts with two uplinks each
C. Add a minimum of three hosts with four uplinks each
D. Add a minimum of two hosts with one uplink each

A

Add a minimum of two hosts with two uplinks each

98
Q

After removing an ESXi host from a cluster for maintenance, a number of virtual machines have encountered the warning seen in the exhibit.

“Virtual machine CPU usage”

After re-adding the ESXi, the issue is resolved.

Which step should the administrator take to move the triggered alarm to its normal state?
A. Ignore
B. Acknowledge
C. Disable
D. Reset to Green

A

Reset to Green

99
Q

An administrator set up the following configuration:

  • The distributed switch has four ESXi hosts, and each host has two 10 Gbps NICs.
  • In the Network I/O Control configuration, the amount of bandwidth reserved for virtual machine (VM) traffic if 4 Gbps.

The administrator wants to guarantee that VMs in the Retail distributed port group can access 50 percent of the available reserved bandwidth for VM traffic.

Given this scenario, what should the size (in Gbps) of the Retail network resource pool be?
A. 40
B. 32
C. 8
D. 16

A

16

100
Q

An environment has the following configuration:

  1. Resource Pool “RP-MOM” has a reservation of 6GHz and one running virtual machine (VM) “VM-M1” with 1 GHz reserved.
  2. Resource Pool “RP-KID” has a reservation of 2GHz, and expandable reservations is activated.

The administrator creates two VMs, “VM-K1” and “VM-K2”, in the “RP-KID” resource pool with 2GHz reserved for each, and turns on “VM-M1.”

Given this scenario, which statement is true?

A. The administrator must deactivate expandable reservations to turn on VM-K2.
B. The administrator can create a third VM (“VM-K3”) at RP-KID and reserve 6GHz.
C. VM-K2 can be powered on because it can get the resources needed from RP-MOM.
D. VM-K2 cannot be powered on because there are not enough resources in RP-KID.

A

VM-K2 can be powered on because it can get the resources needed from RP-MOM.

101
Q

An administrator is tasked with adding new capacity to an existing software-defined data center (SDDC).

  • The SDDC currently hosts two vSphere clusters (ClusterA and ClusterB) with different CPU compatibilities.
  • vSphere vMotion and vSphere Distributed Resource Scheduler (DRS) are currently in use in the SDDC.
  • The new capacity will be implemented by provisioning four ESXi hosts running a new generation of Intel Skylake CPUs.
  • All workload virtual machines (VMs) must support live migration to any cluster in the SDDC.

The administrator noticed the running critical “evc1” virtual machine (VM) shown in the exhibit is not migrating using vSphere vMotion to the original Clusters A or B.

Which three steps must the administrator take to support this functionality? (Choose three.)

A. Disable the Enhanced vMotion Compatibility (EVC) on the VM.
B. Reboot the VM.
C. Configure the Enhanced vMotion Compatibility (EVC) on the VM to Intel Skylake.
D. Power on the VM.
E. Configure the Enhanced vMotion Compatibility (EVC) on vSphere Cluster A and B to support Intel Skylake.
F. Power off the VM.

A

Disable the Enhanced vMotion Compatibility (EVC) on the VM.

Power on the VM.

Configure the Enhanced vMotion Compatibility (EVC) on vSphere Cluster A and B to support Intel Skylake.

102
Q

An administrator has a requirement to revert a running virtual machine to a previous snapshot after a failed attempt to upgrade an application. When the administrator originally took the snapshot, the following choices in the Take Snapshot dialog were made:

  • Snapshot the virtual machine’s memory = false
  • Quiesce guest file system = false

What will be the result of the administrator selecting the “Revert to Latest Snapshot” option to return the virtual machine to a previous snapshot? (Choose two.)

A. The virtual machine will be restored to the parent snapshot
B. The virtual machine will be restored in a powered off state.
C. The virtual machine will be restored to the child snapshot
D. The virtual machine will be restored in a powered on state.
E. The virtual machine will be restored in a suspended state.

A

The virtual machine will be restored to the parent snapshot
The virtual machine will be restored in a powered off state.