What should the vSphere administrator use to meet this requirement?
A vSphere administrator is working in a high security environment. The administrator wants to ensure unencrypted VMs can be migrated securely. What should the vSphere administrator use to meet this requirement?A . vTPMB . UEFI Secure BootC . KMS ServerD . encrypted vSphere vMotionView AnswerAnswer: D Explanation: Reference: https://docs.vmware.com/en/VMware-vSphere/6.7/com.vmware.vsphere.security.doc/GUIDÂ6865D84A-C286-49C4-A4D4-D62145150242.html
Which two options are available during the installation process?
An administrator is installing a Platform Services Controller Instance. Which two options are available during the installation process? (Choose two.)A . choose deployment sizeB . specify vSphere administrator credentialsC . enable Enhanced Linked ModeD . create a vCenter Single sign-on domainE . join an existing domainView AnswerAnswer: DE Explanation: Reference:...
What size is .vswp file when the VM is powered on?
A vSphere administrator creates a VM with 2 vCPUs and 4GB memory. A 3GB memory reservation is applied to the VM. What size is .vswp file when the VM is powered on?A . 1GBB . 2GBC . 3GBD . 4GBView AnswerAnswer: A
Which two features should an administrator use to protect a VMware vCenter Server Appliance from host and hardware failures? (Choose two.)
Which two features should an administrator use to protect a VMware vCenter Server Appliance from host and hardware failures? (Choose two.)A . VMware Distributed Power ManagementB . vCenter High AvailabilityC . vSphere High AvailabilityD . vSphere Fault ToleranceE . VMware vSphere Distributed Resource SchedulerView AnswerAnswer: BD
What are two potential disadvantages of this configuration?
A VSS is configured with two uplinks and assigned a load balancing policy route based on a virtual port ID. What are two potential disadvantages of this configuration? (Choose two.)A . A VM with a single MAC address is limited to the speed of the uplink associated with the relevant...
What is the most secure way to configure the firewall rule?
An administrator is using vSphere Web Client to configure the firewall to allow specific third-party application SSH access to an ESXi Host. What is the most secure way to configure the firewall rule?A . Specify remote IP subnet range in IP List.B . Use Allow connection from any IP address.C...
What is a benefit of using resource pools?
What is a benefit of using resource pools?A . Increased visibility of user activityB . Increased vMotion efficiency for a set of VMsC . Increased accuracy for proactive resources for a set of VMsD . Increased ease of reserving resources for a set of VMsView AnswerAnswer: D
How is vCenter HA different from vSphere HA?
How is vCenter HA different from vSphere HA?A . vCenter HA requires only an active and passive node.B . vCenter HA requires an external Platform Services Controller.C . vCenter HA requires Fault Tolerance.D . vCenter HA requires an active, passive, and witness node.View AnswerAnswer: D Explanation: Reference: https://nolabnoparty.com/en/vmware-vcenter-high-availability-setup-pt-1/
Which permission should be granted to a user with Administrator permission and with no access to the encrypted VM console?
Which permission should be granted to a user with Administrator permission and with no access to the encrypted VM console?A . New role with no Cryptographic OperationsB . Administrator role and Read Only RoleC . Administrator roleD . No Cryptography Administrator roleView AnswerAnswer: D Explanation: Reference: https://docs.vmware.com/en/VMware-vSphere/6.7/com.vmware.vsphere.security.doc/GUIDÂ17568345-E59E-43A8-A811-92F8BE9C7719.html#GUID-17568345-E59E-43A8-A811-92F8BE9C7719
Which vSphere feature is designed to distribute space usage and I/O load across multiple datastores?
Which vSphere feature is designed to distribute space usage and I/O load across multiple datastores?A . Storage PoliciesB . vStorage API for Array IntegrationC . Storage I/O ControlD . vSphere Storage DRSView AnswerAnswer: C