Appendix: Answers to Review Questions


Chapter 1: What's New in vSphere 6.7

  1. A. The management of VCSA services has been moved into the VAMI UI.
  2. C. The Virtual Flash configuration has not yet moved to the HTML5 client.
  3. B. The vSphere Management SDK includes the storage SDK, the vSAN.
  4. C. All of these deployments support Enhanced Linked Mode, but VMware is recommending embedded PSCs for all deployments.
  5. D. The Topology and Upgrade tool is an online utility used to ask questions and present a suggested solution.
  6. C. The vcsa-util tool will converge or decommission external PSCs.
  7. C. The cmsso-util can repoint vCenter servers, allowing you to merge or split vSphere SSO domains.
  8. D. The loadESXCheckCompat script on the ESXI host will report on why Quick Boot isn't enabling.
  9. A. Quick Boot only restarts the kernel, which can be far quicker than initializing the hardware during a full reboot.
  10. C. Legacy virtual machines can be provisioned with drives created in Persistent Memory to improve their storage access time.
  11. A. Using iSCSI across RDMA requires the iSER software adapter to be enabled on each host.
  12. B. The Adaptive Resync feature will balance the I/O requirements of vSAN, primarily to ensure that VM I/O is prioritized over resync I/O during times of contention.
  13. A. vSAN support for TRIM/UNMAP will drive storage efficiency by flagging for reuse blocks that guests have released.
  14. A. WSFC is supported by using iSCSI targets accessed by the guest OS.
  15. B. The latest storage technology, 4k, provides for higher efficient space utilization by reducing the number of gaps without the performance penalty of 512e.
  16. A. TPM 2.0 security hardware is built into most modern servers and can be leveraged to ensure boot integrity for the ESXI host and guests running on the host.
  17. D. The new VM hardware revision that ships with vSphere 6.7 is version 14. It is required for the 6.7-specific VM hardware such as NVDIMM.
  18. B. OVA files are now converted to OVF during upload.
  19. B, C. Virtual machines can be cloned to a Content Library as VM templates or converted to OVFs.
  20. A. Setting the EVC option for a virtual machine improves portability by allowing it to migrate, resume, or have powered-on snapshots be started on more hosts.

Chapter 2: Configuring and Administering Security in a vSphere Datacenter

  1. A. Privileges are very granular and can include actions like copying and pasting within a virtual machine or allowing the use of the datastore browser. To properly complete most actions, like the creation of a virtual machine, several privileges are required. When grouping privileges together, it makes sense to determine what actions are required by a user or group of users in their job role, then create a role that has all of those privileges.
  2. A, B. When vSphere is initially deployed, several system roles are created by default to ensure that certain access levels are available at launch. These include the Administrator role and the No Access role, for example. Beyond these roles, organizations need to create customized roles to match their business needs. To simplify this process, VMware includes a number of sample roles covering typical infrastructure activities like creating virtual machines and administering datastores. These can be cloned and edited to create the exact roles required by the organization.
  3. A. When a user belongs to multiple groups, they inherit the privileges of both groups. While this makes sense if you think about how they may need to take actions related to the role of each group, it is contrary to most security configurations.
  4. A, C. Exception Users are users that can access the host even after it has been placed into Lockdown Mode. Regular auditing should be performed to ensure that the users in this group are valid and should have this degree of access. Another way to access an ESXi host is through SSH. SSH is disabled by default, but regular auditing should be performed to ensure that this remains disabled, or if it must be enabled, that the list of users who can access the host is closely monitored. Guest Operations and Datastore Access are both valid settings that should be properly secured, but these settings are specific to vCenter Server and not the host.
  5. D. By default, log files on an ESXi host are stored in a scratch partition that is created during installation. Because the partition is configured as a ramdisk, data stored in the partition is not persistent. To ensure that log files are persistent, you can either change the log directory to a persistent location or change the scratch partition to a persistent location. However, since vmsupport data is also stored in the scratch partition, moving this to a persistent location could result in the partition becoming full over time.
  6. C. By default, versions 1.0, 1.1, and 1.2 are all active. From a security hardening standpoint, VMware recommends disabling older versions. However, some third-party applications require TLS 1.1, so in some cases you may have to keep versions 1.1 and 1.2 and just disable 1.0. This can be done using the TLC Reconfiguration Utility. Version 1.3 was released in August 2018 but has not been widely incorporated and is not supported in vSphere 6.
  7. B. When Lockdown Mode is enabled using the Strict option, it is no longer possible to access the host using SSH or from the console unless the user is on the Exception Users list, in which case they can access the host from the console, via SSH, or from vCenter Server. Using this option does not force the use of the Exception Users list, it simply requires users to access the host via vCenter Server.
  8. C. All four of the components listed here are part of vCenter Single Sign-On. STS generates the tokens, the Administration Service allows configuration, vmdir provides an LDAP directory, and the Identity Management Service handles identity sources. Effective with vSphere 6.0, vmdir stores Single Sign-On and certification data. This component is also the piece that replicates this data to other Platform Services Controllers in a highly available deployment.
  9. A, C. The embedded Platform Services Controller should only be used for small, stand-alone deployments. This type of deployment will not allow additional PSC instances or vCenter Server instances to be joined to the vCenter Single Sign-On domain. For larger deployments, external PSC instances are required, which would sit behind a load balancer, but it is not a component that would be joined to the domain, nor are ESXi hosts.
  10. B. A minimum of two PSC instances are required to create a highly available deployment. This is because data is replicated between the instances and the solution is designed to autofailover in the event that an instance becomes unreachable. Additional instances can be deployed as needed but are not required to make the solution highly available.
  11. C. The No Access role prevents viewing or editing and can be used to mask off areas of the hierarchy from the users assigned to that role.
  12. D. The No Cryptography Administrator role will prevent an administrator from encrypting a virtual machine.
  13. A. The port for SSH is disabled by default. The other ports are open by default. Note that starting the SSH service will also open the port.
  14. A, C. With normal lockdown enabled, only root and a local user added to DCUI.Access can log into the DCUI.
  15. D. The Strict Lockdown Mode disables the DCUI, or ESXi host console for the ESXi server.
  16. A, B. Two of the available identity providers are Active Directory and OpenLDAP. Other options are Active Directory as an LDAP server and LocalOS.
  17. A. Secure Boot requires hardware version 13. You must also have a compatible operating system to use Secure Boot, but that is not required to enable it.
  18. A, B. The older versions of TLS (1.0 and 1.1) should be disabled, allowing TLS 1.2 to be used.

Chapter 3: Networking in vSphere

  1. B. The virtual machine currently has a guarantee of 250 Mbit/s but a performance cap or limit of 500 Mbit/s. Increasing the limit to 1000 Mbit/s for the VM is the only option that will improve the performance. Note that you will not be able to set the reservation to 1000 Mbit/s (option D) before you increase the limit.

  2. B. Traffic shaping is performed per-port group, so using that will immediately affect just the VMs on that VLAN.

  3. C, D. If the virtual machines worked on one host and don't work on another, the first place to check is the physical network connection, including making sure the host has a physical NIC assigned to that switch.

  4. A, C. The main function of private VLAN is to isolate traffic on the same VLAN or network. You can also use traffic filtering with IP ranges to block traffic.

  5. C, D. Increasing the reservation on the virtual machine would guarantee it higher network performance. However, it cannot have more reserved than the pool quote, so that must increase also.

  6. C. Of all the shown options, only vSAN can be selected as a traffic type.

  7. C. This service handles incoming traffic for the host; vSphere Replication handles outgoing.

  8. A, B. LLDP will retrieve information from the physical switch about port connectivity and configuration. The vmkping command can be used to verify that the host's VMkernel ports can access the default gateway and other hosts on the network. Note that beacon probing requires at least three NICs.

  9. B. Creating a VMkernel adapter for Provisioning traffic will allow you to separate traffic for cloning and cold migrations for further improvements. Also, none of the other options could improve performance for VMkernel traffic.

  10. D. LAGs cannot currently be used with software iSCSI initiator multipathing.

  11. A. You would need completely separate networks and gateways to accomplish this, which can only be done with custom TCP/IP stacks.

  12. B. With only one network connecting to the host, and multiple default gateways on that network, the simplest option is to override the default gateway.

  13. D. The number of uplinks is set directly on the switch, settings are adjusted on the uplink group, and physical NICs can be set or changed in the virtual switch on the host.

  14. C. VGT mode is the only one that passes VLAN headers to the guest.

  15. A. EST mode is required for an access port, when the physical switch is handling all VLAN operations.

  16. B. Promiscuous mode will essentially turn a port group into a hub where all traffic on the host for that switch and VLAN is forwarded to all ports in the port group.

  17. B. Failover settings are done at the port group level. Use Explicit Failover Order will allow you to pick which NIC is used and during which fail conditions.

  18. C. If Explicit Failover is configured with some NICs in Unused, those NICs will never be utilized regardless of the state of the other NICs.

  19. C. Reservations can be set at a maximum of 75 percent of the speed of the slowest connected pNIC. If no pNICs are connected, a reservation cannot be set.

  20. A, C. If the VMs are using jumbo frames but not all switches are configured, you will see inconsistent results. If the physical switch has the wrong VLAN tags configured, some networks will not be available for the host.


Chapter 4: Storage in vSphere

  1. C. VMFS6 is only supported for 6.5 hosts.

  2. A. This is not only the simplest method, it is also the only method that will work.

  3. B, C. Block storage requires ESXi to maintain the file structure. Both iSCSI and local disks are block storage.

  4. A, B, D. HBAs allow boot from SAN. FBFT and FBPT are the technologies required for non-HBAs to support boot-from-FCoE.

  5. D. An IQN on the host is required for iSCSI. The other choices are all optional.

  6. C. CHAP is only for iSCSI and needs to be set per target to allow for multiple arrays.

  7. C, D. Deduplication and compression require vSAN Disk Format 3 and an All-Flash array.

  8. B. Currently NFS v4.1 is not supported for Storage DRS.

  9. A, B. A disk group consists of one SSD and between one and seven capacity disks. C is not right because there is only one SSD. D is not right because if you make one disk group (1+3), you only have three disks left, which is not enough.

  10. C. A disk group consists of one SSD and between one and seven capacity disks. C is the only option with more than 8 disks or more than two SSD plus HDD drives.

  11. B. A, C, and D all leverage external storage arrays or servers. vSAN only uses local disks on the hosts.

  12. B. While storage arrays and servers can be used to supply storage for physical servers, only vSAN can be used by vSphere to provide storage using the iSCSI target.

  13. A, B. CHAP is available for iSCSI, Kerberos for NFS. Both storage technologies use TCP/IP.

  14. A. NFS 4.1 has the option to ensure data integrity using Kerberos.

  15. B. vSAN offers data-at-rest encryption. While storage servers and arrays might offer the capability, it is not configured in vSphere.

  16. C. Storage profiles created for vSAN actually create the capabilities when they are applied to VMs. All of the other profiles reference capabilities previously created.

  17. B, C. VVols are only supported by iSCSI and NFS servers and arrays.

  18. A, D. VVols need providers and profiles but are not compatible with traditional LUNs or datastores.

  19. D. NFS 4.1 offers multipathing, which will improve performance at all times. NFS datastores do not have cache drives, Storage DRS would require other NFS datastores with lower I/O demands, and SIOC shares only matter during times of contention.

  20. B, D. Out of these options, only iSCSI and Fibre Channel are supported for booting a host.


Chapter 5: Upgrading a vSphere Deployment

  1. B. During the upgrade, an embedded SQL Express database will be replaced with an embedded PostgreSQL database. Any other database migration must be performed before the upgrade.

  2. B. UMDS can be installed on a Linux-based or Windows server and has no topology dependencies other than not being installed on a server with VUM.

  3. C, D. All vCenter components are now installed with vCenter. VUM is installed with VCSA but can be installed separately to support Windows. UMDS can always be installed on a Windows or Linux-based server.

  4. A, C. VUM is primarily used to update hosts but can also update VMs and VAs. VUM cannot update vCenter or distributed switches.

  5. B, D. VUM is primarily used to update hosts but can also update virtual machine hardware and VMware Tools. VUM cannot update vCenter or distributed switches.

  6. B, C. The CLI migration tool is vcsa-deploy, which can be run from a Windows machine, and vmware-umds is the download service for VUM, which can run on Windows or a Linux-based machine.

  7. D. The migration-assistant utility must be started on the Windows vCenter server.

  8. A. The export directory can be removed from the migration host as a cleanup step. The directory will not be removed by the migration utility.

  9. D. The vcsa-deploy utility, like the GUI utility, can upgrade, install, or migrate a vCenter instance.

  10. A. The embedded database used by vCenter 6.5 is PostgreSQL, and an embedded SQL Express database will migrate to that by default.

  11. A, B, C. While the embedded database used by vCenter 6.5 is PostgreSQL, it can be installed with SQL or Oracle. There are also steps to take to prevent the SQL Express database from being migrated to PostgreSQL.

  12. D. The proper upgrade plan is “top down” with the Platform Services Controller (or SSO for version 5.5) being upgraded before vCenter and hosts. VM Hardware should be upgraded last.

  13. A, C. The presumption here is that the hosts were upgraded before vCenter. Reverting the hosts to their previous version or upgrading vCenter would resolve the issue.

  14. A, B. After the migration, Auto Deploy will be running on the VCSA server. The old server should be decommissioned and the DHCP parameters should be changed so booting hosts can find the new Auto Deploy service.

  15. A, C. During the migration, data is copied from most of the services to the new vCenter appliance; however, ESXi Dump Collector and Syslog Collector data is not included.

  16. B. After a migration, hosts will need to be manually repointed to the new ESXi Dump Collector service on the VCSA appliance.

  17. A, D. If you have multiple vCenter servers, you must have external Platform Services Controllers.

  18. A. By default, VUM will update one host in a cluster at a time. You can change this to be a set number of hosts or allow VUM to decide the maximum number of hosts to update at one time.

  19. C, D. VUM can attach baselines to several inventory objects, including VM folders and vCenter.

  20. B, D. VUM can attach host and VM/VA baselines to several inventory objects, including datacenters and vCenter.

  21. B. VUM can snapshot virtual machines before updating to allow for easy rollback of changes.


Chapter 6: Allocating Resources in a vSphere Datacenter

  1. B. When DRS is disabled on a cluster, it removes all of the resource pools that are a part of the cluster. This information is not restored automatically when DRS is re-enabled. Creating a snapshot of the resource pool tree allows this information to be restored if DRS has to be disabled temporarily.

  2. A. Shares are a way to determine what allocation of resources happens when a resource is under contention. In this scenario, because the Sales pool has a share value of High, it will receive twice the amount of resources as the Engineering pool, which has a share value of Normal.

  3. C, D. When a resource pool is established and the Expandable Reservation option is unchecked, the virtual machines using the pool are only able to reserve the amount of resources available in the pool. If a virtual machine in a pool will not power on, it is typically because the Admission Control mechanism is preventing the action due to a lack of resources available to reserve. To resolve this, you can either reduce the reservation requirements of one or more virtual machines in the pool or turn on the Expandable Reservation mechanism. A third option, though not provided as an answer here, would be to provide additional resources to the pool.

  4. B. Resource pools can be used in a few different ways. One way is to control priority access to resources using shares. In this method, it is not necessary to provide a fixed amount of resources to the pool. However, if there are virtual machines that need dedicated resources, the pool needs to reserve an amount of that resource to provide to the virtual machines in the pool.

  5. C. If a resource pool runs out of a resource, virtual machines with reservation requirements will be unable to power on. This could be resolved by adding additional resources, or you can enable the Expandable Reservation parameter. This allows the child pool to request resources from its parent pool to satisfy a virtual machine's requirements.

  6. A, C. A resource pool is used to provide memory and/or CPU resources to virtual machines. vSphere uses other mechanisms to manage storage and network resources.

  7. A. The hierarchy of resource pools begins at the cluster, which is referred to as the root pool. From there, a top-level resource pool is referred to as a parent pool, and pools created within that pool are referred to as child pools. When two pools exist at the same level (as would two child pools created under the same parent pool), they are referred to as sibling pools.

  8. B. When a virtual machine powers on, it is able to use as much of the resources configured for it as are available in the cluster. For example, if a virtual machine is configured with 1 vCPU and 4 GB of memory is powered up on a host with 2.4 GHz CPUs, the VM can use as much as 2.4 GHz of CPU resources. However, the VM may only require a much smaller amount, such as 500 MHz. A limit can be used to prevent overallocation of resources and manage user expectations. The overallocation of resources may result in performance gains that will diminish as additional VMs are added to the cluster.

  9. A. When setting share values, you can enter a custom value or use the default settings of High, Normal, and Low. When these settings are used, they conform to a ratio of 4:2:1, where High is twice as much of a resource as Normal and four times as much as Low.

  10. C. In this case, there is no contention. Shares are only applied when there is resource contention, so the configuration shown in the scenario is not applied and all pools get all the resources they require

  11. B, D. Even though this use case involves only a single VM, you must still create a VM group in order to create a VM-Host affinity rule. You cannot create a simple VM-VM affinity rule because this type of rule does not take specific hosts into account when migrating the VM.

  12. C. VM-VM affinity rules cannot be used in conjunction with HA if HA is configured with the Dedicated failover hosts option and multiple failover hosts have been configured.

  13. B. Because VM-Host affinity rules are cluster based, the virtual machines in the DRS VM group must all reside within the same cluster. When a VM in an existing group is removed from the cluster, it loses its DRS group affiliation, even if it is added back into the cluster. To resolve the issue, the VM must be manually added back into the group.

  14. C. Predictive DRS requires an understanding of the way workloads utilize resources over time. The collection and analysis of workload metrics is one of the key features of vRealize Operations Manager and is required in order for Predictive DRS to know when to migrate workloads in advance to avoid resource contention.

  15. D. Network-aware DRS does not migrate virtual machines due to a network resource issue. What it does do is take into consideration the network utilization of hosts in the cluster when migrating a virtual machine due to a compute resource that is in contention in order to ensure that the migration solves the compute resource issue without creating a network resource issue.

  16. A, C. Generally speaking, anti-affinity rules exist to maximize availability, and achieving that goal should apply to all hosts in a DRS cluster. However, in some specific cases, such as licensing or nonuniform hardware concerns, the rule may need to be applied to a subset of hosts in the cluster, resulting in the need for a VMHost rule.

  17. A. Network-aware DRS monitors the utilization of the physical uplinks of ESXi hosts in the cluster. An ESXi host is considered saturated when the collective utilization of the uplinks reaches or exceeds 80 percent. This setting is the default and can be adjusted using an advanced option if needed.

  18. A, B, D. DRS generates migration recommendations when a CPU or memory imbalance occurs. Storage DRS generates migration recommendations in the event of a storage imbalance; DRS does not. There are other conditions that would generate migration recommendations, including satisfying a resource pool and accommodating an affinity or anti-affinity rule. DRS will also generate migration recommendations when a host in the cluster has planned downtime and enters Maintenance mode but is unable to migrate VMs from a host that experiences an unplanned downtime event.

  19. A. When two VM-VM affinity rules conflict, the older one takes precedence and the newer rule is disabled. DRS only tries to satisfy enabled rules, and disabled rules are ignored.

  20. A, C. This DRS will never take an action that would violate a VMHost rule if the rule is set using the Must Run On or Must Not Run On option. Options A and C could both result in a violation of the rule. Because both B and D are manual options and are not performed by DRS, they can be accomplished. When possible, VM-Host rules should use preferential options to allow DRS maximum flexibility.


Chapter 7: Backing Up and Recovering a vSphere Deployment

  1. B, D. vSphere Data Protection offers deduplication of backups as a core feature. It can also replicate backup jobs to remote sites.

  2. A. vSphere Replication can compress the data before sending it to the remote site. This increases CPU usage but lowers sync time and network usage.

  3. B. While the VDP appliance and proxies can each back up 8 VMs at a time, adding a proxy appliance disables the internal proxy, so you need to deploy two proxy appliances to back up 16 virtual machines at the same time.

  4. A. vSphere Data Protection offers guest agents to back up certain applications, including Microsoft Exchange. An application-aware backup should be used for any database or database-like guest.

  5. D. An application-aware backup should be used for any database or database-like guest. While vSphere Replication offers guest agents for some applications, it does not protect MYSQL.

  6. C. vSphere Replication offers point-in-time instances, which provides multiple snapshots with a recovered VM, allowing you to choose which point in time to recover that virtual machine to.

  7. D. vSphere Replication offers recovery point objectives (RPOs), which is a measure of how often a virtual machine is replicated. The more often a VM is replicated, the less data is lost.

  8. A, B. vSphere Replication and vSphere Data Protection both offer the ability to replicate to remote sites.

  9. A. vSphere Replication offers Guest OS quiescing to ensure that no writes are outstanding before the VM is replicated. This helps to ensure that the guest will be in a good state when it is recovered.

  10. A. While guest OS quiescing can improve the state of the guest when it is recovered, it could interfere with a very low RPO setting if the guest takes too long to quiesce.

  11. C. A red icon on a VDP backup job indicates that it was not able to quiesce the guest prior to backing up the virtual machine.

  12. A. vSphere Replication does not support virtual machines with Fault Tolerance enabled.

  13. C. Decreasing the RPO time will decrease the frequency of capturing and replicating the virtual machine, which will significantly reduce network traffic.

  14. D. Enabling data deduplication for vSphere Data Protection will significantly reduce the storage used for backups.

  15. A. There is only one option for backing up VCSA, and that is whether to include stats, events, alarms, and tasks in the backup.

  16. B. VDP is the only option shown that could back up a vCenter server on Windows.

  17. A. If the VM is powered on, vSphere Replication will not allow Synchronize Recent Changes to be used. You can power off the VM or select Use Latest Available Data to recover the VM.

  18. A, C. When vSphere Replication recovers a VM, it will be powered off with the network connections disconnected. While you can choose from point-in-time snapshots if they are available, that is not a required step.


Chapter 8: Troubleshooting a vSphere Deployment

  1. A, C. Using esxtop in batch mode, the output can be redirected to create a CSV file. A CSV file is an option in the performance view of a cluster. A vDS doesn't have a performance view.

  2. C. The vpxd log file is considered the main vCenter log file.

  3. C, D. The ESXi web client and vSphere web client can be used to download host files.

  4. C. VCSA is installed with a Windows utility and the install log is found in the appdatalocalVMwareCIP directory for the user that runs the utility.

  5. C. The first step of upgrade should always be backing up whatever you are upgrading. Note that option A will be performed with the update, option B cannot be performed before the upgrade, and option D isn't needed.

  6. A. The correct order is “biggest to smallest” and especially PSC before vCenter and vCenter before ESXi. vDS and vSAN are upgraded last if needed.

  7. D. The Guest Average is the sum of the Device, Kernel, and Queue response times and should be approximately what the guest sees for storage response time.

  8. A. The Device average is the time it takes a request to be sent to and returned from the storage array.

  9. A, C. The performance charts are to report on performance of hosts and virtual machines.

  10. B. The kernel average is the time the host spends processing a storage request.

  11. D. The esxtop command when run in batch mode (-b) will capture data for a number of times specified (-n) in intervals specified. While -d sets the time interval, the default interval is 5 seconds.

  12. A, C, D. The error is reporting that admission control (a part of High Availability) is preventing Tiny02 from powering on. This is because Tiny02 has a reservation set, and the admission control calculations concluded that there is not enough capacity available to meet Tiny02's reservation. From the list, only 3D, Tiny01, and vcsa-02a.corp.local are powered on and thus can have active reservations. Disabling the reservation on Tiny02 or one of the active VMs or disabling admission control should resolve the issue.

  13. A, D. Cisco Discovery Protocol and Link Layer Discovery Protocol will report on upstream physical switch information and capabilities.

  14. A. CPU Ready reports on guest CPU instructions that are waiting to be scheduled.

  15. C. The memory swap counter reports when guest memory is being written to disk, which has a significant performance impact on the guest.

  16. D. The memory balloon counter indicates that memory is being reclaimed from guests.

  17. B. The minimum vSphere license level needed for High Availability is Essentials Plus.

  18. D. The minimum vSphere license level needed for DRS is Enterprise Plus.

  19. B, C. Local SCSI disks and LUNs accessed over Fibre Channel are not affected by Ethernet network outages.

  20. B. The optional vMA management appliance has resxtop built in. Otherwise, you need to download the vSphere CLI and install it on a workstation.


Chapter 9: Deploying and Customizing ESXi Hosts

  1. A. You can only attach one profile to a host.

  2. C. If you have settings in two different profiles, you can combine them using the Copy Settings to Host Profiles wizard. While option B would work, it would take more effort.

  3. D. The Profile Compliance section of the Monitor tab for the cluster object is a good place to view compliance. You can also use the Monitor tab of the host profile.

  4. D. While the Summary screen of a host will display a message if the host is not in compliance, there is no view available on the host object showing host profile compliance. You can also use the Monitor tab of the host profile.

  5. B, C. Exporting the customizations to use as a template for other hosts is a common practice. You can also use it to quickly recreate a host that is being removed from inventory.

  6. A, C, E. The basic steps to compare settings with host profiles are extract, attach, and check. You do not need to remediate if you are only checking the settings, and you won't export unless you have multiple datacenters.

  7. A. Host customizations export as CSV files.

  8. B. Host profiles export as VPF files.

  9. C. If you download a custom ESXi installation image from a server vendor, make sure you get the ZIP version so you can import it into Auto Deploy.

  10. C. A custom depot is required to have image profiles created on the Auto Deploy server.

  11. B. The host displays that message when it finds the Auto Deploy server but no rule matches it.

  12. A, B. The host is not receiving a DHCP address. Either the DHCP server is not running or the host cannot reach it.

  13. A, C. The host is receiving a DHCP address but cannot reach the TFTP server. Either the TFTP server is not running or the host cannot reach it.

  14. A, D. The host is receiving a DHCP address and is pulling the bootloader but cannot reach the Auto Deploy server. Either the Auto Deploy server is not running or the host cannot reach it with the supplied information-note the URL with IP address pulled from the tramp file.

  15. D, E. The host is receiving a DHCP address and pulling the bootloader from TFTP and is querying the Auto Deploy server but not receiving an image. The most likely issue is that no deploy rule is created that applies to that host.

  16. A, B, C. Rules can apply to all hosts or any host that matches a pattern or patterns. Pattern types include asset tag, serial number, and vendor name.

  17. C. The rule is not activated, which is a requirement to provide the boot image.

  18. A. After a host is assigned an image, it will continue to use that image until a new rule applies to it or the existing rule is changed to a different image.

  19. A, B. Stateless Caching will copy the image to the host after the first deployment, allowing the host to boot with the image on subsequent starts if Auto Deploy is not available. Stateful Install installs ESXi, similar to using a CD to install.

  20. A, D. After a host is assigned an image, it will continue to use that image unless the host is removed from inventory. Auto Deploy will match any rule that applies to a host and will send the indicated image.


Chapter 10: Ensuring High Availability for vSphere Clusters and the VCSA

  1. B. All licenses other than Essentials include HA.

  2. A. Enabling HA allows VMs to be restated on other hosts only if a host fails.

  3. B, C. These advanced HA options will prevent HA from using the default gateway (setting das.usedefaultisolationaddress to false). A new IP address will be used instead.

  4. D. Dedicated failover hosts configures specific hosts to have no VMs running unless there is a host failure.

  5. B. Cluster resource percentage is recommended for environments where VMs have very different resource reservations.

  6. A. Slot Policy is recommended for environments where VMs have very similar resource reservations because the slot size will be very close to the average VM size.

  7. B. With cluster resource percentage, you could have a failure scenario where sufficient capacity is available but spread across several hosts, preventing a VM with a large reservation from starting

  8. C. By default, HA will obey DRS affinity and anti-affinity rules during a failure recovery.

  9. C. The performance degradation VMs tolerate will trigger a warning message if performance is estimated to drop after a failure. A setting of 100% will disable the warning; a setting of 0% will trigger a warning for any estimated performance drop.

  10. A, D. A new VM would not be able to power on if the available capacity of the cluster (total MHz minus slot sizes of running VMs minus reserved capacity) is less than the reservation of the new VM. Removing the reservation will allow the VM to power up. The other option is to reduce the slot size of the environment, which (if the Slot Policy is set to the default) can only be done by reducing the reservation of the largest VM.

  11. B. The default slot size is the largest CPU reservation and the largest memory reservation.

  12. C. VM application monitoring can only restart the guest OS.

  13. A, B. VMware Tools is required for VM monitoring, and a VM (by default) must be up for 120 seconds before failing for VM monitoring to restart it.

  14. A, D. Proactive HA requires a compatible monitoring solution from your server vendor. Application monitoring requires your application to send heartbeats to the running host.

  15. A, D. vCenter HA only works with VCSA, and you need a dedicated network for the HA traffic.

  16. D. If two appliances fail, the third will not respond to requests.

  17. B, D. The Basic option handles cloning and configuring but requires SSH and a dedicated network for HA traffic.

  18. A, B. The Advanced option requires the admin to clone the VCSA twice, using the Guest Customization options to change the hostname and IP addresses.

  19. D. Setting HA to maintenance mode will enable the active node to continue to respond to requests even if it loses connectivity to the passive and witness nodes.

  20. B. The default is two heartbeat datastores per host. There may be more than two in use in a cluster if not all hosts have access to the same datastores.

  21. C. When Slot Policy is used, each virtual machine uses one slot unless it has a reservation greater than the slot size. The environment has 8 available slots of the 20 it has total.

  22. C. When Slot Policy is used, each virtual machine uses one slot unless it has a reservation greater than the slot size. If the reservation is greater, it will consume enough slots to cover its reservation.


Chapter 11: Administering and Managing vSphere Virtual Machines

  1. A, D, E. A virtual machine needs its configuration file (.vmx) plus the two vmdk files-the .vmdk config file and the -flat.vmdk binary file.

  2. C. The default for a four-CPU VM would be one core per VM. You could also set two cores per CPU (the guest would see two sockets) or four cores with just one socket presented to the guest.

  3. A. A virtual machine is restricted to the number of CPUs as its host has logical processors.

  4. D. A VM with just one CPU might not have the numvcpus value. You would need to add the value to increase the CPUs.

  5. B, C. The binary files for virtual machine are the -flat file and the - sparse file; the -sparse file contains snapshot changes.

  6. C. Snapshots are always thin provisioned. The .vmx file will reference the two new snapshot files, which in turn will reference the original/parent disks.

  7. B. The existing VM has only four vCPUs selected. Once it has been changed to 8, the cores per socket can be set to 8.

  8. C. Once 3D Graphics is enabled, you can change the 3D Renderer setting.

  9. A. The default setting of one 8 MB display will not support 4k; a setting of Auto will scale to support a larger display.

  10. A. Snapshot VMDKs are always stored with their parent VMDKs.

  11. A. Boot Delay is intended to wait on the initial BIOS screen for a set period of time and will allow an administrator to perform tasks such as launch the boot menu.

  12. B. Force BIOS Setup will leave the VM in the BIOS menu until an administrator exits the menu or restarts the VM.

  13. C, D. Secure EFI boot is intended to prevent scenarios such as rootkits from infecting your guest at boot. Changing the firmware to EFI and enabling Secure Boot are the virtual hardware requirements for this.

  14. A. Enabling latency sensitivity will create a soft DRS rule to keep a VM on the current. This helps to ensure that the VM will not be vMotioned off.

  15. D. No VMs can be deployed from an optimized catalog.

  16. B. While SMB is an option for a VCSA appliance, a VCSA appliance can't actually use an SMB share.

  17. B. This error occurs when the Download Library Content Only When Needed option is configured for a published catalog.

  18. A, D. A USB device must be configured for vMotion when it is added to the VM.

  19. C. The error is due to resizing the partition to a smaller-thansuggested size.

  20. A. In this case, the default firewall is preventing connectivity from the Converter server. While this is not apparent from the error, option B cannot be the answer as the ESXi host has not been contacted, option C cannot be the answer as the agent will be installed after the source machine is contacted (if not found), and option D cannot be the answer as this is a Powered On conversion.

UP

LIMITED OFFER: GET 30% Discount

This is ONE TIME OFFER

ExamSnap Discount Offer
Enter Your Email Address to Receive Your 30% Discount Code

A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.