An administrator is tasked with migrating a single virtual machine (VM) from an existing VMware vCenter to a secure environment where corporate security policy requires that all VMs be encrypted. The secure environment consists of a dedicated vCenter instance with a 4-node vSphere cluster and already contains a number of encrypted VMs. Which two steps must the administrator take to ensure the migration is a success? (Choose two.)
A.
Ensure that the source and destination vCenter instances share the same Key Management Server (KMS).
B.
Ensure that Encrypted vMotion Is turned off for the VM.
C.
Ensure that the VM is encrypted before attempting the migration.
D.
Ensure that the VM is powered off before attempting the migration.
E.
Ensure that the source and destination vCenter Servers have a different Key Management Server (KMS).
Ensure that the source and destination vCenter instances share the same Key Management Server (KMS).
Ensure that the VM is encrypted before attempting the migration.
To ensure a successful migration of an encrypted VM to a secure environment, the administrator needs to ensure that the source and destination vCenter instances share the same Key Management Server (KMS), which provides encryption keys for both environments; and ensure that the VM is encrypted before attempting the migration, which allows preserving its encryption status during vMotion.
References:
https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.security.doc/GUID-F8F105EC-A6EA- https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.security.doc/GUID-C3FFBF62-D6BF-
An administrator is working with VMware Support and Is asked to provide log bundles for the ESXI hosts in an environment. Three options Joes the administrator have? (Choose three.)
A.
Generate a combined log bundle for all ESXI hosts using the vCenter Management Interface.
B.
Generate a separate log bundle for each ESXI host using the vSphere Host Client.
C.
Generate a combined log bundle for all ESXI hosts using the vSphere Client.
D.
Generate a separate log bundle for each ESXI host using the vSphere Client.
E.
Generate a separate log bundle for each ESXI host using the vCenter Management Interface.
F.
Generate a combined log bundle for all ESXi hosts using the vSphere Host Client.
Generate a separate log bundle for each ESXI host using the vSphere Host Client.
Generate a combined log bundle for all ESXI hosts using the vSphere Client.
Generate a separate log bundle for each ESXI host using the vSphere Client.
Option B, C and D are correct because they are valid methods to generate log bundles for individual or multiple ESXi hosts using different interfaces. Option A and E are incorrect because they are not possible options to generate log bundles for all ESXi hosts using the vCenter Management Interface. Option F is incorrect because it is not possible to generate a combined log bundle for all ESXi hosts using the vSphere Host Client.
An administrator has been notified that a number of hosts are not compliant with the company policy for time synchronization.The relevant portion of the policy states:
All physical servers must synchronize time with an external time source that is accurate to the microsecond. Which step should the administrator take to ensure compliance with the policy?
A.
Ensure that each vCenter Server Appliance is configured to use a Network Time Protocol (NTP) source.
B.
Ensure that each ESXi host is configured to use a Precision Time Protocol (PTP) source.
C.
Ensure that each ESXi host is configured to use a Network Time Protocol (NTP) source.
D.
Ensure that each vCenter Server Appliance is configured to use a Precision Time Protocol (PTP) source.
Ensure that each ESXi host is configured to use a Precision Time Protocol (PTP) source.
To comply with the policy of synchronizing time with an external source that is accurate to the microsecond, the administrator needs to ensure that each ESXi host is configured to use a PTP source, which provides higher accuracy than NTP.
An administrator is tasked with configuring certificates for a VMware software-defined data center (SDDC) based on the following requirements:
• All certificates should use certificates trusted by the Enterprise Certificate Authority (CA).
• The solution should minimize the ongoing management overhead of replacing certificates.
Which three actions should the administrator take to ensure that the solution meets corporate policy? (Choose three.)
A.
Replace the VMware Certificate Authority (VMCA) certificate with a self-signed certificate generated from the
B.
Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.
C.
Replace the machine SSL certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
D.
Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.
E.
Replace the solution user certificates wife custom certificates generated from the Enterprise CA.
F.
Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.
Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.
Replace the solution user certificates wife custom certificates generated from the Enterprise CA.
Option B, D and E are correct because they allow the administrator to replace the machine SSL certificates, the VMware Certificate Authority (VMCA) certificate and the solution user certificates with custom certificates generated from the Enterprise CA, which will ensure that all certificates are trusted by the Enterprise CA and minimize the ongoing management overhead of replacing certificates. Option A is incorrect because replacing the VMCA certificate with a self-signed certificate generated from the VMCA will not ensure that the certificate is trusted by the Enterprise CA. Option C is incorrect because replacing the machine SSL certificates with trusted certificates generated from the VMCA will not ensure that the certificates are trusted by the Enterprise CA. Option F is incorrect because replacing the solution user certificates with trusted certificates generated from the VMCA will not ensure that the certificates are trusted by the Enterprise CA.
After a recent unexplained peak in virtual machine (VM) CPU usage, an administrator is asked to monitor the VM performance for a recurrence of the issue.
Which two tools can the administrator use? (Choose two.)
A.
vCenter Management Interface
B.
Direct Console User Interface (DCUI)
C.
vSphere Performance Charts
D.
vCenter Command Line Interface
E.
ESXi Shell
vSphere Performance Charts
ESXi Shell
To monitor the VM performance for a recurrence of the issue, the administrator can use vSphere Performance Charts, which provide graphical views of various performance metrics for VMs and other objects; or ESXi Shell, which provides command-line access to ESXi hosts and allows running various commands to collect performance data.
References:
https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.monitoring.doc/GUID-D89E8267-C74 https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.monitoring.doc/GUID-CDC20FD2-FE
A vSphere cluster has the following configuration:
• Virtual machines (VMs) are running Production and Test workloads
• vSphere Distributed Resource Scheduler (DRS) is enabled
• There are no resource pools in the cluster
Performance monitoring data shows that the Production workload VMs are not receiving their fully allocated memory when the vSphere cluster is fully utilized.
A combination of which two steps could the administrator perform to ensure that the Production VMs are always guaranteed the full allocation of memory? (Choose two.)
A.
Assign a custom memory share value to the resource pool containing the Production VMs.
B.
Assign a memory reservation value to the resource pool containing the Production VMs.
C.
Create a parent resource pool for the Production VMs.
D.
Create a sibling resource pool for each of the Production and Test VMs.
E.
Create a child resource pool for the Test VMs.
Assign a memory reservation value to the resource pool containing the Production VMs.
Create a sibling resource pool for each of the Production and Test VMs.
An administrator is completing the configuration of a new vSphere cluster and has enabled vSphere High Availability (HA) and vSphere Distributed Resource Scheduler (DRS).
After adding the ESXi hosts to the cluster, which networking information will the administrator be prompted to provide when using the Cluster Quickstart workflow?
A.
vMotion networking
B.
Management networking
C.
vSAN networking
D.
Virtual machine networking
vMotion networking
An administrator remotely deploys VMware ESXi using an out of band management connection and now needs to complete the configuration of the management network so that the host is accessible through the vSphere Host Client.
The following information has been provided to complete the configuration:
•Host FQDN esxi01corp.local
•Management VLAN ID: 10 DHCP: No
•Management IP Address: 172.16.10.101/24
•Management IP Gateway: 172.16.10.1
•Corporate DNS Servers: 172 16.10.5, 172.16.10..6
•DNS Domain: corp.local
In addition, all host configurations must also meet the following requirements:
•The management network must use only IPv4 network protocols.
•The management network must be fault tolerant
Which four high level tasks should the administrator complete in the Direct Console User Interface (DCUI) in order to meet the requirements and successfully log into the vSphere Host Client? (Choose four.)
A.
Set the value of the VMware ESXi Management Network VLAN ID to 10
B.
Configure at least two network adapters for the VMware ESXi Management Network
C.
Update the VMware ESXi Management Network IPv4 configuration to use a static IPv4 address
D.
Create a DNS A Record for the VMware ESXi host on the corporate DNS servers
E.
Disable IPv6 for the VMware ESXi Management Network
F.
Restore the original Management vSphere Standard Switch.
G.
Update the VMware ESXi Management Network DNS configuration to use the corporate DNS servers for ' names resolution
Set the value of the VMware ESXi Management Network VLAN ID to 10
Configure at least two network adapters for the VMware ESXi Management Network
Update the VMware ESXi Management Network IPv4 configuration to use a static IPv4 address
Create a DNS A Record for the VMware ESXi host on the corporate DNS servers
An administrator has a requirement to revert a running virtual machine to a previous snapshot after a failed attempt to upgrade an application. When the administrator originally took the snapshot the following choices in the Take Snapshot dialog were made:
Snapshot the virtual machine’s memory = false
Quiesce guest file system = false
What will be the result of the administrator selecting the ‘Revert to Latest Snapshot? option to return the virtual machine to a previous snapshot?
A.
The virtual machine will be restored to the parent snapshot in a powered on state
B.
The virtual machine will be restored to the parent snapshot in a powered off state.
C.
The virtual machine will be restored to the child snapshot in a powered off state
D.
The virtual machine will be restored to the child snapshot in a powered on state.
The virtual machine will be restored to the parent snapshot in a powered off state.
Powered on (does not include memory) Reverts to the parent snapshot and the virtual machine is powered off. Powered off (does not include memory) Reverts to the parent snapshot and the virtual machine is powered off. https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-vm-administration/GUID-50BD0E64-75A6-4164-B
An administrator is tasked with moving an application and guest operating system (OS) running on top of a physical server to a software-defined data center (SDDC) in a remote secure location.
The following constraints apply:
• The remote secure location has no network connectivity to the outside world.
• The business owner is not concerned if all changes in the application make it to the SDDC in the secure location.
• The application's data is hosted in a database with a high number of transactions.
What could the administrator do to create an image of the guest OS and application that can be moved to this remote data center?
A.
Create a hot clone of the physical server using VMware vCenter Converter.
B.
Create a cold clone of the physical server using VMware vCenter Converter.
C.
Restore the guest OS from a backup.
D.
Use storage replication to replicate the guest OS and application.
Create a cold clone of the physical server using VMware vCenter Converter.
Option B is correct because it allows the administrator to create a cold clone of the physical server using VMware vCenter Converter, which will create an image of the guest OS and application that can be moved to this remote data center without requiring network connectivity or affecting the application’s data. Option A is incorrect because creating a hot clone of the physical server using VMware vCenter Converter will require network connectivity and may affect the application’s data due to changes during conversion. Option C is incorrect because restoring the guest OS from a backup will require network connectivity and may not include the latest changes in the application. Option D is incorrect because using storage replication to replicate the guest OS and application will require network connectivity and may not be feasible for a physical server.
References:
https://docs.vmware.com/en/vCenter-Converter-Standalone/6.2/com.vmware.convsa.guide/GUID-9F9E3F8C-0E
A vSphere environment is experiencing intermittent short bursts of CPU contention, causing brief production outages for some of the virtual machines (VMs). To understand the cause of the issue, the administrator wants to observe near real-time statistics for all VMs.
Which two vSphere reporting tools could the administrator use? (Choose two.)
A.
Advanced Performance Charts
B.
esxcli
C.
resxtop
D.
Overview Performance Charts
E.
esxtop
Advanced Performance Charts
esxtop
Advanced Performance Charts and esxtop are both vSphere reporting tools that can be used to observe near real-time statistics for all VMs. Advanced Performance Charts provides a graphical view of performance data, while esxtop is a command-line tool that provides more detailed information.
administrator successfully installs VMware ESXi onto the first host of a new vSphere duster but makes no additional configuration changes. When attempting to log into the vSphere Host Client using the Fully Qualified Domain Name (FQDN) of the host, the administrator receives the following error message:
‘’server Not Found –we can’t connect to the server at esxit101.corp.local.’’
• Host FQDN: esxi 101. Corp. local
• Management VLAN ID: 10
• DHCP: No
• Management IP Address: 172.16.10.101/24
• Management IP Gateway: 172.16.10.1
• Corporate DNS Servers: 172.16.10.5, 172.16.10.6
• DNS Domain: corp.local
Which three high level tasks should the administrator complete, at a minimum, in order to successfully log into the vSphsrs Host Client using the FQDN for the exxi101 and complete the configuration (Choose three.)
A.
Ensure a DNS A Record Is created for the VMware ESXI host on the corporate DNS servers,
B.
Update the VMware ESXI Management Network DNS configuration to use the corporate DNS servers for name, resolution,
C.
Update the VMware ESXI Management Network IPv4 configuration to use a static a IPv4 address.
D.
Configure at least two network adapters for the VMware ESXI Management Network.
E.
Set the value of the VMware ESXI Management Network VLAN ID to 10.
F.
Disable IPv6 for the VMware ESXI Management Network.
Ensure a DNS A Record Is created for the VMware ESXI host on the corporate DNS servers,
Update the VMware ESXI Management Network DNS configuration to use the corporate DNS servers for name, resolution,
To successfully log into the vSphere Host Client using the FQDN for the ESXi host, the administrator needs to ensure a DNS A Record is created for the VMware ESXi host on the corporate DNS servers, which maps its FQDN to its IP address; and update the VMware ESXi Management Network DNS configuration to use the corporate DNS servers for name resolution, which allows resolving its FQDN.
Page 3 out of 9 Pages |
Previous |