What are two advantages of VCB over conventional agent-based methods of backing up a virtual machine's (VM's) data? (Choose Two.)

What are two advantages of VCB over conventional agent-based methods of backing up a virtual machine's (VM's) data? (Choose Two.) 






A. enables LAN-free backup and avoids undue overloading of the datacenter network
B. allows selection of files and directories from the guest file system of any VM
C. makes it possible to do both file-based and full-system backup of the same VM simultaneously
D. helps to eliminate the need for a backup window by using an online, snapshot-based backup





Answer: A,D

What are three requirements for a VMware HA cluster? (Choose three.)

What are three requirements for a VMware HA cluster? (Choose three.) 





A. Private Gigabit Ethernet network for all hosts
B. access to shared storage from all hosts
C. identical type and quantity of CPUs in each host
D. access to the virtual machine networks from all hosts
E. name resolution between all hosts





Answer: B,D,E

You want to troubleshoot poor remote console performance. Which is a possible cause of the problem?

You want to troubleshoot poor remote console performance. Which is a possible cause of the problem? 





A. The virtual NIC assigned to the virtual machine has a speed or duplex mismatch.
B. The physical NIC assigned to the virtual machine port group has a speed or duplex mismatch.
C. The virtual machine has an IP address conflict.
D. To conserve memory, the ESX Server has initiated Transparent Page Sharing.




Answer: B

Which statement is true about running both DRS and VMware HA (HA) on the same cluster?

Which statement is true about running both DRS and VMware HA (HA) on the same cluster? 






A. There is no advantage to running these two technologies on the same cluster as they are completely unrelated.
B. After a host failure, HA can start virtual machines intelligently using DRS algorithms.
C. After a host failure,
H. will restart virtual machines and DRS will migrate them to balance the workloads.
D. This is not a recommended configuration.





Answer: C

What are three advantages of VCB over conventional agent-based methods of backing up a virtual machine's (VM's) data? (Choose three.)

What are three advantages of VCB over conventional agent-based methods of backing up a virtual machine's (VM's) data? (Choose three.) 






A. allows selection of files and directories from the guest file system of a Linux VM
B. enables LAN-free backup and avoids undue overloading of the datacenter network
C. helps to eliminate the need for a backup window by using a "hot" snapshot-based backup
D. reduces the load on the ESX Server by moving backup tasks to a backup proxy machine
E. makes it possible to do both file-based and full-system backup of the same VM simultaneously







Answer: B,C,D

You have a Windows virtual machine (VM) that is performing poorly. You suspect high CPU utilization is the culprit. To definitively ascertain the cause of the performance problem, you should look for a _____.

You have a Windows virtual machine (VM) that is performing poorly. You suspect high CPU utilization is the culprit. To definitively ascertain the cause of the performance problem, you should look for a _____. 





A. high CPU Usage % value in Windows Task Manager
B. low CPU Ready value in VirtualCenter
C. high CPU Usage % in a third-party monitoring tool installed in the VM
D. high CPU Ready value in VirtualCenter






Answer: B

What are two characteristics of VMware Consolidated Backup? (Choose two.)

What are two characteristics of VMware Consolidated Backup? (Choose two.) 







A. Image-level backups of virtual machines can be performed
B. A Plugin integrate the VCB UI into Virtual Center
C. LAN-free backups of virtual machines can be performed
D. File-level backups of Windows and Linux virtual machines can be performed






Answer: A,C

One of the hosts in a cluster of 10 hosts requires maintenance. This host is currently running two virtual machines (VMs) for a total of 30% CPU utilization. What is the best practice for repairing the hardware?

One of the hosts in a cluster of 10 hosts requires maintenance. This host is currently running two virtual machines (VMs) for a total of 30% CPU utilization. What is the best practice for repairing the hardware? 




A. place the VMs on the host in Maintenance mode
B. place the host in Offline mode
C. repair the server while running VMs
D. place the host in Maintenance mode






Answer: D

In which format does an iSCSI target ID appear?

In which format does an iSCSI target ID appear? 






A. iqn.<year-mo>.<reversed_domain_name>:<unique_name>
B. iscsi.<year-mo>.<forward_domain_name>:<unique_name>
C. iqn.<ip_address>.<reversed_domain_name>
D. iscsi.<organizational_unit>.<forward_domain_name>:<unique_name>








Answer: A

Which two statements are true about network traffic shaping? (Choose two.)

Which two statements are true about network traffic shaping? (Choose two.) 






A. The settings affect only traffic being sent out the uplink adapter to the physical network.
B. The settings affect all vSwitch traffic.
C. The settings are defined on a per port group basis.
D. The settings affect only traffic coming into the uplink adapter from the physical network.
E. The settings are defined on a per-virtual machine basis.






Answer: A,C

Your desktop PC, like all desktop PCs at your office, has the Virtual Infrastructure Client application installed. Your PC cannot connect to a certain virtual machine (VM) on your ESX Server. Which troubleshooting test would be LEAST helpful in determining the cause of this problem?

Your desktop PC, like all desktop PCs at your office, has the Virtual Infrastructure Client application installed. Your PC cannot connect to a certain virtual machine (VM) on your ESX Server. Which troubleshooting test would be LEAST helpful in determining the cause of this problem? 







A. try to connect to a different VM
B. try to ping the IP address of a VM that is known to be up and working
C. try to ping the IP address of your service console
D. try to ping the DNS hostname of your service console







Answer: B

You are trying to decide whether to back up virtual machines (VMs) using a backup agent in each guest OS or using a backup agent in the service console. When is it most appropriate to use the guest OS strategy rather than the service console strategy to back up VMs? (Choose two.)

You are trying to decide whether to back up virtual machines (VMs) using a backup agent in each guest OS or using a backup agent in the service console. When is it most appropriate to use the guest OS strategy rather than the service console strategy to back up VMs? (Choose two.) 






A. when space for storing backups is severely limited
B. when all of the VMs must operate 24 hours a day, 7 days a week
C. when the current backup software license is per-server and is very costly
D. when quick recovery of full systems is a priority






Answer: A,B

DRS on a cluster is set to "Fully Automated", at its most aggressive setting. One particular server in the cluster is running at 98% CPU utilization. You notice that none of the virtual machines (VMs) are being placed on other servers. What are two possible causes of the problem? (Choose two.)

DRS on a cluster is set to "Fully Automated", at its most aggressive setting. One particular server in the cluster is running at 98% CPU utilization. You notice that none of the virtual machines (VMs) are being placed on other servers. What are two possible causes of the problem? (Choose two.) 







A. The VM options report_section = "8" in the DRS Settings on that cluster for all of the VMs on that server are set to Manual.
B. No other server in the cluster has enough resources to accommodate any of the VMs on the overloaded server.
C. An Affinity Rule for those particular VMs has been set to "Separate Virtual Machine" for the VMs on the overloaded host.
D. The guest OS types for the VMs do not support DRS.







Answer: A,B

Virtual machine (VM) A is connected to virtual switch A, and VM B.is connected to virtual switch B. Which statement is true about the network traffic between A and B?

Virtual machine (VM) A is connected to virtual switch A, and VM B.is connected to virtual switch B.
Which statement is true about the network traffic between A and B? 







A. Traffic between VM A and VM B flows through the physical NIC.
B. Traffic between VM A and VM B stays within ESX Server.
C. VM A can communicate with VM B if they have same security policies.
D. VM A can communicate with VM B if they have same port group policies.







Answer: A

On which platform does the VCB proxy run?

On which platform does the VCB proxy run? 





A. a Windows physical machine
B. a Windows virtual machine
C. an agent in an ESX Server
D. a Linux physical machine
E. a Linux virtual machine





Answer: A

What can prevent a successful migration with VMotion?

What can prevent a successful migration with VMotion? 





A. network cards located in different server slots
B. a physical CD-ROM that is connected from the virtual machine
C. different CPU clock speeds
D. one of the virtual disks that is a mapped SAN LUN









Answer: B

Which two statements are true about internal-only virtual switches? (Choose two.)

Which two statements are true about internal-only virtual switches? (Choose two.) 




A. They are required for virtual machines to use private IP addresses.
B. They disallow service console access to the virtual machines.
C. They allow a group of virtual machines to communicate only with each other.
D. They can contain multiple port groups.







Answer: C,D

While attempting to start a virtual machine (VM), you get an error message stating that there is insufficient memory available. What can you do to start the VM?

While attempting to start a virtual machine (VM), you get an error message stating that there is insufficient memory available. What can you do to start the VM? 





A. increase the memory limit of your VM
B. decrease the memory limit of your VM
C. increase the memory reservation of your VM
D. decrease the memory reservation of your VM






Answer: D

In a fully automated DRS cluster, what can be done to ensure that a specific virtual machine (VM) does not migrate automatically to another host?

In a fully automated DRS cluster, what can be done to ensure that a specific virtual machine (VM) does not migrate automatically to another host? 





A. set the DRS VM options report_section = "8" for the specific VM to Partially Automated
B. use the Affinity Wizard to specify manual automation
C. do nothing because the DRS cluster must be put in Partially Automated mode to allow this level of control
D. set the DRS VM rule to "keep on this host"






Answer: A

During installation you manually create a local VMFS volume. What is a possible purpose for this volume?

During installation you manually create a local VMFS volume. What is a possible purpose for this volume? 






A. storage for service console log files
B. decentralized storage for all VMkernel swap activity
C. VMkernel swap files for locally configured virtual machines
D. service console swap files for over commitment of service console RAM






Answer: B

You are experiencing traffic overload on an Uplink network adapter. Which three actions can be taken to reduce the overload? (Choose three.)

You are experiencing traffic overload on an Uplink network adapter. Which three actions can be taken to reduce the overload? (Choose three.) 





A. move virtual machines to other vSwitches to reduce contention
B. add NIC teaming to increase the available bandwidth
C. add the VMkernel TCP/IP networking stack to improve performance
D. move virtual machines to other VLAN port groups on the same vSwitch
E. configure traffic shaping to reduce contention









Answer: A,B,E

A VirtualCenter login that worked correctly in the past is suddenly no longer working. It fails to authenticate with the previous login ID. Assuming there are no network problems and that all servers are up and running, where is the problem located?

A VirtualCenter login that worked correctly in the past is suddenly no longer working. It fails to authenticate with the previous login ID. Assuming there are no network problems and that all servers are up and running, where is the problem located? 






A. in the user's account properties in Active Directory
B. in the VirtualCenter database's security tables
C. in the VirtualCenter management server's security functionality
D. in the Virtual Infrastructure client's security configuration settings
E. in the VirtualCenter management agent on the host






Answer: A

What is the purpose of resource shares?

What is the purpose of resource shares? 






A. to set guaranteed maximum resource usage
B. to set guaranteed minimum resource usage
C. to prioritize resources when total resources are scarce
D. to prevent starting virtual machines when resources are scarce






Answer: C

On an ESX Server managed by VirtualCenter, you create a new user and assign this user Administrator Privileges. Which privileges will that user have on the ESX Server cluster in which this server resides?

On an ESX Server managed by VirtualCenter, you create a new user and assign this user Administrator Privileges. Which privileges will that user have on the ESX Server cluster in which this server resides? 




A. Administrator
B. Virtual Machine Administrator
C. Cluster User
D. None






Answer: D

Which is a valid reason NOT to set affinity on a single virtual machine (VM)?

Which is a valid reason NOT to set affinity on a single virtual machine (VM)? 





A. Affinity settings are ignored as part of a VMotion
B. Affinity can only be set on hyperthreaded systems.
C. A VM with affinity might not receive 100 percent of the CPU.
D. Setting affinity will monopolize a CPU making it unusable for other VMs on the server.







Answer: C

An administrator manages a site with remote workers, business partners and third-party service providers. These users need access to corporate data and network resources while adhering to security and corporate governance regulations. Which of the following VMware solutions can provide the power and versatility of virtual machines with the security and control of centrally managed desktops?

An administrator manages a site with remote workers, business partners and third-party service providers. These users need access to corporate data and network resources while adhering to security and corporate governance regulations. Which of the following VMware solutions can provide the power and versatility of virtual machines with the security and control of centrally managed desktops? 





A. VMware Lifecycle Manager
B. VMware Workstation
C. VMware View
D. VMware Server






Answer: C

What must be done to allow customization of Windows virtual machines that are deployed from templates?

What must be done to allow customization of Windows virtual machines that are deployed from templates? 






A. The location of the sysprep.exe must be specified in config.ini.
B. Nothing needs to be done as the VirtualCenter installer automatically locates and installs Sysprep components.
C. Sysprep must be downloaded from Microsoft and installed on the VirtualCenter server.
D. A sysprep.inf file must be created in a text editor and imported using the customization wizard.






Answer: C

A user has been given access to VirtualCenter using the Virtual Infrastructure Client to administer virtual machines. What else can the user do?

A user has been given access to VirtualCenter using the Virtual Infrastructure Client to administer virtual machines. What else can the user do? 






A. log on to the VirtualCenter server
B. log on to any ESX Server managed by VirtualCenter
C. log on to the VirtualCenter server if an administrator grants the Permit Web Access privilege
D. log on to the VirtualCenter server and any ESX Server managed by VirtualCenter






Answer: A

Which statement is true about resource pools?

Which statement is true about resource pools? 




A. They may contain one or more child VMware
H. clusters.
B. They may contain one or more child resource pools.
C. They may aggregate groups of resource pools.
D. They may contain one or more child DRS clusters.








Answer: B

Which of the following resource management techniques could be used to relieve a network bottleneck caused by a VM with occasional high outbound network activity?

Which of the following resource management techniques could be used to relieve a network bottleneck caused by a VM with occasional high outbound network activity? 







A. apply traffic shaping to the VM with high activity
B. apply traffic shaping to the port group containing the virtual machine
C. convert the switch from a vNetwork Standard Switch to a vNetwork Distributed Switch
D. apply traffic shaping to the other VMs in the same port group







Answer: B

Click the Exhibit button. Which statement is true about the network performance of the virtual machine (VM) shown in the exhibit?

Click the Exhibit button.
Which statement is true about the network performance of the virtual machine (VM) shown in the exhibit? 




A. The VM can send traffic as fast as the underlying physical NIC.
B. The underlying physical NIC is configured for 100 Mbps/half-duplex.
C. The VM can send at the maximum of 10 Mbps.
D. Virtual Switch autonegotiation settings need to be adjusted to improve performance.





Answer: A

(Click the Exhibit button) The graph shown in the exhibit indicates which of the following?

(Click the Exhibit button) The graph shown in the exhibit indicates which of the following? 




A. Average amount of time SCSI reads and writes spend in the queue
B. Average amount of time required to read and write from the Guest OS to the Virtual Machine virtual disk file
C. Average amount of time spent by the VMkernel processing SCSI read and write commands
D. Average amount of time spent reading and writing to the physical storage device







Answer: D

(Click the Exhibit Button) An administrator has received reports of poor network performance with a virtual machine. Which of the following steps would improve the network performance of this virtual machine (VM)?

(Click the Exhibit Button) An administrator has received reports of poor network performance with a virtual machine. Which of the following steps would improve the network performance of this virtual machine (VM)? 




A. Add an additional uplink to the virtual switch this virtual machine is attached to
B. Increase memory to the virtual machine
C. Adjust shares for the virtual NIC on the virtual machine
D. Traffic shape this virtual machine






Answer: A

Click the Exhibit button. Assuming this is the only virtual machine, and the only resource pool, what is the maximum amount of memory that could be configured for use by the virtual machine that is part of the Finance Resource Pool?

Click the Exhibit button. Assuming this is the only virtual machine, and the only resource pool, what is the maximum amount of memory that could be configured for use by the virtual machine that is part of the Finance Resource Pool? 






A. 13375 MB less virtual machine overhead
B. 57 MB less virtual machine overhead
C. 3009 MB less virtual machine overhead
D. 16384 MB less virtual machine overhead






Answer: C