An administrator is tasked with configuring vSphere Trust Authority. The administrator has completed the following steps:
• Set up the workstation
• Enabled the Trust Authority Administrator
• Enabled the Trust Authority State
• Collected information about the ESXi hosts and vCenter to be trusted
Which step does the administrator need to complete next?
A.
Import the Trusted Host information to the Trust Authority Cluster
B.
Import the Trusted Cluster information to the Trusted Hosts
C.
Create the Key Provider on the Trusted Cluster
D.
Import the Trusted Host information to the Trusted Cluster
Import the Trusted Host information to the Trust Authority Cluster
Explanation
https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.security.doc/images/GUID-D205B3C1 https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-39D8AB34-AD45-4B0A-8FB0-7A1
An administrator plans to bri ng VMware vCenter offline in order to perform hardware mainte-nance on the host where the vCenter Server Appliance is running.
Which vSphere feature must be configured to ensure that vCenter users experience minimal downtime?
A.
vSphere Distributed Resource Scheduler
B.
Hybrid Linked Mode
C.
vCenter Server High Availability
D.
Enhanced Linked Mode
vCenter Server High Availability
An administrator Is performing maintenance activities and discovers that a Virtual Machine File System (VMFS) datastore has a lot more used capacity than expected. The datastore contains 10 virtual machines (VMs) and, when the administrator reviews the contents of the associated datastore, discovers that five- virtual machines have a snapshot file (-delta.vmdk flies) that has not been modified In over 12 months. The administrator chei kfl the Snapshot Manager within the vSphere Client and confirms that there are no snapshots visible.
Which task should the administrator complete on the virtual machines to free up datastore space?
A.
Consolidate the snapshots for each VM.
B.
Inflate the disk files for each VM.
C.
Delete all snapshots for each VM.
D.
Storage vMotion each VM to another datastore.
Consolidate the snapshots for each VM.
Consolidating snapshots for each VM will merge any snapshot files that are not associated with a snapshot in Snapshot Manager into the base disk file and free up datastore space.
References:
https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.vm_admin.doc/GUID-53F65726-A23B
The presence of redundant delta disks can adversely affect the virtual machine performance. You can combine such disks without violating a data dependency. After consolidation, redundant disks are removed, which improves the virtual machine performance and saves storage space.
An administrator is investigating user logon failures for a VMware vCenter instance
Where can the administrator find log files containing information related to user login activities?
A.
On the vCenter Management Interface
B.
On the ESXi host using the Direct Console User Interface (®)
C.
On the vCenter Server Appliance
D.
In the vSphere Client when viewing the vCenter virtual machine
On the vCenter Server Appliance
The administrator can find log files containing information related to user login activities on the vCenter Server Appliance, which is a preconfigured Linux-based virtual machine that runs all vCenter Server services.
The log files are located in /var/log/vmware/vmware-vpx/vpxd.log and
/var/log/vmware/sso/ssoAdminServer.log directories.
References:
https://docs.vmware.com/en/VMware-vSphere/8.0/com.vmware.vsphere.troubleshooting.doc/GUID-5F9A7E49-
An administrator is tasked with migrating a single virtual machine (VM) from an existing VMware vCenter to a secure environment where corporate security policy requires that all VMs be encrypted. The secure environment consists of a dedicated vCenter instance with a 4-node vSphere cluster and already contains a number of encrypted VMs. Which two steps must the administrator take to ensure the migration is a success? (Choose two.)
A.
Ensure that the source and destination vCenter instances share the same Key Management Server (KMS).
B.
Ensure that Encrypted vMotion Is turned off for the VM.
C.
Ensure that the VM is encrypted before attempting the migration.
D.
Ensure that the VM is powered off before attempting the migration.
E.
Ensure that the source and destination vCenter Servers have a different Key Management Server (KMS).
Ensure that the source and destination vCenter instances share the same Key Management Server (KMS).
Ensure that the VM is encrypted before attempting the migration.
To ensure a successful migration of an encrypted VM to a secure environment, the administrator needs to ensure that the source and destination vCenter instances share the same Key Management Server (KMS), which provides encryption keys for both environments; and ensure that the VM is encrypted before attempting the migration, which allows preserving its encryption status during vMotion.
References:
https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.security.doc/GUID-F8F105EC-A6EA- https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.security.doc/GUID-C3FFBF62-D6BF-
Page 5 out of 20 Pages |
Previous |