Q1. An administrator needs to use vSphere Update Manager to perform orchestrated upgrades of ESXi hosts and virtual machines. The vSphere management components reside in a secure environment that does not have direct access to the Internet.
How would Update Manager be configured in this environment while maintaining the organization's security requirements?
A. Install Update Manager Download Service on a machine with Internet access and configure an export policy to the Update Manager server.
B. Install Update Manager Secure Gateway on a machine in the DMZ and configure an IPsec tunnel to the internal Update Manager server.
C. Create a TFTP server as an HTTP proxy and configure an export policy to the Update Manager server.
D. Enable gateway services on the Update Manager server and provide Internet access to the gateway address.
Answer: A
Q2. A vSphere administrator needs to use vSphere Update Manager to perform orchestrated upgrades of virtual machines.
Which two options are available for virtual machine remediation? (Choose two.)
A. Upgrade virtual machine hardware
B. Upgrade VMware tools
C. Upgrade virtual machine appliances
D. Upgrade virtual machine guest OS
Answer: A,B
Q3. An administrator needs to migrate a company's physical servers to virtual servers and deploy into the ESXi 5.x cluster. During the process of converting to a virtual machine, the administrator needs to reduce the size of the disks.
Which method should the administrator use to meet this requirement?
A. Use VMware Converter hot cloning with volume-based cloning at the file level
B. Shut down the physical server and use VMware Converter cold cloning with volume-based cloning at the block level
C. Use VMware Converter hot cloning with volume-based cloning at the block level
D. Shut down the physical server and use VMware Converter cold cloning with volume-based cloning at the file level
Answer: A
Q4. An application server has been added to an existing multi-tier application contained in a vApp. Shortly after a planned maintenance event, users are unable to access the application.
What does the vSphere administrator need to change to ensure the application can be accessed?
A. The startup order of the vApp
B. The shutdown option to power off the virtual machines
C. The IP Allocation policy to DHCP
D. The Memory Shares to High
Answer: A
Q5. A vSphere administrator enables Fault Tolerance on a powered off virtual machine that has the following configuration:
.The virtual machine's single thin provisioned virtual disk is sized at 100GB.
.The datastore that houses the virtual machine has 120GB of free space.
After Fault Tolerance has been configured, another administrator attempts to use Enhanced vMotion to move a 30GB virtual machine file into the same datastore and receives an error.
What condition could cause this behavior?
A. Fault Tolerance inflated the virtual machine's virtual disk file.
B. Fault Tolerance created a temporary logging file on the same datastore.
C. Fault Tolerance created a secondary copy of the virtual machine's virtual disk file.
D. The Fault Tolerance logging file ran out of disk space.
Answer: A
Q6. To comply with security requirements, an administrator with a vCenter Server Appliance needs to force logoff of the vSphere web client after 10 minutes of inactivity.
What should the administrator do to meet the requirement?
A. Edit: /var/lib/vmware/vsphere-client/webclient.properties, modify session.timeout=10
B. Edit: /opt/vmware/vsphere-client/webclient.properties, modify session.timeout=600
C. Edit: /var/lib/vmware/vsphere-client/webclient.properties modify session.timeout=600
D. Edit: /opt/vmware/vsphere-client/webclient.properties, modify session.timeout=10
Answer: A
Q7. An administrator using vCenter Operations Manager notices an increase in resource consumption by virtual machines over a period of time. The administrator needs to understand how adding more hosts or increasing resources in existing hosts will address the growing resource requirements of the virtual machines.
Which vCenter Operations Manager feature can provide this information?
A. Host or Cluster Capacity Optimization Report
B. What-if Scenarios
C. Density and Reclaimable Waste badges
D. Virtual Machine Optimization Report
Answer: B
Q8. A customer needs to size a single backup appliance for backing up 3TB of data. There is no requirement for guest level backups of SQL and Exchange.
What is the minimum VMware Data Protection solution and sizing that would fulfill the stated requirements?
A. VMware Data Protection Advanced with a 4TB backup appliance
B. VMware Data Protection with a 4TB backup appliance
C. VMware Data Protection Advanced with a 3TB backup appliance
D. VMware Data Protection with a 3TB backup appliance
Answer: A
Q9. An application team is implementing a new solution in the virtualized environment. The application vendor states the application is memory intensive. The application is very unstable when operating without adequate on-demand access to physical memory. The application's virtual machines are assigned to the Mission Critical resource pool.
Which resource pool setting will help ensure the application has adequate access to memory?
A. Memory reservation
B. High memory share value
C. Unlimited memory
D. Expandable reservation
Answer: A
Q10. What is a valid plug-in status for a plug-in that has been added to a vSphere client?
A. Disabled
B. Unknown
C. Stopped
D. Installed
Answer: A
Q11. A vSphere administrator needs to perform packet tracing from a Linux virtual machine. The virtual machine is attached to a vSphere Standard Switch configured with several VLANs.
Which approach could the administrator use to configure the network to capture all traffic from the Linux virtual machine?
A. Configure the virtual switch with VLAN Trunking and specify each VLANs on the port group containing the virtual machine.
B. Configure a vSphere Distributed Switch with VLAN Trunking. Create a port group and configure it with Promiscuous Mode. Connect the virtual machine to that port group.
C. Configure the port group containing the virtual machine for Promiscuous Mode. Set the port group to use VLAN 1.
D. Configure a vSphere Distributed Switch with VLAN Trunking. Connect the virtual machine to the switch and enable Port Mirroring on the port group containing the virtual machine.
Answer: B
Q12. How is changed block tracking (CBT) used in a vSphere implementation?
A. CBT is used by the VMkernel to reduce time needed for virtual machine copy operations.
B. CBT is used by VMware Data Protection (VDP) to reduce time needed for backup jobs.
C. CBT is used by vCenter Server to reduce the size of snapshots.
D. CBT is used by vSphere Replication for synchronous replication operations.
Answer: B
Q13. Which two CPU features enable the use of 64-bit virtual machines? (Choose two.)
A. Intel VT
B. NX/XD Bit
C. Hyper-threading
D. AMD RVI
Answer: A,D
Q14. A vSphere administrator needs the ability to adjust the amount of guaranteed physical CPU and Memory resources to a virtual machine without incurring application downtime.
Which actions must the administrator perform?
A. Enable CPU hotplug and Memory hotplug on the virtual machine.
B. Adjust the number of CPUs and the Memory Configuration for the virtual machine.
C. Adjust the CPU reservation slider and click the Reserve all Guest Memory checkbox.
D. Adjust the CPU and Memory reservation sliders on the virtual machine.
Answer: D
Q15. A customer needs to select an appropriate Path Selection Policy (PSP) for their storage array. There is no requirement for a preferred path. The policy should not select a new path unless the current one fails.
Which PSP meets the requirement?
A. Fixed
B. Round Robin
C. Most Recently Used
D. Asymmetric Logical Unit Access
Answer: C