Which two conditions should be verified before removing the ESXi host from a vSAN cluster? (Choose two.)
Which two conditions should be verified before removing the ESXi host from a vSAN cluster? (Choose two.)A . Data evacuation is complete.B . Encryption is disabled.C . ESXi host is in maintenance mode.D . Resyncs are running.E . All objects are currently healthy.View AnswerAnswer: CE Explanation: Reference: https://vsan-essentials.gitbooks.io/vsan-6-2/content/chapter7.html
What is the purpose of slack space in vSAN?
What is the purpose of slack space in vSAN?A . Increases overall vSAN capacityB . Allows for maintenance and failure operationsC . Stores vSphere HA heartbeatsD . Provides vSAN analytic dataView AnswerAnswer: B Explanation: Reference: https://storagehub.vmware.com/t/vmware-vsan/vmware-r-vsan-tm-design-and-sizing-guide-2/how-much-slack-space-should-i-leave-1/
Which vCenter Server role ensures only authorized vSphere administrators have access to encryption functionality?
An organization is no longer compliant with security requirements because a vSphere administrator disabled encryption on a vSAN cluster. Which vCenter Server role ensures only authorized vSphere administrators have access to encryption functionality?A . AdministratorB . Read-onlyC . No cryptography administratorD . No accessView AnswerAnswer: C Explanation: Reference: https://docs.vmware.com/en/VMware-vSphere/6.5/com.vmware.vsphere.security.doc/GUIDÂ6C181D08-6650-4AD1-92D1-AAFDA3A3E38C.html
What must be considered when configuring the new vSAN cluster?
An administrator is planning to deploy a new vSAN cluster with these requirements: - Physical adapters will share capacity among several traffic types - Guaranteed bandwidth for vSAN during bandwidth contention - Enhanced security and performance What must be considered when configuring the new vSAN cluster?A . Isolate traffic in...
What are two purposes of a vSAN storage policy? (Choose two.)
What are two purposes of a vSAN storage policy? (Choose two.)A . Determine how storage objects are provisionedB . Determine vSAN encryption levelC . Guarantee the required level of serviceD . Enable deduplication and compressionE . Enable TRIM/UNMAPView AnswerAnswer: AC Explanation: Reference: http://www.vmwarearena.com/understanding-vmware-virtual-san-storage-policies-detailedÂview/
Which factor should be included in the design to improve read performance?
A vSAN administrator is designing a new all-flash vSAN cluster. The cluster will host read intensive applications. Which factor should be included in the design to improve read performance?A . Multiple disk groupsB . Large capacity disksC . Large cache disksD . Large controller cacheView AnswerAnswer: A Explanation: Reference: https://vsan-essentials.gitbooks.io/vsan-6-2/content/chapter4.html
Assuming all other disks have not suffered from a hardware failure, why would vSAN mark all disks in the group as failed?
A single disk in a vSAN disk group suffers from an unrecoverable hardware failure. This causes vSAN to set the health status for all disks in the group to Permanent disk loss, indicating disk failure. Assuming all other disks have not suffered from a hardware failure, why would vSAN mark...
Which two storage policies can the cluster satisfy?
An all-flash vSAN cluster contains four nodes. Which two storage policies can the cluster satisfy? (Choose two.)A . FTT=2 (RAID-1 Mirroring)B . FTT=2 (RAID-6 Erasure Coding)C . FTT=1 (RAID-1 Mirroring)D . FTT=1 (RAID-5 Erasure Coding)E . FTT=3 (RAID-1 Mirroring)View AnswerAnswer: CD
What is the maximum number of nodes possible for this solution?
You are designing a vSAN stretched cluster solution. What is the maximum number of nodes possible for this solution?A . 15 per data site + 1 witness hostB . 30 per data site + 1 witness hostC . 32 per data site + 1 witness hostD . 64 per data...
Which VM file type resides in the VM home namespace object on a vSAN datastore?
Which VM file type resides in the VM home namespace object on a vSAN datastore?A . .vswpB . .vmsnC . .vmxD . .vmemView AnswerAnswer: C Explanation: Reference: https://vsan-essentials.gitbooks.io/vsan-6-2/content/chapter6.html