Question 17 ( Exam A )
An administrator is tasked with moving an application and guest operating system (OS) running on top of a physical server to a software-defined data center (SDDC) in a remote secure location.
The following constraints apply:
The remote secure location has no network connectivity to the outside world.
The business owner is not concerned if all changes in the application make it to the SDDC in the secure location.
The application’s data is hosted in a database with a high number of transactions.
What could the administrator do to create an image of the guest OS and application that can be moved to this remote data center?
- A. Create a hot clone of the physical server using VMware vCenter Converter.
- B. Create a cold clone of the physical server using VMware vCenter Converter.
- C. Restore the guest OS from a backup.
- D. Use storage replication to replicate the guest OS and application.
Answer : B
Question 18 ( Exam A )
An administrator is tasked with configuring an appropriate Single Sign-On (SSO) solution for VMware vCenter based on the following criteria:
The solution should support the creation of Enhanced Link Mode groups.
All user accounts are stored within a single Active Directory domain and the solution must support only this Active Directory domain as the identity source.
All user account password and account lockout policies must be managed within the Active Directory domain.
The solution should support token-based authentication.
Which SSO solution should the administrator choose based on the criteria?
- A. vCenter Identity Provider Federation with Active Directory Federation Services as the identity provider
- B. vCenter Single Sign-On with Active Directory over LDAP as the identity source
- C. vCenter Single Sign-On with Active Directory (Windows Integrated Authentication) as the identity source
- D. vCenter Identity Provider Federation with Active Directory over LDAP as the identity provider
Answer : C
Question 19 ( Exam A )
An administrator is tasked with looking into the disaster recovery options for protecting a database server using VMware vSphere Replication.
The following requirements must be met:
The virtual machine must remain online during the protection.
The virtual machine's snapshots must be used as part of the replication process.
Which step must the administrator complete to accomplish this task?
- A. Configure the virtual machine storage policy.
- B. Enable guest OS VSS quiescing for this virtual machine.
- C. Perform a full initial synchronization of the source virtual machine to the target location.
- D. Configure network traffic isolation for vSphere Replication.
Answer : B
Question 20 ( Exam A )
An administrator must gracefully restart a virtual machine (VM) through the vSphere Client but the option is greyed out. The administrator has full administrative access on VMware vCenter and all the objects available in vCenter, but has no access to log onto the operating system.
Which action should the administrator take to meet the objective?
- A. Upgrade the virtual hardware
- B. Migrate the VM to another host
- C. Install VMware Tools
- D. Restart vCenter
Answer : B
Question 21 ( Exam A )
An administrator is tasked with installing VMware vCenter. The vCenter Server Appliance must support an environment of:
400 hosts
4000 virtual machines
Which two resources must be allocated, at a minimum, to meet the requirements? (Choose two.)
- A. 16 vCPUs
- B. 30 GB Memory
- C. 4 vCPUs
- D. 8 vCPUs
- E. 20 GB Memory
Answer : BD
Question 22 ( Exam A )
Which VMware offering will allow an administrator to manage the lifecycle of multiple vCenter Server instances in a single software as a service (SaaS)-based solution to help drive operational efficiency?
- A. VMware vSphere with Tanzu
- B. VMware Cloud Foundation
- C. VMware vSphere+
- D. VMware Aria Suite Lifecycle
Answer : B
Question 23 ( Exam A )
Which feature would allow for the non-disruptive migration of a virtual machine between two clusters in a single VMware vCenter instance?
- A. vSphere vMotion
- B. Cross vCenter Migration
- C. vSphere Storage vMotion
- D. vSphere Fault Tolerance
Answer : B
Question 24 ( Exam A )
Which four elements can a vSphere Lifecycle Manager image contain? (Choose four.)
- A. ESXi base image
- B. ESXi configuration
- C. Vendor agents
- D. Vendor add-ons
- E. BIOS updates
- F. Firmware and drivers add-on
- G. Independent components
Answer : ABEF
Question 25 ( Exam A )
If a distributed switch uses the “Route based on physical NIC load” load balancing algorithm, what does the mean send or receive utilization of an uplink need to exceed for the flow of traffic to move to the second uplink?
- A. 75 percent of the capacity over a 30 second period
- B. 60 percent of the capacity over a 30 second period
- C. 60 percent of the capacity over a 40 second period
- D. 75 percent of the capacity over a 40 second period
Answer : B
Question 26 ( Exam A )
An administrator manually configures a reference ESXi host that meets company security standards for vSphere environments. The administrator now needs to apply all of the security standards to every identically configured host across multiple vSphere clusters within a single VMware vCenter instance.
Which four steps would the administrator complete to meet this requirement? (Choose four.)
- A. Extract the host profile from the reference host.
- B. Export the host profile from vCenter.
- C. Import host customization on the reference host.
- D. Attach the host profile to each cluster that requires the secure configuration.
- E. Check the compliance of each host against the host profile.
- F. Reset host customization on the reference host.
- G. Remediate all non-compliant hosts.
Answer : ADEG
Question 27 ( Exam A )
After a recent unexplained peak in virtual machine (VM) CPU usage, an administrator is asked to monitor the VM performance for a recurrence of the issue.
Which two tools can the administrator use? (Choose two.)
- A. vCenter Management Interface
- B. Direct Console User Interface (DCUI)
- C. vSphere Performance Charts
- D. vCenter Command Line Interface
- E. ESXi Shell
Answer : CD
Question 28 ( Exam A )
An administrator is tasked with configuring vSphere Trust Authority.
The administrator has completed the following steps:
Set up the workstation -
Enabled the Trust Authority Administrator
Enabled the Trust Authority State
Collected information about the ESXi hosts and vCenter to be trusted
Which step does the administrator need to complete next?
- A. Import the Trusted Host information to the Trust Authority Cluster
- B. Import the Trusted Cluster information to the Trusted Hosts
- C. Create the Key Provider on the Trusted Cluster
- D. Import the Trusted Host information to the Trusted Cluster
Answer : C
Question 29 ( Exam A )
Refer to the exhibit.
An administrator set up the following configuration:
The distributed switch has three ESXi hosts, and each host has two 40 Gbps NICs.
The amount of bandwidth reserved for virtual machine (VM) traffic is 6 Gbps.
The administrator wants to guarantee that VMs in the Finance distributed port group can access 50 percent of the available reserved bandwidth for VM traffic.
Given this scenario, what should the size (in Gbps) of the Finance network resource pool be?
- A. 18
- B. 80
- C. 36
- D. 120
Answer : C
Question 30 ( Exam A )
A vSphere environment is experiencing intermittent short bursts of CPU contention, causing brief production outages for some of the virtual machines (VMs). To understand the cause of the issue, the administrator wants to observe near real-time statistics tor all VMs.
Which two vSphere reporting tools could the administrator use? (Choose two.)
- A. Advanced Performance Charts
- B. esxcli
- C. resxtop
- D. Overview Performance Charts
- E. esxtop
Answer : CE