Q1. An administrator wants to configure a High Availability cluster to allow virtual machines a
10 minute window to shut down in the event of a Host Isolation incident.
What two configuration settings would satisfy this requirement? (Choose two.)
A. Set the advanced option das.isolationshutdowntimeout = 10.
B. Set the advanced option das.isolationshutdowntimeout = 600.
C. Configure Host Isolation Response to Shut Down and Restart VMs.
D. Configure Host Isolation Response to Power Off and Restart VMs.
Answer: B,C
Q2. Which two scenarios could cause Storage DRS to be disabled on a Virtual Disk (VMDK)? (Choose two.)
A. The VMDK is an independent disk.
B. The virtual machine has vSphere Fault Tolerance enabled.
C. The VMDK is hosted on NFS storage.
D. The virtual machine has a CD-ROM/ISO image connected.
Answer: A,B
Q3. Which three components should an administrator select when configuring vSphere permissions? (Choose three.)
A. Inventory Object
B. Role
C. User/Group
D. Privilege
E. Password
Answer: A,B,C
Q4. Which two statements are correct regarding vSphere certificates? (Choose two.)
A. ESXi host upgrades do not preserve the SSL certificate and reissue one from the VMware Certificate Authority (VMCA).
B. ESXi host upgrades preserve the existing SSL certificate.
C. ESXi hosts have assigned SSL certificates from the VMware Certificate Authority (VMCA) during install.
D. ESXi hosts have self-signed SSL certificates by default.
Answer: B,C
Q5. After successfully adding a new ESXi 6.x host to vCenter Server, an administrator sees it as Not Responding in the vSphere Web Client interface a few minutes later.
If the issue is caused by a network firewall blocking traffic, which port must be opened to correct this specific problem?
A. 443 (TCP)
B. 443 (UDP)
C. 902 (TCP)
D. 902 (UDP)
Answer: D
Q6. Which file determines the location of the installation script during a scripted upgrade?
A. boot.cfg
B. ks.cfg
C. script.cfg
D. upgrade.cfg
Answer: A
Q7. An administrator notices that one virtual machine is in an orphaned state.
What are two reasons that a virtual machine can appear as orphaned? (Choose two.)
A. A VMware High Availability host failure has occurred.
B. The virtual machine was unregistered directly on the host.
C. The ESXi host is disconnected.
D. The user does not have privilege to access the virtual machine.
Answer: A,B
Q8. An administrator has created a resource pool named Marketing HTTP with a Memory Limit of 24 GB and a CPU Limit of 10,000 MHz.
The Marketing HTTP resource pool contains three virtual machines:
✑ Mktg-SQL has a memory reservation of 16 GB.
✑ Mktg-App has a memory reservation of 6 GB.
✑ Mktg-Web has a memory reservation of 4 GB.
What would happen if all three virtual machines are powered on?
A. All three virtual machines can power on, but will have memory contention.
B. All three virtual machines can power on without memory contention.
C. Only two of the three virtual machines can power on.
D. Only one of the virtual machines can power on.
Answer: C
Q9. Refer to the Exhibit.
An administrator has configured a firewall rule as shown in the Exhibit. Which statement best describes the ESXi 6.x firewall rule?
A. Connections from the ESXi host to all devices on the 192.168.1.0 network and 192.168.2.220 on port 22 are allowed.
B. Connections coming from IP addresses from the 192.168.1.0 network and 192.168.2.220 on port 22 are allowed.
A. C. TCP Connections coming from IP addresses from the 192.168.1.0 network and 192.168.2.220 on port 22 are not allowed.
D. TCP Connections from the ESXi host to all devices on the 192.168.1.0 network and 192.168.2.220 on port 22 are not allowed.
Answer: B
Q10. Which two reasons would prevent Storage Distributed Resource Scheduler (SDRS) from operating on a datastore? (Choose two.)
A. The datastore has Storage I/O Control disabled.
B. The datastore is connected to an unsupported host.
C. The datastore is hosted on an NFS server.
D. The datastore is hosted on an iSCSI server.
Answer: A,B
Q11. What is the maximum number of snapshot instances in vSphere Replication that can be configured to recover a virtual machine at a specific point in time?
A. 16
B. 24
C. 48
D. 72
Answer: B
Q12. An administrator creates a Private VLAN with a Primary VLAN ID of 2. The administrator than creates three Private VLANs as follows:
✑ Marketing
✑ PVLAN ID. 4
✑ PVLAN Type. Isolated
✑ Accounting
✑ PVLAN ID. 5
✑ PVLAN Type. Community
✑ Secretary
✑ PVLAN ID. 17
✑ PVLAN Type. Isolated
Users in the Accounting PVLAN are reporting problems communicating with servers in the Marketing PVLAN.
Which two actions could the administrator take to resolve this problem? (Choose two.)
A. Change the PVLAN type for the Accounting network to Promiscuous.
B. Change the PVLAN ID for the Accounting network to 2.
C. Change the PVLAN type for Marketing network to Promiscuous.
D. Change the PVLAN ID for Accounting network to 4.
Answer: A,B
Q13. An administrator has upgraded a Distributed vCenter Server environment from 5.5 to 6.0. What is the next step that should be taken?
A. vCenter Inventory Service must be manually stopped and removed.
A. B. vCenter Inventory Service must be changed from manual to automatic.
C. vCenter Inventory Service must be manually stopped and restarted.
D. vCenter Inventory Service must be changed from automatic to manual.
Answer: A
Q14. An administrator is upgrading an ESXi 5.5 host to ESXi 6.x and gets the following error: MEMORY_SIZE
What does this indicate?
A. Insufficient memory on the ESXi host to complete the upgrade.
B. Insufficient memory for Auto Deploy to complete the upgrade.
C. Insufficient memory in vCenter Server to complete the upgrade.
D. Insufficient memory for Update Manager to complete the upgrade.
Answer: A
Q15. Which Advanced Setting should be created for the vCenter Server to change the expiration policy of the vpxuser password?
A. VimPasswordExpirationInDays
B. VimExpirationPasswordDays
C. VimPassExpirationInDays
D. VimPasswordRefreshDays
Answer: A
Q16. VMware vSphere Replication protects virtual machines from partial or complete site failures by replicating the virtual machines between which three sites? (Choose three.)
A. From a source site to a target site.
B. From within a single site from one cluster to another.
C. From multiple source sites to a shared remote target site.
D. From a single source site to multiple remote target sites.
E. From multiple source sites to multiple remote target sites.
Answer: A,B,C