New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An administrator is configuring ESXi host behavior before and during the remediation process.

Which remediation setting is supported only on select hardware platforms? (Choose the best answer.)

A.

VM migration

B.

HA admission control

C.

Maintenance mode failures

D.

Quick Boot

An administrator wants to create a master copy of an existing virtual machine (VM) named “TestApp” and deploy VMs from this master copy whenever a user requests one.

Which method can the administrator use to create a master copy of TestApp? (Choose the best answer.)

A.

Deploy from an Open Virtual Machine Format (OVF) template

B.

Convert a template to a VM

C.

Clone the VM to a template

D.

Create a new VM

An administrator runs a two-node vSphere cluster, which contains two domain controller virtual machines (VMs). The administrator wants to ensure that VMs run on separate hosts without interfering with normal maintenance operations.

How should the administrator configure Distributed Resource Scheduler (DRS)? (Choose the best answer.)

A.

Create a ‘Must run Virtual Machines to Hosts’ anti-affinity rule.

B.

Create a ‘Virtual Machines to Virtual Machines’ anti-affinity rule.

C.

Create a ‘Virtual Machines to Virtual Machines’ dependency rule.

D.

Create a ‘Should run Virtual Machines to Hosts’ anti-affinity rule.

An administrator is tasked with upgrading an existing vSphere environment to version 7.0. There are existing VMFS3 and VMFS5 datastores in the environment.

Which statement is true regarding this upgrade? (Choose the best answer.)

A.

An ESXi 7.0 host will NOT recognize a VMFS3 datastore.

B.

VMFS3 is supported with ESXi 7.0 to store boot configurations only.

C.

A VMFS5 datastore CANNOT be upgraded; a new VMFS6 datastore is required.

D.

An ESXi 7.0 host can automatically upgrade a VMFS5 datastore.

Which feature is a prerequisite for Proactive High Availability (HA)? (Choose the best answer.)

A.

vCenter High Availability

B.

vSAN Cluster

C.

Predictive Distributive Resource Scheduler (DRS)

D.

vSphere Distributive Resource Scheduler (DRS)

A development team has a recurring need to rapidly replicate hundreds of virtual machines (VMs) for load testing.

Which method should the team use to deploy the VMs? (Choose the best answer.)

A.

Linked clones from a content library

B.

Instant clones using the vSphere API

C.

Full clones using vSphere Auto Deploy

D.

Full clones from a template

An administrator sees a virtual machine message that reads, “Consolidation is required” in the vSphere Client.

Which action does ESXi take when the administrator completes snapshot consolidation? (Choose the best answer.)

A.

Collapses all snapshots in the current snapshot tree

B.

Commits redundant delta disks to the base disk

C.

Collapses all snapshots into a single snapshot

D.

Deletes all snapshots without committing to the base disk

Refer to the exhibit.

What is the effective role the test1 account has on the Finance01 virtual machine? (Choose the best answer.)

A.

No access

B.

Administrator

C.

Read-only

D.

Virtual machine user

An administrator is running a variety of vSphere 6.5 cluster configurations and is tasked with upgrading to vSphere 7.0.

Which two conditions could cause potential conflicts or outages to the virtual machines (VMs)? (Choose two.)

A.

The use of a Windows vCenter Server system

B.

Datastores attached to the hosts based on VMFS3

C.

The upgrade of a vSphere Distributed Switch with VMs attached

D.

The upgrade of an external platform services controller

E.

The use of third-party custom vSphere Installation Bundles (VIBs) installed on the ESXi hosts

An administrator wants to leverage the processor-specific technology that uses a security extension for securing virtual machines (VMs). This will allow user-level code to define private regions of memory called enclaves that are protected from external access.

What does the administrator need to configure to enable VMs to use this technology? (Choose the best answer.)

A.

Trusted Platform Module (TPM)

B.

Virtual Intel Software Guard Extensions (vSGX)

C.

Advanced Encryption Standard-New Instructions (AES-NI)

D.

Transparent Page Sharing (TPS)