Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

An administrator is required to configure several Microsoft Windows virtual machines (VMs) to support Secure Boot for a critical secure application.

The following information is provided:

•The corporate security policy states that all forms of data encryption must utilize a key provider.

•The firmware of each VM is currently set to use Unified Extensible Firmware Interface (UEFI).

•Due to the nature of the application running within the VMs, the guest operating system for each VM is currently a minimum of Windows Server 2008 and Windows 7.

Which security feature should the administrator implement to meet these requirements?

A.

vSphere Virtual Machine Encryption

B.

vSphere Visualization-Based Security

C.

Virtual Intel Software Guard Extensions (vSGX)

D.

Virtual Trusted Platform Module (vTPM)

An administrator notices a Fibre Channel adapter in an ESXi host has been experiencing inconsistent connectivity states.

Which trigger can be used to quickly identify the issue and alert the administrator so that the issue can be resolved?

A.

Host Connection Lost

B.

Lost Network Path Redundancy

C.

Lost Network Connectivity

D.

Lost Storage Connectivity

An administrator has configured Storage I/O Control (SIOC) on a Virtual Machine File System (VMFS) datastore.

•The datastore supports 30,000 IOPS

•Storage I/O Control has been set to manual

•Storage I/O Control is triggered when latency hits 30 ms

•The datastore contains 3 virtual machines (VMs)

•A gold tier VM

•A silver tier VM

•A bronze tier VM

Assuming the datastore latency does not exceed 29ms, what is the maximum number of IOPS the bronze tier VM is entitled to?

A.

30,000

B.

20,000

C.

10.000

D.

5,000

A group of new virtual machines have been deployed using thin-provisioned disks due to the limited storage space available in an environment. The storage team has expressed concern about extensive use of this type of provisioning.

An administrator is tasked with creating a custom alarm to notify the storage team when thin provisioning reaches a certain capacity threshold.

Where must the administrator define this alarm?

A.

Datastore

B.

Data center

C.

Datastore cluster

D.

Virtual machine

Which step is completed during Stage 1 of the vCenter Server Appliance deployment?

A.

Join a vCenter Single Sign-On domain

B.

Create a new vCenter Single Sign-On domain

C.

Select the deployment size

D.

Configure SSH access

An administrator wants to allow a DevOps engineer the ability to delete Tanzu Kubernetes Grid (TKG) cluster objects in a vSphere Namespace.

Which role would provide the minimum required permissions to perform this operation?

A.

Administrator

B.

Can View

C.

Owner

D.

Can Edit

Which two tasks can be completed using vSphere LifeCycle Manager? (Choose two.)

A.

Manage the firmware lifecycle of ESXi hosts that are part of a managed cluster with a single image.

B.

Check that the ESXi hosts are compliant with the recommended baseline and update the hosts

C.

Upgrade VMware vCenter from version 7 to 8.

D.

Check the hardware compatibility of the hosts in a cluster against the VMware Compatibility Guide (VCG) using baselines.

E.

Manage the firmware lifecycle of ESXi hosts are part of a managed cluster using baselines

A vSphere cluster hosts a three-tier application. The cluster has 50% resources available. If a host in the cluster fails, the database server must be online before the application server, and the application server must be online before the Web server.

Which feature can be used to meet these requirements?

A.

Predictive DRS

B.

vSphere HA Orchestrated Restart

C.

vSphere HA Restart Priority

D.

Proactive HA

An administrator is tasked with looking into the disaster recovery (DR) options for a software-defined data center (SDDC).

The following requirements must be met:

•All virtual machines (VMs) must be protected to a secondary site.

•The source VMs must remain online until the failover.

•When failing over to the secondary site, application downtime is allowed

•The DR failover must be managed from the vSphere Client.

•Costs must remain as low as possible.

How can the administrator accomplish this task?

A.

Configure VMware Cloud Disaster Recovery (VCDR) and combine it with array-based storage replication

B.

Configure VMware a Site Recovery Manager and combine it with vSphere Replication.

C.

Configure a subscribed content library on the secondary site.

D.

Configure VMware Site Recovery Manager and combine it with array-based storage replication.

A vSphere environment is experiencing intermittent short bursts of CPU contention, causing brief production outages for some of the virtual machines (VMs). To understand the cause of the issue, the administrator wants to observe near real-time statistics for all VMs.

Which two vSphere reporting tools could the administrator use? (Choose two.)

A.

Advanced Performance Charts

B.

esxcli

C.

resxtop

D.

Overview Performance Charts

E.

esxtop