You have a Windows 2003 Server virtual machine (VM) that is experiencing performance problems. Task Manager displays the following information:
CPU Usage: 85%
Memory Available: 3 GB
Network Utilization: 25%
vCenter Server displays this additional information:
ESXi host CPU Utilization: 60%
VMkernel Swap Activity: None
Average Network Usage: 900 Mbps
What is the most likely cause for the performance problems?
B. The ESXi host NIC is being over utilized
An administrator determines that a virtual machine configured for the Development port group lost network connectivity when it was migrated with vMotion from one ESXi 5.x host to another. The administrator notices that machines configured for the Production port group are not experiencing the issue. The hosts have port groups with the following network configuration:
Host A:Production (VLAN 100) Development
Host B:Production (VLAN 100) Development (VLAN 200)
Which two conditions would explain the loss of network connectivity for the virtual machine? (Choose two.)
A. The configured VLAN for Production on Host A is incorrect. B. The configured VLAN for Development on Host B is incorrect.
C. An improper native VLAN is configured on the uplinks to Host A.
D. An improper native VLAN is configured on the uplinks to Host B.
not sure
Which vSwitch or vSwitch port group policy setting allows a virtual machine to listen to traffic other than that which is specifically destined for the given VM?
Traffic Shaping
Promiscuous Mode
MAC Address Changes
Forged Transmits
Promiscuous Mode
VMware vSphere can be evaluated prior to purchase. What is the maximum number of days the evaluation can be used before a license must be purchased?
30
60
90
120
60 days
What would cause the proportional share mechanism to be invoked?
A. the sum of reservations exceeds the physical resources
A vSphere 5 implementation contains two ESXi hosts, ESXi01 and ESXi02. A virtual machine, VM21a on ESXi01 is connected to a vSphere Standard Switch (vSS) in a port group called Production. The vSS is connected to an uplink on the 10.1.20.0/24 network. ESXi02 is configured with a vSS connected to an uplink on the 10.1.30.0/24 network. A port group called Engineering exists on this switch.Which two statements are true about this configuration? (Choose two.)
A. Broadcasts from the Production port group can be received on the Engineering port group.
B. Broadcasts from the Production port group can not be received on the Engineering port group.
C. The virtual machine can be vMotion migrated to the target host.
D. The virtual machine can not be vMotion migrated to the target host.
B, D
Which VMware solution provides rich, personalized virtual desktops to Thin Clients and repurposed PCs with all the benefits of centralized desktop management?
An administrator finds that an ESXi host cannot be managed by vCenter Server.Which three logs can be reviewed using the DCUI? (Choose three.)
The ESXi shell logs
The HA agent logs
The management agent log
The vmkernel log
The VMware ESXi Observation log
not certai
What are the iSCSI discovery methods that are supported by ESXi hosts?
Static Targets, Dynamic Targets
Static Discovery, SendTargets
Static Discovery, FindTargets
Dynamic Discovery, FindTargets
Static Discovery and SendTargets.
If you do not want to have remove targets discovered through Dynamic Discovery, what options do you have?
Use Static Discovery instead.
An administrator has a mixture of Intel-based ESX Hosts in a DRS cluster where the CPUs are compatible in every way except that some support the NX/XD feature and some do not.Which two actions will minimize the effect of these differences? (Choose two.)
a. Mask the NX/XD bit in the processor section of the Configuration tab on the ESXi hosts
b. Mask the NX/XD bit on every virtual machine in the cluster
c. Enable Enhanced VMotion Compatibility
d. Enable Rapid Virtualization Indexing
A, C
Which feature allows a running virtual machine to be moved from one ESXi host to another without interruption?
Storage VMotion
HA
Cold Migration
VMotion
VMotion
Which two actions have no effect on the amount of physical memory resources used for virtualization overhead? (Choose two.)
Installing a 64-bit versus 32-bit operating system.
Increasing the amount of RAM in the virtual machine.
Increasing the number of virtual CPUs in the virtual machine.
Increasing the memory shares for the virtual machine.
b and c, i think
What protocol is used by an ESXi host to communicate with NAS devices?
iSCSI
CIFS
NFS
SMB
NFS
To prevent non-ESXi hosts from seeing VMFS datastores, which would be the most efficent place to configure LUN masking?
on the ESXi host
on the SAN Storage Device
on the non-ESXi hosts
on the Fibre Channel Switch
on the Fibre Channel Switch
An administrator would like to set up Host Profiles in a vSphere architecture. Using the vSphere Client, the administrator connects to vCenter Server and navigates to Management, then begins to build a new Host Profile but is unable to save the profile.
Why is the administrator unable to save the completed profile?
D. The administrator does not have the proper vSphere edition so this feature is not licensed
A company has been utilizing templates in its environment. It is running a 10-node ESXi 5.x Cluster and DRS has not been configured. Several virtual machines have been deployed from this template and successfully powered on, but a newly deployed virtual machine will not power on. There appears to be adequate CPU and Memory resources available on the host.Which three things can be done to allow more virtual machines to be deployed into the cluster from this template? (Choose three.)
A. Deploy the virtual machine to a different host using the same datastore
B. Enable DRS on the cluster to balance the virtual load out across hosts
C. Increase the virtual machine memory reservation
D. Move the swap file to a different location
E. Select a different datastore for the virtual machine
B, D, E (I think)
You are running into disk contention problems on a VMFS datastore. Which two actions will resolve this problem? (Choose two.)
A. Adjust disk shares for each ESXi host accessing this datastore.
B. Adjust disk shares for all virtual machines accessing this datastore from the same ESXi host
C. Move some of the virtual machines from this VMFS datastore to another datastore on the same LUN.
D. Move some of the virtual machines from this VMFS datastore to another datastore on a different LUN.
B, D - I think
What are two types of CHAP authentication supported by ESXi
A. Automatic
B. Unidirectional
C. Bidirectional
D. Dynamic
B. Unidirectional
C. Bidirectional
What types of CHAP authentication are supported with Hardware iSCSI. Identify all that apply
A. Unidirectional. Bidirectional and Per-Target CHAP are only supported with software iSCSI
With Unidirectional CHAP, which is true:
C. The Target authenticates the Initiator
Identify the unique benefits afforded by Software iSCSI (select all that apply)
A. Automatic CHAP configuration
B. Bidirectional CHAP
C. Bidirectional and Unidirectional CHAP
D. Different credentials for each Target
E. Ability to not use CHAP unless rewquired by Target
F. Use CHAP - Ability to require a successful CHAP authentication
B, D, E
You have changed the iSCSI name of the hardware initiator. When is the new name recognized for iSCSI sessions?
D. Immediately for new sessions, only on subsequent login for existing sessions
An ESXi host is configured to access an iSCSI target using CHAP authentication.What happens to the access if CHAP is disabled on the ESXi host?
B.
An administrator wants to restrict the ability of selected administrators to install plug-ins in their vSphere Client applications.Which action should the administrator perform?
D. ( I tihnk)
When is a 64-bit Windows Operating System required for the installation of vCenter Server?
B.
What is a valid use case for the No Access role?
B.
An administrator finds that the Hardware Status tab is unavailable when an ESXi host is selected in vCenter Server.Which two steps could be taken to investigate the issue? (Choose two.)
A. Check to see if TCP port 5989 is open on the vCenter Server to allow CIM traffic
B. Check the status of the vCenter Hardware Service in vCenter Service Status
C. Check the status of the CIM Server service on the Security Profile of the host
D. Check to see if UDP port 5989 is open on the vCenter Server to allow CIM traffic.
A and B, I think
Which two conditions will cause a vMotion validation check to fail? (Choose two.)
A, B
What is the connection type of the primary VLAN in a Private VLAN?
Promiscuous
A storage array containing a VMFS datastore must be taken offline for maintenance.What can be done to avoid virtual machine downtime on VMs running in this datastore?
Storage VMotion could be used to accomplish this operation with no virtual machine downtime.
An administrator is setting up vMotion in a vSphere environment. A migration is run to test the configuration, but fails.On which vSphere component does vMotion need to be enabled?
Port Group
Which CHAP authentication mechanisms are only available when using software and dependent hardware iSCSI adapters (Choose Two)
Per-subnet CHAP
Per-target CHAP
Bidrectional CHAP
Per IP CHAP
Per-target CHAP
Bidrectional CHAP
If the vCenter Virtual Appliance is named vcva.vclass.local what address will you type into a browser to manage it?
https://vcva.vclass.local:5480
Name 4 views available when you run the vSphere Client against a vCenter server?
datastores,
vm templates, host and clusters, networking
How many ports by default for a vSS?
120 + 8 for management
What are the 3 security policies and what
are their defaults?
Promiscuous mode (reject),
MAC address changes (enabled),
Forged transmits (enabled)
What port do you use for downloading a web client?
9443
What port is used for connecting to vcenter?
5480
What is lockdown mode?
A mode through the DCUI that disables all root access to ESXi machines
What port/protocol does NTP use?
Port 123 over UDP
When would you want to use an RDM?
When a VM must interact with a real disk / SAN, such as when you make disk aray snapshots or have a large amount of dat that you do not want to move onto a virtual disk as part of a physical to virtual conversion.
What is the difference between ovf and ova files?
OVF =Platform, independent, folder
OVA = ZIP
Identify three network security policy exceptions and explain them:
Promiscuous mode
Default: reject
MAC Address Changes:
Default: Accept
Definition: Prevents (when set to reject) VM from receiving when packet when a guest attempts to change the MAC assigned to the virtual network.
Forged Transmits:
Default: Accept
Definition: In Reject, the vNIC drops frame that the guest sends where the source address field contains a MAC other than the assigned vNIC MAC address.
Which of the following is a valid definition for burst size?
D. Kbytes
Which of the following is a valid definition for peak bandwidth size?
D. kbps
Which of the following is a valid definition for peak bandwidth size?
A. kbps
B. seconds
C. kbytes
D. Mbps
kbps
Idenitfy five NIC teaming policies
1. Load Balancing (outbound only)
2. Netowrk Failure Detection
3. Notify Switches
4. Failback
5. Failover
I need a deterministic load balancing policy, which one can I use?
1. virtual port ID load balancing
2. source mac hash
Identify three load balancing methods?
Originating Virtual Port ID
Source MAC Hash
IP-Hash
Which capabilities can NFS support (identify all that apply):
A. Boot from SAN
B. vMotion
C. vSphere HA
D. DRS
E. RDM
B, C, and D
Which capabilities can DASsupport (identify all that apply):
A. Boot from SAN
B. vMotion
C. vSphere HA
D. DRS
E. RDM
B (with new enhanced v-motion)
E
What five steps must be taken to configure iSCSI software intiator?
1. configure a vmkernal port for ip storage
2. enable the iscsi software adapter
3. configure the iscsci qualified name (IQN) and alias (if required)
4. configure iscsi software properties - static/dynamic discovery addresses and iSCSI port binding
5. configure chap
Storage DRS provides initial placement and load balancing recommendations. I/O load is evaluated by default every
A. 24 Hours
B. 8 Hours
C. 2 Hours
D. 6 Hours
TK
By default, HA picks how many heartbeat datastores?
A. 1
B. 2
C. 3
D. 4
TK
When configuring resource allocation settings on a VDS switch, which two settings are available?
A. System network resource pools
B. System resource pools
C. User-defined resource pools
D. User-defined network resource pools.
TK
What steps must you take to configure software iSCSI multipathing?
1. Create two VMKernal ports
2. Attach NICS to each port
3. Use port-binding to associate the VMKernal ports with the iSCSI initiator
Once setup they all share the same IQN but differnet IP addresses. The routing table is not consululte,d but managed by vSphere multipahting modules.