Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An administrator is tasked with deploying a new VMware vSAN-backed vSphere cluster.

Environment:

    Existing VCF instance with two workload domains.

    Each workload domain has one vSphere cluster.

    The new cluster must be lifecycle-managed and scaled independently from existing clusters.

Which action must the administrator take?

A.

Deploy the new vSphere cluster on one of the non-management workload domains within the existing VCF instance.

B.

Deploy the new vSphere cluster on one of the existing workload domains within the existing VCF instance.

C.

Deploy the new vSphere cluster as a new workload domain with a new NSX instance within the existing VCF instance.

D.

Deploy the new vSphere cluster as a new workload domain with shared NSX within the existing VCF instance.

An administrator is responsible for the management of a VMware Cloud Foundation (VCF) environment. The administrator has been tasked with deleting an Organization that was created in error within VCF Automation.

Assuming the administrator has the correct permissions, which four steps must the administrator take to complete the objective? (Choose four.)

A.

Delete the target Organization.

B.

Delete all SSL Certificates for the target Organization.

C.

Disable the target Organization.

D.

Delete all region quotas within the target Organization.

E.

Log into the VCF Operations Fleet Management Portal.

F.

Delete the embedded VCF Operations Orchestrator instance.

G.

Log into the VCF Automation Provider Management Portal.

A security team informed an administrator that a VMware vCenter root password was compromised. As a precaution, the password was changed directly in vCenter. What should an administrator do to regain management capability of this vCenter by VCF Operations?

A.

Enter the new root password using the Reset password function in VCF Operations.

B.

Use the Rotate password function in VCF Operations.

C.

Enter the new root password using the Update password function in VCF Operations.

D.

Enter the new root password using the Remediate password function in VCF Operations.

During creation of a new Organization for All Applications in VCF Automation, which four NSX constructs are automatically configured at the regional networking step? (Choose four.)

A.

A Default Virtual Private Cloud (VPC)

B.

A Provider Tier-0 Gateway

C.

An outbound Destination Network Address Translation (DNAT) rule

D.

An NSX Transit Gateway

E.

An outbound Source Network Address Translation (SNAT) rule

F.

A Virtual Distributed Switch (VDS)

G.

A Virtual Private Cloud (VPC) connectivity profile

An administrator must replace a component’s certificate in VCF with an external CA-signed certificate. What format must be used when creating the certificate?

A.

DER

B.

PFX

C.

P7B

D.

PEM

Which tool can be used to backup and restore workloads on clusters provisioned by vSphere Supervisor?

A.

Velero

B.

Site Recovery Manager

C.

Restic

D.

VMware Live Recovery

Which VMware Cloud Foundation (VCF) Automation component provides a self-service catalog in the VM Apps tenant?

A.

VCF Operations Orchestrator

B.

VCF Assembler

C.

VCF Service Broker

D.

VCF Config

An organization wants to enable Service and Application Discovery across their VMware Cloud Foundation (VCF) fleet. Which optional VMware Cloud Foundation (VCF) solution must the administrator enable or deploy to facilitate this capability?

A.

vSphere Supervisor

B.

VCF Operations for Logs

C.

VCF Operations Collector

D.

VCF Operations for Networks

An administrator is tasked with upgrading a vSphere 8-only environment to VCF 9.0. Which three components must be deployed as part of the upgrade? (Choose three.)

A.

VCF Operations fleet management

B.

VCF Identity Broker

C.

VCF Operations for Logs

D.

VCF Operations

E.

VCF Operations for Networks

F.

VCF Operations Collector

Why is a Container Storage Interface (CSI) necessary?

A.

CSI replaces all 3rd party storage provider interfaces.

B.

CSI allows applications to dynamically detect storage.

C.

CSI provides containers access to ephemeral storage.

D.

CSI provides persistent storage functionality to containers.