Practice Exam Q&A

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

You need to configure an ESXi 7.0 host to access shared NVMe devices using RDMA over Converged Ethernet (RoCE) Version 2. Which steps should you take?

- Add a software adapter to the host's storage adapters - Configure VMkernel network adapter - Navigate to Networking > RDMA Adapaters and verify the VMkernel adapter bindings

Which of the following can be modified during the conversion of a physical machine to a virtual machine? (Select two)

- Change automatic services to be disabled - Resize two hard drives, by making one larger and the other smaller

Which two steps would an administrator complete when configuring vCenter Server High Availability using the vSphere Client?

- Choose the data replication network for Active, Passive, Witness nodes - Indicate that the Passive and Witness nodes have been manually created

You are planning to install vCenter Server 7.0 and want to use the GUI Installer. Which of the following is a supported location from which to run the installer?

- Mac - Windows

You are configuring teaming policies in your vSphere 7.0 environment. Which of the following teaming options are not available for a vSS?

- Route Based on Physical NIC load

You are preparing to configure vVols in a vSphere 7.0 environment. Which of the following components should you configure in the storage system?

- Storage containers - Protocol endpoints

An administrator is tasked with upgrading an existing vSphere environment to version 7.0. The current configuration is using an external Platform Services Controller. Which two statements are true regarding this upgrade?

- The external Platform Services Controller needs to be decommisioned following the deployment of the new vCenter Server Appliance - The external Platform Service Controller needs to be converged into an embedded vCenter Server Appliance

What are two functions of vSphere Lifecycle Manager?

- Update ESXi hosts in a cluster using baselines - Upgrade VMware Tools and VM hardware

Which two configuration tasks must be performed from the vCenter Server Management Interface?

-Enable SSH login -Add an Network Time Protocol (NTP Server)

What are 3 supported ESXi 7 boot options?

-Software FCoE - SAN -iSCSI SAN

Which two VMware features are supported in a virtual machine using Intel Software Guard Extensions (Intel SGX) technology?

-VM Encryption -Storage I/O Control

What stores the ESXi certificates?

/etc/vmware/ssl Stored locally on each host

Each logical port on a vSphere standard switch can be a member of how many port groups?

1

How many vSphere Trust Authority Clusters can a Trusted Cluster reference?

1

What are the memory share values for a virtual machine by default?

10 shares per MB of configured RAM

You are configuring SIOC and want to change the threshold it uses to begin prioritizing I/O based on shares. Which of the following options is the acceptable range?

10 to 100 ms

You are preparing to import certificates for your vSphere environment. Which of the following is not a requirement?

1024 - to 16, 384-bit keys

You are configuring a hybrid vSAN cluster in a vSphere 7.0 environment. By default, what percentage of the flash space is used as a write buffer?

30%

You want to leverage LAGs with your vDS. Which of the following is supported?

40 LAGs on a signle distributed switch

Using NIOC, you reserved 1.0 Gbps for virtual machine system traffic on a distributed switch with eight 10 Gbps uplinks. If you reserve 512 Mbps for a network resource pool, what is the maximum reservation you can set in another network resource pool?

7.5 Gbps

What is the minimum host memory that VMware recommends for a production environment?

8 GB

What is a minimum disk controller requirement for VMware vSAN?

A disk controller in pass-through or RAID 0 mode

Which of the following is a requirement for guest OS customization?

A supported gues OS installed on SCSI node 0:0 Guest OS customization requires a supported guest OS installed on SCSI node 0:0 and VMware Tools

What happens to VMs inside a resource pool when the resource pool is deleted?

All VMs inside the pool are placed in the parent pool

What is the minimum CPU core requirement for successful installation, or upgrade, of ESXi on a host?

At least 2 cores

You want to enable a vDS health check for virtual switch teaming. Which of the following is a requirement?

At least two active NICs and two hosts The required vDS configuration for the virtual switch teaming policy health check is at least two active physical NICs and two hosts.

You are preparing to leverage VAAI in your vSphere environment. Which of the following primitives will not be available for your virtual machines stored in NFS datastores?

Atomic Test and Set

You are responsible for performing certificate management for your ESXi hosts. Which of the following privileges do you need?

Certificates.Manage.Certificates

What can the administrator do to make sure the alarm is triggered when there is an actual CPU performance issue?

Change "is below" to "is above"

What is a pre-requisite for configuring virtualization-based security (VBS)?

Change the firmware type from Legacy BIOS to UEFI

You want to control the host compatibility for your virtual machines at various levels of the inventory. On which of the following objects can you set the Default VM Compatibility option?

Cluster

What is the basic packaging for vSphere Installation Bundles (VIBs) and metadata in vSphere Lifecycle Manager?

Component

You are enabling direct ESXi access using local accounts. To change the password requirements, such as minimum length, which of the following steps should you take?

Configure Security.PaswordQualityControl

An administrator wants to be able to log in to the vSphere Client and view the inventories of two vCenter Server instances. What must the administrator do to meet this requirement?

Connect each vCenter Server instance to the same vCenter Sing-On domain during the deployment

A vSphere environment is using vSAN for all of its storage and consists of 4 blade chassis with multiple ESXi hosts per bladechassis. Which of the following would allow an entire blade chassis to fail, and still ensure all of the VM files are available to restart the VMs that were on the ESXi hosts in the failed blade chassis?

Create 4 fault domains: one for all hosts in each blade chassis

You are configuring vSphere HA in a cluster. You want to configure the cluster to use a specific host as a target for failovers. Which setting should you use?

Define Host Failover Capacity By set to Dedicated failover Hosts

How could the administrator renew VMware Certificate Authority-assigned certificates to the ESXi hosts?

Disconnect the ESXi hosts and reconnect them to vCenter Server

You configured an ESXi host with a TPM 2.0 chip and enabled UEFI Secure Boot. During the boot, you get the message "No cached identity key, loading from DB." What should you do?

Disconnect the host from the vCenter Server and reconnect If the "Host secure boot was disabled" message appears in the vSphere Client, you must re-enable Secure Boot to resolve the problem.

Which option should you choose to minimize the time required to create a virtual machine snapshot?

Do not quiesce the file system or snapshot the memory

You are configuring vSAN in a vSphere 7.0 environment. Which of the following is supported when using Quickstart to configure a vSAN cluster?

ESXi 6.5.0

You want to create a virtual machine that can use up to 4096 MB video memory. Which compatibility option should you choose?

ESXi 7.0

An administrator receives an escalation to investigate a low disk space alarm on a datastore. The administrator discovers that a snapshot has been accidentally taken on a production, write-intensive database server. The snapshot has grown to nearly 1 TB in size in less than an hour and continues growing every second. Which behavior should the administrator expect while deleting the snapshot?

ESXi will commit the snapshot delta disk into the base disk; ongoing database write activity could result in long stun time

In your vSphere 7.0 environment, you want to export a virtual machine for portability to other systems. Which approach should you use?

Export to OVF

You are configuring Virtual Machine Component Protection (VMCP) in a vSphere HA cluster. Which of the following statements is true?

For APD failures, you can control the restart policy for virtual machines by setting it to Conservative or Aggressive

What is the MINIMUN virtual machine hardware version that supports 64 virtual cores?

Hardware version 9 (ESXi 5.1 or later)

You are concerned about service availability for your vCenter Server. Which of the following statements is true?

If a vCenter service fails, LCM restarts it

You are planning to implement a vSAN stretched cluster. Which of the following statements is true?

If you set PFFT to 0, you may be able to use SMP-FT

You want to tag voice over IP data in your vSphere environment. Which step should you take?

Implement a rule with Action=Tag

You want to configure predictive DRS in your vSphere cluster. Which of the following is a requirement?

In the vRealize Ops, set provide data to vSphere Predicitve DRS to True

You need to use encryption in your vSphere environment. Which of the following should you use to configure a trust relationship between a KMS and vCenter?

In the vSphere CLient, select the vCenter Server and choose Configuration > Key Management Servers

You are configuring virtual networking in your vSphere 7.0 environment. Which of the following policies are available for distributed switches but not for standard switches?

Inbound traffic shaping

Which step can an administrator take so that vSphere can access patch information if vCenter Server does NOT have Internet access?

Install VMware vSphere Update Manager Download Service on a Linux server

A development team has a recurring need to rapidly replicate hundreds of virtual machines (VMs) for load testing. Which method should the team use to deploy the VMs?

Instant clones using the vSphere API

You are enabling VM Monitoring in a vSphere HA cluster. You want to set the monitoring level such that its failure interval is 60 seconds. Which of the following options should you choose?

Medium

You are creating a resource pool in a vSphere DRS cluster. Which of the following is a default setting?

Memory Reservation is 0

You want to control the use of NetFlow within your distributed switch. Which type of network policy should you implement?

Monitoring

In your vSphere 7.0 environment, you are using the Datastore Browser to perform administrative tasks. Which of the following options is not available in the Datastore Browser?

Mount

You are configuring EVC Mode in a vSphere cluster that uses Intel hardware. Which of the following values should you choose to set the EVC Mode to the lowest level that includes the SSE4.2 instruction set?

Nehalem

What determines the default bandwidth share allocation for system traffic, such as vSphere Fault Tolerance and vSphere vMotion?

Network I/O Control version

You plan to deploy vSphere 7.0 and want to minimize virtual machine downtime by proactively detecting hardware failures and placing the host in quarantined or maintenance mode. What feature do you need?

Proactive HA

An administrator is asked to deploy a virtual machine (VM) that can sniff packets for the Security team. Which setting must be set to "accept" on the VM's port group?

Promiscous mode

You need to configure a virtual machine to utilize N-Port ID Virtualization (NPIV). Which of the following is required?

RDM An RDM is a mapping file containing metadata that resides in a VMFS datastore. NPIV requires the use of virtual machines with RDMs

You want to enable passthrough for a network device on your ESXi host. You see that an orange icon is associated with a device. Which of the following actions should you take?

Reboot the host

You are troubleshooting a virtual machine by using the vSphere Client. Which of the following is not a valid debugging and statistics advanced setting?

Record Trivial You can set debugging and statistics to run normally, record debugging information, record statistics, or record statistics and debugging.

A host profile is updated with a new password that urgently needs to be changed on all hosts attached to the host profile. Which option would an administrator select to complete the password change?

Remediate

You are using the vSphere Client to manage the storage providers. Which one of the following is not an option?

Replace When using the vSphere Client to manage the storage providers, you can select a storage provider and choose Synchronize Storage Providers, Rescan, Remove, or Refresh Certificate.

What can an administrator use to partition limited CPU and memory resources between two departments?

Resource Pools

A user reports that he cannot migrate a VM with vMotion. You determine that the problem is due to insufficient permissions. Which of the following privileges must the user be granted?

Resource>Assign Virtual Machine to Resource Pool on the destination ESXi host, cluster or resource pool

You are preparing to manage and troubleshoot a vSAN environment. Which of the following is a command-line interface that provides a cluster-wide view and is included with the vCenter Server deployment?

Ruby vSphere Console Ruby vSphere Console (RVC) is a command-line interface used for managing and troubleshooting vSAN. RVC provides a cluster-wide view and is included with the vCenter Server deployment.

You are planning the backup and recover for a new vCenter Server appliance using the file based backup feature in the vCenter Server Appliance Management Interface. Which protocol is not supported?

SCP

You want to address an application's sensitivity to network latency by implementing a technology that presents a physical device with multiple virtual functions. Which one of the following should you implement?

SR-IOV Single Root I/O Virtualization (SR-IOV) is a feature that allows a single Peripheral Component Interconnect Express (PCIe) device to appear as multiple devices. It is useful for supporting an application in a guest OS that is sensitive to network latency. SR-IOV-enabled devices provide virtual functions (VFs) to the hypervisor or guest operating system.

You are preparing to deploy and manage a vSphere environment. Which vCenter Server component provides Security Assertion Markup Language (SAML) tokens?

STS The STS service issues Security Assertion Markup Language (SAML) tokens. These security tokens represent the identity of a user in one of the identity source types supported by vCenter Single Sign-On.

An administrator sees that a virtual machine named "Server1" has a Distributed Resource Scheduler (DRS) score of 25%

Server1 is experiencing high resource contention

You plan to deploy vSphere 7.0 for three ESXi hosts and want to deploy the minimum vCenter Server edition that supports vMotion. Which Center Server edition do you choose?

Standard

You are explaining how vSphere interacts with storage systems. Which of the following steps may occur when VMware NMP receives an I/O request?

The PSP issues the I/O request on the appropriate physical path

In a vSphere High Availability (vSphere HA) cluster, which action does vSphere HA take when the VM Monitoring service does NOT receive heartbeats from a virtual machine (VM) in the cluster?

The VM is restarted on the same host in the cluster

You want to upgrade a vCenter Server 6.7 instance and External PSC to version 7.0.

The vCenter Server 7.0 instance is using an embedded PSC

Which virtual disk configuration provides the best performance for the guest OS?

Thick-Eager Zeroed It is the slowest method if virtual disk creation but it is the best for guest performance

In which scenario would a vSphere administrator consider implementing CPU limits?

To define the max amount of CPU that a virtual machine could consume

Which of the following is not a good use for resource pools in DRS?

To impact the use of network resources Resource pools are container objects in the vSphere inventory that are used to compartmentalize the CPU and memory resources of a host, a cluster, or a parent resource pool. You can delegate control over each resource pool to specific individuals and groups

You want to implement network security policies at the lowest available level. Which approach should you choose?

Use the distributed switch and apply policies on the individual ports At the distributed port level, you can override policies applied to the distributed port group and apply unique policies to a distributed port.

vCenter Server experiences a catastrophic failure and the administrator must restore from a vCenter Server backup stored on an FTP server. What must the administrator do to restore vCenter Server?`

Use the vCenter Server GUI installer to deploy a vCenter Server instance and restore the vCenter Server data from the backup

You want to integrate vSphere with your storage system. Which of the following provides software components that integrate with vSphere to provide information about the physical storage capabilities?

VASA A software component that integrate with vSphere to provide information about the physical storage capabilities

Which of the following is used to store Vcenter certificates?

VECS

In your vSphere environment where VASA is not implemented, you are planning to leverage storage policies associated with devices in your storage array. Which type of storage policies should you create?

VM Storage policy for tag-based placement

You are deploying datastores in a vSphere environment and want to use the latest VMFS version that supports ESXi 6.5 and ESXi 7.0. Which version should you use?

VMFS Version 6

What of the following is the default path selection policy for most active/passive storage devices?

VMW_PSP_MRU MRU is the default path selection policy for most active/passive storage devices

An administrator wants to enable bandwidth allocation for workloads by using Network I/O Control. What should the administrator configure to accomplish this?

Virtual machine traffic

You want to increase the size of a VMFS 6 datastore. Which one of the following statements is true?

You can expand the datastore by using available space on the storage device that is backing the datastore

You are configuring NFS datastores for your vSphere 7.0 environment. Which one of the following statements is true?

You can use multiple IPs with NFS version 4.1 but not 3

You want to be able to use the vSphere Client to identify the non-Cisco physical switch connected to a virtual switch uplink. Which of the following should you implement?

a vDS with LLDP

An administrator is trying to configure vCenter Single Sign-On from the vSphere Client but does NOT have permission. Which role is required in order to configure vCenter Single Sign-On?

vCenter Single Sign-On Administrator

Which of the following products provide the automation, orchestration, and operations layer for an on-premise VMware SDDC?

vRealize Suite

What is the foundation of a software-defined data center (SDDC)?

vSphere

Which feature is a prerequisite for Proactive High Availability (HA)?

vSphere Distributive Resource Scheduler (DRS)

Which feature can an administrator configure to have a copy of critical virtual machines in another cluster?

vSphere Replication

You want to create a custom TCP/IP stack for your ESXi 7.0 server. Which one of the following is an available service that you can directly enable for the stack?

vSphere Replication NFC The available services for a custom stack are Management, vMotion, IP-based storage, Provisioning, Fault Tolerance logging, vSphere Replication, vSphere Replication NFC, and vSAN.

You plan to implement vSphere 7.0 and use vSphere Fault Tolerance to protect virtual machines with two vCPUs. Which is the minimum vSphere Edition that you need?

vSphere Standard and Enterprise

What command could be run to gather the logs directly from the ESXi shell (or SSH)?

vm-support

You are examining vSphere logs. Which of the following logs is in the same folder as the virtual machine configuration file?

vmware.log


Kaugnay na mga set ng pag-aaral

psychology chapter 1.2 setting the context

View Set

Module 08: Intravenous Fluid Therapy

View Set

CS 356 - Introduction to Computer Networks

View Set

IH 490: Module 1- Intro to hazardous material

View Set