What is the VMware-recommended network configuration between the three sites in a vSAN stretched cluster?

What is the VMware-recommended network configuration between the three sites in a vSAN stretched cluster? Question: What is the VMware-recommended network configuration between the three sites in a vSAN stretched cluster? Options: L2 connectivity between the preferred and secondary sites, and L3 from the preferred and secondary sites to the witness site. L3 connectivity between … Read more

Which of the below represents a valid process for replacing the failed disk?

A cache tier device experiences a permanent disk failure.Which of the below represents a valid process for replacing the failed disk?2. Physically replace the failed disk.2. Physically replace the failed disk.2. Physically replace the failed disk.3. Using the vSphere Web Client, re-create the disk group.When a flash device failure occurs, before physically removing the device … Read more

How does vSAN attempt to remediate the issue?

If a vSAN capacity device experiences a pattern of sustained high latency, how does vSAN attempt to remediate the issue?In vSAN 6.1 we introduced Dying Disk Handling to identify and remediate pro-actively disks that we detected high latency from.When failure of a device is anticipated, vSAN evaluates the data on the device. If there are … Read more

How much is the vSAN datastore raw capacity reduced while the host is in maintenance mode?

The following are the configuration details for a 10-node all-flash vSAN cluster:All hosts contain one vSAN disk group.Each disk group has 400GB for the cache tier and 1600GB for the capacity tier.A host in the cluster is placed into maintenance mode. The maintenance mode option selected is “Ensure data accessibility from other hosts”.How much is … Read more

Which scenario is network multicast required?

For which scenario is network multicast required? vSAN 6.6 simplifies design and deployment by removing the need for multicast network traffic (required for versions of vSAN prior to 6.6). When upgrading from a previous version of vSAN to vSAN 6.6, multicast is required until all hosts Question: Which scenario is network multicast required? Options: Clusters … Read more

Which VMware-recommended tool is used to size vSAN deployments?

Which VMware-recommended tool is used to size vSAN deployments? Question: Which VMware-recommended tool is used to size vSAN deployments? Options: ReadyNode Configuration vSAN TCO and Sizing Calculator vSAN Hardware Compatibility List Sizing spreadsheets available from partners Correct Answer The Correct Answer for this Question is vSAN TCO and Sizing Calculator

What will happen when the policy is applied?

If the Primary level of failures to tolerate policy is changed from 2 to 3 without shutting down the virtual machine, what will happen when the policy is applied?Incorrect Answers:D: RAID 5 or RAID 6 erasure coding does not support a Primary level of failures to tolerate value of 3.Note: Primary level of failures to … Read more

Which two statements are true about VSAN deduplication and compression?

Which two statements are true about VSAN deduplication and compression? (Choose two.)You can enable deduplication and compression as a cluster-wide setting, but they are applied on a disk group basis. The vSAN deduplication block size is 4K fixed.References:https://docs.vmware.com/en/VMware-vSphere/6.5/com.vmware.vsphere.virtualsan.doc/GUID-3D2D80CC-444E-454E-9B8B-25C3F620EFED.htmlhttps://blogs.vmware.com/virtualblocks/2017/11/29/vsan-operations-adding-removing-drives-deduplication-compression-enabled/ Question: Which two statements are true about VSAN deduplication and compression? Options: vSAN deduplication and compression are … Read more

Which key is required to unencrypt an encrypted core dump when using vSAN encryption?

Which key is required to unencrypt an encrypted core dump when using vSAN encryption? The core dump is encrypted with the host key.References: https://docs.vmware.com/en/VMware-vSphere/6.7/com.vmware.vsphere.virtualsan.doc/GUID-6701FDE9-D1BA-4455-BD9F-3519646D408C.html Question: Which key is required to unencrypt an encrypted core dump when using vSAN encryption? Options: Key Encryption Key (KEK) Disk Encryption Key (DEK) Host Key Internal Key in Digital Envelope … Read more

What are two ways that the storage policies can be allied?

What are two ways that the storage policies can be allied? (Choose two.) Question: What are two ways that the storage policies can be allied? Options: Execute a PowerCLI script Right-click a virtual machine in the vSphere Web Client Run the “esxcli vsan storage tag add” command Select the vSAN datastore and click “Apply Storage … Read more