An administrator is migrating 100 virtual machines from one ESXi Host to another. The current lGigE network cards are only migrating four virtual machines simultaneously. Which action should the administrator take to increase that number to eight?
A.
Add more memory to the ESXI hosts
B.
Add a 10GigE network card to each ESXI host
C.
Configure port mirroring
D.
Configure Load Balancing
Add a 10GigE network card to each ESXI host
Which virtual machine (VM) problem is solved using vSphere Storage
vmotion?
A.
The ESXi host on which a VM is running requires to enter
maintenance mode.
B.
The storage array on which a VM is running requires to enter
maintenance mode.
C.
VMs are running on one ESXi host that presents high CPU resource
contention.
D.
The vSphere Client shows that a VM needs to be consolidated
The storage array on which a VM is running requires to enter
maintenance mode.
A vSphere administrator sees the alarm:
vSphere HA virtual machine failed to failover
This occurred for virtual machines (VMs) in a cluster with vSphere High Availability (HA)
enabled. The guest operating system on the VMs did not report a power failure.
What is a possible cause of this event?
A.
The host is still running but has disconnected from the network.
B.
The VMs cloning operations did not complete.
C.
A reboot of vCenter Server impacted vSphere HA.
D.
The VMs encountered an error during migration using vSphere vMotion
The host is still running but has disconnected from the network.
What is the default encrypted vSphere vMotion state for virtual machines that are not encrypted?
A.
Disabled
B.
Required
C.
Opportunistic
D.
Enabled
Opportunistic
Which feature mist an administrator use to revert back to the previousof a VM template?
A.
VM Snapshots
B.
Content Library
C.
VMware Tools
D.
Storage vMotion
Content Library
Which vSphere feature mitigates common optimization challenges?
A.
vSphere Trust Authority
B.
vSphere High Availability
C.
vSphere DRS
D.
vSphere Fault Tolerance
vSphere DRS
Refer to the exhibit
Which statement Is true about the access privileges of User 2?
A.
User 2 has virtual machine power user privileges to Prod04-3.
B.
User 2 has no access to all objects in the Production folder and Test and Dev folder.
C.
User 2 has virtual machine power user privileges to all VMs In the Production folder.
D.
User 2 has access to all objects in the Production folder and no access to Dev01, Dev02, and Dev03.
User 2 has virtual machine power user privileges to Prod04-3.
A vSphere administrator is unable to remove an ESXi host from a
vSphere Distributed Switch (VDS).
Which two reasons could have caused this issue?
A.
The VDS is configured with ingress traffic shaping.
B.
Virtual machines network adapters on the host are connected to the
switch
C.
Virtual machine network adapters are faulty.
D.
The ESXi host is connected to another VDS.
E.
The ESXi host had VMkernel adapters assigned to the switch.
Virtual machines network adapters on the host are connected to the
switch
The ESXi host is connected to another VDS.
An administrator has been asked to keep domain controllers running
on separate ESXi hosts.
Which type of VM/Host rule must be configured to meet this
requirement?
A.
keep Virtual Machines Together
B.
Virtual Machines to virtual Machines
C.
Virtual Machines to Hosts
D.
Separate Virtual machines
Separate Virtual machines
Which two block storage protocols are supported on vSphere?
A.
SAB
B.
SMB
C.
ISCSI
D.
NFSv4.1
E.
NFSv3
SAB
ISCSI
An administrator would like to enable a switch setting to restrict the network bandwidth that
is available to ports, but the solution must also allow bursts of traffic to flow through at
higher speeds. Which vSphere Distributed Switch setting accomplishes this goal?
A.
Monitoring
B.
Security
C.
Traffic shaping
D.
Teaming and failover
Traffic shaping
An administrator has configured a Linux virtual machine and found
that it does not have network connectivity. The administrator notices this
when trying to ping the default gate way and nothing comes back. The
administrator needs to verify that the guest operating system is configured
properly.
What is the first step that the administrator should take to meet this goal?
A.
Ping an outside source to see if you get a response
B.
Verify that VMware Tools has been loaded on the guest operating system
C.
Check that the virtual network adapter is present and enabled
D.
Confirm the link status of the virtual switch
Check that the virtual network adapter is present and enabled
Page 3 out of 9 Pages |
Previous |