You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" Professional VMware vSphere 7.x Practice Test 8 "
0 of 65 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
Professional VMware vSphere 7.x
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking view questions. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
Answered
Review
Question 1 of 65
1. Question
You are deploying datastores in a vSphere environment and want to use the latest VMFS version that supports ESXi 6.5 and ESXi 7.0. Which version should you use?
Correct
VMFS Version 6 provides access for ESXi 6.5 and later hosts
Incorrect
VMFS Version 6 provides access for ESXi 6.5 and later hosts
Unattempted
VMFS Version 6 provides access for ESXi 6.5 and later hosts
Question 2 of 65
2. Question
You need your resource pool to use a two-pass algorithm to allocate reservations. In the second pass, excess pool reservation is allocated proportionally to virtual machines (limited by virtual machine size). Which step should you take?
Correct
Starting in vSphere 6.7, DRS uses a new two-pass algorithm to allocate resource reservations to its children. In the second pass, excess pool reservation is allocated proportionally, limited by the virtual machine’s configured size.
Incorrect
Starting in vSphere 6.7, DRS uses a new two-pass algorithm to allocate resource reservations to its children. In the second pass, excess pool reservation is allocated proportionally, limited by the virtual machine’s configured size.
Unattempted
Starting in vSphere 6.7, DRS uses a new two-pass algorithm to allocate resource reservations to its children. In the second pass, excess pool reservation is allocated proportionally, limited by the virtual machine’s configured size.
Question 3 of 65
3. Question
You are configuring virtual networking in your vSphere 7.0 environment. Which of the following policies are available for distributed switches but not for standard switches?
Correct
Distributed virtual switches can do both inbound and outbound traffic shaping, whereas standard virtual switches handle just outbound traffic shaping.
Incorrect
Distributed virtual switches can do both inbound and outbound traffic shaping, whereas standard virtual switches handle just outbound traffic shaping.
Unattempted
Distributed virtual switches can do both inbound and outbound traffic shaping, whereas standard virtual switches handle just outbound traffic shaping.
Question 4 of 65
4. Question
You are concerned about service availability for your vCenter Server. Which of the following statements is true?
Correct
If a vCenter service fails, VMware Service Lifecycle Manager restarts it. VMware Service Lifecycle Manager is a service running in vCenter server.
Incorrect
If a vCenter service fails, VMware Service Lifecycle Manager restarts it. VMware Service Lifecycle Manager is a service running in vCenter server.
Unattempted
If a vCenter service fails, VMware Service Lifecycle Manager restarts it. VMware Service Lifecycle Manager is a service running in vCenter server.
Question 5 of 65
5. Question
You are preparing to leverage VAAI in your vSphere environment. Which of the following primitives will not be available for your virtual machines stored in NFS datastores?
Correct
The following are the VAAI primitives for NAS: Full File Clone, Fast File Clone/Native Snapshot Support, Extended Statistics, and Reserve Space.
Incorrect
The following are the VAAI primitives for NAS: Full File Clone, Fast File Clone/Native Snapshot Support, Extended Statistics, and Reserve Space.
Unattempted
The following are the VAAI primitives for NAS: Full File Clone, Fast File Clone/Native Snapshot Support, Extended Statistics, and Reserve Space.
Question 6 of 65
6. Question
You are planning to implement vVols. Which of the following are logical I/O proxies?
Correct
Protocol endpoints (PEs) are logical I/O proxies, used for communication with virtual volumes and the virtual disk files.
Incorrect
Protocol endpoints (PEs) are logical I/O proxies, used for communication with virtual volumes and the virtual disk files.
Unattempted
Protocol endpoints (PEs) are logical I/O proxies, used for communication with virtual volumes and the virtual disk files.
Question 7 of 65
7. Question
You are preparing to manage and troubleshoot a vSAN environment. Which of the following is a command-line interface that provides a cluster-wide view and is included with the vCenter Server deployment?
Correct
Ruby vSphere Console (RVC) is a command-line interface used for managing and troubleshooting vSAN. RVC provides a cluster-wide view and is included with the vCenter Server deployment.
Incorrect
Ruby vSphere Console (RVC) is a command-line interface used for managing and troubleshooting vSAN. RVC provides a cluster-wide view and is included with the vCenter Server deployment.
Unattempted
Ruby vSphere Console (RVC) is a command-line interface used for managing and troubleshooting vSAN. RVC provides a cluster-wide view and is included with the vCenter Server deployment.
Question 8 of 65
8. Question
You are planning to implement RAID 6 erasure coding for a virtual disk stored in a vSAN datastore. What percentage of the required capacity will be usable?
Correct
If you choose RAID 5/6 and PFTT=2 for a 100 GB virtual disk, the required capacity is 150 GB, and the usable capacity is 67%.
Incorrect
If you choose RAID 5/6 and PFTT=2 for a 100 GB virtual disk, the required capacity is 150 GB, and the usable capacity is 67%.
Unattempted
If you choose RAID 5/6 and PFTT=2 for a 100 GB virtual disk, the required capacity is 150 GB, and the usable capacity is 67%.
Question 9 of 65
9. Question
You are explaining how vSphere interacts with storage systems. Which of the following steps may occur when VMware NMP receives an I/O request?
Correct
When the VMware NMP receives an I/O request, its calls the appropriate PSP, the PSP selects an appropriate physical path, and the NMP issues the I/O request.
Incorrect
When the VMware NMP receives an I/O request, its calls the appropriate PSP, the PSP selects an appropriate physical path, and the NMP issues the I/O request.
Unattempted
When the VMware NMP receives an I/O request, its calls the appropriate PSP, the PSP selects an appropriate physical path, and the NMP issues the I/O request.
Question 10 of 65
10. Question
You want to enable passthrough for a network device on your ESXi host. You see that an orange icon is associated with a device. Which of the following actions should you take?
Correct
An orange icon indicates that the status of the device has changed, and you must reboot the host before you can use the device.
Incorrect
An orange icon indicates that the status of the device has changed, and you must reboot the host before you can use the device.
Unattempted
An orange icon indicates that the status of the device has changed, and you must reboot the host before you can use the device.
Question 11 of 65
11. Question
You are configuring teaming policies in your vSphere 7.0 environment. Which of the following teaming options are not available for a vSS?
Correct
The following NIC teaming options are available on vSS and vDS: Route Based on Originating Virtual Port, Route Based on IP Hash, Route Based on Source MAC Hash, and Use Explicit Failover Order.
Incorrect
The following NIC teaming options are available on vSS and vDS: Route Based on Originating Virtual Port, Route Based on IP Hash, Route Based on Source MAC Hash, and Use Explicit Failover Order.
Unattempted
The following NIC teaming options are available on vSS and vDS: Route Based on Originating Virtual Port, Route Based on IP Hash, Route Based on Source MAC Hash, and Use Explicit Failover Order.
Question 12 of 65
12. Question
You want to configure your ESXi host’s acceptance level such that you cannot install VIBs signed at or below the PartnerSupported level but you can install VIBs signed at higher levels. Which option should you choose?
Correct
If the host acceptance level is VMwareAccepted, you cannot install VIBs at the PartnerSupported level.
Incorrect
If the host acceptance level is VMwareAccepted, you cannot install VIBs at the PartnerSupported level.
Unattempted
If the host acceptance level is VMwareAccepted, you cannot install VIBs at the PartnerSupported level.
Question 13 of 65
13. Question
You are managing certificates in your vSphere environment. By default, what types of certificates are in VECS? (Choose two.)
Correct
The Certificate Management page shows the certificate types in the VMware Endpoint Certificate Service (VECS). By default, the types are machine SSL certificates and trusted root certificates.
Incorrect
The Certificate Management page shows the certificate types in the VMware Endpoint Certificate Service (VECS). By default, the types are machine SSL certificates and trusted root certificates.
Unattempted
The Certificate Management page shows the certificate types in the VMware Endpoint Certificate Service (VECS). By default, the types are machine SSL certificates and trusted root certificates.
Question 14 of 65
14. Question
You want to create a custom TCP/IP stack for your ESXi 7.0 server. Which one of the following is an available service that you can directly enable for the stack?
Correct
The available services for a custom stack are Management, vMotion, IP-based storage, Provisioning, Fault Tolerance logging, vSphere Replication, vSphere Replication NFC, and vSAN.
Incorrect
The available services for a custom stack are Management, vMotion, IP-based storage, Provisioning, Fault Tolerance logging, vSphere Replication, vSphere Replication NFC, and vSAN.
Unattempted
The available services for a custom stack are Management, vMotion, IP-based storage, Provisioning, Fault Tolerance logging, vSphere Replication, vSphere Replication NFC, and vSAN.
Question 15 of 65
15. Question
You are configuring Virtual Machine Component Protection (VMCP) in a vSphere HA cluster. Which of the following statements is true?
Correct
For PDL and APD failures, you can set VMCP to either issue event alerts or to power off and restart virtual machines. For APD failures only, you can additionally control the restart policy for virtual machines by setting it to Conservative or Aggressive.
Incorrect
For PDL and APD failures, you can set VMCP to either issue event alerts or to power off and restart virtual machines. For APD failures only, you can additionally control the restart policy for virtual machines by setting it to Conservative or Aggressive.
Unattempted
For PDL and APD failures, you can set VMCP to either issue event alerts or to power off and restart virtual machines. For APD failures only, you can additionally control the restart policy for virtual machines by setting it to Conservative or Aggressive.
Question 16 of 65
16. Question
You are enabling direct ESXi access using local accounts. To change the password requirements, such as minimum length, which of the following steps should you take?
Correct
You can change the required length, change the character class requirement, and allow passphrases by using the Security.PasswordQualityControl advanced option.
Incorrect
You can change the required length, change the character class requirement, and allow passphrases by using the Security.PasswordQualityControl advanced option.
Unattempted
You can change the required length, change the character class requirement, and allow passphrases by using the Security.PasswordQualityControl advanced option.
Question 17 of 65
17. Question
You want to integrate vSphere with your storage system. Which of the following provides software components that integrate with vSphere to provide information about the physical storage capabilities?
Correct
VASA storage providers are software components that integrate with vSphere to provide information about the physical storage capabilities.
Incorrect
VASA storage providers are software components that integrate with vSphere to provide information about the physical storage capabilities.
Unattempted
VASA storage providers are software components that integrate with vSphere to provide information about the physical storage capabilities.
Question 18 of 65
18. Question
You want to address an application’s sensitivity to network latency by implementing a technology that presents a physical device with multiple virtual functions. Which one of the following should you implement?
Correct
Single Root I/O Virtualization (SR-IOV) is a feature that allows a single Peripheral Component Interconnect Express (PCIe) device to appear as multiple devices. It is useful for supporting an application in a guest OS that is sensitive to network latency. SR-IOV-enabled devices provide virtual functions (VFs) to the hypervisor or guest operating system.
Incorrect
Single Root I/O Virtualization (SR-IOV) is a feature that allows a single Peripheral Component Interconnect Express (PCIe) device to appear as multiple devices. It is useful for supporting an application in a guest OS that is sensitive to network latency. SR-IOV-enabled devices provide virtual functions (VFs) to the hypervisor or guest operating system.
Unattempted
Single Root I/O Virtualization (SR-IOV) is a feature that allows a single Peripheral Component Interconnect Express (PCIe) device to appear as multiple devices. It is useful for supporting an application in a guest OS that is sensitive to network latency. SR-IOV-enabled devices provide virtual functions (VFs) to the hypervisor or guest operating system.
Question 19 of 65
19. Question
You are preparing to implement vSphere with Kubernetes. Which type of virtual disk must you provide for storing logs, emptyDir volumes, and ConfigMaps?
Correct
A vSphere pod requires ephemeral storage to store Kubernetes objects, such as logs, emptyDir volumes, and ConfigMaps.
Incorrect
A vSphere pod requires ephemeral storage to store Kubernetes objects, such as logs, emptyDir volumes, and ConfigMaps.
Unattempted
A vSphere pod requires ephemeral storage to store Kubernetes objects, such as logs, emptyDir volumes, and ConfigMaps.
Question 20 of 65
20. Question
You created a distributed port group with default settings. Which of the following statements is true?
You want to leverage LAGs with your vDS. Which of the following is supported?
Correct
A vDS supports up to 64 LAGs.
Incorrect
A vDS supports up to 64 LAGs.
Unattempted
A vDS supports up to 64 LAGs.
Question 22 of 65
22. Question
You are configuring vSphere Fault Tolerance (FT) in a vSphere 7.0 environment. What is the maximum number of virtual CPUs you can use with an FT-protected virtual machine?
Correct
vSphere Fault Tolerance can accommodate symmetric multiprocessor (SMP) virtual machines with up to eight vCPUs.
Incorrect
vSphere Fault Tolerance can accommodate symmetric multiprocessor (SMP) virtual machines with up to eight vCPUs.
Unattempted
vSphere Fault Tolerance can accommodate symmetric multiprocessor (SMP) virtual machines with up to eight vCPUs.
Question 23 of 65
23. Question
You are configuring storage policies for use with your vSAN cluster. Which of the following is not an available option?
Correct
The available vSAN storage policies include PFTT, SFTT, Data Locality, Failure Tolerance Method, Number of Disk Stripes per Object, Flash Read Cached Reservation, Force Provisioning, Object Space Reservation, Disable, Object Checksum, and IOPS Limit for Object.
Incorrect
The available vSAN storage policies include PFTT, SFTT, Data Locality, Failure Tolerance Method, Number of Disk Stripes per Object, Flash Read Cached Reservation, Force Provisioning, Object Space Reservation, Disable, Object Checksum, and IOPS Limit for Object.
Unattempted
The available vSAN storage policies include PFTT, SFTT, Data Locality, Failure Tolerance Method, Number of Disk Stripes per Object, Flash Read Cached Reservation, Force Provisioning, Object Space Reservation, Disable, Object Checksum, and IOPS Limit for Object.
Question 24 of 65
24. Question
You are using the vSphere Client to manage the storage providers. Which one of the following is not an option?
Correct
When using the vSphere Client to manage the storage providers, you can select a storage provider and choose Synchronize Storage Providers, Rescan, Remove, or Refresh Certificate.
Incorrect
When using the vSphere Client to manage the storage providers, you can select a storage provider and choose Synchronize Storage Providers, Rescan, Remove, or Refresh Certificate.
Unattempted
When using the vSphere Client to manage the storage providers, you can select a storage provider and choose Synchronize Storage Providers, Rescan, Remove, or Refresh Certificate.
Question 25 of 65
25. Question
You are configuring EVC Mode in a vSphere cluster that uses Intel hardware. Which of the following values should you choose to set the EVC Mode to the lowest level that includes the SSE4.2 instruction set?
Correct
Intel EVC Mode Nehalem (Level L2) includes the Intel Penryn feature set and exposes additional CPU features, including SSE4.2 and POPCOUNT.
Incorrect
Intel EVC Mode Nehalem (Level L2) includes the Intel Penryn feature set and exposes additional CPU features, including SSE4.2 and POPCOUNT.
Unattempted
Intel EVC Mode Nehalem (Level L2) includes the Intel Penryn feature set and exposes additional CPU features, including SSE4.2 and POPCOUNT.
Question 26 of 65
26. Question
You are planning to implement a vSAN stretched cluster. Which of the following statements is true?
Correct
Symmetric Multiprocessing Fault Tolerance (SMP-FT) is supported when PFFT is set to 0 and Data Locality is set to Preferred or Secondary.
Incorrect
Symmetric Multiprocessing Fault Tolerance (SMP-FT) is supported when PFFT is set to 0 and Data Locality is set to Preferred or Secondary.
Unattempted
Symmetric Multiprocessing Fault Tolerance (SMP-FT) is supported when PFFT is set to 0 and Data Locality is set to Preferred or Secondary.
Question 27 of 65
27. Question
You want to control the use of NetFlow within your distributed switch. Which type of network policy should you implement?
Correct
After configuring NetFlow on a vDS, you can configure monitoring policies on vDS port groups and ports.
Incorrect
After configuring NetFlow on a vDS, you can configure monitoring policies on vDS port groups and ports.
Unattempted
After configuring NetFlow on a vDS, you can configure monitoring policies on vDS port groups and ports.
Question 28 of 65
28. Question
You want to implement network security policies at the lowest available level. Which approach should you choose?
Correct
At the distributed port level, you can override policies applied to the distributed port group and apply unique policies to a distributed port.
Incorrect
At the distributed port level, you can override policies applied to the distributed port group and apply unique policies to a distributed port.
Unattempted
At the distributed port level, you can override policies applied to the distributed port group and apply unique policies to a distributed port.
Question 29 of 65
29. Question
You are responsible for multiple vSphere environments. What must you do to enable the use of Enhanced Linked Mode in vSphere 7.0?
Correct
To join vCenter Server systems in Enhanced Linked Mode, you need to connect them to the same SSO domain.
Incorrect
To join vCenter Server systems in Enhanced Linked Mode, you need to connect them to the same SSO domain.
Unattempted
To join vCenter Server systems in Enhanced Linked Mode, you need to connect them to the same SSO domain.
Question 30 of 65
30. Question
You are configuring vSphere HA in a cluster. You want to configure the cluster to use a specific host as a target for failovers. Which setting should you use?
Correct
Set Define Host Failover Capacity By to Dedicated Failover Hosts to designate hosts to use for failover actions.
Incorrect
Set Define Host Failover Capacity By to Dedicated Failover Hosts to designate hosts to use for failover actions.
Unattempted
Set Define Host Failover Capacity By to Dedicated Failover Hosts to designate hosts to use for failover actions.
Question 31 of 65
31. Question
You want to tag voice over IP data in your vSphere environment. Which step should you take?
Correct
When marking traffic, you can create a rule to configure qualifiers to identify the data to be tagged and set Action to Tag.
Incorrect
When marking traffic, you can create a rule to configure qualifiers to identify the data to be tagged and set Action to Tag.
Unattempted
When marking traffic, you can create a rule to configure qualifiers to identify the data to be tagged and set Action to Tag.
Question 32 of 65
32. Question
You are responsible for performing certificate management for your ESXi hosts. Which of the following privileges do you need?
Correct
To perform certificate management for ESXi, you must have the Certificates.Manage Certificates privilege.
Incorrect
To perform certificate management for ESXi, you must have the Certificates.Manage Certificates privilege.
Unattempted
To perform certificate management for ESXi, you must have the Certificates.Manage Certificates privilege.
Question 33 of 65
33. Question
You are deploying virtual machines in a vSphere environment. Which virtual disk configuration provides the best performance for the guest OS?
Correct
Thick eager zeroed is the slowest method for virtual disk creation, but it is the best for guest performance.
Incorrect
Thick eager zeroed is the slowest method for virtual disk creation, but it is the best for guest performance.
Unattempted
Thick eager zeroed is the slowest method for virtual disk creation, but it is the best for guest performance.
Question 34 of 65
34. Question
You want to use DirectPath I/O in your vSphere 7.0 environment. Which of the following features is supported?
Correct
With DirectPath I/O in a vSphere 7.0 environment, a virtual machine can be part of a cluster, but it cannot migrate across hosts.
Incorrect
With DirectPath I/O in a vSphere 7.0 environment, a virtual machine can be part of a cluster, but it cannot migrate across hosts.
Unattempted
With DirectPath I/O in a vSphere 7.0 environment, a virtual machine can be part of a cluster, but it cannot migrate across hosts.
Question 35 of 65
35. Question
You are configuring traffic shaping policies for your vSS. Which one of the following is not an available setting?
Correct
When you enable traffic shaping for a standard switch or port group, you can configure the options Average Bandwidth, Peak Bandwidth, and Burst Size.
Incorrect
When you enable traffic shaping for a standard switch or port group, you can configure the options Average Bandwidth, Peak Bandwidth, and Burst Size.
Unattempted
When you enable traffic shaping for a standard switch or port group, you can configure the options Average Bandwidth, Peak Bandwidth, and Burst Size.
Question 36 of 65
36. Question
You are testing Storage DRS (SDRS) in a scenario where the utilized space on one datastore is 82%, and it is 79% on another. You observe that SDRS does not make a migration recommendation. What might be the reason?
Correct
If the space used on datastore A is 82% and on datastore B is 79%, the difference is 3. If the threshold is 5, Storage DRS will not make migration recommendations from datastore A to datastore B.
Incorrect
If the space used on datastore A is 82% and on datastore B is 79%, the difference is 3. If the threshold is 5, Storage DRS will not make migration recommendations from datastore A to datastore B.
Unattempted
If the space used on datastore A is 82% and on datastore B is 79%, the difference is 3. If the threshold is 5, Storage DRS will not make migration recommendations from datastore A to datastore B.
Question 37 of 65
37. Question
You want to enable UEFI Secure Boot. To determine whether your ESXi host supports Secure Boot, which of the following steps should you take?
Correct
: You can use the following command to run the Secure Boot validation script on an upgraded ESXi host:Â /usr/lib/vmware/secureboot/bin/secureBoot.py -c
Incorrect
: You can use the following command to run the Secure Boot validation script on an upgraded ESXi host:Â /usr/lib/vmware/secureboot/bin/secureBoot.py -c
Unattempted
: You can use the following command to run the Secure Boot validation script on an upgraded ESXi host:Â /usr/lib/vmware/secureboot/bin/secureBoot.py -c
Question 38 of 65
38. Question
Which of the following is the default path selection policy for most active/passive storage devices?
Correct
MRU is the default path selection policy for most active/passive storage devices.
Incorrect
MRU is the default path selection policy for most active/passive storage devices.
Unattempted
MRU is the default path selection policy for most active/passive storage devices.
Question 39 of 65
39. Question
Which of the following is not a good use for resource pools in DRS?
Correct
Resource pools are container objects in the vSphere inventory that are used to compartmentalize the CPU and memory resources of a host, a cluster, or a parent resource pool. You can delegate control over each resource pool to specific individuals and groups.
Incorrect
Resource pools are container objects in the vSphere inventory that are used to compartmentalize the CPU and memory resources of a host, a cluster, or a parent resource pool. You can delegate control over each resource pool to specific individuals and groups.
Unattempted
Resource pools are container objects in the vSphere inventory that are used to compartmentalize the CPU and memory resources of a host, a cluster, or a parent resource pool. You can delegate control over each resource pool to specific individuals and groups.
Question 40 of 65
40. Question
In vSphere 7.0, you want to configure the DRS migration threshold such that it is at the minimum level at which the virtual machine happiness is considered. Which of the following values should you choose?
Correct
When the DRS migration threshold is set to Level 3, the default level, DRS expands on Level 2 by making recommendations to improve VM happiness and cluster load distribution.
Incorrect
When the DRS migration threshold is set to Level 3, the default level, DRS expands on Level 2 by making recommendations to improve VM happiness and cluster load distribution.
Unattempted
When the DRS migration threshold is set to Level 3, the default level, DRS expands on Level 2 by making recommendations to improve VM happiness and cluster load distribution.
Question 41 of 65
41. Question
You want to be able to use the vSphere Client to identify the non-Cisco physical switch connected to a virtual switch uplink. Which of the following should you implement?
Correct
Cisco Discovery Protocol (CDP) support was introduced with ESX 3.x. CDP is available for standard switches and distributed switches that are connected to Cisco physical switches. Link Layer Discovery Protocol (LLDP) is supported in vSphere 5.0 and later for vDS (5.0.0 and later), but not for vSS.
Incorrect
Cisco Discovery Protocol (CDP) support was introduced with ESX 3.x. CDP is available for standard switches and distributed switches that are connected to Cisco physical switches. Link Layer Discovery Protocol (LLDP) is supported in vSphere 5.0 and later for vDS (5.0.0 and later), but not for vSS.
Unattempted
Cisco Discovery Protocol (CDP) support was introduced with ESX 3.x. CDP is available for standard switches and distributed switches that are connected to Cisco physical switches. Link Layer Discovery Protocol (LLDP) is supported in vSphere 5.0 and later for vDS (5.0.0 and later), but not for vSS.
Question 42 of 65
42. Question
In your vSphere environment where VASA is not implemented, you are planning to leverage storage policies associated with devices in your storage array. Which type of storage policies should you create?
Correct
A VM storage policy for tag-based placement is helpful for storage arrays that do not support VASA and their storage characteristics are not visible to the vSphere client.
Incorrect
A VM storage policy for tag-based placement is helpful for storage arrays that do not support VASA and their storage characteristics are not visible to the vSphere client.
Unattempted
A VM storage policy for tag-based placement is helpful for storage arrays that do not support VASA and their storage characteristics are not visible to the vSphere client.
Question 43 of 65
43. Question
You are enabling VM Monitoring in a vSphere HA cluster. You want to set the monitoring level such that its failure interval is 60 seconds. Which of the following options should you choose?
Correct
The medium virtual machine monitoring level sets Failure Interval to 60 seconds and Reset Period to 24 hours.
Incorrect
The medium virtual machine monitoring level sets Failure Interval to 60 seconds and Reset Period to 24 hours.
Unattempted
The medium virtual machine monitoring level sets Failure Interval to 60 seconds and Reset Period to 24 hours.
Question 44 of 65
44. Question
You are configuring networking policies in your vSphere 7.0 environment. Which of the following policies are not available for a vSS?
Correct
On a vSS, you can set the following network policies: Teaming and Failover, Security, Traffic Shaping, and VLAN.
Incorrect
On a vSS, you can set the following network policies: Teaming and Failover, Security, Traffic Shaping, and VLAN.
Unattempted
On a vSS, you can set the following network policies: Teaming and Failover, Security, Traffic Shaping, and VLAN.
Question 45 of 65
45. Question
You want to enable a vDS health check for virtual switch teaming. Which of the following is a requirement?
Correct
The required vDS configuration for the virtual switch teaming policy health check is at least two active physical NICs and two hosts.
Incorrect
The required vDS configuration for the virtual switch teaming policy health check is at least two active physical NICs and two hosts.
Unattempted
The required vDS configuration for the virtual switch teaming policy health check is at least two active physical NICs and two hosts.
Question 46 of 65
46. Question
Using NIOC, you reserved 1.0 Gbps for virtual machine system traffic on a distributed switch with eight 10 Gbps uplinks. If you reserve 512 Mbps for a network resource pool, what is the maximum reservation you can set in another network resource pool?
Correct
If you reserved 1.0 Gbps for virtual machine system traffic on a distributed switch with 8 uplinks, then the total aggregated bandwidth available for virtual machine reservation on the switch is 8.0 Gbps. Each network resource pool can reserve a portion of the 8 Gbps capacity.
Incorrect
If you reserved 1.0 Gbps for virtual machine system traffic on a distributed switch with 8 uplinks, then the total aggregated bandwidth available for virtual machine reservation on the switch is 8.0 Gbps. Each network resource pool can reserve a portion of the 8 Gbps capacity.
Unattempted
If you reserved 1.0 Gbps for virtual machine system traffic on a distributed switch with 8 uplinks, then the total aggregated bandwidth available for virtual machine reservation on the switch is 8.0 Gbps. Each network resource pool can reserve a portion of the 8 Gbps capacity.
Question 47 of 65
47. Question
You are configuring permissions in a vSphere environment. When editing an existing permission, which of the following properties can you change?
Correct
In a vSphere environment, you cannot change the object, user, or user group in a permission, but you can change the role.
Incorrect
In a vSphere environment, you cannot change the object, user, or user group in a permission, but you can change the role.
Unattempted
In a vSphere environment, you cannot change the object, user, or user group in a permission, but you can change the role.
Question 48 of 65
48. Question
You need to configure a virtual machine to utilize N-Port ID Virtualization (NPIV). Which of the following are required? (Choose two.)
Correct
NPIV requires the use of virtual machines with RDMs. An RDM is a mapping file containing metadata that resides in a VMFS datastore.
Incorrect
NPIV requires the use of virtual machines with RDMs. An RDM is a mapping file containing metadata that resides in a VMFS datastore.
Unattempted
NPIV requires the use of virtual machines with RDMs. An RDM is a mapping file containing metadata that resides in a VMFS datastore.
Question 49 of 65
49. Question
You want to use Predictive DRS. What is the minimum vSphere version you need?
Correct
Predictive DRS requires vCenter Server 6.5 or later, it must be enabled on both vCenter Server and vROps, and the vCenter Server and vROps clocks must be synchronized.
Incorrect
Predictive DRS requires vCenter Server 6.5 or later, it must be enabled on both vCenter Server and vROps, and the vCenter Server and vROps clocks must be synchronized.
Unattempted
Predictive DRS requires vCenter Server 6.5 or later, it must be enabled on both vCenter Server and vROps, and the vCenter Server and vROps clocks must be synchronized.
Question 50 of 65
50. Question
You need to use encryption in your vSphere environment. Which of the following should you use to configure a trust relationship between a KMS and vCenter?
Correct
To configure a trust relationship between a KMS and vCenter, in the vSphere Client, select the vCenter Server, navigate to Configuration > Key Management Servers, and click Add.
Incorrect
To configure a trust relationship between a KMS and vCenter, in the vSphere Client, select the vCenter Server, navigate to Configuration > Key Management Servers, and click Add.
Unattempted
To configure a trust relationship between a KMS and vCenter, in the vSphere Client, select the vCenter Server, navigate to Configuration > Key Management Servers, and click Add.
Question 51 of 65
51. Question
You want to adopt zero-trust security and automated network deployment. Which of the following products should you use?
Correct
NSX is commonly used with zero-trust security and multi-cloud networking.
Incorrect
NSX is commonly used with zero-trust security and multi-cloud networking.
Unattempted
NSX is commonly used with zero-trust security and multi-cloud networking.
Question 52 of 65
52. Question
You want to implement a workload mobility platform that simplifies application migration, workload rebalancing, and business continuity across hybrid clouds. Which product should you implement?
Correct
VMware HCX is a workload mobility platform that simplifies application migration, workload rebalancing, and business continuity across on-premises data centers, private clouds, and hybrid clouds.
Incorrect
VMware HCX is a workload mobility platform that simplifies application migration, workload rebalancing, and business continuity across on-premises data centers, private clouds, and hybrid clouds.
Unattempted
VMware HCX is a workload mobility platform that simplifies application migration, workload rebalancing, and business continuity across on-premises data centers, private clouds, and hybrid clouds.
Question 53 of 65
53. Question
You are configuring vSphere Distributed Power Management (DPM) in your vSphere 7.0 environment. Which of the following is not a requirement for using Wake-on-LAN (WoL) in DPM?
Correct
To use Wake-on-LAN (WoL) with DPM, you must ensure that vMotion is configured, the vMotion NIC must supports WoL, and the physical switch port must be set to automatically negotiate the link speed.
Incorrect
To use Wake-on-LAN (WoL) with DPM, you must ensure that vMotion is configured, the vMotion NIC must supports WoL, and the physical switch port must be set to automatically negotiate the link speed.
Unattempted
To use Wake-on-LAN (WoL) with DPM, you must ensure that vMotion is configured, the vMotion NIC must supports WoL, and the physical switch port must be set to automatically negotiate the link speed.
Question 54 of 65
54. Question
You want to deliver VDI using stateless virtual desktops and just-in-time delivery of user profile data and applications. Which products should you choose? (Choose two.)
Correct
Horizon includes instant clones, which together with VMware Dynamic Environment Manager and VMware App Volumes dynamically provides just-in-time (JIT) delivery of user profile data and applications to stateless desktops.
Incorrect
Horizon includes instant clones, which together with VMware Dynamic Environment Manager and VMware App Volumes dynamically provides just-in-time (JIT) delivery of user profile data and applications to stateless desktops.
Unattempted
Horizon includes instant clones, which together with VMware Dynamic Environment Manager and VMware App Volumes dynamically provides just-in-time (JIT) delivery of user profile data and applications to stateless desktops.
Question 55 of 65
55. Question
You just installed a new vCenter Server. Using the vSphere Client, which of the following objects can be the first object that you create in the inventory pane?
Correct
Other than an optional folder to contain data centers, you cannot create any object in the inventory until you create a data center
Incorrect
Other than an optional folder to contain data centers, you cannot create any object in the inventory until you create a data center
Unattempted
Other than an optional folder to contain data centers, you cannot create any object in the inventory until you create a data center
Question 56 of 65
56. Question
You want to configure vSphere Replication using the vSphere Client. Which of the following is the correct navigation path?
Correct
To configure replication, in the vSphere Client, navigate to Home > Site Recovery > Open Site Recovery.
Incorrect
To configure replication, in the vSphere Client, navigate to Home > Site Recovery > Open Site Recovery.
Unattempted
To configure replication, in the vSphere Client, navigate to Home > Site Recovery > Open Site Recovery.
Question 57 of 65
57. Question
Which of the following products provides connection, WAN optimization, and bulk migrations?
Correct
VMware HCX is a workload mobility platform that simplifies application migration, workload rebalancing, and business continuity across on-premises data centers, private clouds, and hybrid clouds.
Incorrect
VMware HCX is a workload mobility platform that simplifies application migration, workload rebalancing, and business continuity across on-premises data centers, private clouds, and hybrid clouds.
Unattempted
VMware HCX is a workload mobility platform that simplifies application migration, workload rebalancing, and business continuity across on-premises data centers, private clouds, and hybrid clouds.
Question 58 of 65
58. Question
You want to decrease time and effort spent on root cause analysis in your data center. Which of the following products should you use?
Correct
vRealize Log Insight (vRLI) is commonly used to decrease time and effort spent on root cause analysis and centralized log management and analysis.
Incorrect
vRealize Log Insight (vRLI) is commonly used to decrease time and effort spent on root cause analysis and centralized log management and analysis.
Unattempted
vRealize Log Insight (vRLI) is commonly used to decrease time and effort spent on root cause analysis and centralized log management and analysis.
Question 59 of 65
59. Question
You plan to upgrade a Windows-based vCenter Server to vCenter Server Appliance 7.0 and want to transfer data in the background. Which of the following types of data can be transferred in the background following the upgrade?
Correct
If you choose to transfer configuration, historical, and performance data, you can transfer the configuration data during the upgrade and transfer the remaining data in the background following the upgrade. The option to transfer data in the background following an upgrade is applicable only to scenarios where the source vCenter Server uses an external database.
Incorrect
If you choose to transfer configuration, historical, and performance data, you can transfer the configuration data during the upgrade and transfer the remaining data in the background following the upgrade. The option to transfer data in the background following an upgrade is applicable only to scenarios where the source vCenter Server uses an external database.
Unattempted
If you choose to transfer configuration, historical, and performance data, you can transfer the configuration data during the upgrade and transfer the remaining data in the background following the upgrade. The option to transfer data in the background following an upgrade is applicable only to scenarios where the source vCenter Server uses an external database.
Question 60 of 65
60. Question
You are preparing to apply permissions in vCenter Server. Which of the following is a system role?
Correct
In vCenter Server 7.0, the system roles include read-only, administrator, no access, no cryptography administrator, trusted infrastructure administrator, and no trusted infrastructure administrator.
Incorrect
In vCenter Server 7.0, the system roles include read-only, administrator, no access, no cryptography administrator, trusted infrastructure administrator, and no trusted infrastructure administrator.
Unattempted
In vCenter Server 7.0, the system roles include read-only, administrator, no access, no cryptography administrator, trusted infrastructure administrator, and no trusted infrastructure administrator.
Question 61 of 65
61. Question
You are configuring permissions in vCenter Server. Which privilege is required for a user to use Storage vMotion to migrate a virtual machine?
Correct
To migrate a virtual machine with Storage vMotion, the user must have the Resource.Migrate Powered On Virtual Machine on the virtual machine or folder and Datastore.Allocate Space on the destination datastore.
Incorrect
To migrate a virtual machine with Storage vMotion, the user must have the Resource.Migrate Powered On Virtual Machine on the virtual machine or folder and Datastore.Allocate Space on the destination datastore.
Unattempted
To migrate a virtual machine with Storage vMotion, the user must have the Resource.Migrate Powered On Virtual Machine on the virtual machine or folder and Datastore.Allocate Space on the destination datastore.
Question 62 of 65
62. Question
You are providing support for a virtual machine named Server01 in a vSphere 7.0 environment. Which of the following is the virtual disk data file?
Correct
The file named -flat.vmdk is the virtual machine data disk file. It is commonly called the flat file. ..vmdk is the virtual machine data disk file.
Incorrect
The file named -flat.vmdk is the virtual machine data disk file. It is commonly called the flat file. ..vmdk is the virtual machine data disk file.
Unattempted
The file named -flat.vmdk is the virtual machine data disk file. It is commonly called the flat file. ..vmdk is the virtual machine data disk file.
Question 63 of 65
63. Question
You need to provide virtual desktops and applications to remote users and call centers. Which product should you implement?
Correct
VMware Horizon is commonly used for remote users, kiosk and task users, and call centers.
Incorrect
VMware Horizon is commonly used for remote users, kiosk and task users, and call centers.
Unattempted
VMware Horizon is commonly used for remote users, kiosk and task users, and call centers.
Question 64 of 65
64. Question
You are making plans for ESXi host certificates. Which of the following is not a valid certificate mode?
Correct
vCenter Server supports these certificate modes for ESXi: VMware Certificate Authority, Custom Certificate Authority, and Thumbprint Mode.
Incorrect
vCenter Server supports these certificate modes for ESXi: VMware Certificate Authority, Custom Certificate Authority, and Thumbprint Mode.
Unattempted
vCenter Server supports these certificate modes for ESXi: VMware Certificate Authority, Custom Certificate Authority, and Thumbprint Mode.
Question 65 of 65
65. Question
In a vSphere cluster, which of the following statements is true if the primary host detects datastore heartbeats for a secondary host but no network heartbeats or ping responses?
Correct
If the primary host detects datastore heartbeats for a secondary host but no network heartbeats or ping responses, it assumes that the secondary host is isolated or in a network partition.
Incorrect
If the primary host detects datastore heartbeats for a secondary host but no network heartbeats or ping responses, it assumes that the secondary host is isolated or in a network partition.
Unattempted
If the primary host detects datastore heartbeats for a secondary host but no network heartbeats or ping responses, it assumes that the secondary host is isolated or in a network partition.
X
Use Page numbers below to navigate to other practice tests