An administrator is configuring ESXi host behavior before and during the remediation process.
Which remediation setting is supported only on select hardware platforms? (Choose the best answer.)
An administrator wants to create a master copy of an existing virtual machine (VM) named “TestApp” and deploy VMs from this master copy whenever a user requests one.
Which method can the administrator use to create a master copy of TestApp? (Choose the best answer.)
An administrator runs a two-node vSphere cluster, which contains two domain controller virtual machines (VMs). The administrator wants to ensure that VMs run on separate hosts without interfering with normal maintenance operations.
How should the administrator configure Distributed Resource Scheduler (DRS)? (Choose the best answer.)
An administrator is tasked with upgrading an existing vSphere environment to version 7.0. There are existing VMFS3 and VMFS5 datastores in the environment.
Which statement is true regarding this upgrade? (Choose the best answer.)
Which feature is a prerequisite for Proactive High Availability (HA)? (Choose the best answer.)
A development team has a recurring need to rapidly replicate hundreds of virtual machines (VMs) for load testing.
Which method should the team use to deploy the VMs? (Choose the best answer.)
An administrator sees a virtual machine message that reads, “Consolidation is required” in the vSphere Client.
Which action does ESXi take when the administrator completes snapshot consolidation? (Choose the best answer.)
Refer to the exhibit.

What is the effective role the test1 account has on the Finance01 virtual machine? (Choose the best answer.)
An administrator is running a variety of vSphere 6.5 cluster configurations and is tasked with upgrading to vSphere 7.0.
Which two conditions could cause potential conflicts or outages to the virtual machines (VMs)? (Choose two.)
An administrator wants to leverage the processor-specific technology that uses a security extension for securing virtual machines (VMs). This will allow user-level code to define private regions of memory called enclaves that are protected from external access.
What does the administrator need to configure to enable VMs to use this technology? (Choose the best answer.)