Which file stores the encryption setting?

Correct Answer for the Question – Which file stores the encryption setting? is given below Which file stores the encryption setting? .vmdk vmsd .nvram .vmx Correct Answer The Correct Answer for this Question is .vmx Explanation The Question – Which file stores the encryption setting? has been answered correctly and answers for the question is .vmx … Read more

Which log file needs to be reviewed?

Correct Answer for the Question – Which log file needs to be reviewed? is given below Which log file needs to be reviewed? vmkeventd.log vmkernel.log vpxa.log loadESX.log Correct Answer The Correct Answer for this Question is loadESX.log Explanation The Question – Which log file needs to be reviewed? has been answered correctly and answers for the … Read more

How many ISCSI sessions would be created from bound ports to targets?

Correct Answer for the Question – How many ISCSI sessions would be created from bound ports to targets? is given below How many ISCSI sessions would be created from bound ports to targets? 2 4 8 16 Correct Answer The Correct Answer for this Question is 8 Explanation The Question – How many ISCSI sessions would … Read more

What should the vSphere administrator use to meet this requirement?

Correct Answer for the Question – What should the vSphere administrator use to meet this requirement? is given below What should the vSphere administrator use to meet this requirement? vTPM UEFI Secure Boot KMS Server encrypted vSphere vMotion Correct Answer The Correct Answer for this Question is encrypted vSphere vMotion Explanation The Question – What should … Read more

What would cause this to occur?

Correct Answer for the Question – What would cause this to occur? is given below What would cause this to occur? There are insufficient cluster resources. Performance degradation VMs tolerate threshold is at default. VMware Tools is not installed. Proactive HA is disabled. Correct Answer The Correct Answer for this Question is Proactive HA is disabled. … Read more

Which task should the administrator perform to ensure the virtual machine files are also renamed to match the new virtual machine name?

Correct Answer for the Question – Which task should the administrator perform to ensure the virtual machine files are also renamed to match the new virtual machine name? is given below Which task should the administrator perform to ensure the virtual machine files are also renamed to match the new virtual machine name? Take a virtual … Read more

Which action is granted to users with Administrator privileges on the host without adding them to the Exception User list?

Correct Answer for the Question – Which action is granted to users with Administrator privileges on the host without adding them to the Exception User list? is given below Which action is granted to users with Administrator privileges on the host without adding them to the Exception User list? Access the host using the vCenter Server … Read more

What is a benefit of using resource pools?

Correct Answer for the Question – What is a benefit of using resource pools? is given below What is a benefit of using resource pools? Increased visibility of user activity Increased vMotion efficiency for a set of VMs Increased accuracy for proactive resources for a set of VMs Increased ease of reserving resources for a set … Read more

What is the outcome when two affinity rules conflict?

Correct Answer for the Question – What is the outcome when two affinity rules conflict? is given below What is the outcome when two affinity rules conflict? VMs will continue to migrate Rules are applied based on priority Only one rule can be enabled Random rule enablement occurs Correct Answer The Correct Answer for this Question … Read more

Which policy is used for intelligent optimization of network interface traffic on a vSphere Distributed Switch (VDS)?

Correct Answer for the Question – Which policy is used for intelligent optimization of network interface traffic on a vSphere Distributed Switch (VDS)? is given below Which policy is used for intelligent optimization of network interface traffic on a vSphere Distributed Switch (VDS)? Route Based on IP Hash Route Based on Source MAC Hash Route Based … Read more