Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

The operations team is tasked with the preparation of a weekly health status overview of a VMware vSphere Foundation (VVF) environment to senior management with the following requirements:

    It should be sent every Monday morning.

    It must include KPIs related to cluster health, storage usage, and virtual machine (VM) growth trends.

    Operational overhead should be minimized.

Which two actions must the administrator perform to satisfy these requirements? (Choose two.)

A.

Create a custom dashboard with the required KPIs.

B.

Configure the scheduler to send the report via e-mail weekly.

C.

Export the built-in Cluster Summary report via FTP.

D.

Create a custom View with the KPIs and add it to a new Report Template.

E.

Export the desired metrics from the Metrics Explorer to CSV.

Which VMware Cloud Foundation (VCF) Operations for Logs capability facilitates root cause analysis and troubleshooting?

A.

Log Forwarding

B.

Alerting

C.

Dashboarding

D.

Log Querying

An administrator is tasked with setting up pricing for their VMware vSphere Foundation (VVF) environment. The accounting team has decided to charge users in 't-shirt sizes' for vCPU in the following method:

    Small (1-2 vCPU)

    Medium (3-4 vCPU)

    Large (5-8 vCPU)

Which rate method is used for this configuration?

A.

Base rate storage per GB.

B.

Base rate slabs.

C.

Base rate CPU per GHz.

D.

Base rate CPU per vCPU.

In VMware Cloud Foundation (VCF) Operations for Logs, which node type is responsible for coordinating the overall functioning of the cluster?

A.

Worker Node

B.

Replica Node

C.

Primary Node

D.

Data Node

During a recent audit, it was determined that a group of users may have been compromised. These users should not have access to any VMware vCenter resources while an investigation is underway. All the affected users have been placed into a SUSPECT_USERS group.

Which step is required to ensure that the suspect users will never have access to resources in vCenter?

A.

Assign the SUSPECT_USERS group the No access role to the vCenter Object and check propagate.

B.

Assign the SUSPECT_USERS group the Administrator role to the vCenter Object and uncheck propagate.

C.

Disconnect the vCenter from Active Directory.

D.

Assign the SUSPECT_USERS group the Read-only role to the vCenter Object and check propagate.

Which action allows a Content Library in VMware vSphere Foundation (VVF) to be accessed by other VMware vCenter Server instances?

A.

Enable automatic synchronization.

B.

Store the library on a vSAN datastore.

C.

Store the library on a shared NFS datastore.

D.

Publish the Content Library.

An administrator is tasked to deploy a new eight-node VMware vSAN Express Storage Architecture (ESA) cluster.

What are three minimum requirements to accomplish this? (Choose three.)

A.

10GbE network interfaces

B.

256GB Memory

C.

25GbE network interfaces

D.

PCIe flash device (NVMe)

E.

SAS solid-state disk (SSD)

F.

128GB Memory

An administrator enables the VMware Cloud Foundation (VCF) Operations orchestrator Plug-in for VMware vSphere Web Client service on a VCF Operations orchestrator appliance.

How many vSphere instances can be integrated in the vSphere Client through the VCF Operations orchestrator plug-in?

A.

8

B.

15

C.

1

D.

10

An administrator is tasked to optimize storage utilization in an existing VMware vSAN Original Storage Architecture (OSA) cluster.

The cluster has the following configuration:

    Eight-node cluster with 1 disk group per node.

    Virtual machines (VMs) are configured with 1 failure - RAID-1 storage policy.

    Storage utilization is at 70%.

Which action can the administrator take to reduce the existing storage utilization with the minimum impact to the cluster?

A.

Enable Deduplication and Compression on the cluster.

B.

Change the storage policy to 3 failure - RAID-1.

C.

Enable Compression only on the cluster.

D.

Change the storage policy to 2 failure - RAID-6.

An administrator is tasked with creating a custom VMware Cloud Foundation (VCF) Operations Web Certificate.

What are three requirements to which the certificate must conform to be used with VCF Operations? (Choose three.)

A.

In the certificate file, all certificates and the private key must be in PEM format.

B.

In the certificate file, the server certificate must be last in the order of certificates.

C.

The VCF Operations certificate cannot use the Subject Alternative Name (SAN) extension.

D.

In the certificate file, the server certificate must be first in the order of certificates.

E.

The certificate file must include the server certificate, a private key, and all issuing certificates.

F.

In the certificate file, all certificates and the private key must be in PFX format.