aiotestking uk

2V0-621D Exam Questions - Online Test


2V0-621D Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. An administrator is troubleshooting network communications between the vCenter Server and the ESXi 6.x host.

Which log shows the interaction events between these components?

A. /var/log/syslog.log

B. /var/log/hostd.log

C. /var/log/vpxa.log

D. /var/log/fdm.log

Answer: C

Q2. Which two considerations should an administrator keep in mind when booting from Software Fiber Channel over Ethernet (FCoE)? (Choose two.)

A. Software FCoE boot configuration can be changed from within ESXi.

B. Software FCoE boot firmware cannot export information in FBFT format.

C. Multipathing is not supported at pre-boot.

D. Boot LUN cannot be shared with other hosts even on shared storage.

Answer: C,D

Q3. Which file determines the location of the installation script during a scripted upgrade?

A. boot.cfg

B. ks.cfg

C. script.cfg

D. upgrade.cfg

Answer: A

Q4. Refer to the Exhibit.

An administrator has configured a firewall rule as shown in the Exhibit. Which statement best describes the ESXi 6.x firewall rule?

A. Connections from the ESXi host to all devices on the 192.168.1.0 network and 192.168.2.220 on port 22 are allowed.

B. Connections coming from IP addresses from the 192.168.1.0 network and 192.168.2.220 on port 22 are allowed.

A. C. TCP Connections coming from IP addresses from the 192.168.1.0 network and 192.168.2.220 on port 22 are not allowed.

D. TCP Connections from the ESXi host to all devices on the 192.168.1.0 network and 192.168.2.220 on port 22 are not allowed.

Answer: B

Q5. Which two supported tools can be used to upgrade virtual machine hardware? (Choose two.)

A. vSphere Web Client

B. vSphere Update Manager

C. vmware-vmupgrade.exe

D. esxcli vm hardware upgrade

Answer: A,B

Q6. Which three ports are used by the vSphere Web Client when connecting directly to an ESXi

6.x host? (Choose three.)

A. 443 TCP

B. 902 TCP and UDP

C. 903 TCP

D. 5480 TCP

E. 9443 TCP and UDP

Answer: A,B,C

Q7. An administrator wants to monitor virtual machines on a host and send notifications when memory usage reaches 80%.

What should the administrator create in vCenter Server to accomplish this?

A. A host alarm that will monitor virtual machine memory usage and set a trigger to email the notification.

B. A vCenter Server alarm that will monitor virtual machine memory usage and set an action to email the notification.

C. A host alarm that will monitor virtual machine memory usage and set an action to email the notification.

A. D. A vCenter Server alarm that will monitor virtual machine memory usage and set a trigger to email the notification.

Answer: B

Q8. Which three options are available for replacing vCenter Server Security Certificates? (Choose three.)

A. Replace with Certificates signed by the VMware Certificate Authority.

B. Make VMware Certificate Authority an Intermediate Certificate Authority.

C. Do not use VMware Certificate Authority, provision your own Certificates.

D. Use SSL Thumbprint mode.

E. Replace all VMware Certificate Authority issued Certificates with self-signed Certificates.

Answer: A,B,C

Q9. During a vCenter Server upgrade, an ESXi 6.x host in a High Availability (HA) cluster fails. Which statement is true?

A. HA will fail the virtual machines over to an available host during the vCenter Server upgrade process.

B. HA is unavailable during the vCenter Server upgrade process.

C. HA will fail the virtual machines over to an available host after the vCenter Server upgrade completes.

D. HA will successfully vMotion the virtual machines during the host failure.

Answer: A

Q10. A common root user account has been configured for a group of ESXi 6.x hosts.

Which two steps should be taken to mitigate security risks associated with this configuration? (Choose two.)

A. Remove the root user account from the ESXi host.

A. B. Set a complex password for the root account and limit its use.

C. Use ESXi Active Directory capabilities to assign users the administrator role.

D. Use Lockdown mode to restrict root account access.

Answer: B,C