Total 99 Questions
Last Updated On : 7-Apr-2026
An administrator creates a virtual machine that contains the latest company-approved software, tools and security updates. Company policy requires that only full clones are allowed for server workloads.
A combination of which two tasks should the administrator complete to prepare for the deployment of this virtual machine for multiple users? (Choose two.)
A.
Set appropriate permissions on the virtual machine.
B.
Create a virtual machine customization specification.
C.
Upgrade the virtual hardware.
D.
Convert the virtual machine to a template.
E.
Take a snapshot of the virtual machine.
Create a virtual machine customization specification.
Convert the virtual machine to a template.
Summary
This question involves preparing a "golden image" VM for mass deployment in an environment that mandates full clones. The process requires making the base VM immutable to prevent changes and ensuring that each deployed clone can be customized with unique settings (like hostname and IP) to avoid conflicts. This is a standard procedure for templating in vSphere.
Correct Option
B. Create a virtual machine customization specification.
This is essential for deploying multiple clones from a single source. The customization specification is a file that contains the settings (such as a unique computer name, network configuration, and license key) that will be applied to each new full clone. This ensures every deployed VM has a unique identity on the network, preventing conflicts.
D. Convert the virtual machine to a template.
This is the foundational step. Converting the configured VM into a template makes it immutable, preventing users from powering it on or altering it. It becomes a master image stored in the vCenter inventory, from which multiple, identical full clones can be deployed in a controlled manner.
Incorrect Option
A. Set appropriate permissions on the virtual machine.
While managing permissions is a general best practice for security, it is not a specific preparatory step for enabling multi-user deployment from a template. Permissions can be set on the template itself after creation.
C. Upgrade the virtual hardware.
This is an action performed on an existing, deployed VM to gain access to new virtual hardware features. It is not a step in preparing a base VM for templating. The virtual hardware version is part of the base image and will be inherited by all clones.
E. Take a snapshot of the virtual machine.
Snapshots are used for capturing a VM's state at a point in time for purposes like testing or rollback. They are not used for templating. A template is a separate object type in the inventory, and deploying from a template does not involve or use snapshots.
Reference
VMware vSphere Documentation: Creating a Template and Deploying a Virtual Machine (This covers the process of converting a VM to a template and using customization specifications during deployment.)
Which step is completed during Stage 1 of the vCenter Server Appliance deployment?
A.
Join a vCenter Single Sign-On domain
B.
Create a new vCenter Single Sign-On domain
C.
Select the deployment size
D.
Configure SSH access
Select the deployment size
Summary
This question tests the specific knowledge of the two-stage deployment process for the vCenter Server Appliance (VCSA). Stage 1 is the initial deployment phase where you configure the basic appliance settings on the target ESXi host or vCenter Server. Stage 2 is the post-deployment configuration where you set up the core vCenter services. The administrator must identify which task belongs to the initial deployment stage.
Correct Option
C. Select the deployment size.
This is a critical step performed in Stage 1. During the initial deployment wizard, you must choose the deployment size (e.g., Tiny, Small, Medium, Large) based on the scale of your environment. This selection determines the CPU, memory, and storage resources allocated to the VCSA, and it is a prerequisite for deploying the appliance onto the ESXi host.
Incorrect Option
A. Join a vCenter Single Sign-On domain:
This is a Stage 2 configuration. After the VCSA is deployed and has booted, Stage 2 involves configuring the Single Sign-On (SSO) settings. At this point, you can choose to join an existing SSO domain (for enhancing a linked mode group) or create a new one.
B. Create a new vCenter Single Sign-On domain:
Similar to option A, this is also a Stage 2 task. The initial setup of the SSO domain (setting the domain name, password, and site name) is part of the post-deployment configuration, not the initial appliance deployment.
D. Configure SSH access:
Configuring SSH access for the VCSA's Bash shell is an administrative task performed after the deployment is fully complete, typically through the VCSA Management Interface (VAMI). It is not part of the Stage 1 deployment wizard.
Reference
VMware vSphere Documentation: Deploying the vCenter Server Appliance (This guide details the two-stage process, clearly separating Stage 1 (deployment) tasks like selecting size and network from Stage 2 (configuration) tasks like setting up SSO.)
Which two tasks can be completed using vSphere LifeCycle Manager? (Choose two.)
A.
Manage the firmware lifecycle of ESXi hosts that are part of a managed cluster with a single image.
B.
Check that the ESXi hosts are compliant with the recommended baseline and update the hosts
C.
Upgrade VMware vCenter from version 7 to 8.
D.
Check the hardware compatibility of the hosts in a cluster against the VMware Compatibility Guide (VCG) using baselines.
E.
Manage the firmware lifecycle of ESXi hosts are part of a managed cluster using baselines
Manage the firmware lifecycle of ESXi hosts that are part of a managed cluster with a single image.
Check that the ESXi hosts are compliant with the recommended baseline and update the hosts
Summary
This question tests the understanding of the two operational modes within vSphere Lifecycle Manager (vLCM): Baselines and Images. vLCM is the central tool in vSphere 8 for managing the lifecycle of ESXi hosts, including their software and, with certain hardware, their firmware. It is not used for upgrading vCenter Server itself.
Correct Option
A. Manage the firmware lifecycle of ESXi hosts that are part of a managed cluster with a single image.
This is a key capability of vLCM when using the desired state image mode. For supported server vendors and models, vLCM can import vendor-specific firmware bundles and manage the firmware and driver updates alongside the ESXi version as a single, compliant image.
B. Check that the ESXi hosts are compliant with the recommended baseline and update the hosts.
This is the traditional function of vLCM (and its predecessor, Update Manager) using baselines. Administrators can attach baselines (collections of patches, extensions, or upgrades) to a cluster, check host compliance against them, and remediate (update) the hosts to bring them into compliance.
Incorrect Option
C. Upgrade VMware vCenter from version 7 to 8.
This is incorrect. The vCenter Server Appliance has its own separate upgrade process, typically initiated from the VCSA installer or the VCSA Management Interface (VAMI). vLCM is designed for ESXi host lifecycle management, not for upgrading the vCenter application itself.
D. Check the hardware compatibility of the hosts in a cluster against the VMware Compatibility Guide (VCG) using baselines.
This is not a function of vLCM. The VMware Compatibility Guide (VCG) is an external website used for manual validation before procurement or installation. vLCM does not integrate with the VCG to perform automated hardware compatibility checks.
E. Manage the firmware lifecycle of ESXi hosts are part of a managed cluster using baselines.
This is incorrect because it specifies the wrong mode. Firmware management is an advanced feature exclusive to vLCM's desired state image mode. The traditional baseline mode can only manage ESXi software (patches, VIBs) and cannot manage host firmware.
Reference
VMware vSphere Documentation: vSphere Lifecycle Manager Overview (This details the capabilities of vLCM, including using images for firmware management and baselines for patch management.)
A group of new virtual machines have been deployed using thin-provisioned disks due to the limited storage space available in an environment. The storage team has expressed concern about extensive use of this type of provisioning.
An administrator is tasked with creating a custom alarm to notify the storage team when thin provisioning reaches a certain capacity threshold.
Where must the administrator define this alarm?
A.
Datastore
B.
Data center
C.
Datastore cluster
D.
Virtual machine
Datastore
Summary
This question focuses on the correct object scope for creating a custom alarm related to thin provisioning. The concern is about the actual space usage (provisioned vs. used) on the shared storage container itself. Alarms must be defined on the vSphere inventory object that directly provides the relevant metrics and triggers the condition you want to monitor.
Correct Option
A. Datastore:
This is the correct object. A datastore is the storage container where the virtual disks are stored. It provides key metrics like "Datastore Disk Provisioned" and "Datastore Disk Used". An alarm defined on the datastore object can monitor the ratio of provisioned space to actual used space, which is the direct measure of thin-provisioning risk. This alerts the team before the datastore runs out of physical capacity.
Incorrect Option
B. Data center:
A data center is a logical container for organizing inventory objects like hosts, clusters, and datastores. It does not have its own storage-level performance or capacity metrics. Defining an alarm here would not provide the specific, granular data needed to monitor thin provisioning on individual datastores.
C. Datastore cluster:
While a datastore cluster (used by Storage DRS) groups datastores, a custom alarm for thin provisioning is best defined at the individual datastore level. This provides a precise alert for the specific storage volume that is running out of physical space, allowing for targeted action. An alarm on the cluster might aggregate data, making it less specific.
D. Virtual machine:
A virtual machine alarm can monitor the space usage of its own virtual disks, but it cannot assess the overall thin-provisioning risk for the shared datastore. The storage team's concern is about the datastore's total committed capacity, not the usage of a single VM.
Reference
VMware vSphere Documentation: Create a Datastore Alarm (This guide explains how to create custom alarms on various inventory objects, including datastores, and lists the available metrics.)
An administrator is tasked with configuring vSphere Trust Authority. The administrator has completed the following steps:
• Set up the workstation
• Enabled the Trust Authority Administrator
• Enabled the Trust Authority State
• Collected information about the ESXi hosts and vCenter to be trusted
Which step does the administrator need to complete next?
A.
Import the Trusted Host information to the Trust Authority Cluster
B.
Import the Trusted Cluster information to the Trusted Hosts
C.
Create the Key Provider on the Trusted Cluster
D.
Import the Trusted Host information to the Trusted Cluster
Import the Trusted Host information to the Trust Authority Cluster
Explanation
https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.security.doc/images/GUID-D205B3C1 https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-39D8AB34-AD45-4B0A-8FB0-7A1
An administrator plans to bri ng VMware vCenter offline in order to perform hardware mainte-nance on the host where the vCenter Server Appliance is running.
Which vSphere feature must be configured to ensure that vCenter users experience minimal downtime?
A.
vSphere Distributed Resource Scheduler
B.
Hybrid Linked Mode
C.
vCenter Server High Availability
D.
Enhanced Linked Mode
vCenter Server High Availability
An administrator Is performing maintenance activities and discovers that a Virtual Machine File System (VMFS) datastore has a lot more used capacity than expected. The datastore contains 10 virtual machines (VMs) and, when the administrator reviews the contents of the associated datastore, discovers that five- virtual machines have a snapshot file (-delta.vmdk flies) that has not been modified In over 12 months. The administrator chei kfl the Snapshot Manager within the vSphere Client and confirms that there are no snapshots visible.
Which task should the administrator complete on the virtual machines to free up datastore space?
A.
Consolidate the snapshots for each VM.
B.
Inflate the disk files for each VM.
C.
Delete all snapshots for each VM.
D.
Storage vMotion each VM to another datastore.
Consolidate the snapshots for each VM.
Consolidating snapshots for each VM will merge any snapshot files that are not associated with a snapshot in Snapshot Manager into the base disk file and free up datastore space.
References:
https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.vm_admin.doc/GUID-53F65726-A23B
The presence of redundant delta disks can adversely affect the virtual machine performance. You can combine such disks without violating a data dependency. After consolidation, redundant disks are removed, which improves the virtual machine performance and saves storage space.
An administrator is investigating user logon failures for a VMware vCenter instance
Where can the administrator find log files containing information related to user login activities?
A.
On the vCenter Management Interface
B.
On the ESXi host using the Direct Console User Interface (®)
C.
On the vCenter Server Appliance
D.
In the vSphere Client when viewing the vCenter virtual machine
On the vCenter Server Appliance
The administrator can find log files containing information related to user login activities on the vCenter Server Appliance, which is a preconfigured Linux-based virtual machine that runs all vCenter Server services.
The log files are located in /var/log/vmware/vmware-vpx/vpxd.log and
/var/log/vmware/sso/ssoAdminServer.log directories.
References:
https://docs.vmware.com/en/VMware-vSphere/8.0/com.vmware.vsphere.troubleshooting.doc/GUID-5F9A7E49-
| Page 3 out of 13 Pages |
| 1234 |
| 2V0-21.23 Practice Test Home |