Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

VMware 2V0-11.25 - VMware Cloud Foundation 5.2 Administrator

Page: 4 / 4
Total 133 questions

An administrator is tasked with troubleshooting an issue where some VMs are not appearing in the vCenter inventory after a recent migration to a new vSphere environment.

Which two components should the administrator examine to resolve this issue? (Choose two.)

A.

The storage policies applied to the VMs.

B.

The network settings of the new vSphere environment.

C.

The compatibility of the VM hardware version with the new vSphere environment.

D.

The registration status of the VMs in the new vSphere environment.

E.

The vSphere permissions assigned to the VMs.

Which feature of VMware Data Services Manager enhances database security and compliance?

A.

Automated workload migration

B.

Database-Level Authentication

C.

Network traffic optimization

D.

Storage replication

After a scheduled maintenance window, users report that they are unable to access the vCenter Server. The administrator notices that the vSphere Client is not responding.

What step should the administrator take to troubleshoot this issue?

A.

Review the firewall rules on the vCenter Server.

B.

Check the network connectivity between the vCenter Server and the ESXi hosts.

C.

Verify that the vCenter Server is powered on and its services are running.

D.

Restart the vSphere Client service on the vCenter Server.

While deploying a new VMware Cloud Foundation environment, a cloud administrator validates the information entered into the Deployment Parameter Workbook. The validation action results in an error and the VMware Cloud Builder GUI error message does not identify the cause.

Which logfile can the administrator use to identify the cause of the validation error?

A.

VMware SDDC Manager appliance - vcf-deployment-debug.log

B.

VMware Cloud Builder appliance - vcf-bringup-debug.log

C.

VMware SDDC Manager appliance - vcf-bringup-debug.log

D.

VMware Cloud Builder appliance - vcf-deployment-debug.log

What are three prerequisites for deploying an NSX Edge cluster in a VMware Cloud Foundation solution? (Choose three.)

A.

Verify that the NSX host overlay VLAN and NSX Edge overlay VLAN are routed to each other.

B.

Set up vSAN storage policies for the Edge VMs.

C.

Create DNS entries for the NSX Edge nodes.

D.

Install Aria Operations and enable Edge Cluster monitoring.

E.

Assign separate VLAN IDs and subnets for the NSX host overlay and NSX Edge overlay networks.

Which is the appropriate first action to take to resolve dropped network packets on an ESXi host?

A.

Check physical network switch configuration

B.

Enable Storage I/O Control

C.

Increase the CPU and memory allocation for VMs

D.

Migrate VMs to another data store

Which feature of VMware Lifecycle Manager allows an administrator to manage the lifecycle of ESXi hosts by applying a consistent image across the hosts in a cluster? (Choose three.)

A.

Configure a Key Management Server (KMS) and add it to vCenter

B.

Create an encryption policy in vCenter.

C.

Enable SSH on the ESXi hosts to manage encryption keys.

D.

Enable the encryption feature on the ESXi hosts.

E.

Apply the encryption policy to the existing VMs.

What are the three prerequisites an administrator must meet to deploy VMware Aria Suite Lifecycle using SDDC Manager? (Choose three.)

A.

Ensure the Management Domain was deployed using vSphere Lifecycle Manager Images.

B.

Ensure the VMware Software Install Bundle for VMware Aria Suite Lifecycle is in the local bundle repository.

C.

Ensure that a custom SSL certificate specifying the FQDN of the appliance is available.

D.

Ensure that the NTP and DNS settings specified in SDDC Manager are valid for all management components.

E.

Ensure that the Application Virtual Networks have been configured.

An administrator is configuring a newly provisioned workload domain within a VMware Cloud Foundation (VCF) environment. The workload domain will contain virtual machines hosting applications which are considered business critical, and the administrator wants to ensure that the virtual machines are given priority over other network traffic types.

Which three steps should the administrator perform to achieve this goal? (Choose three.)

A.

Configure a bandwidth resource allocation for the virtual machine traffic type.

B.

Enable Network I/O control (NIOC) on the workload domain vSphere Distributed Switch (vDS).

C.

Create a new vSphere Distributed Switch (vDS) specifically for virtual machine traffic.

D.

Configure dedicated physical network adapters for the ESXi management traffic.

E.

Disable bandwidth resource allocations for all other traffic types to ensure virtual machine traffic gets full bandwidth.

F.

Configure a new network resource pool to assign shares, limits and reservations for the virtual machine traffic.