Answers to the “Do I Know This Already?” Quizzes and Review Questions
1. b. Explanation: vCenter Server Essentials Plus, which is included in vSphere Essentials Plus, supports vMotion.
2. b. Explanation: Proactive HA minimizes VM downtime by proactively detecting hardware failures and placing the host in Quarantine Mode or Maintenance Mode.
3. d. Explanation: Security Token Service (STS) provides Security Assertion Markup Language (SAML) tokens, which are used to authenticate users to other vCenter components instead of requiring users to authenticate to each component.
4. a. Explanation: During vCenter Server Appliance deployment, you must create an SSO domain or join an existing SSO domain.
5. a. Explanation: You should deploy vCenter Server Appliance in the Large Environment configuration, which requires 37 GB, because the Medium Environment configuration supports only 4000 virtual machines.
6. d. Explanation: Changing the host boot type between legacy BIOS and UEFI is not supported after you install ESXi 7.0.
7. a. Explanation: If you plan to schedule file-based backups using the vCenter Server Appliance Management Interface (VAMI), you must prepare an FTP, FTPS, HTTP, HTTPS, or SCP server with sufficient disk space to store the backups. Although the NFS and SMB protocols are supported for backup, the vCenter Server Appliance GUI installer does not support restoration from a backup with these protocols. To perform a restore from the NFS or SMB protocol, use the vCenter Server Management API.
8. c. Explanation: For Windows users, VMware supports Microsoft Edge 38 and later, Microsoft Internet Explorer 11.0.96 and later, Mozilla Firefox 45 and later, Google Chrome 50 and later, and Safari 5.1 and later. For Mac users, VMware supports Safari 5.1 and later, Mozilla Firefox 45 and later, and Google Chrome 50 and later.
9. d. Explanation: vRealize Automation is cloud automation software that speeds up the delivery of infrastructure and application resources on-premises and in the public cloud.
10. b. Explanation: VMware Cloud Foundation (VCF) delivers a simple path to the hybrid cloud by leveraging a common infrastructure and consistent operational model for on-premises and off-premises data centers.
1. c and f. Explanation: NPIV requires the use of virtual machines with RDMs. An RDM is a mapping file containing metadata that resides in a VMFS datastore.
2. a. Explanation: A vSphere pod requires ephemeral storage to store Kubernetes objects, such as logs, emptyDir volumes, and ConfigMaps.
3. c. Explanation: Symmetric Multiprocessing Fault Tolerance (SMP-FT) is supported when PFFT is set to 0 and Data Locality is set to Preferred or Secondary.
4. b. Explanation: If you choose RAID 5/6 and PFTT=2 for a 100 GB virtual disk, the required capacity is 150 GB, and the usable capacity is 67%.
5. a. Explanation: The following are the VAAI primitives for NAS: Full File Clone, Fast File Clone/Native Snapshot Support, Extended Statistics, and Reserve Space.
6. d. Explanation: Protocol endpoints (PEs) are logical I/O proxies, used for communication with virtual volumes and the virtual disk files.
7. a. Explanation: When the VMware NMP receives an I/O request, its calls the appropriate PSP, the PSP selects an appropriate physical path, and the NMP issues the I/O request.
8. c. Explanation: A VM storage policy for tag-based placement is helpful for storage arrays that do not support VASA and their storage characteristics are not visible to the vSphere client.
9. a. Explanation: The available vSAN storage policies include PFTT, SFTT, Data Locality, Failure Tolerance Method, Number of Disk Stripes per Object, Flash Read Cached Reservation, Force Provisioning, Object Space Reservation, Disable, Object Checksum, and IOPS Limit for Object.
10. b. Explanation: If the space used on datastore A is 82% and on datastore B is 79%, the difference is 3. If the threshold is 5, Storage DRS will not make migration recommendations from datastore A to datastore B.
1. d. Explanation: On a vSS, you can set the following network policies: Teaming and Failover, Security, Traffic Shaping, and VLAN.
2. b. Explanation: The following NIC teaming options are available on vSS and vDS: Route Based on Originating Virtual Port, Route Based on IP Hash, Route Based on Source MAC Hash, and Use Explicit Failover Order.
3. a. Explanation: Distributed virtual switches can do both inbound and outbound traffic shaping, whereas standard virtual switches handle just outbound traffic shaping.
4. c. Explanation: If you reserved 1.0 Gbps for virtual machine system traffic on a distributed switch with 8 uplinks, then the total aggregated bandwidth available for virtual machine reservation on the switch is 8.0 Gbps. Each network resource pool can reserve a portion of the 8 Gbps capacity.
5. c. Explanation: When marking traffic, you can create a rule to configure qualifiers to identify the data to be tagged and set Action to Tag.
6. c. Explanation: A vDS supports up to 64 LAGs.
7. a. Explanation: The required vDS configuration for the virtual switch teaming policy health check is at least two active physical NICs and two hosts.
8. c. Explanation: Cisco Discovery Protocol (CDP) support was introduced with ESX 3.x. CDP is available for standard switches and distributed switches that are connected to Cisco physical switches. Link Layer Discovery Protocol (LLDP) is supported in vSphere 5.0 and later for vDS (5.0.0 and later), but not for vSS.
9. a. Explanation: With DirectPath I/O in a vSphere 7.0 environment, a virtual machine can be part of a cluster, but it cannot migrate across hosts.
10. a. Explanation: The available services for a custom stack are Management, vMotion, IP-based storage, Provisioning, Fault Tolerance logging, vSphere Replication, vSphere Replication NFC, and vSAN.
1. d. Explanation: Intel EVC Mode Nehalem (Level L2) includes the Intel Penryn feature set and exposes additional CPU features, including SSE4.2 and POPCOUNT.
2. c. Explanation: When the DRS migration threshold is set to Level 3, the default level, DRS expands on Level 2 by making recommendations to improve VM happiness and cluster load distribution.
3. b. Explanation: Resource pools are container objects in the vSphere inventory that are used to compartmentalize the CPU and memory resources of a host, a cluster, or a parent resource pool. You can delegate control over each resource pool to specific individuals and groups.
4. a. Explanation: Starting in vSphere 6.7, DRS uses a new two-pass algorithm to allocate resource reservations to its children. In the second pass, excess pool reservation is allocated proportionally, limited by the virtual machine’s configured size.
5. d. Explanation: Set Define Host Failover Capacity By to Dedicated Failover Hosts to designate hosts to use for failover actions.
6. b. Explanation: The medium virtual machine monitoring level sets Failure Interval to 60 seconds and Reset Period to 24 hours.
7. c. Explanation: For PDL and APD failures, you can set VMCP to either issue event alerts or to power off and restart virtual machines. For APD failures only, you can additionally control the restart policy for virtual machines by setting it to Conservative or Aggressive.
8. b. Explanation: Predictive DRS requires vCenter Server 6.5 or later, it must be enabled on both vCenter Server and vROps, and the vCenter Server and vROps clocks must be synchronized.
9. d. Explanation: vSphere Fault Tolerance can accommodate symmetric multiprocessor (SMP) virtual machines with up to eight vCPUs.
10. a. Explanation: If a vCenter service fails, VMware Service Lifecycle Manager restarts it. VMware Service Lifecycle Manager is a service running in vCenter server.
1. d and f. Explanation: Other than an optional folder to contain data centers, you cannot create any object in the inventory until you create a data center
2. d. Explanation: A subscribed library is a library whose content you cannot change or publish. It receives its content from a published library.
3. b. Explanation: The file named <vmName>-flat.vmdk is the virtual machine data disk file. It is commonly called the flat file. <vmName>..vmdk is the virtual machine data disk file.
4. a. Explanation: The parent (current) snapshot is always the snapshot that appears immediately above the You Are Here icon in the Snapshot Manager. The parent snapshot is not always the snapshot that you took most recently.
5. a. Explanation: The SIO controller provides serial and parallel ports and floppy devices, and it performs system management activities. One SIO controller is available to the virtual machine, but it cannot be configured or removed.
6. c. Explanation: The VM Options table includes General Options, Encryption Options, Power Management, VMware Tools, VBS, Boot Options, Advanced Options, Fibre Channel NPIV, and vApp Options.
7. a. Explanation: If the vCenter Server instances exist in separate vCenter Single Sign-On domains, you can use vSphere APIs or the vSphere SDK to migrate virtual machines. The cross-vCenter Server and long-distance vMotion features require an Enterprise Plus license.
8. c. Explanation: You can simultaneously perform one Storage vMotion and four vMotion operations involving a specific host.
9. b. Explanation: To avoid network saturation, you can use traffic shaping to limit the average bandwidth and peak bandwidth available to vMotion traffic.
10. c. Explanation: One of the most popular use cases for instant clones is a just-in-time virtual desktop infrastructure (VDI) deployment. Instant clones enable you to perform large-scale deployments by allowing you to create virtual machines from a controlled point in time. For example, VMware Horizon uses instant clones to improve the provisioning process for virtual desktops.
1. d. Explanation: Use cases for vSphere with Tanzu include providing a familiar single stack for containers and virtual machines and streamlining the development of modern applications.
2. b. Explanation: vRealize Operations (vROps) is commonly used for continuous performance optimization and intelligent remediation.
3. a. Explanation: vRealize Log Insight (vRLI) is commonly used to decrease time and effort spent on root cause analysis and centralized log management and analysis.
4. a and e. Explanation: Horizon includes instant clones, which together with VMware Dynamic Environment Manager and VMware App Volumes dynamically provides just-in-time (JIT) delivery of user profile data and applications to stateless desktops.
5. d and e. Explanation: VMware App Volumes is a set of application and user management solutions for VMware Horizon, Citrix Virtual Apps and Desktops, and Remote Desktop Services Host (RDSH) virtual environments.
6. d. Explanation: vSphere Replication does not require separate licensing. Instead, it is included as a feature of specific vSphere license editions, including vSphere Standard.
7. b and c. Explanation: Site Recovery Manager (SRM) use cases include disaster recovery and data center migrations. For data replication, SRM integrates with vSphere Replication and supported storage-based replication products.
8. c. Explanation: VMware Cloud Foundation (VCF) is a hybrid cloud platform built on full-stack hyperconverged infrastructure (HCI) technology. Its main components include Cloud Builder and SDDC Manager.
9. a. Explanation: VMware HCX is a workload mobility platform that simplifies application migration, workload rebalancing, and business continuity across on-premises data centers, private clouds, and hybrid clouds.
10. a. Explanation: NSX is commonly used with zero-trust security and multi-cloud networking.
1. d. Explanation: The key size requirement is 2048 to 16,384 bits, not 1024 to 16,384 bits
2. a. Explanation: vCenter Server supports these certificate modes for ESXi: VMware Certificate Authority, Custom Certificate Authority, and Thumbprint Mode.
3. a. Explanation: In vCenter Server 7.0, the system roles include read-only, administrator, no access, no cryptography administrator, trusted infrastructure administrator, and no trusted infrastructure administrator.
4. a. Explanation: To migrate a virtual machine with Storage vMotion, the user must have the Resource.Migrate Powered On Virtual Machine on the virtual machine or folder and Datastore.Allocate Space on the destination datastore.
5. d. Explanation: In normal lockdown mode, user accounts that are in the Exception Users list and that have administrator privileges on the host can access the DCUI. Also, users identified in the host’s DCUI.Access advanced option can access the DCUI.
6. a. Explanation: By default, this password must have at least eight characters, one lowercase character, one numeric character, and one special character.
7. b. Explanation: To list the available security associations, you can use the command esxcli network ip ipsec sa list in ESXi.
8. b. Explanation: Concerning encrypted vMotion across vCenter Server instances, you must use the vSphere APIs, encrypted vMotion migration of unencrypted virtual machines is supported, and vMotion migration of encrypted virtual machines is not supported.
9. d. Explanation: Some settings can be disabled in a vSphere environment. To reduce potential risk, consider setting isolation.tools.ghi.launchmenu.change to TRUE.
10. b. Explanation: You can implement VMware NSX Data Center for vSphere (NSX) to add a distributed logical firewall, microsegmentation, and additional security measures to your vSphere environment.
1. a. Explanation: The ESXi installation prerequisites include downloading the ESXi installer ISO and preparing the hardware system to boot from it.
2. b. Explanation: There is a default installation script included with the ESXi installer. The default ks.cfg installation script is in the initial RAM disk at /etc/vmware/weasel/ks.cfg.
3. c. Explanation: Prior to running the deployment command, you can run a pre-deployment check by using the command vcsa-deploy install --verify-only path-to-JSON-file.
4. a. Explanation: VECS does not store ESXi certificates. ESXi certificates are stored locally on the ESXi hosts in the /etc/vmware/ssl directory.
5. d. Explanation: All users have must have the object of class inetOrgPerson
. All groups must have the object of class groupOfUniqueNames
. Al groups must have the group membership attribute uniqueMember
.
6. c. Explanation: A user must be a member of the CAAdmins group to perform most certificate management operations, such as using the certool command.
7. a. Explanation: You should not select the Use Machine Account option if you plan to rename the machine. Instead, you need to select Use Service Principle Name (SPN) and provide the SPN, UPN, and password.
8. a. Explanation: In scenarios where vCenter Server is installed in a secured network with no Internet access, you can install the Update Manager Download Service (UMDS) and use it to download updates.
9. d. Explanation: For the Passive node, connect NIC 0 to the Management network and NIC 1 to the vCenter HA network. For the Witness node, connect NIC 1 to the vCenter HA network.
10. b. Explanation: The following kernel boot options have been deprecated and are no longer supported in ESXi 7.0: --no-auto-partition, autoPartitionCreateUSBCoreDumpPartition, and autoPartitionDiskDumpPartitionSize.
1. a. Explanation: To add physical adapters to a vSS, you can select the host, navigate to Configure > Networking > Virtual Switches, select the switch, and select Manage Physical Adapters. In the wizard, click the Add Adapters (green plus sign) button.
2. b. Explanation: You can set the VLAN ID to 0 (external switch tagging), 1 to 4094 (virtual switch tagging), or 4095 (virtual guest tagging)
3. d. Explanation: You can change the general setting of a vDS, including Name, Number of Uplinks, Network I/O Control (enable or disable), and Description.
4. a. Explanation: You can change the Advanced settings for a vDS, including MTU (in bytes), Multicast Filtering Mode (Basic or IGMP/MLD Snooping), Discovery Protocol, and Administrator Contact.
5. a. Explanation: When creating a VMkernel adapter, you should configure the VMkernel Adapter IP, MTU, Stack, and Available Services settings.
6. c. Explanation: NIOC applies shares to each of the following network traffic types: management traffic, Fault Tolerance (FT) traffic, NFS traffic, vSAN traffic, vMotion traffic, vSphere Replication (VR) traffic, vSphere Data Protection backup traffic, and virtual machine traffic.
7. b. Explanation: For port mirroring, you can select one of the following session types: distributed port monitoring. remote mirroring source, remote mirroring destination, or encapsulated remote mirroring (L3) source.
8. a. Explanation: The number of ports in each port channel must match the number of physical NICs that will be aggregated on the host (the minimum is two). The same hashing algorithm must be used for the port channel and the associated LAG on the vDS. All the NICs in a LAG must be configured with the same speed and duplexing.
9. b. Explanation: You can enable the VLAN and MTU and the Teaming and Failover health checks.
10. d. Explanation: You can use the following to qualify data: IP address (to identify packets by source and destination addresses and ports), MAC address (to identify packets by source and destination addresses and by VLAN), system traffic (to identity data by system traffic type).
1. c. Explanation: If you initially selected the Skip Quickstart option, you should add hosts manually. If you previously used Quickstart but selected Configure Networking Settings Later, you can add hosts by using Quickstart but must manually configure the host networking.
2. d. Explanation: The default value for both CPU and Memory Limit is Unlimited.
3. a. Explanation: Define Host Failover Capacity can be set to Cluster Resource Percentage, Slot Policy (powered-on VMs), Dedicated Host Failures, or Disabled.
4. b. Explanation: To configure Virtual Machine Component Protection (VMCP) in a vSphere HA cluster, you can select Failures and Responses > Datastore with PDL and choose Issue Events or Power Off and Restart VMs.
5. c. Explanation: You need to install a supported vendor-supplied vSphere Client plug-in and register the proactive HA provider. Ensure that vSphere HA and DRS are enabled. To allow remediation actions, you need the Host.Config.Quarantine and Host.Config.Maintenance privileges.
6. b. Explanation: If the guest OS reports that memory paging is occurring, you should increase the memory size of the virtual machine.
7. a. Explanation: If a virtual disk is thin provisioned, you may be maximizing the use of your storage space while decreasing the virtual machine’s performance and increasing its risk of denial of service.
8. b. Explanation: %DRPTX is the percentage of transmit packets dropped. It indicates that the physical network adapter cannot meet the demand, perhaps due to load from other virtual machines.
9. a. Explanation: Warning, Information, and Audit are valid event types. Another valid type is Alert, which indicates that a fatal problem has occurred in the system.
10. c. Explanation: The ESXi host agent log contains data related to the agent that manages and configures the ESXi host and its virtual machines.
1. c. Explanation: In hybrid clusters, magnetic disks are used for capacity, and flash devices serve as a read cache and a write buffer. In a hybrid cluster, 70% of the flash space is used for the read cache, and 30% is used for the write buffer.
2. a. Explanation: Distributed switches with Network I/O Control (NIOC) Version 2 cannot be used for vSAN Quickstart. To use Quickstart to configure a vSAN cluster, the hosts must have similar network configuration.
3. d. Explanation: A datastore is expandable when the backing storage device has free space immediately after the datastore extent.
4. b. Explanation: Multiple IP addresses or DNS names can be used with NFS Version 4.1 multipathing.
5. b. Explanation: To configure SIOC, select a datastore, enable Configuration > Properties > Storage I/O Control, click Advanced, and modify the threshold for contention. (This value must be between 10 ms and 100 ms.)
6. d. Explanation: If you want to perform a maintenance activity on an SDRS cluster member datastore or its underlying storage devices, you can place it in Maintenance Mode. To place a datastore in Maintenance Mode using the vSphere Client, right-click the datastore in the inventory pane, select Enter SDRS Maintenance Mode, and optionally apply any recommendations.
7. a, d, and e. Explanation: To configure an ESXi 7.0 host to access shared NVMe devices using RoCE Version 2, you create a new VMkernel virtual network adapter on a virtual switch and configure its uplink to use the RDMA paired uplink (for example, vmnic9). Navigate to Configure > Networking > RDMA Adapters to review the bindings. Select Add Software NVMe over RDMA Adapter.
8. b. Explanation: In vPMem mode, a virtual machine can directly access PMem resources and use the resources as regular memory.
9. c. Explanation: FIXED and LB_RR are path selection schemes (PSS) used by the HPP module. VMW_PSP_FIXED is the NMP path selection module that uses a preferred path.
10. a and b. Explanation: To configure vVols in a vSphere 7.0 environment, you need to configure the following components on the storage side: protocol endpoints, storage containers, storage profiles, and replication configurations (if you plan to use vVols with replication).
1. d. Explanation: To join vCenter Server systems in Enhanced Linked Mode, you need to connect them to the same SSO domain.
2. a. Explanation: In a vSphere environment, you cannot change the object, user, or user group in a permission, but you can change the role.
3. b and c. Explanation: The Certificate Management page shows the certificate types in the VMware Endpoint Certificate Service (VECS). By default, the types are machine SSL certificates and trusted root certificates.
4. a. Explanation: To perform certificate management for ESXi, you must have the Certificates.Manage Certificates privilege.
5. d. Explanation: You can change the required length, change the character class requirement, and allow passphrases by using the Security.PasswordQualityControl advanced option.
6. a. Explanation: An orange icon indicates that the status of the device has changed, and you must reboot the host before you can use the device.
7. b. Explanation: If the host acceptance level is VMwareAccepted, you cannot install VIBs at the PartnerSupported level.
8. a. Explanation: You can use the following command to run the Secure Boot validation script on an upgraded ESXi host: /usr/lib/vmware/secureboot/bin/secureBoot.py -c
9. b. Explanation: To configure a trust relationship between a KMS and vCenter, in the vSphere Client, select the vCenter Server, navigate to Configuration > Key Management Servers, and click Add.
10. c. Explanation: To configure vSphere Trust Authority, you need to configure the trusted key provider for the trusted hosts on the trusted cluster (using Register-KeyProvider and Set-KeyProvider).
1. c. Explanation: The vCenter Server Appliance Management Interface (VAMI) provides a file-based backup feature for the vCenter Server. Alternatively, you can perform image-based backups by using the vSphere API.
2. a. Explanation: You can configure a backup to stream the data to a target by using FTP, FTPS, HTTP, HTTPS, SFTP, NFS, or SMB.
3. d. Explanation: To upgrade a vSphere 6.5 or 6.7 environment to vSphere 7.0, you should upgrade the major components in the following order: vCenter Server, ESXi hosts, VMware Tools, virtual machine hardware.
4. c. Explanation: If you choose to transfer configuration, historical, and performance data, you can transfer the configuration data during the upgrade and transfer the remaining data in the background following the upgrade. The option to transfer data in the background following an upgrade is applicable only to scenarios where the source vCenter Server uses an external database.
5. d. Explanation: A vSphere Installation Bundle (VIB) is the smallest installable software package (metadata and binary payload) for ESXi.
6. a. Explanation: To enable Quick Boot, navigate to Menu > Lifecycle Manager, select a vCenter Server, and enable the Quick Boot checkbox in the cluster settings at Settings > Host Remediation > Images.
7. c. Explanation: Firmware updates are available in a special vendor depot that you access through a vendor-specific hardware support manager plug-in that registers itself as a vCenter Server extension. Firmware updates are not available for clusters that are managed with baselines.
8. c. Explanation: To change the state of a service, you can right-click on the service and select Start, Stop, or Reset. You can also change a service’s startup policy such that it automatically starts with the host or associated firewall ports or is started only manually.
9. b. Explanation: When the Health Status badge color is orange, it indicates an alert, and one or more components may be degraded. Non-security patches may be available.
10. a. Explanation: Optionally, you can check conflicts and apply one of the following resolutions to all conflicts or separately to each conflict: Copy, Skip, or Merge.
1. c. Explanation: When selecting the storage type on a host that has PMem memory, you can select either the Standard or PMem radio button. If you chose PMem storage for a virtual machine, its default virtual disk, new virtual disk, and NVDIMM devices share the same PMem resources.
2. b. Explanation: With the vmx.log.guest.level = “info” setting, vminst.log is sent to the host, but vmmsi.log remains in the virtual machine.
3. a. Explanation: You cannot use the vSphere Client to clone a virtual machine using linked clones or instant clones. You can do so with API calls.
4. c. Explanation: The compatibility setting controls which virtual machine hardware version is used. Setting the compatibility to ESXi 6.7 and later uses hardware Version 14.
5. a. Explanation: To control the default hardware compatibility for new virtual machines, you can set the Default VM Compatibility setting at the host, cluster, or data center level.
6. d. Explanation: To minimize the impact to a running virtual machine and to reduce the time required to take a snapshot, do not snapshot the memory state or quiesce the guest file system.
7. c. Explanation: In vSphere, to use VBS, you must use virtual hardware Version 14 or later. The virtual machine must be set to use UEFI firmware, Secure Boot, hardware virtualization (Intel VT/ADM-V), and IOMMU.
8. a. Explanation: The main use case for vGPUs is to support high-end graphics in virtual desktop infrastructure (VDI). Recently, the need to support artificial intelligence (AI) and machine learning (ML) has also emerged as a major use case.
9. a. Explanation: If a user is granted the read-only role as a global permission and the administrator role at a vCenter Server level, then the user can manage the vCenter Server’s content libraries and content but can only view content libraries belonging to other vCenter Servers.
10. d. Explanation: You can import items such as OVA/OVF templates and vApps to a content library. You can also import ISO images. You can also add content to the library by cloning VMs or templates to the library.
1. c. Explanation: Fault Tolerance is supported for up to two vCPUs in vSphere 7.0 Standard.
2. d. Explanation: VMware Directory Service for the vCenter Single Sign-On (SSO) domain (vsphere.local) is a service in vCenter Server Appliance.
3. b. Explanation: To install ESXi 7.0, ensure that the hardware system has 4 GB or more of physical RAM. VMware recommends 8 GB or more for production environments.
4. c and d. Explanation: You must run the GUI deployment from a Windows, Linux, or Mac machine that is in the network on which you want to deploy the appliance.
5. b. Explanation: VMware Cloud Foundation (VCF) is the industry’s most advanced hybrid cloud platform. It provides a complete set of software-defined services for compute, storage, networking, security, and cloud management to run enterprise apps in private or public environments.
1. d. Explanation: VMFS Version 6 provides access for ESXi 6.5 and later hosts.
2. c. Explanation: Ruby vSphere Console (RVC) is a command-line interface used for managing and troubleshooting vSAN. RVC provides a cluster-wide view and is included with the vCenter Server deployment.
3. a. Explanation: VASA storage providers are software components that integrate with vSphere to provide information about the physical storage capabilities.
4. a. Explanation: MRU is the default path selection policy for most active/passive storage devices.
5. b. Explanation: Thick eager zeroed is the slowest method for virtual disk creation, but it is the best for guest performance.
1. b. Explanation: When you enable traffic shaping for a standard switch or port group, you can configure the options Average Bandwidth, Peak Bandwidth, and Burst Size.
2. c. Explanation: At the distributed port level, you can override policies applied to the distributed port group and apply unique policies to a distributed port.
3. a. Explanation: In vSphere 7.0, the default settings for a distributed port group are static binding, elastic port allocation, and eight ports.
4. d. Explanation: Single Root I/O Virtualization (SR-IOV) is a feature that allows a single Peripheral Component Interconnect Express (PCIe) device to appear as multiple devices. It is useful for supporting an application in a guest OS that is sensitive to network latency. SR-IOV-enabled devices provide virtual functions (VFs) to the hypervisor or guest operating system.
5. b. Explanation: After configuring NetFlow on a vDS, you can configure monitoring policies on vDS port groups and ports.
1. b. Explanation: Enhanced vMotion Compatibility (EVC) is a cluster feature. The source and target processors must come from the same vendor class (AMD or Intel) to be vMotion compatible. Clock speed, cache size, and number of cores can differ between source and target processors.
2. b. Explanation: When the DRS Migration Threshold is set to Level 2, DRS expands on Level 1 by making recommends in situations that are at or close to resource contention. It does not make recommendations just to improve virtual machine happiness or cluster load distribution.
3. b. Explanation: If the primary host detects datastore heartbeats for a secondary host but no network heartbeats or ping responses, it assumes that the secondary host is isolated or in a network partition.
4. d. Explanation: Hosts must use static IP addresses or guarantee that IP addresses assigned by DHCP persist across host reboots.
5. a. Explanation: To use Wake-on-LAN (WoL) with DPM, you must ensure that vMotion is configured, the vMotion NIC must supports WoL, and the physical switch port must be set to automatically negotiate the link speed.
1. b. Explanation: Although making snapshots may be a useful step for a backup utility, a snapshot is not by itself a backup. A snapshot does not provide a redundant copy of data. If the base flat file is lost or corrupt, you cannot restore the virtual machine by reverting to a snapshot.
2. a. Explanation: You can enable or disable hardware acceleration. You can set debugging and statistics to run normally, record debugging information, record statistics, or record statistics and debugging.
3. a. Explanation: To migrate virtual machines with disks larger than 2 TB, the source and destination ESXi hosts must be Version 6.0 or later.
4. c. Explanation: During a vMotion migration without shared storage the virtual disk data is transferred over the vMotion network.
5. a. Explanation: During an instant clone (vmFork) operation, the system quiesces and stuns the source virtual machine, creates and transfers a checkpoint, customizes the destination MAC address and UUID, and forks the memory and disk.
1. b. Explanation: vRealize Orchestrator (vRO) is a key component of vRA that provides custom workflows to support anything as a service (XaaS).
2. d. Explanation: VMware Horizon is commonly used for remote users, kiosk and task users, and call centers.
3. b. Explanation: To configure replication, in the vSphere Client, navigate to Home > Site Recovery > Open Site Recovery.
4. d. Explanation: VMware HCX is a workload mobility platform that simplifies application migration, workload rebalancing, and business continuity across on-premises data centers, private clouds, and hybrid clouds.
5. a. Explanation: VMware AppDefense provides data center endpoint security that protects applications running in a virtualized environment.
1. c. Explanation: Do not use CRL distribution points, authority information access, or certificate template information in any custom certificates.
2. b. Explanation: You cannot modify permissions on the following entities that derive permissions from the root vCenter Server system: custom fields, licenses, roles, statistics intervals, or sessions.
3. d. Explanation: By default, the services that are running in ESXi include DCUI, Load-Based Teaming, CIM Server, and VMware vCenter Agent.
4. b. Explanation: You should remove any expired or revoked certificates from the vCenter Server to avoid MITM attacks.
5. d. Explanation: Prerequisites for enabling UEFI boot for your virtual machines are UEFI firmware, virtual hardware Version 13 or later, VMware Tools Version 10.1 or later, and an operating system that supports UEFI Secure Boot.
1. d. Explanation: In the first stage when using the GUI installer, you navigate through the installation wizard, choose the deployment type, provide the appliance settings, and deploy the OVA. In the second stage you use a wizard to configure the appliance time synchronization, configure vCenter Single Sign-On (SSO), and start the services in the newly deployed appliance.
2. d. Explanation: When adding an Active Directory over LDAP identity source, you need to provide required information such as the name, the base DN for users, and the base DN for groups.
3. d. Explanation: The vSphere Lifecyle Manager service is available via the vSphere Client immediately after vCenter Server deployment. No special steps are required to install vSphere Lifecyle Manager.
4. c. Explanation: A rule can identify target hosts by boot MAC address, SMBIOS information, BIOS UUID, vendor, model, or fixed DHCP IP address.
5. b. Explanation: After selecting Remediate and selecting the hosts, you need to click Pre-check Remediation to determine whether the selected hosts are ready for remediation.
1. b. Explanation: You can set VLAN ID to 0 (external switch tagging), 1 to 4094 (virtual switch tagging), or 4095 (virtual guest tagging).
2. c. Explanation: As a rollback plan, you should export the distributed switch configuration prior to upgrading. In the export wizard, choose the option to include the distributed port groups.
3. c. Explanation: Edit the distributed port group setting. In the settings, click General and then, from the Network Resource Pool drop-down menu, select the network resource pool and click OK.
4. d. Explanation: The provisioning stack supports traffic for virtual machine cold migration, cloning, and snapshot migration. It also supports the Network File Copy (NFC) traffic used for cloning virtual disks during long-distance vMotion. You can use this stack to isolate provisioning traffic by placing it on a separate gateway. The default stack provides networking support for management traffic and for all VMkernel traffic types.
5. a. Explanation: To enable NetFlow in a distributed port group, select the distributed port group, select Configure > Policies, click Edit, and then, on the Monitoring page, select Enable NetFlow or Disable NetFlow.
1. c. Explanation: Optionally, you can set Memory Reservation to a numeric value (the default is 0) and a unit of measure (MB, GB, MHz, or GHz).
2. c. Explanation: In the vRealize Operations (vROps) GUI, locate the appropriate vCenter Server adapter instance. Select the adapter, choose Advanced Settings, and set Provide Data to vSphere Predictive DRS to True.
3. d. Explanation: To disable admission control, set Define Host Failover Capacity to Disabled.
4. a. Explanation: VIMTOP is a tool you can run in vCenter Server Appliance to see resource usage for services that are running.
5. d. Explanation: vmware.log is in the same folder as the virtual machine configuration file.
1. c. Explanation: To provide the encryption keys for a vSAN datastore, you must implement a key management server (KMS) cluster server that is KMIP 1.1 compliant and is in the vSphere compatibility matrices.
2. c. Explanation: To enable deduplication and compression for an existing vSAN cluster, edit the vSAN services in the cluster and enable Deduplication and Compression. (Separate options to enable just deduplication or just decompression are not provided.)
3. c. Explanation: The options in the Datastore Brower include Upload Files, Upload Folder, Download, New Folder, Copy to, Move to, Rename to, Delete, and Inflate.
4. d. Explanation: The default storage module that claims NVMe-oF is HPP. NVMe-oF targets cannot be claimed by NMP.
5. a. Explanation: When using the vSphere Client to manage the storage providers, you can select a storage provider and choose Synchronize Storage Providers, Rescan, Remove, or Refresh Certificate.
1. b. Explanation: To assign a global permission, you should use the vSphere Client with a user account that has the Permissions.Modify Permission privilege on the root object of all inventory hierarchies.
2. d. Explanation: A yellow alarm is raised if a certificate’s status is Expiring Shortly (that is, if it expires in less than eight months).
3. a. Explanation: With this setting, passwords of one and two character classes are disabled, and so are passphrases. An uppercase character that begins a password and a number that ends a password do not count toward the number of character classes used.
4. d. Explanation: If the “Host secure boot was disabled” message appears in the vSphere Client, you must re-enable Secure Boot to resolve the problem. If the “No cached identity key, loading from DB” message appears, you must disconnect and reconnect the host.
5. a. Explanation: You can leverage the files that you exported during the configuration of vTA vSphere as your backup. If you need to restore vTA, you can use the exported files to reconfigure vTA.
1. b. Explanation: After a restore completes, the following configurations are restored: virtual machine resource settings, resource pool hierarchy and setting, cluster-host membership, DRS configuration, and rules.
2. d. Explanation: If you choose to transfer configuration, historical, and performance data, you can transfer the configuration data during the upgrade and transfer the remaining data in the background following the upgrade. The option to transfer data in the background following an upgrade is only applicable to scenarios where the source vCenter Server uses an external database.
3. b. Explanation: When working with baselines, the following settings are applicable: Quick Boot, VM Power State, VM Migration, Maintenance Mode Failures, PXE Booted Hosts, and Removable Media Devices. When working with images, the following settings are applicable: Quick Boot, VM Power State, VM Migration, Maintenance Mode Failures, HA Admission Control, and DPM.
4. d. Explanation: In rare situations, such as when the distributed switch used for management is not functioning, you may want to restore a standard switch to an ESX host, which you can do with the Restore Standard Switch option in the DCUI.
5. b. Explanation: If the source domain contains multiple (linked) vCenter Servers, the repointing process involves additional steps to shut down the vCenter Server and unregister it from the source domain.
1. c. Explanation: Guest OS customization requires a supported guest OS installed on SCSI node 0:0 and VMware Tools. Windows guest customization requires ESXi Version 3.5 or later. Linux guest customization requires Perl in the guest OS.
2. a. Explanation: The compatibility setting controls which virtual machine hardware version is used. Setting the compatibility to ESXi 7.0 and later uses hardware Version 17, which is the minimum version that support 4 GB video memory.
3. d. Explanation: To minimize the impact to a running virtual machine and to reduce the time required to take a snapshot, do not snapshot the memory state or quiesce the guest file system.
4. a. Explanation: You can export a virtual machine, virtual appliance, or vApp as an OVF or OVA template to create virtual appliances that can be imported by other users. Starting in vSphere 6.5, you can only export to OVF.
5. c. Explanation: The transfer service on the vCenter Server is responsible for importing and exporting content between the subscriber and the publisher, using HTTP NFC.