What is a pre-requisite for increasing datastore capacity? (Choose the best answer.)
What is a pre-requisite for increasing datastore capacity? (Choose the best answer.)A . The backing device for the datastore has enough free space.B . The datastore is managed by Storage DRS (SDRS).C . The datastore is 100% full.D . There are NO powered-on virtual machines on the datastore.View AnswerAnswer: A...
Which role is required in order to configure vCenter Single Sign-On?
An administrator is trying to configure vCenter Single Sign-On from the vSphere Client but does NOT have permission. Which role is required in order to configure vCenter Single Sign-On? (Choose the best answer.)A . vCenter Single Sign-On AdministratorB . vCenter AdministratorC . vCenter Server Appliance RootD . vCenter Power UserView...
Which type of network adapter is designed to provide connectivity to hosts and handle the standard system traffic of vSphere vMotion? (Choose the best answer.)
Which type of network adapter is designed to provide connectivity to hosts and handle the standard system traffic of vSphere vMotion? (Choose the best answer.)A . VMkernel portB . VXLAN virtual tunnel end point (VXLAN VTEP)C . Virtual machine network interface card (VMNIC)D . VM networkView AnswerAnswer: A Explanation: Reference:...
What is the effective role the test1 account has on the Finance01 virtual machine?
Refer to the exhibit. What is the effective role the test1 account has on the Finance01 virtual machine? (Choose the best answer.)A . No accessB . AdministratorC . Read-onlyD . Virtual machine userView AnswerAnswer: A Explanation: https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.security.doc/GUID-72EE3449-79FD-4E7A-B164-26904958540F.html
What is the minimum CPU core requirement for successful installation, or upgrade, or ESXi on a host? (Choose the best answer.)
What is the minimum CPU core requirement for successful installation, or upgrade, or ESXi on a host? (Choose the best answer.)A . 8B . 1C . 32D . 2View AnswerAnswer: D Explanation: Reference: https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.esxi.upgrade.doc/GUID-DEB8086A-306B-4239-BF76-E354679202FC.html
Which step must the administrator take to meet this requirement?
An administrator wants to be able to send vCenter Server log files to a remote syslog server and analyze logs using vRealize Log Insight. Which step must the administrator take to meet this requirement? (Choose the best answer.)A . Configure the vCenter Server logging options using the vSphere Client.B ....
Which two components are core to vSphere? (Choose two.)
Which two components are core to vSphere? (Choose two.)A . ESXiB . vSANC . vCenter ServerD . vRealize Network InsightE . vRealize Operations ManagerView AnswerAnswer: A,C Explanation: Reference: https://docs.vmware.com/en/VMware-vSphere/6.7/com.vmware.vsphere.vcenterhost.doc/GUID-302A4F73-CA2D-49DC-8727-81052727A763.html
What is the minimum number of ESXi hosts required to enable this capability?
vCenter High Availability (HA) protects vCenter Server against host and hardware failures. What is the minimum number of ESXi hosts required to enable this capability? (Choose the best answer.)A . 5B . 7C . 1D . 3View AnswerAnswer: D Explanation: Reference: https://docs.vmware.com/en/VMware-vSphere/7.0/vsphere-esxi-vcenter-server-70-availability-guide.pdf (73)
Which component encrypts the virtual machine files?
An administrator wants to implement virtual machine encryption. Which component encrypts the virtual machine files? (Choose the best answer.)A . CertificateB . Data encryption key (DEK)C . Key encryption key (KEK)D . Key management server (KMS)View AnswerAnswer: B,C Explanation: Reference: https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/techpaper/vm-encryption-vsphere65-perf.pdf
Which setting must be set to “accept” on the VM’s port group?
An administrator is asked to deploy a virtual machine (VM) that can sniff packets for the Security team. Which setting must be set to “accept” on the VM’s port group? (Choose the best answer.)A . Promiscuous modeB . Forged transmitsC . MAC address changesD . Traffic shapingView AnswerAnswer: A Explanation:...