Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

An administrator creates a virtual machine that contains the latest company-approved software, tools and security updates. Company policy requires that only full clones are allowed for server workloads.

A combination of which two tasks should the administrator complete to prepare for the deployment of this virtual machine for multiple users? (Choose two.)

A.

Set appropriate permissions on the virtual machine.

B.

Create a virtual machine customization specification.

C.

Upgrade the virtual hardware.

D.

Convert the virtual machine to a template.

E.

Take a snapshot of the virtual machine.

Full Access
Question # 5

An administrator is tasked with adding two additional hosts into an existing production vSphere cluster to support the need for additional capacity.

The vSphere cluster currently has four identically configured ESXi hosts (esxOT esx02. esx03 and esx04) that utilize Intel Skylake-based CPUs. The two new hosts (esx05 and esx06) are configured identically in terms of memory and storage to the existing hosts: but utilize Intel Ice Lake-based CPUs.

The administrator must ensure that:

•Any virtual machine migrates to any of the six ESXi hosts running in the cluster.

•There is no virtual machine downtime during the process of adding the new hosts.

Which step should the administrator take to meet these requirements?

A.

Create a new vSphere cluster with Enhanced vMotion Compatibility (EVC) enabled and move all hosts into A' the new cluster

B.

Create a new vSphere cluster and move only three hosts into the new cluster.

C.

Configure Enhanced vMotion Compatibility (EVC) mode on the existing cluster and add the two new hosts into the cluster.

D.

Create a new vSphere cluster with vSphere High Availability (HA) enabled and move all hosts into the new cluster

Full Access
Question # 6

An administrator is tasked with looking into the disaster recovery (DR) options for a software-defined data center (SDDC).

The following requirements must be met:

•All virtual machines (VMs) must be protected to a secondary site.

•The source VMs must remain online until the failover.

•When failing over to the secondary site, application downtime is allowed

•The DR failover must be managed from the vSphere Client.

•Costs must remain as low as possible.

How can the administrator accomplish this task?

A.

Configure VMware Cloud Disaster Recovery (VCDR) and combine it with array-based storage replication

B.

Configure VMware a Site Recovery Manager and combine it with vSphere Replication.

C.

Configure a subscribed content library on the secondary site.

D.

Configure VMware Site Recovery Manager and combine it with array-based storage replication.

Full Access
Question # 7

An administrator is tasked with implementing a backup solution capable of backing up the Su-pervisor cluster, vSphere Pods, and persistent volumes.

Which two solutions must be used to meet this requirement? (Choose two.)

A.

VMware vCenter

B.

Standalone Velero and Restic

C.

NSX-T Manager

D.

vSphere Host Client

E.

Velero Plugin for vSphere

Full Access
Question # 8

An administrator is tasked with configuring certificates for a VMware software-defined data center (SDDC) based on the following requirements:

• All certificates should use certificates trusted by the Enterprise Certificate Authority (CA).

• The solution should minimize the ongoing management overhead of replacing certificates.

Which three actions should the administrator take to ensure that the solution meets corporate policy? (Choose three.)

A.

Replace the VMware Certificate Authority (VMCA) certificate with a self-signed certificate generated from the

B.

Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.

C.

Replace the machine SSL certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).

D.

Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.

E.

Replace the solution user certificates wife custom certificates generated from the Enterprise CA.

F.

Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).

Full Access
Question # 9

An administrator is tasked with applying updates to a vSphere cluster running vSAN using vSphere Lifecycle Manager. Downtime to the ESXI hosts must be minimal while the work Is completed.

The administrator has already completed the following steps and no errors have been returned:

• Downloaded all applicable software and created a new Image

• Attached the new Image to the cluster and run a compliance check against the Image for the cluster

• Ran a remediation pre-check for the cluster

Which two series of steps should the administrator perform to start the remediation of the cluster using the new image? (Choose two.)

A.

1. Use the Remediate option in vSphere Lifecycle Manager to remediate all of the ESXI hosts in the cluster in parallel.

2. Allow vSphere Lifecycle Manager to automatically control maintenance mode on the ESXI hosts.

B.

1. Place each of the ESXI hosts into maintenance mode manually.

2. Use the Stage option in vSphere Lifecycle Manager to stage the required software on all ESXi hosts one at a time.

C.

1. Leave all ESXI hosts in the cluster operational.

2. Use the Stage All option in vSphere Lifecycle Manager to stage the required software onto all ESXI hosts one at a time.

D.

l Leave all ESXI hosts in the cluster operational

2. Use the Stage All option in vSphere Lifecycle Manager to stage the required software onto all ESXI hosts in the cluster In parallel.

E.

1 Use the Remediate Option In vSphere Lifecycle Manager to remediate all of the ESXI hosts In the cluster In sequence.

2. Allow vSphere Lifecycle Manager to automatically control maintenance mode on the ESXI hoy

Full Access
Question # 10

After a recent unexplained peak in virtual machine (VM) CPU usage, an administrator is asked to monitor the VM performance for a recurrence of the issue.

Which two tools can the administrator use? (Choose two.)

A.

vCenter Management Interface

B.

Direct Console User Interface (DCUI)

C.

vSphere Performance Charts

D.

vCenter Command Line Interface

E.

ESXi Shell

Full Access
Question # 11

An administrator is deploying a new all flash vSAN cluster based on the vSAN Original Storage Architecture (OSA).

What is the minimum supported network throughput in Gb/s for each host?

A.

50

B.

10

C.

25

D.

1

Full Access
Question # 12

An administrator is tasked with deploying a new on-premises software-defined data center (SDDC) that will contain a total of eight VMware vCenter instances.

The following requirements must be met:

• All vCenter instances should be visible in a single vSphere Client session.

• All vCenter inventory should be searchable from a single vSphere Client session.

• Any administrator must be able to complete operations on any vCenter instance using a single set of credentials.

What should the administrator configure to meet these requirements?

A.

Two Enhanced Linked Mode groups consisting of four vCenter instances each in a Single Sign-On domain.

B.

A single Hybrid Linked Mode group consisting of four vCenter instances each in a Single Sign-On domain.

C.

A single Enhanced Linked Mode group consisting of eight vCenter instances in one Single Sign-On domain.

D.

A single Hybrid Linked Mode group consisting of eight vCenter instances in one Single Sign-On domain.

Full Access
Question # 13

An administrator needs to create affinity rules for the following vSphere cluster setup:

•The cluster contains two virtual machines (VMs) named app01 and app02.

•The cluster contains six hosts named esx11 through esx16.

•The app01 and app02 VMs run software that is licensed to run only on esx11, esx12, or esx13.

•vSphere Distributed Resource Scheduler (DRS) is configured

Which set of steps must the administrator perform to ensure that the licensing requirements are met for app01 and app02?

A.

1. Add all the hosts to a host group.

2. Create a VM-VM anti-affinity rule for app01 and app02

B.

1. Add the esx11 - esx13 hosts to a host group

2. Create a VM-VM affinity rule for app01 and app02

C.

1 Add the VMs to a VM group and the esx11 - esx13 hosts to a host group.

2 Create a VM-Host required rule between the VM group and the host group.

D.

1. Add the VMs to a VM group and the esx11 - esx13 hosts to a host group.

2. Create a VM-Host preferential rule between the VM group and the host group

Full Access
Question # 14

An administrator is working with VMware Support and Is asked to provide log bundles for the ESXI hosts in an environment. Which three options Joes the administrator have? (Choose three.)

A.

Generate a combined log bundle for all ESXI hosts using the vCenter Management Interface.

B.

Generate a separate log bundle for each ESXI host using the vSphere Host Client.

C.

Generate a combined log bundle for all ESXI hosts using the vSphere Client.

D.

Generate a separate log bundle for each ESXI host using the vSphere Client.

E.

Generate a separate log bundle for each ESXI host using the vCenter Management Interface.

F.

Generate a combined log bundle for all ESXi hosts using the vSphere Host Client.

Full Access
Question # 15

An administrator enables Secure Boot on an ESXi host. On booting the ESXi host, the following error message appears:

Fatal error: 39 (Secure Boot Failed)

A.

The kernel has been tampered with.

B.

The Trusted Platform Module chip has failed.

C.

The administrator attempted to boot with a bootloader that is unsigned or has been tampered with.

D.

A package (VIB or driver) has been tampered with.

Full Access
Question # 16

An administrator wants to allow a DevOps engineer the ability to delete Tanzu Kubernetes Grid (TKG) cluster objects in a vSphere Namespace.

Which role would provide the minimum required permissions to perform this operation?

A.

Administrator

B.

Can View

C.

Owner

D.

Can Edit

Full Access
Question # 17

What are three options an administrator can configure after creating a vSphere Namespace? (Choose three.)

A.

Backup schedule

B.

Certificates

C.

Storage policies

D.

Update policies

E.

Permissions

F.

Resource and Object limits

Full Access
Question # 18

An administrator has a host profile named Standard-Config. The administrator wants to change the other host profiles to use only the storage configuration settings that are defined in the Standard-Config host profile.

What should the administrator do to make this change?

A.

Export host customizations and import them to the other host profiles.

B.

Copy the storage settings from Standard-Config to all other host profiles.

C.

Duplicate the Standard-Config host profile and only modify the storage configuration settings.

D.

Export the Standard-Config host profile and attach it to the other hosts.

Full Access
Question # 19

An administrator must gracefully restart a virtual machine (VM) through the vSphere Client but the option is greyed out. The administrator has full administrative access on VMware vCenter and all the objects available in vCenter, but has no access to log onto the operating system.

Which action should the administrator take to meet the objective?

A.

Upgrade the virtual hardware

B.

Migrate the VM to another host

C.

Install VMware Tools

D.

Restart vCenter

Full Access
Question # 20

Which four elements can a vSphere Lifecycle Manager image contain? (Choose four.)

A.

ESXi base image

B.

ESXI configuration

C.

Vendor agents

D.

Vendor add-ons

E.

BIOS updates

F.

Firmware and drivers add-on

G.

Independent components

Full Access
Question # 21

When configuring vCenter High Availability (HA), which two statements are true regarding the active, passive, and witness nodes? (Choose two.)

A.

Network latency must be less than 10 milliseconds.

B.

They must have a supported Wide Area Network (WAN).

C.

They must have a minimum of a 10 Gbps network adapter

D.

They must have a minimum of a 1 Gbps network adapter.

E.

Network latency must be more than 10 milliseconds.

Full Access
Question # 22

Refer to the exhibit.

Given the configuration shown in the exhibit, what should the administrator do if the latest VM template contains changes that are no longer needed?

A.

Delete App-LibTemplate (2)

B.

Revert to App-LibTernplate (2)

C.

Delete App-LibTemplate (3)

D.

Check out App-LibTemplate (3)

Full Access
Question # 23

Which step is completed during Stage 1 of the vCenter Server Appliance deployment?

A.

Join a vCenter Single Sign-On domain

B.

Create a new vCenter Single Sign-On domain

C.

Select the deployment size

D.

Configure SSH access

Full Access
Question # 24

Refer to the exhibit.

An administrator set up the following configuration:

• The distributed switch has four ESXi hosts, and each host has two 10 Gbps NICs.

• In the Network I/O Control configuration, the amount of bandwidth reserved for virtual machine (VM) traffic if 4 Gbps.

The administrator wants to guarantee that VMs in the Retail distributed port group can access 50 percent of the available reserved bandwidth for VM traffic.

Given this scenario, what should the size (in Gbps) of the Retail network resource pool be?

A.

40

B.

32

C.

8

D.

16

Full Access
Question # 25

Which VMware offering will allow an administrator to manage the lifecycle of multiple vCenter Server instances in a single software as a service (SaaS)-based solution to help drive operational efficiency?

A.

VMware vSphere with Tanzu

B.

VMware Cloud Foundation

C.

VMware vSphere+

D.

VMware Aria Suite Lifecycle

Full Access
Question # 26

An administrator is tasked with implementing a backup solution capable of backing up the Supervisor cluster, vSphere Pods, and persistent volumes.

Which two solutions must be used to meet this requirement? (Choose two.)

A.

VMware vCenter

B.

Standalone Velero and Restic

C.

NSX-T Manager

D.

vSphere Host Client

E.

Velero Plugin for vSphere

Full Access
Question # 27

If a distributed switch uses the "Route based on physical NIC load" load balancing algorithm, what does the mean send or receive utilization of an uplink need to exceed for the flow of traffic to move to the second uplink?

A.

75 percent of the capacity over a 30 second period

B.

60 percent of the capacity over a 30 second period

C.

60 percent of the capacity over a 40 second period

D.

75 percent of the capacity over a 40 second period

Full Access
Question # 28

An administrator has mapped three vSphere zones to three vSphere clusters.

Which two statements are true for this vSphere with Tanzu zonal Supervisor enablement? (Choose two.)

A.

One Supervisor will be created in a specific zone.

B.

One Supervisor will be created across all zones.

C.

Three Supervisors will be created in Linked Mode.

D.

Individual vSphere Namespaces will be placed into a specific zone.

E.

Individual vSphere Namespaces will be spread across all zones.

Full Access
Question # 29

Refer to the exhibit.

An administrator is tasked with adding new capacity to an existing software-defined data center (SDDC).

• The SDDC currently hosts two vSphere clusters (ClusterA and ClusterB) with different CPU compatibilities.

• vSphere vMotion and vSphere Distributed Resource Scheduler (DRS) are currently in use in the SDDC.

• The new capacity will be implemented by provisioning four ESXi hosts running a new generation of Intel Skylake CPUs.

• All workload virtual machines (VMs) must support live migration to any cluster in the SDDC.

The administrator noticed the running critical "ever virtual machine (VM) shown in the exhibit is not migrating using vSphere vMotion to the original Clusters A or B.

Which three steps must the administrator take to support this functionality? (Choose three.)

A.

Power on the VM.

B.

Disable the Enhanced vMotion Compatibility (EVC) on the VM.

C.

Reboot the VM.

D.

D. Configure the Enhanced vMotion Compatibility (EVC) on vSphere Cluster A and B to support Intel Skylake.

E.

Power off the VM.

F.

Configure the Enhanced vMotion Compatibility (EVC) on the VM to Intel Skylake.

Full Access
Question # 30

An administrator is asked to configure a security policy at the port group level of a standard switch.

The following requirements must be met:

• The security policy must apply to all virtual machines on portgroup-1.

• All traffic must be forwarded, regardless of the destination.

A.

Forged transmits set to reject

B.

MAC address changes set to accept

C.

Promiscuous mode set to reject

D.

Promiscuous mode set to accept

Full Access
Question # 31

A group of new virtual machines have been deployed using thin-provisioned disks due to the limited storage space available in an environment. The storage team has expressed concern about extensive use of this type of provisioning.

An administrator is tasked with creating a custom alarm to notify the storage team when thin provisioning reaches a certain capacity threshold.

Where must the administrator define this alarm?

A.

Datastore

B.

Data center

C.

Datastore cluster

D.

Virtual machine

Full Access