An administrator is working with VMware Support and Is asked to provide log bundles for the ESXI hosts in an environment. Three options Joes the administrator have? (Choose three.)
A.
Generate a combined log bundle for all ESXI hosts using the vCenter Management Interface.
B.
Generate a separate log bundle for each ESXI host using the vSphere Host Client.
C.
Generate a combined log bundle for all ESXI hosts using the vSphere Client.
D.
Generate a separate log bundle for each ESXI host using the vSphere Client.
E.
Generate a separate log bundle for each ESXI host using the vCenter Management Interface.
F.
Generate a combined log bundle for all ESXi hosts using the vSphere Host Client.
An administrator has been notified that a number of hosts are not compliant with the company policy for time synchronization.The relevant portion of the policy states:
All physical servers must synchronize time with an external time source that is accurate to the microsecond. Which step should the administrator take to ensure compliance with the policy?
A.
Ensure that each vCenter Server Appliance is configured to use a Network Time Protocol (NTP) source.
B.
Ensure that each ESXi host is configured to use a Precision Time Protocol (PTP) source.
C.
Ensure that each ESXi host is configured to use a Network Time Protocol (NTP) source.
D.
Ensure that each vCenter Server Appliance is configured to use a Precision Time Protocol (PTP) source.
An administrator is tasked with configuring certificates for a VMware software-defined data center (SDDC) based on the following requirements:
• All certificates should use certificates trusted by the Enterprise Certificate Authority (CA).
• The solution should minimize the ongoing management overhead of replacing certificates.
Which three actions should the administrator take to ensure that the solution meets corporate policy? (Choose three.)
A.
Replace the VMware Certificate Authority (VMCA) certificate with a self-signed certificate generated from the
B.
Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.
C.
Replace the machine SSL certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
D.
Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.
E.
Replace the solution user certificates wife custom certificates generated from the Enterprise CA.
F.
Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
After a recent unexplained peak in virtual machine (VM) CPU usage, an administrator is asked to monitor the VM performance for a recurrence of the issue.
Which two tools can the administrator use? (Choose two.)
A.
vCenter Management Interface
B.
Direct Console User Interface (DCUI)
C.
vSphere Performance Charts
D.
vCenter Command Line Interface
E.
ESXi Shell
A vSphere cluster has the following configuration:
• Virtual machines (VMs) are running Production and Test workloads
• vSphere Distributed Resource Scheduler (DRS) is enabled
• There are no resource pools in the cluster
Performance monitoring data shows that the Production workload VMs are not receiving their fully allocated memory when the vSphere cluster is fully utilized.
A combination of which two steps could the administrator perform to ensure that the Production VMs are always guaranteed the full allocation of memory? (Choose two.)
A.
Assign a custom memory share value to the resource pool containing the Production VMs.
B.
Assign a memory reservation value to the resource pool containing the Production VMs.
C.
Create a parent resource pool for the Production VMs.
D.
Create a sibling resource pool for each of the Production and Test VMs.
E.
Create a child resource pool for the Test VMs.
Page 6 out of 20 Pages |
Previous |