Total 99 Questions
Last Updated On : 7-Apr-2026
An administrator is tasked with migrating a single virtual machine (VM) from an existing VMware vCenter to a secure environment where corporate security policy requires that all VMs be encrypted. The secure environment consists of a dedicated vCenter instance with a 4-node vSphere cluster and already contains a number of encrypted VMs. Which two steps must the administrator take to ensure the migration is a success? (Choose two.)
A.
Ensure that the source and destination vCenter instances share the same Key Management Server (KMS).
B.
Ensure that Encrypted vMotion Is turned off for the VM.
C.
Ensure that the VM is encrypted before attempting the migration.
D.
Ensure that the VM is powered off before attempting the migration.
E.
Ensure that the source and destination vCenter Servers have a different Key Management Server (KMS).
Ensure that the source and destination vCenter instances share the same Key Management Server (KMS).
Ensure that the VM is encrypted before attempting the migration.
To ensure a successful migration of an encrypted VM to a secure environment, the administrator needs to ensure that the source and destination vCenter instances share the same Key Management Server (KMS), which provides encryption keys for both environments; and ensure that the VM is encrypted before attempting the migration, which allows preserving its encryption status during vMotion.
References:
https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.security.doc/GUID-F8F105EC-A6EA- https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.security.doc/GUID-C3FFBF62-D6BF-
An administrator is working with VMware Support and Is asked to provide log bundles for the ESXI hosts in an environment. Three options Joes the administrator have? (Choose three.)
A.
Generate a combined log bundle for all ESXI hosts using the vCenter Management Interface.
B.
Generate a separate log bundle for each ESXI host using the vSphere Host Client.
C.
Generate a combined log bundle for all ESXI hosts using the vSphere Client.
D.
Generate a separate log bundle for each ESXI host using the vSphere Client.
E.
Generate a separate log bundle for each ESXI host using the vCenter Management Interface.
F.
Generate a combined log bundle for all ESXi hosts using the vSphere Host Client.
Generate a separate log bundle for each ESXI host using the vSphere Host Client.
Generate a combined log bundle for all ESXI hosts using the vSphere Client.
Generate a separate log bundle for each ESXI host using the vSphere Client.
Option B, C and D are correct because they are valid methods to generate log bundles for individual or multiple ESXi hosts using different interfaces. Option A and E are incorrect because they are not possible options to generate log bundles for all ESXi hosts using the vCenter Management Interface. Option F is incorrect because it is not possible to generate a combined log bundle for all ESXi hosts using the vSphere Host Client.
An administrator has been notified that a number of hosts are not compliant with the company policy for time synchronization.The relevant portion of the policy states:
All physical servers must synchronize time with an external time source that is accurate to the microsecond. Which step should the administrator take to ensure compliance with the policy?
A.
Ensure that each vCenter Server Appliance is configured to use a Network Time Protocol (NTP) source.
B.
Ensure that each ESXi host is configured to use a Precision Time Protocol (PTP) source.
C.
Ensure that each ESXi host is configured to use a Network Time Protocol (NTP) source.
D.
Ensure that each vCenter Server Appliance is configured to use a Precision Time Protocol (PTP) source.
Ensure that each ESXi host is configured to use a Precision Time Protocol (PTP) source.
To comply with the policy of synchronizing time with an external source that is accurate to the microsecond, the administrator needs to ensure that each ESXi host is configured to use a PTP source, which provides higher accuracy than NTP.
An administrator is tasked with configuring certificates for a VMware software-defined data center (SDDC) based on the following requirements:
• All certificates should use certificates trusted by the Enterprise Certificate Authority (CA).
• The solution should minimize the ongoing management overhead of replacing certificates.
Which three actions should the administrator take to ensure that the solution meets corporate policy? (Choose three.)
A.
Replace the VMware Certificate Authority (VMCA) certificate with a self-signed certificate generated from the
B.
Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.
C.
Replace the machine SSL certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
D.
Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.
E.
Replace the solution user certificates wife custom certificates generated from the Enterprise CA.
F.
Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.
Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.
Replace the solution user certificates wife custom certificates generated from the Enterprise CA.
Option B, D and E are correct because they allow the administrator to replace the machine SSL certificates, the VMware Certificate Authority (VMCA) certificate and the solution user certificates with custom certificates generated from the Enterprise CA, which will ensure that all certificates are trusted by the Enterprise CA and minimize the ongoing management overhead of replacing certificates. Option A is incorrect because replacing the VMCA certificate with a self-signed certificate generated from the VMCA will not ensure that the certificate is trusted by the Enterprise CA. Option C is incorrect because replacing the machine SSL certificates with trusted certificates generated from the VMCA will not ensure that the certificates are trusted by the Enterprise CA. Option F is incorrect because replacing the solution user certificates with trusted certificates generated from the VMCA will not ensure that the certificates are trusted by the Enterprise CA.
After a recent unexplained peak in virtual machine (VM) CPU usage, an administrator is asked to monitor the VM performance for a recurrence of the issue.
Which two tools can the administrator use? (Choose two.)
A.
vCenter Management Interface
B.
Direct Console User Interface (DCUI)
C.
vSphere Performance Charts
D.
vCenter Command Line Interface
E.
ESXi Shell
vSphere Performance Charts
ESXi Shell
To monitor the VM performance for a recurrence of the issue, the administrator can use vSphere Performance Charts, which provide graphical views of various performance metrics for VMs and other objects; or ESXi Shell, which provides command-line access to ESXi hosts and allows running various commands to collect performance data.
References:
https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.monitoring.doc/GUID-D89E8267-C74 https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.monitoring.doc/GUID-CDC20FD2-FE
A vSphere cluster has the following configuration:
• Virtual machines (VMs) are running Production and Test workloads
• vSphere Distributed Resource Scheduler (DRS) is enabled
• There are no resource pools in the cluster
Performance monitoring data shows that the Production workload VMs are not receiving their fully allocated memory when the vSphere cluster is fully utilized.
A combination of which two steps could the administrator perform to ensure that the Production VMs are always guaranteed the full allocation of memory? (Choose two.)
A.
Assign a custom memory share value to the resource pool containing the Production VMs.
B.
Assign a memory reservation value to the resource pool containing the Production VMs.
C.
Create a parent resource pool for the Production VMs.
D.
Create a sibling resource pool for each of the Production and Test VMs.
E.
Create a child resource pool for the Test VMs.
Assign a memory reservation value to the resource pool containing the Production VMs.
Create a sibling resource pool for each of the Production and Test VMs.
An administrator is completing the configuration of a new vSphere cluster and has enabled vSphere High Availability (HA) and vSphere Distributed Resource Scheduler (DRS).
After adding the ESXi hosts to the cluster, which networking information will the administrator be prompted to provide when using the Cluster Quickstart workflow?
A.
vMotion networking
B.
Management networking
C.
vSAN networking
D.
Virtual machine networking
vMotion networking
An administrator remotely deploys VMware ESXi using an out of band management connection and now needs to complete the configuration of the management network so that the host is accessible through the vSphere Host Client.
The following information has been provided to complete the configuration:
•Host FQDN esxi01corp.local
•Management VLAN ID: 10 DHCP: No
•Management IP Address: 172.16.10.101/24
•Management IP Gateway: 172.16.10.1
•Corporate DNS Servers: 172 16.10.5, 172.16.10..6
•DNS Domain: corp.local
In addition, all host configurations must also meet the following requirements:
•The management network must use only IPv4 network protocols.
•The management network must be fault tolerant
Which four high level tasks should the administrator complete in the Direct Console User Interface (DCUI) in order to meet the requirements and successfully log into the vSphere Host Client? (Choose four.)
A.
Set the value of the VMware ESXi Management Network VLAN ID to 10
B.
Configure at least two network adapters for the VMware ESXi Management Network
C.
Update the VMware ESXi Management Network IPv4 configuration to use a static IPv4 address
D.
Create a DNS A Record for the VMware ESXi host on the corporate DNS servers
E.
Disable IPv6 for the VMware ESXi Management Network
F.
Restore the original Management vSphere Standard Switch.
G.
Update the VMware ESXi Management Network DNS configuration to use the corporate DNS servers for ' names resolution
Set the value of the VMware ESXi Management Network VLAN ID to 10
Configure at least two network adapters for the VMware ESXi Management Network
Update the VMware ESXi Management Network IPv4 configuration to use a static IPv4 address
Create a DNS A Record for the VMware ESXi host on the corporate DNS servers
| Page 4 out of 13 Pages |
| 2345 |
| 2V0-21.23 Practice Test Home |