ExamGecko
Home Home / VMware / 2V0-21.23

VMware 2V0-21.23 Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











During the staging of a patch on a vCenter Server Appliance, an error was encountered and the process stopped. An administrator resolved the root cause and is ready to continue with the staging of the patch.

From the vCenter Management Interface, which action should the administrator take to continue the process from the point at which the error occurred?

A.
Use the Stage and Install option to resume the staging.
A.
Use the Stage and Install option to resume the staging.
Answers
B.
Use the Resume option to resume the staging.
B.
Use the Resume option to resume the staging.
Answers
C.
Use the Unstage option to restart the staging.
C.
Use the Unstage option to restart the staging.
Answers
D.
Use the Stage Only option to restart the staging.
D.
Use the Stage Only option to restart the staging.
Answers
Suggested answer: B

Explanation:

docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vcenter.upgrade.doc/GUID-FF533442-66F0- 4797-976D-1DA99102DD0A.html


An administrator is adding a new ESXi host to an existing vSphere cluster. When selecting the cluster, the administrator Is unable to use the Cluster Quickstart workflow to add and configure the additional host.

What could be the root cause of this issue?

A.
The administrator has previously dismissed the Cluster Quickstart workflow.
A.
The administrator has previously dismissed the Cluster Quickstart workflow.
Answers
B.
The administrator must manually add the host to the cluster before using the Cluster Quickstart workflow.
B.
The administrator must manually add the host to the cluster before using the Cluster Quickstart workflow.
Answers
C.
The administrator has not been assigned the required permissions to use the Cluster Quickstart workflow.
C.
The administrator has not been assigned the required permissions to use the Cluster Quickstart workflow.
Answers
D.
The administrator must enable the Cluster Quickstart workflow option in VMware vCenter.
D.
The administrator must enable the Cluster Quickstart workflow option in VMware vCenter.
Answers
Suggested answer: A

Explanation:

Option A is correct because it indicates that the administrator has previously dismissed the Cluster Quickstart workflow, which will prevent them from using it to add and configure an additional host. To use the Cluster Quickstart workflow again, the administrator must enable it in the cluster settings. Option B is incorrect because the administrator does not need to manually add the host to the cluster before using the Cluster Quickstart workflow, as this is one of the steps in the workflow. Option C is incorrect because the administrator does not need any special permissions to use the Cluster Quickstart workflow, as long as they have permissions to perform cluster operations. Option D is incorrect because there is no option to enable the Cluster Quickstart workflow in VMware vCenter, as this is a feature of vSphere clusters. Reference: https://docs.vmware.com/en/VMwarevSphere/ 7.0/com.vmware.vsphere.vcenterhost.doc/GUID-9F9E3F8C-0E2B-4B6A-8C5C- 3F8E5F6B4E9D.html

A company has two sites: Site A and Site B. The administrator would like to manage the VMware vCenter inventories in both sites from a single vSphere Client session.

Which vCenter feature must be configured?

A.
VMware Certificate Authority
A.
VMware Certificate Authority
Answers
B.
VMware Site Recovery Manager
B.
VMware Site Recovery Manager
Answers
C.
vCenter Single Sign-On
C.
vCenter Single Sign-On
Answers
D.
Enhanced Linked Mode
D.
Enhanced Linked Mode
Answers
Suggested answer: D

Explanation:

Option D is correct because it indicates that Enhanced Linked Mode must be configured to allow the administrator to manage the VMware vCenter inventories in both sites from a single vSphere Client session. Enhanced Linked Mode allows multiple vCenter Server instances to share information such as tags, licenses, roles, permissions, and policies. Option A is incorrect because VMware Certificate Authority is a service that provides certificates for vSphere components and does not affect inventory management. Option B is incorrect because VMware Site Recovery Manager is a solution that provides disaster recovery and business continuity for vSphere environments and does not affect inventory management. Option C is incorrect because vCenter Single Sign-On is a service that provides authentication and authorization for vSphere components and does not affect inventory management. Reference: https://docs.vmware.com/en/VMwarevSphere/ 7.0/com.vmware.vcenter.install.doc/GUID-9F9E3F8C-0E2B-4B6A-8C5C-3F8E5F6B4E9D.html

An administrator plans to update the Supervisor cluster and has noticed some of the Tanzu Kubemetes Grid clusters are running an incompatible version.

Which action must the administrator take before proceeding with the Supervisor cluster update?

A.
Update all Tanzu Kubernetes Grid clusters to the latest version prior to the Supervisor cluster update.
A.
Update all Tanzu Kubernetes Grid clusters to the latest version prior to the Supervisor cluster update.
Answers
B.
No action is needed - Tanzu Kubernetes Grid clusters will be updated automatically as part of the update process.
B.
No action is needed - Tanzu Kubernetes Grid clusters will be updated automatically as part of the update process.
Answers
C.
No action is needed - Incompatible Tanzu Kubernetes Grid clusters can be manually updated after the Supervisor cluster update.
C.
No action is needed - Incompatible Tanzu Kubernetes Grid clusters can be manually updated after the Supervisor cluster update.
Answers
D.
Update incompatible Tanzu Kubernetes Grid clusters prior to the Supervisor cluster update.
D.
Update incompatible Tanzu Kubernetes Grid clusters prior to the Supervisor cluster update.
Answers
Suggested answer: D

Explanation:

Option D is correct because it indicates that the administrator must update incompatible Tanzu Kubernetes Grid clusters prior to the Supervisor cluster update, as this will ensure that there are no compatibility issues or disruptions during or after the update process. Option A is incorrect because it is not necessary to update all Tanzu Kubernetes Grid clusters to the latest version prior to the Supervisor cluster update, as some clusters may already be compatible with the new version. Option B is incorrect because Tanzu Kubernetes Grid clusters will not be updated automatically as part of the update process, as they require manual intervention from the administrator. Option C is incorrect because incompatible Tanzu Kubernetes Grid clusters cannot be manually updated after the Supervisor cluster update, as they may become inaccessible or unstable due to compatibility issues.

Reference: https://docs.vmware.com/en/VMware-vSphere/7.0/vmware-vsphere-with-tanzu/GUID- 9F9E3F8C-0E2B-4B6A-8C5C-3F8E5F6B4E9D.html

Which three vSphere features are still supported for Windows-based virtual machines when enabling vSphere's -virtualization-based security feature? (Choose three.)

A.
vSphere vMotion
A.
vSphere vMotion
Answers
B.
PCI passthrough
B.
PCI passthrough
Answers
C.
vSphere High Availability (HA)D, vSphere Fault Tolerance
C.
vSphere High Availability (HA)D, vSphere Fault Tolerance
Answers
D.
vSphere Distributed Resources Scheduler (DRS)
D.
vSphere Distributed Resources Scheduler (DRS)
Answers
E.
Hot Add of CPU or memory
E.
Hot Add of CPU or memory
Answers
Suggested answer: A, C, E

Explanation:

Option A, C and E are correct because they indicate that vSphere features such as vMotion, High Availability (HA) and Distributed Resource Scheduler (DRS) are still supported for Windows-based virtual machines when enabling vSphere's virtualization-based security feature, which provides enhanced protection for guest operating systems and applications against various attacks. Option B is incorrect because PCI passthrough is not supported for Windows-based virtual machines when enabling vSphere's virtualization-based security feature, as this feature requires direct access to physical devices that cannot be shared or protected by hypervisor mechanisms. Option D is incorrect because Fault Tolerance is not supported for Windows-based virtual machines when enabling vSphere's virtualization-based security feature, as this feature requires identical execution states for primary and secondary virtual machines that cannot be guaranteed by hypervisor mechanisms. Option F is incorrect because Hot Add of CPU or memory is not supported for Windows-based virtual machines when enabling vSphere's virtualization-based security feature, as this feature requires dynamic changes to virtual hardware configuration that cannot be handled by hypervisor mechanisms. Reference: https://docs.vmware.com/en/VMwarevSphere/ 7.0/com.vmware.vsphere.security.doc/GUID-A2A4371A-B888-404C-B23FC422A8C40F54. html

An administrator wants to create virtual machine (VM) templates and store them in a content library.

The administrator would like to use the content library to manage different versions of these templates so that reverting to an earlier version is an option.

How should the administrator create these templates?

A.
Select a VM in the vCenter inventory.Clone the VM to the content library as a VM template type.
A.
Select a VM in the vCenter inventory.Clone the VM to the content library as a VM template type.
Answers
B.
Select a VM template in the vCenter inventory. Clone the template to the content library.
B.
Select a VM template in the vCenter inventory. Clone the template to the content library.
Answers
C.
Export a VM in the vCenter inventory to an OVF template. Import the OVF template into the content library.
C.
Export a VM in the vCenter inventory to an OVF template. Import the OVF template into the content library.
Answers
D.
Convert a VM to a template in the vCenter inventory.Clone the template to the content library.
D.
Convert a VM to a template in the vCenter inventory.Clone the template to the content library.
Answers
Suggested answer: A

Explanation:

Option A is correct because it allows the administrator to clone a VM to the content library as a VM template type, which can be used to create and manage different versions of these templates in the content library. Option B is incorrect because it requires the administrator to convert a VM to a template in the vCenter inventory first, which is an extra step. Option C is incorrect because it requires the administrator to export a VM to an OVF template and import it into the content library, which are extra steps. Option D is incorrect because it requires the administrator to convert a VM to a template in the vCenter inventory and clone it to the content library, which are extra steps.

Reference: https://docs.vmware.com/en/VMwarevSphere/ 7.0/com.vmware.vsphere.vm_admin.doc/GUID-9F9E3F8C-0E2B-4B6A-8C5C- 3F8E5F6B4E9D.html

An administrator is tasked with configuring certificates for a VMware software-defined data center (SDDC) based on the following requirements:

• All certificates should use certificates trusted by the Enterprise Certificate Authority (CA).

• The solution should minimize the ongoing management overhead of replacing certificates.

Which three actions should the administrator take to ensure that the solution meets corporate policy? (Choose three.)

A.
Replace the VMware Certificate Authority (VMCA) certificate with a self-signed certificate generated from the
A.
Replace the VMware Certificate Authority (VMCA) certificate with a self-signed certificate generated from the
Answers
B.
Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.
B.
Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.
Answers
C.
Replace the machine SSL certificates with trusted certificates generated from the VMwareCertificate Authority (VMCA).
C.
Replace the machine SSL certificates with trusted certificates generated from the VMwareCertificate Authority (VMCA).
Answers
D.
Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.
D.
Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.
Answers
E.
Replace the solution user certificates wife custom certificates generated from the Enterprise CA.
E.
Replace the solution user certificates wife custom certificates generated from the Enterprise CA.
Answers
F.
Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
F.
Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
Answers
Suggested answer: B, D, E

Explanation:

Option B, D and E are correct because they allow the administrator to replace the machine SSL certificates, the VMware Certificate Authority (VMCA) certificate and the solution user certificates with custom certificates generated from the Enterprise CA, which will ensure that all certificates are trusted by the Enterprise CA and minimize the ongoing management overhead of replacing certificates. Option A is incorrect because replacing the VMCA certificate with a self-signed certificate generated from the VMCA will not ensure that the certificate is trusted by the Enterprise CA. Option C is incorrect because replacing the machine SSL certificates with trusted certificates generated from the VMCA will not ensure that the certificates are trusted by the Enterprise CA. Option F is incorrect because replacing the solution user certificates with trusted certificates generated from the VMCA will not ensure that the certificates are trusted by the Enterprise CA.

Reference: https://docs.vmware.com/en/VMwarevSphere/ 7.0/com.vmware.vsphere.security.doc/GUID-A2A4371A-B888-404C-B23FC422A8C40F54.html

An administrator is tasked with moving an application and guest operating system (OS) running on top of a physical server to a software-defined data center (SDDC) in a remote secure location.

The following constraints apply:

• The remote secure location has no network connectivity to the outside world.

• The business owner is not concerned if all changes in the application make it to the SDDC in the secure location.

• The application's data is hosted in a database with a high number of transactions.

What could the administrator do to create an image of the guest OS and application that can be moved to this remote data center?

A.
Create a hot clone of the physical server using VMware vCenter Converter.
A.
Create a hot clone of the physical server using VMware vCenter Converter.
Answers
B.
Create a cold clone of the physical server using VMware vCenter Converter.
B.
Create a cold clone of the physical server using VMware vCenter Converter.
Answers
C.
Restore the guest OS from a backup.
C.
Restore the guest OS from a backup.
Answers
D.
Use storage replication to replicate the guest OS and application.
D.
Use storage replication to replicate the guest OS and application.
Answers
Suggested answer: B

Explanation:

Option B is correct because it allows the administrator to create a cold clone of the physical server using VMware vCenter Converter, which will create an image of the guest OS and application that can be moved to this remote data center without requiring network connectivity or affecting the application's data. Option A is incorrect because creating a hot clone of the physical server using VMware vCenter Converter will require network connectivity and may affect the application's data due to changes during conversion. Option C is incorrect because restoring the guest OS from a backup will require network connectivity and may not include the latest changes in the application. Option D is incorrect because using storage replication to replicate the guest OS and application will require network connectivity and may not be feasible for a physical server. Reference:

https://docs.vmware.com/en/vCenter-Converter-Standalone/6.2/com.vmware.convsa.guide/GUID-9F9E3F8C-0E2B-4B6A-8C5C-3F8E5F6B4E9D.html

An administrator is tasked with configuring an appropriate Single Sign-On (SSO) solution for VMware vCenter based on the following criteria:

• The solution should support the creation of Enhanced Link Mode groups.

• All user accounts are stored within a single Active Directory domain and the solution must support only this Active Directory domain as the identity source.

• All user account password and account lockout policies must be managed within the Active

Directory domain.

• The solution should support token-based authentication.

Which SSO solution should the administrator choose based on the criteria?

A.
vCenter Identity Provider Federation with Active Directory Federation Services as the identity provider
A.
vCenter Identity Provider Federation with Active Directory Federation Services as the identity provider
Answers
B.
vCenter Single Sign-On with Active Directory over LDAP as the identity source
B.
vCenter Single Sign-On with Active Directory over LDAP as the identity source
Answers
C.
vCenter Single Sign-On with Active Directory (Windows Integrated Authentication) as the identity source
C.
vCenter Single Sign-On with Active Directory (Windows Integrated Authentication) as the identity source
Answers
D.
vCenter Identity Provider Federation with Active Directory over LDAP as the identity provider
D.
vCenter Identity Provider Federation with Active Directory over LDAP as the identity provider
Answers
Suggested answer: A

Explanation:

Option C is correct because it indicates that vCenter Single Sign-On with Active Directory (Windows Integrated Authentication) as the identity source is the best SSO solution for VMware vCenter based on the criteria, as this solution supports Enhanced Link Mode groups, supports only one Active Directory domain as the identity source, delegates password and account lockout policies to Active Directory, and supports token-based authentication. Option A is incorrect because vCenter Identity Provider Federation with Active Directory Federation Services as the identity provider is not necessary for a single Active Directory domain scenario and may introduce additional complexity and overhead. Option B is incorrect because vCenter Single Sign-On with Active Directory over LDAP as the identity source does not support token-based authentication and may require additional configuration for password and account lockout policies. Option D is incorrect because vCenter Identity Provider Federation with Active Directory over LDAP as the identity provider does not support token-based authentication and may introduce additional complexity and overhead.

Reference: https://docs.vmware.com/en/VMwarevSphere/ 7.0/com.vmware.vcenter.install.doc/GUID-A2A4371A-B888-404C-B23F-C422A8C40F54.html

An administrator is tasked with looking into the disaster recovery options for protecting a database server using VMware vSphere Replication.

The following requirements must be met:

• The virtual machine must remain online during the protection.

• The virtual machine's snapshots must be used as part of the replication process.

Which step must the administrator complete to accomplish this task?

A.
Configure the virtual machine storage policy.
A.
Configure the virtual machine storage policy.
Answers
B.
Enable guest OS VSS quiescing for this virtual machine.
B.
Enable guest OS VSS quiescing for this virtual machine.
Answers
C.
Perform a full initial synchronization of the source virtual machine to the target location.
C.
Perform a full initial synchronization of the source virtual machine to the target location.
Answers
D.
Configure network traffic isolation for vSphere Replication.
D.
Configure network traffic isolation for vSphere Replication.
Answers
Suggested answer: C

Explanation:

https://docs.vmware.com/en/vSphere-Replication/8.7/com.vmware.vsphere.replication- admin.doc/GUID-C249300C-2BC0-4128-88B5-046C3DE6BC5B.html


Total 109 questions
Go to page: of 11