Which native feature could be used to protect virtual machine files and disks containing confidential customer data?

Which native feature could be used to protect virtual machine files and disks containing confidential customer data?A . VMware ToolsB . vCenter HAC . VM encryptionD . VDPView AnswerAnswer: C

January 3, 2021 No Comments READ MORE +

Which two actions should an administrator take to identify why DRS is unable to satisfy the affinity rules?

VMs are violating affinity rules and DRS is unable to correct the rules violations. Which two actions should an administrator take to identify why DRS is unable to satisfy the affinity rules? (Choose two.)A . Review VM Overrides tab.B . Review systems logs.C . Review if violated rules are in...

January 3, 2021 No Comments READ MORE +

A vCenter High Availability cluster consists of how many vCenter Server Appliance instances?

A vCenter High Availability cluster consists of how many vCenter Server Appliance instances?A . 2B . 3C . 4D . 5View AnswerAnswer: B

January 3, 2021 No Comments READ MORE +

How is vCenter HA different from vSphere HA?

How is vCenter HA different from vSphere HA?A . vCenter HA requires only an active and passive node.B . vCenter HA requires an external Platform Services Controller.C . vCenter HA requires Fault Tolerance.D . vCenter HA requires an active, passive, and witness node.View AnswerAnswer: D

January 2, 2021 No Comments READ MORE +

What can the administrator enable for the lowest possible downtime?

An administrator is deploying a new mission critical database. The database requirements are 12 vCPUs and 24GB of RAM. What can the administrator enable for the lowest possible downtime?A . DRSB . vSphere replicationC . fault toleranceD . proactive HAView AnswerAnswer: D

January 2, 2021 No Comments READ MORE +

Which two items should be deployed at the second site?

An administrator configures vSphere Replication for a DR site. Which two items should be deployed at the second site? (Choose two.)A . array-based storageB . vSphere Replication applianceC . vCenter ServerD . vSphere Distributed Switch (VDS)E . vSphere Data Protection (VDP)View AnswerAnswer: B,C

January 2, 2021 No Comments READ MORE +

What is required for host attestation to secure the hypervisor?

What is required for host attestation to secure the hypervisor?A . VM encryptionB . CHAPC . TPM 2.0 chipD . KMS serverView AnswerAnswer: C Explanation: https://docs.vmware.com/en/VMware­vSphere/6.7/com.vmware.vsphere.security.doc/GUID-10F7022C-DBE1-47A2-BD86­3840C6955057.html

January 2, 2021 No Comments READ MORE +

What are two potential disadvantages of this configuration?

A VSS is configured with two uplinks and assigned a load balancing policy route based on a virtual port ID. What are two potential disadvantages of this configuration? (Choose two.)A . A VM with a single MAC address is limited to the speed of the uplink associated with the relevant...

January 2, 2021 No Comments READ MORE +

Which option in cmsso-util will achieve this?

A vSphere Administrator wants to move a vCenter Server with an external Platform Services Controller from one SSO domain to another SSO domain. Which option in cmsso-util will achieve this?A . domain-repointB . reconfigureC . unregisterD . repointView AnswerAnswer: A

January 1, 2021 No Comments READ MORE +

How is the Publish this content library externally option made visible in the settings?

A vSphere administrator is trying to publish a content library. How is the Publish this content library externally option made visible in the settings?A . Enable automatic synchronization.B . Use a library that is not already published.C . Select the authentication check box.D . Choose a library that is not...

January 1, 2021 No Comments READ MORE +