Total 60 Questions
Last Updated On : 7-Apr-2026
An administrator is tasked with developing an automated, repeatable process to:
Connect to the corporate Active Directory and create a Windows computer object in a defined Organizational Unit.
Connect to the target vCenter and create a Windows VM from a template.
Power on the VM and join it to the corporate domain.
Which VMware vSphere Foundation (VVF) component is best suited for this task?
A. vSphere Supervisor
B. VCF Operations
C. VCF CLI
D. VCF Operations Orchestrator
An administrator has successfully deployed the VMware Cloud Foundation (VCF) Installer appliance to begin a new VMware vSphere Foundation (VVF) deployment. The VMware ESX hosts are powered on and meet all hardware and connectivity prerequisites.
What is the next step to begin deploying vSphere Foundation?
A. Enable SSH on all ESX hosts.
B. Launch the VCF Installer deployment wizard.
C. Install SDDC Manager using the VCF Installer.
D. Manually deploy the vCenter Server Appliance.
A virtual machine (VM) owner has requested to move a VM from one cluster to another.
The following information has been provided:
The VM cannot have downtime during the transfer.
The same network is present on both clusters.
The datastore that the VM is currently on is not present in the destination cluster.
What step should the administrator perform to move the VM?
A. Perform a vMotion of the VM to the new cluster.
B. Backup the VM and restore it to the new cluster.
C. Perform a vMotion with Storage vMotion to the new cluster.
D. Inform the owner the VM cannot be moved to the new cluster.
The security team has requested that high-sensitivity workloads be protected using Confidential Computing in your VMware vSphere Foundation (VVF) 9.0 environment.
These workloads handle regulated data that must be isolated from the hypervisor and other tenants, even when running on the same ESX host.
The vSphere administrator is responsible for ensuring that only trusted hosts are used and that virtual machines are configured with hardware-enforced memory isolation.
Which two configurations must you implement to support Confidential Computing for these workloads? (Choose two.)
A. Create virtual machines with hardware version 22 and set the Confidential Computing flag.
B. Use TPM 2.0 on the guest OS to generate attestation reports for VM launch.
C. Enable AMD SEV-SNP or Intel TDX support in the host BIOS and confirm compatibility in vSphere.
D. Configure Encrypted vMotion with "Required" mode for the VM.
E. Enable vSphere Trust Authority and set the Confidential Computing flag.
An administrator is tasked to create a new storage policy for an eight-node VMware vSAN
Original Storage Architecture (OSA) cluster.
The following specifications have been provided:
Tolerate up to two host failures.
Ensure maximum usable capacity.
Which storage policy settings must the administrator configure?
A. 1 failure - RAID-1
B. 2 failures - RAID-5
C. 3 failures - RAID-1
D. 1 failure - RAID-5
An administrator needs to ensure that only specific users can manage the virtual machines (VM) in a specific VMware vCenter folder.
Which three steps are required to accomplish this? (Choose three.)
A. Assign the new role to the appropriate users/groups.
B. Create a new role in vCenter with VM management permissions.
C. Apply the role to the specific vCenter folder.
D. Add the identity source to vCenter.
E. Create a datastore cluster.
Which VMware Cloud Foundation (VCF) Operations capability enables monitoring and optimization of a VMware vSphere Foundation (VVF) environment?
A. Intelligent Alerts
B. Capacity Analytics
C. Log Insight Integration
D. Infrastructure Visibility
An administrator is tasked with enabling a Supervisor in a VMware vSphere Foundation (VVF) environment using vSphere networking and the Foundation Load Balancer. The vSAN-backed cluster has been configured with a vSphere Distributed Switch.
Which two actions must the administrator perform when enabling a Supervisor using vSphere networking? (Choose two.)
A. Select a vSphere namespace template to define initial namespace limits.
B. Provide a static IP address range for the Supervisor control plane VMs.
C. Configure a Tier-0 Gateway with BGP or static routing.
D. Enable the VM Service before deploying the Supervisor.
E. Assign a vSphere Distributed Switch and a corresponding port group.
| Page 2 out of 8 Pages |
| 123 |
| 2V0-16.25 Practice Test Home |