Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

VMware 2V0-21.23 VMware vSphere 8.x Professional Exam Practice Test

Page: 1 / 11
Total 107 questions

VMware vSphere 8.x Professional Questions and Answers

Question 1

An administrator is tasked with moving an application and guest operating system (OS) running on top of a physical server to a software-defined data center (SDDC) in a remote secure location.

The following constraints apply:

• The remote secure location has no network connectivity to the outside world.

• The business owner is not concerned if all changes in the application make it to the SDDC in the secure location.

• The application's data is hosted in a database with a high number of transactions.

What could the administrator do to create an image of the guest OS and application that can be moved to this remote data center?

Options:

A.

Create a hot clone of the physical server using VMware vCenter Converter.

B.

Create a cold clone of the physical server using VMware vCenter Converter.

C.

Restore the guest OS from a backup.

D.

Use storage replication to replicate the guest OS and application.

Question 2

An administrator is tasked with looking into the disaster recovery options for protecting a database server using VMware vSphere Replication.

The following requirements must be met:

• The virtual machine must remain online during the protection.

• The virtual machine's snapshots must be used as part of the replication process.

Which step must the administrator complete to accomplish this task?

Options:

A.

Configure the virtual machine storage policy.

B.

Enable guest OS VSS quiescing for this virtual machine.

C.

Perform a full initial synchronization of the source virtual machine to the target location.

D.

Configure network traffic isolation for vSphere Replication.

Question 3

An administrator needs to provide encryption for workloads within an existing vSphere cluster. The following requirements must be met:

• Workloads should be encrypted at rest.

• Encrypted workloads must automatically be encrypted during transit.

• Encryption should not require any specific hardware.

What should the administrator configure to meet these requirements?

Options:

A.

Encrypted vSphere vMotion

B.

Unified Extensible Firmware Interface (UEFI) Secure Boot

C.

Host Encryption

D.

VM Encryption

Question 4

Refer to the exhibit.

Question # 4

An administrator is tasked with adding new capacity to an existing software-defined data center (SDDC).

• The SDDC currently hosts two vSphere clusters (ClusterA and ClusterB) with different CPU compatibilities.

• vSphere vMotion and vSphere Distributed Resource Scheduler (DRS) are currently in use in the SDDC.

• The new capacity will be implemented by provisioning four ESXi hosts running a new generation of Intel Skylake CPUs.

• All workload virtual machines (VMs) must support live migration to any cluster in the SDDC.

The administrator noticed the running critical "ever virtual machine (VM) shown in the exhibit is not migrating using vSphere vMotion to the original Clusters A or B.

Which three steps must the administrator take to support this functionality? (Choose three.)

Options:

A.

Power on the VM.

B.

Disable the Enhanced vMotion Compatibility (EVC) on the VM.

C.

Reboot the VM.

D.

D. Configure the Enhanced vMotion Compatibility (EVC) on vSphere Cluster A and B to support Intel Skylake.

E.

Power off the VM.

F.

Configure the Enhanced vMotion Compatibility (EVC) on the VM to Intel Skylake.

Question 5

An administrator is responsible for the management of a VMware vCenter instance that is currently experiencing performance issues. The administrator quickly identifies that the CPU and memory utilization of vCenter is consistently over 80%. Upon further analysis, it seems that the vpxd process is contributing significantly to the performance issue.

A combination of which four steps should the administrator take to resolve the performance issues and ensure that a similar issue can be rectified without requiring downtime to vCenter moving forward? (Choose four.)

Options:

A.

Gracefully shut down vCenter using the vSphere Client.

B.

Enable CPU Hot Add on the vCenter virtual machine.

C.

Power on the vCenter Server Appliance using the vSphere Host Client.

D.

Enable CPU and Memory Hot Add on the vCenter virtual machine.

E.

Add additional CPU to the vCenter Server Appliance.

F.

Power on the vCenter Server Appliance using the vSphere Client.

G.

Enable Memory Not Add on the vCenter virtual machine.

Question 6

An administrator is preparing to perform an update to vSphere clusters that are running vSAN. The administrator wants to ensure that the following requirements are met as part of the update:

•All hosts in the cluster are updated with the same software.

•The firmware versions on the hosts are updated

•The new software versions are checked for compliance against the vSAN Hardware Compatibility List.

Which three steps should the administrator take to meet these requirements? (Choose three.)

Options:

A.

Configure vSphere Lifecycle Manager with an image for the cluster.

B.

Register the vendor hardware management system as a vCenter Server extension.

C.

Download the firmware updates from the VMware website

D.

Download the firmware updates from the vendor website.

E.

Run a hardware compatibility check using vSphere Lifecycle Manager

F.

Configure vSphere Lifecycle Manager with a baseline for the cluster.

Question 7

An administrator is asked to configure a security policy at the port group level of a standard switch.

The following requirements must be met:

• The security policy must apply to all virtual machines on portgroup-1.

• All traffic must be forwarded, regardless of the destination.

Options:

A.

Forged transmits set to reject

B.

MAC address changes set to accept

C.

Promiscuous mode set to reject

D.

Promiscuous mode set to accept

Question 8

An administrator is tasked with allowing a single user the ability to take snapshots on a virtual machine. When looking in vCenter, the administrator can see that there are already users and groups assigned permissions on the virtual machine as follows:

•The group VMJJsers has the Virtual Machine Power User role.

•The group VM_Viewers has the Read Only role.

The administrator confirms that the user requesting the additional access is currently one of five members of the VM_Viewers group

Which two steps should the administrator take to grant this user the additional access required without impacting the user access of others? (Choose two.)

Options:

A.

Add the user to the VM_Users group and leave the permissions on the virtual machine object unchanged

B.

Add a new permission on the virtual machine object selecting the user and the new custom role.

C.

Edit the Read Only role to add the Virtual Machine Snapshot Management privileges.

D.

Create a new custom role with the Virtual Machine Snapshot Management privileges.

E.

new permission on the virtual machine object selecting the VM_Viewers group and the new custom

Question 9

An administrator is adding a new ESXi host to an existing vSphere cluster. When selecting the cluster, the administrator Is unable to use the Cluster Quickstart workflow to add and configure the additional host.

What could be the root cause of this issue?

Options:

A.

The administrator has previously dismissed the Cluster Quickstart workflow.

B.

The administrator must manually add the host to the cluster before using the Cluster Quickstart workflow.

C.

The administrator has not been assigned the required permissions to use the Cluster Quickstart workflow.

D.

The administrator must enable the Cluster Quickstart workflow option in VMware vCenter.

Question 10

A vSphere cluster hosts a three-tier application. The cluster has 50% resources available. If a host in the cluster fails, the database server must be online before the application server, and the application server must be online before the Web server.

Which feature can be used to meet these requirements?

Options:

A.

Predictive DRS

B.

vSphere HA Orchestrated Restart

C.

vSphere HA Restart Priority

D.

Proactive HA

Question 11

An administrator is investigating reports of users experiencing difficulties logging into a VMware vCenter instance using LDAP accounts.

Which service should the administrator check as part of troubleshooting?

Options:

A.

vSphere Authentication Proxy Service

B.

Lookup Service

C.

Identity Management Service

D.

VMware Authentication Framework Daemon

Question 12

Refer to the exhibit.

Question # 12

After updating a predefined alarm on VMware vCenter, an administrator enables email notifications as shown in the attached alarm; however, notifications are NOT being sent.

Where must the mail server settings be configured by the administrator to resolve this issue?

Options:

A.

In the ESXi host system config

B.

In the alarm rule definitions

C.

In the vCenter settings in the vSphere Client

D.

in the vCenter Management Interface

Question 13

Following a merger with another company, an administrator is tasked with configuring an identity source for VMware vCenter so that all vSphere administrators can authenticate using their existing Active Directory accounts. Each company has user accounts in their own Active Directory forests.

The following additional information has been provided:

• The corporate policy states that only Windows-based machine accounts are allowed in Active Directory. Which action should the administrator take to configure vCenter Single Sign-On (SSO) to meet this requirement?

Options:

A.

Configure SSO to use Active Directory over LDAP as the identity source.

B.

Configure SSO to use OpenLDAP as the identity source.

C.

Join the vCenter Server Appliance to the LDAP domain.

D.

Configure SSO to use Active Directory (Integrated Windows Authentication) as the identity source.

Question 14

An administrator notices a performance issue in VMvvare vCenter To try and understand more about the performance issue, the administrator needs to gather more information about the vCenter database to eliminate a potential disk space issue.

Which two tools can the administrator use? (Choose two.)

Options:

A.

vCenter Management Interface (VAMI)

B.

Perfmon

C.

df

D.

esxtop

E.

vSphere Client

Question 15

An administrator is tasked with deploying a new on-premises software-defined data center (SDDC) that will contain a total of eight VMware vCenter instances.

The following requirements must be met:

• All vCenter instances should be visible in a single vSphere Client session.

• All vCenter inventory should be searchable from a single vSphere Client session.

• Any administrator must be able to complete operations on any vCenter instance using a single set of credentials.

What should the administrator configure to meet these requirements?

Options:

A.

Two Enhanced Linked Mode groups consisting of four vCenter instances each in a Single Sign-On domain.

B.

A single Hybrid Linked Mode group consisting of four vCenter instances each in a Single Sign-On domain.

C.

A single Enhanced Linked Mode group consisting of eight vCenter instances in one Single Sign-On domain.

D.

A single Hybrid Linked Mode group consisting of eight vCenter instances in one Single Sign-On domain.

Question 16

An administrator needs to consolidate a number of physical servers by migrating the workloads to a software-defined data center solution.

Which VMware solution should the administrator recommend?

Options:

A.

VMware Horizon

B.

VMware vSAN

C.

VMware vSphere

D.

VMware

Question 17

An administrator must gracefully restart a virtual machine (VM) through the vSphere Client but the option is greyed out. The administrator has full administrative access on VMware vCenter and all the objects available in vCenter, but has no access to log onto the operating system.

Which action should the administrator take to meet the objective?

Options:

A.

Upgrade the virtual hardware

B.

Migrate the VM to another host

C.

Install VMware Tools

D.

Restart vCenter

Question 18

An administrator enables Secure Boot on an ESXi host. On booting the ESXi host, the following error message appears:

Fatal error: 39 (Secure Boot Failed)

Options:

A.

The kernel has been tampered with.

B.

The Trusted Platform Module chip has failed.

C.

The administrator attempted to boot with a bootloader that is unsigned or has been tampered with.

D.

A package (VIB or driver) has been tampered with.

Question 19

An administrator manually configures a reference ESXi host that meets company security standards for vSphere environments. The administrator now needs to apply all of the security standards to every identically configured host across multiple vSphere clusters within a single VMware vCenter instance.

Which four steps would the administrator complete to meet this requirement? (Choose four.)

Options:

A.

Extract the host profile from the reference host

B.

Export the host profile from vCenter.

C.

Import host customization on the reference host.

D.

Attach the host profile to each cluster that requires the secure configuration.

E.

Check the compliance of each host against the host profile.

F.

Reset host customization on the reference host.

G.

Remediate all non-compliant hosts.

Question 20

When configuring vCenter High Availability (HA), which two statements are true regarding the active, passive, and witness nodes? (Choose two.)

Options:

A.

Network latency must be less than 10 milliseconds.

B.

They must have a supported Wide Area Network (WAN).

C.

They must have a minimum of a 10 Gbps network adapter

D.

They must have a minimum of a 1 Gbps network adapter.

E.

Network latency must be more than 10 milliseconds.

Question 21

Which feature would allow for the non-disruptive migration of a virtual machine between two clusters in a single VMware vCenter instance?

Options:

A.

vSphere vMotion

B.

Cross vCenter Migration

C.

vSphere Storage vMotion

D.

vSphere Fault Tolerance

Question 22

After a number of outages within a production VMware software-defined data center, an administrator is tasked with identifying a solution to meet the following requirements:

• Reduce the risk of outages by proactively identifying issues with the environment and resolving them.

• Reduce the complexity of uploading log bundles when raising support tickets.

Which solution should the administrator recommend to meet these requirements?

Options:

A.

VMware Aria Operations for Logs

B.

VMware Skyline Advisor Pro

C.

VMware Skyline Health

D.

VMware Aria Operations

Question 23

An administrator wants to use tag-based placement rules on their virtual machine disks using VMware vCenter.

Which option would allow the administrator to achieve this?

Options:

A.

Storage Policy Based Management

B.

Storage I/O Control

C.

vSphere Storage APIs for Storage Awareness (VASA)

D.

vSphere Distributed Resource Scheduler (DRS)

Question 24

An administrator is tasked with looking into the disaster recovery (DR) options for a software-defined data center (SDDC).

The following requirements must be met:

•All virtual machines (VMs) must be protected to a secondary site.

•The source VMs must remain online until the failover.

•When failing over to the secondary site, application downtime is allowed

•The DR failover must be managed from the vSphere Client.

•Costs must remain as low as possible.

How can the administrator accomplish this task?

Options:

A.

Configure VMware Cloud Disaster Recovery (VCDR) and combine it with array-based storage replication

B.

Configure VMware a Site Recovery Manager and combine it with vSphere Replication.

C.

Configure a subscribed content library on the secondary site.

D.

Configure VMware Site Recovery Manager and combine it with array-based storage replication.

Question 25

An administrator is tasked with configuring remote direct memory access (RDMA) over Converged Ethernet v2 (RoCE v2).

Which two types of adapters must the administrator configure? (Choose two.)

Options:

A.

Paravirtual RDMA adapter

B.

RDMA network adapter

C.

Software iSCSi adapter

D.

Fibre Channel over Ethernet (FCoE) adapter

E.

Software NVMe over RDMA storage adapter

Question 26

An administrator is tasked with implementing a backup solution capable of backing up the Supervisor cluster, vSphere Pods, and persistent volumes.

Which two solutions must be used to meet this requirement? (Choose two.)

Options:

A.

VMware vCenter

B.

Standalone Velero and Restic

C.

NSX-T Manager

D.

vSphere Host Client

E.

Velero Plugin for vSphere

Question 27

An administrator decides to restore VMware vCenter from a file-based backup following a failed upgrade. Which interface should the administrator use to complete the restore?

Options:

A.

Direct Console User Interface (DCUI)

B.

vCenter Management Interface (VAMI)

C.

vSphere Client

D.

vCenter GUI Installer

Question 28

An administrator is planning to upgrade a VMware vCenter instance to version 8. It is currently integrated with the following solutions:

* VMware Aria Automation

* VMware Cloud Director

Which tool can the administrator use to run Interoperability reports before the upgrade process?

Options:

A.

sphere Update Manager

B.

VMware Aria Suite Lifecycle

C.

vCenter Server Update Planner

D.

vSphere Lifecycle Manager

Question 29

An administrator runs a two-node vSphere cluster, which contains two domain controller virtual machines (VMs). The administrator wants to ensure that VMs run on separate hosts without interfering with normal maintenance operations.

How should the administrator configure Distributed Resource Scheduler (DRS)?

Options:

A.

Create a 'Must run Virtual Machines to Hosts' anti-affinity rule.

B.

Create a 'Virtual Machines to Virtual Machines' anti-affinity rule.

C.

Create a 'Virtual Machines to Virtual Machines' dependency rule.

D.

Create a 'Should run Virtual Machines to Hosts' anti-affinity rule.

Question 30

An administrator is working with VMware Support and Is asked to provide log bundles for the ESXI hosts in an environment. Which three options Joes the administrator have? (Choose three.)

Options:

A.

Generate a combined log bundle for all ESXI hosts using the vCenter Management Interface.

B.

Generate a separate log bundle for each ESXI host using the vSphere Host Client.

C.

Generate a combined log bundle for all ESXI hosts using the vSphere Client.

D.

Generate a separate log bundle for each ESXI host using the vSphere Client.

E.

Generate a separate log bundle for each ESXI host using the vCenter Management Interface.

F.

Generate a combined log bundle for all ESXi hosts using the vSphere Host Client.

Question 31

What are two uses cases for VMware Tools? (Choose two.)

Options:

A.

Time synchronization with an NTP server

B.

Direct deployment of the Aria Automation Config minion

C.

Share folders between ESXi hosts and guest OS file systems

D.

Ability to shut down a virtual machine remotely

E.

Support for unsupported network device drivers

Question 32

A vSphere cluster has the following configuration:

• Virtual machines (VMs) are running Production and Test workloads

• vSphere Distributed Resource Scheduler (DRS) is enabled

• There are no resource pools in the cluster

Performance monitoring data shows that the Production workload VMs are not receiving their fully allocated memory when the vSphere cluster is fully utilized.

A combination of which two steps could the administrator perform to ensure that the Production VMs are always guaranteed the full allocation of memory? (Choose two.)

Options:

A.

Assign a custom memory share value to the resource pool containing the Production VMs.

B.

Assign a memory reservation value to the resource pool containing the Production VMs.

C.

Create a parent resource pool for the Production VMs.

D.

Create a sibling resource pool for each of the Production and Test VMs.

E.

Create a child resource pool for the Test VMs.

Page: 1 / 11
Total 107 questions