Q1. A vSphere Replication user needs to connect a source site to a target site.
What privilege is needed at both sites?
A. VRM remote.Manage VRM
B. VRM datastore mapper.Manage
C. Host.vSphere Replication.Manage replication
D. Virtual machine.vSphere Replication.Manage replication
Answer: A
Q2. An administrator needs to configure a storage solution for a vSphere 6.x implementation with these characteristics:
Snapshot support
vMotion Capability
Clustering across multiple ESXi hosts
Database application with high transaction count
vFlash Read Cache
Which solution meets all of the stated requirements?
A. A vmdk located on a Shared VMFS datastore
B. A Physical Mode Raw Device Mapped LUN
C. A Virtual Mode Raw Device Mapped LUN
D. A Virtual SAN-based vmdk
Answer: C
Q3. An administrator is creating a new Content Library. It will subscribe to another remote Content Library without authentication enabled.
What information from the published library will they need in order to complete the subscription?
A. Subscription URL
B. A security password from the publishing Content Library
C. Publisher's Items.json file
D. Username from the publishing Content Library
Answer: A
Q4. An administrator with global administrator privileges creates a custom role but fails to assign any privileges to it.
Which two privileges would the custom role have? (Choose two.)
A. System.View
B. System.Anonymous
C. System.User
D. System.ReadOnly
Answer: A,B
Q5. An administrator plans to use VMware Converter Standalone to convert a virtual machine to a vSphere environment. The source virtual machine has these properties:
. Running Windows 2008 R2
. Contains one NTFS formatted volume
During conversion, how many virtual disks can the administrator add to the destination virtual machine?
A. 0
B. 1
C. 2
D. 3
Answer: A
Q6. A user notifies an administrator that Content Libraries are not visible.
What is a possible solution?
A. Assign the user the read-only role at the global permission level.
B. Assign the user the read-only role at the vCenter Server root level.
C. Assign the user the read-only role at the vCenter Server data center level.
D. Assign the user the read-only role at the vCenter Server cluster level.
Answer: A
Q7. When troubleshooting a performance related issue, an administrator sees the following warning message on an ESXi Console:
Significant imbalance between NUMA nodes detected. Performance may be impacted.
Which action should the administrator take to correct this problem?
A. Ensure that the RAM modules are evenly balanced between processor sockets in the physical server.
B. Ensure that all memory banks associated with CPU Socket 0 in the physical server are completely filled.
C. Ensure that the physical server has the maximum amount of RAM modules that it can support.
D. Ensure that all RAM modules in the host are Error-correcting code (ECC) modules.
Answer: A
Q8. When attempting to connect to a vCenter Server, an administrator observes the following at the top of the vSphere Web Client:
Could not connect to one or more vCenter Server Systems:https://vCenter.corp.com:443/sdk
What three reasons could be preventing the vSphere Web Client from communicating with this vCenter Server? (Choose three.)
A. The vCenter Server machine is not responding via the network.
B. An incorrect entry for this vCenter Server exists in the Single Sign-On service.
C. The SSL certificates do not match the FQDN address for the server.
D. The Platform Services Controller is external to this vCenter Server.
E. The DNS entry for the vCenter Server is incorrect.
Answer: A,B,C
Q9. Which three statements are correct regarding Fibre Channel over Ethernet (FCOE)? (Choose three.)
A. The network switch must have Priority-based Flow Control (PFC) set to AUTO.
B. The network switch must have Priority-based Flow Control (PFC) set to ON.
C. Each port on the FCoE card must reside on the same vSwitch.
D. Each port on the FCoE card must reside on a separate vSwitch.
E. The ESXi host will require a reboot after moving an FCoE card to a different vSwitch.
Answer: A,D,E
Q10. Which two groups of settings should be reviewed when attempting to increase the security of virtual machines (VMs)? (Choose two.)
A. Disable hardware devices
B. Disable unexposed features
C. Disable VMtools devices
D. Disable VM Template features
Answer: A,B