Free 2V0-21.23 Professional VMware vSphere 8.x Dump

Question #: 40

When configuring vCenter High Availability (HA), which two statements are true regarding the active, passive, and witness nodes? (Choose two.)

  • A. Network latency must be less than 10 milliseconds.
  • B. They must have a supported Wide Area Network (WAN).
  • C. They must have a minimum of a 10 Gbps network adapter.
  • D. They must have a minimum of a 1 Gbps network adapter.

Suggested Answer: AD

Question #: 41

An administrator is deploying a new all flash vSAN cluster based on the vSAN Original Storage Architecture (OSA).

What is the minimum supported network throughput in Gb/s for each host?

  • A. 50
  • B. 10
  • C. 25
  • D. 1

Suggested Answer: B

Question #: 42

An administrator enables Secure Boot on an ESXi host. On booting the ESXi host, the following error message appears:

Fatal error: 39 (Secure Boot Failed)

What is the cause of this issue?

  • A. The kernel hos been tampered with.
  • B. The Trusted Platform Module chip has failed.
  • C. The administrator attempted to boot with a bootloader that is unsigned or has been tampered with.
  • D. A package (VIB or driver) has been tampered with.

Suggested Answer: A

Question #: 43

To keep virtual machines (VMs) up and running at all times in a vSphere cluster, an administrator would like VMs to be migrated automatically when the host hardware health status becomes degraded.

Which cluster feature can be used to meet this requirement?

  • A. Predictive DRS
  • B. Proactive HA
  • C. vSphere HA Orchestrated Restart
  • D. vSphere Fault Tolerance

Suggested Answer: B

Question #: 44

An administrator wants to allow a DevOps engineer the ability to delete Tanzu Kubernetes Grid (TKG) cluster objects in a vSphere Namespace.

Which role would provide the minimum required permissions to perform this operation?

  • A. Administrator
  • B. Can View
  • C. Owner
  • D. Can Edit

Suggested Answer: D

Question #: 45

A group of new virtual machines have been deployed using thin-provisioned disks due to the limited storage space available in an environment. The storage team has expressed concern about extensive use of this type of provisioning.

An administrator is tasked with creating a custom alarm to notify the storage team when thin provisioning reaches a certain capacity threshold.

Where must the administrator define this alarm?

  • A. Datastore
  • B. Data center
  • C. Datastore cluster
  • D. Virtual machine

Suggested Answer: A

Question #: 46

What are three options an administrator can configure after creating a vSphere Namespace? (Choose three.)

  • A. Backup schedule
  • B. Certificates
  • C. Storage policies
  • D. Update policies
  • E. Permissions
  • F. Resource and Object limits

Suggested Answer: CEF

Question #: 47

A VMkernel port is labelled PROD01 and uses the default TCP/IP stack. Currently, this VMkernel port is configured for supporting live virtual machine (VM) migrations.

Which configuration change should the administrator make to isolate live VM migration traffic from other network traffic?

  • A. Remove PROD01 and create a new VMkernel port and set the TCP/IP stack to vSphere vMotion.
  • B. Remove PROD01 and create a new VMkernel port with the TCP/IP stack set to provisioning.
  • C. Create a new VMkernel port and set the TCP/IP stack to provisioning.
  • D. Modify PROD01 by changing the TCP/IP stack to vSphere vMotion.

Suggested Answer: A

Question #: 48

After adding a new vSphere ESXi host with identical hardware configuration to an existing vSphere cluster, which task would an administrator complete prior to checking the compliance with an existing host profile?

  • A. Attach the host profile to the new host
  • B. Duplicate the host profile
  • C. Copy the host setting from the new host
  • D. Import the host profile

Suggested Answer: A

Question #: 49

An administrator is tasked with deploying a new on-premises software-defined data center (SDDC) that will contain a total of eight VMware vCenter instances.

The following requirements must be met:

All vCenter instances should be visible in a single vSphere Client session.

All vCenter inventory should be searchable from a single vSphere Client session.

Any administrator must be able to complete operations on any vCenter instance using a single set of credentials.

What should the administrator configure to meet these requirements?

  • A. Two Enhanced Linked Mode groups consisting of four vCenter instances each in a Single Sign-On domain.
  • B. A single Hybrid Linked Mode group consisting of four vCenter instances each in a Single Sign-On domain.
  • C. A single Enhanced Linked Mode group consisting of eight vCenter instances in one Single Sign-On domain.
  • D. A single Hybrid Linked Mode group consisting of eight vCenter instances in one Single Sign-On domain.

Suggested Answer: C

Question #: 50

An administrator has Windows virtual machines (VMs) and VMware Tools is installed in each VM. The administrator performs a status check of VMware Tools using vSphere Lifecycle Manager.

What is the VMware Tools status for the Windows VMs if the version of VMware Tools has a known problem and must be immediately upgraded?

  • A. Version Unsupported
  • B. Guest Managed
  • C. Unknown
  • D. Upgrade Available

Suggested Answer: A

Question #: 51

Which three features are only available when using vSphere Distributed Switches instead of vSphere Standard Switches? (Choose three.)

  • A. 802.1Q tagging
  • B. Port mirroring
  • C. Netflow
  • D. Configuration backup and restore
  • E. IPv6 support
  • F. IPv4 support

Suggested Answer: BCD

Question #: 52

An administrator is configuring vSphere Lifecycle Manager to install patches to a vSphere cluster. The cluster runs workload virtual machines (VMs) that are incompatible with vSphere vMotion, and therefore cannot be live migrated between hosts during the installation of the patches.

Which configuration in vSphere Lifecycle Manager will allow the administrator to reduce the downtime associated with the patching operation without migrating the VMs?

  • A. Enable Distributed Power Management (DPM) and set the VM power state to the suspend to disk option
  • B. Enable Quick Boot ana set the VM power stale to the suspend to disk option
  • C. Enable vSphere High Availability (HA) admission control and set the VM power stale to the suspend to memory option
  • D. Enable Quick Boot and set the VM power state to the suspend to memory option

Suggested Answer: D

D (100%)

Question #: 53

An administrator creates a new corporate virtual machine (VM) template every month to include all of the latest patches. The administrator needs to ensure that the new VM template is synchronized from the primary data center site (London) to two secondary data center sites (Tokyo and New York). The administrator is aware that datastore space is limited within the secondary data center sites. The administrator needs to ensure that the VM template is available in the secondary sites the first time a new virtual machine is requested.

Which four steps should the administrator take to meet these requirements? (Choose four.)

  • A. Create a new published content library at the primary site.
  • B. Add the virtual machine template to the subscribed content library.
  • C. Create a new published content library in each secondary site.
  • D. Create a new subscribed content library in each secondary site.
  • E. Configure the subscribed content library to download content when needed.
  • F. Configure each subscribed content library to download content immediately.
  • G. Add the virtual machine template to the published content library.

Suggested Answer: ADEG

Question #: 54

An administrator is tasked with migrating a single virtual machine (VM) from an existing VMware vCenter to a secure environment where corporate security policy requires that all VMs be encrypted. The secure environment consists of a dedicated vCenter instance with a 4-node vSphere cluster and already contains a number of encrypted VMs.

Which two steps must the administrator take to ensure the migration is a success? (Choose two.)

  • A. Ensure that the source and destination vCenter instances share the same Key Management Server (KMS).
  • B. Ensure that Encrypted vMotion is turned off for the VM.
  • C. Ensure that the VM is encrypted before attempting the migration.
  • D. Ensure that the VM is powered off before attempting the migration.
  • E. Ensure that the source and destination vCenter Servers have a different Key Management Server (KMS).

Suggested Answer: AC

Question #: 55

An administrator is tasked with providing users access to objects within an existing VMware vCenter instance. The vCenter inventory has a single data center with one management vSphere cluster and five workload vSphere clusters.

The following requirements must be met for assigning the users access:

Users must only be able to view all of the inventory objects associated with the management vSphere cluster.

Users must be able to edit all of the inventory objects associated with the workload vSphere clusters.

The administrator creates a custom role to provide the permissions needed to allow users to edit inventory objects.

Which series of steps should the administrator complete to assign the custom role and provide the required level of access to users?

  • A. Apply Global permissions to assign the Read Only role to the root vCenter object.Apply vCenter permissions to assign the custom role to the workload vSphere clusters and enable propagation.
  • B. Apply Global permissions to assign the Read Only role to the root vCenter object and enable propagation.Apply vCenter permissions to assign the custom role to the workload vSphere clusters and enable propagation.
  • C. Apply Global permissions to assign the Read Only role to the root vCenter object.Apply vCenter permissions to assign the custom role to the workload vSphere clusters.
  • D. Apply Global permissions to assign the Read Only role to the root vCenter object and enable propagation.Apply vCenter permissions to assign the custom role to the workload vSphere clusters.

Suggested Answer: B

Question #: 56

An administrator has a requirement to revert a running virtual machine to a previous snapshot after a failed attempt to upgrade an application. When the administrator originally took the snapshot, the following choices in the Take Snapshot dialog were made:

Snapshot the virtual machine’s memory = false

Quiesce guest file system = false

What will be the result of the administrator selecting the “Revert to Latest Snapshot” option to return the virtual machine to a previous snapshot?

  • A. The virtual machine will be restored to the parent snapshot in a powered on state.
  • B. The virtual machine will be restored to the parent snapshot in a powered off state.
  • C. The virtual machine will be restored to the child snapshot in a powered off state.
  • D. The virtual machine will be restored to the child snapshot in a powered on state.

Suggested Answer: B

Question #: 57

An administrator is planning to upgrade a VMware vCenter instance to version 8. It is currently integrated with the following solutions:

VMware Aria Automation –

VMware Cloud Director –

Which tool can the administrator use to run interoperability reports before the upgrade process?

  • A. vSphere Update Manager
  • B. VMware Aria Suite Lifecycle
  • C. vCenter Server Update Planner
  • D. vSphere Lifecycle Manager

Suggested Answer: C

Question #: 58

An administrator decides to restore VMware vCenter from a file-based backup following a failed upgrade.

Which interface should the administrator use to complete the restore?

  • A. Direct Console User Interface (DCUI)
  • B. vCenter Management Interface (VAMI)
  • C. vSphere Client
  • D. vCenter GUI Installer

Suggested Answer: D

Question #: 59

An administrator needs to provide encryption for workloads within an existing vSphere cluster.

The following requirements must be met:

Workloads should be encrypted at rest.

Encrypted workloads must automatically be encrypted during transit.

Encryption should not require any specific hardware.

What should the administrator configure to meet these requirements?

  • A. Encrypted vSphere vMotion
  • B. Unified Extensible Firmware Interface (UEFI) Secure Boot
  • C. Host Encryption
  • D. VM Encryption

Suggested Answer: D

Trả lời

Email của bạn sẽ không được hiển thị công khai. Các trường bắt buộc được đánh dấu *

you are using free dumps!!!

Please help to click ads to support the website

DỊCH VỤ iT