2V0-21.23 Dumps

2V0-21.23 Braindumps 2V0-21.23 Real Questions 2V0-21.23 Practice Test

2V0-21.23 Actual Questions


killexams.com


Vmware


2V0-21.23


VMware vSphere 8.x Professional (VCP-DCV)


https://killexams.com/pass4sure/exam-detail/2V0-21.23


Question: 23


Which feature would allow for the non-disruptive migration of a virtual machine between two clusters in a single VMware vCenter instance?


  1. vSphere vMotion

  2. Cross vCenter Migration

  3. vSphere Storage vMotion

  4. vSphere Fault Tolerance


Answer: A Question: 24

Which four elements can a vSphere Lifecycle Manager image contain? (Choose four.)


  1. ESXi base image

  2. ESXi configuration

  3. Vendor agents

  4. Vendor add-ons

  5. BIOS updates

  6. Firmware and drivers add-on

  7. Independent components


Answer: A,D,F,G Question: 25

If a distributed switch uses the âRoute based on physical NIC loadâ load balancing algorithm, what does the mean send or receive utilization of an uplink need to exceed for the flow of traffic to move to the second uplink?


  1. 75 percent of the capacity over a 30 second period

  2. 60 percent of the capacity over a 30 second period

  3. 60 percent of the capacity over a 40 second period

  4. 75 percent of the capacity over a 40 second period


Answer: A Question: 26

An administrator manually configures a reference ESXi host that meets company security standards for vSphere environments. The administrator now needs to apply all of the security standards to every identically configured host

across multiple vSphere clusters within a single VMware vCenter instance.


Which four steps would the administrator complete to meet this requirement? (Choose four.)


  1. Extract the host profile from the reference host.

  2. Export the host profile from vCenter.

  3. Import host customization on the reference host.

  4. Attach the host profile to each cluster that requires the secure configuration.

  5. Check the compliance of each host against the host profile.

  6. Reset host customization on the reference host.

  7. Remediate all non-compliant hosts.


Answer: A,D,E,G Question: 27

After a recent unexplained peak in virtual machine (VM) CPU usage, an administrator is asked to monitor the VM performance for a recurrence of the issue.


Which two tools can the administrator use? (Choose two.)


  1. vCenter Management Interface

  2. Direct Console User Interface (DCUI)

  3. vSphere Performance Charts

  4. vCenter Command Line Interface

  5. ESXi Shell


Answer: A,C,E Question: 28

An administrator is tasked with configuring vSphere Trust Authority. The administrator has completed the following steps:

Set up the workstation -


Enabled the Trust Authority Administrator Enabled the Trust Authority State

Collected information about the ESXi hosts and vCenter to be trusted Which step does the administrator need to complete next?

  1. Import the Trusted Host information to the Trust Authority Cluster

  2. Import the Trusted Cluster information to the Trusted Hosts

  3. Create the Key Provider on the Trusted Cluster

  4. Import the Trusted Host information to the Trusted Cluster


Answer: A Question: 29

Refer to the exhibit.



An administrator set up the following configuration:


The distributed switch has three ESXi hosts, and each host has two 40 Gbps NICs. The amount of bandwidth reserved for virtual machine (VM) traffic is 6 Gbps.

The administrator wants to guarantee that VMs in the Finance distributed port group can access 50 percent of the available reserved bandwidth for VM traffic.


Given this scenario, what should the size (in Gbps) of the Finance network resource pool be?


  1. 18

  2. 80

  3. 36

  4. 120


Answer: A Question: 30

A vSphere environment is experiencing intermittent short bursts of CPU contention, causing brief production outages for some of the virtual machines (VMs). To understand the cause of the issue, the administrator wants to observe near real-time statistics tor all VMs.


Which two vSphere reporting tools could the administrator use? (Choose two.)

  1. Advanced Performance Charts

  2. esxcli

  3. resxtop

  4. Overview Performance Charts

  5. esxtop


Answer: A,C,E Question: 31

An administrator is performing maintenance activities and discovers that a Virtual Machine File System (VMFS) datastore has a lot more used capacity than expected. The datastore contains 10 virtual machines (VMs) and, when the administrator reviews the contents of the associated datastore, discovers that five virtual machines have a snapshot file (-delta.vmdk files) that has not been modified in over 12 months. The administrator checks the Snapshot Manager within the vSphere Client and confirms that there are no snapshots visible.


Which task should the administrator complete on the virtual machines to free up datastore space?


  1. Consolidate the snapshots for each V

  2. Inflate the disk files for each V

  3. Delete all snapshots for each V

  4. Storage vMotion each VM to another datastore.


Answer: A Question: 32

An administrator is attempting to configure Storage I/O Control (SIOC) on five datastores within a vSphere environment. The administrator is being asked to determine why SIOC configuration completed successfully on only four of the datastores.


What are two possible reasons why the configuration was not successful? (Choose two.)


  1. The datastore contains Raw Device Mappings (RDMs).

  2. SAS disks are used for the datastore.

  3. The datastore has multiple extents.

  4. The datastore is using ISCS

  5. The administrator is using NFS storage.


Answer: A,C Question: 33

An administrator has mapped three vSphere zones to three vSphere clusters.


Which two statements are true for this vSphere with Tanzu zonal Supervisor enablement? (Choose two.)


  1. One Supervisor will be created in a specific zone.

  2. One Supervisor will be created across all zones.

  3. Three Supervisors will be created in Linked Mode.

  4. Individual vSphere Namespaces will be placed into a specific zone.

  5. Individual vSphere Namespaces will be spread across all zones.

Answer: A,B,D Question: 34

An administrator is investigating reports of users experiencing difficulties logging into a VMware vCenter instance using LDAP accounts.


Which service should the administrator check as part of troubleshooting?


  1. vSphere Authentication Proxy Service

  2. Lookup Service

  3. Identity Management Service

  4. VMware Authentication Framework Daemon


Answer: C Question: 35

An administrator is looking to deploy a new VMware vCenter instance. The current environment consists of 75 hosts and is expected to grow up to 100 hosts over the next three years.


Which deployment size should the administrator select?


  1. Medium

  2. Tiny

  3. Large

  4. Small


Answer: D