A、 The virtual machine will be restored to the parent snapshot
B、 The virtual machine will be restored in a powered off state
C、 The virtual machine will be restored to the child snapshot
D、 The virtual machine will be restored in a powered on state
E、 The virtual machine will be restored in a suspended state
F、
G、
H、
I、
J、
答案:AB
解析:
A、 The virtual machine will be restored to the parent snapshot
B、 The virtual machine will be restored in a powered off state
C、 The virtual machine will be restored to the child snapshot
D、 The virtual machine will be restored in a powered on state
E、 The virtual machine will be restored in a suspended state
F、
G、
H、
I、
J、
答案:AB
解析:
A. Ensure that the source and destination vCenter instances share the same Key Management Server (KMS).
B. Ensure that Encrypted vMotion Is turned off for the VM
C. Ensure that the VM is encrypted before attempting the migration
D. Ensure that the VM is powered off before attempting the migration.
E. Ensure that the source and destination vCenter Servers have a different Key Management Server (KMS).
F.
G.
H.
I.
J.
解析:解析: To ensure a successful migration of an encrypted VM to a secure environment, the administrator needs to ensure that the source and destination vCenter instances share the same Key Management Server (KMS), which provides encryption keys for both environments; and ensure that the VM is encrypted before attempting the migration, which allows preserving its encryption status during vMotion.为了确保加密虚拟机成功迁移到安全环境,管理员需要确保源和目标vCenter实例共享同一个密钥管理服务器(KMS),该服务器为两个环境提供加密密钥;并确保在尝试迁移之前对虚拟机进行加密,这样可以在vMotion过程中保留其加密状态。
A. Medium
B. Tiny
C. Large
D. Small
解析:解析:VMWare: Small environment (up to 100 hosts or 1,000 virtual machines) Medium environment (up to 400 hosts or 4,000 virtual machine)The administrator should select the small deployment size for the new vCenter Server instance, which is suitable for an environment with up to 100 hosts or 1,000 virtual machines. The small deployment size has 4 vCPUs and 19 GB of memory, which can handle the current and expected growth of the environment. The other deployment sizes are either too large or too small for the environment.VMWare:小型环境(最多100台主机或1,000台虚拟机)中型环境(最多400台主机或4,000台虚拟机)管理员应为新的vCenter Server实例选择小型部署,这适用于最多100台主机或1,000台虚拟机的环境小型部署有4个vCPUs和19 GB内存,可以处理环境的当前和预期增长。其他部署规模对于环境来说要么太大,要么太小。
A. Ensure a DNS A Record is created for the VMware ESXi host on the corporate DNS servers.
B. Update the VMware ESXi Management Network DNS configuration to use the corporate DNS servers for names resolution
C. Update the VMware ESXi Management Network IPv4 configuration to use a static a IPv4 address
D. Configure at least two network adapters for the VMware ESXi Management Network
E. Set the value of the VMware ESXi Management Network VLAN ID to 10
F. Disable IPv6 for the VMware ESXi Management Network
G.
H.
I.
J.
解析:
A. 802.1Q tagging
B. Port mirroring
C. Netflow
D. Configuration backup and restore
E. IPv6 support
F. IPv4 support
G.
H.
I.
J.
解析:解析:Three features that are only available when using vSphere Distributed Switches instead of vSphere Standard Switches are port mirroring, which allows monitoring network traffic on a virtual switch port; Netflow, which allows collecting IP traffic information from a virtual switch; and configuration backup and restore, which allows saving and restoring distributed switch settings.只有在使用vSphere分布式交换机而不是vSphere标准交换机时才可用的三项功能是端口镜像,它允许监控虚拟交换机端口上的网络流量;Netflow,允许从虚拟交换机收集IP流量信息;以及配置备份和恢复,允许保存和恢复分布式交换机设置。
A. Extract the host profile from the reference host
B. Export the host profile from vCenter.
C. Import host customization on the reference host.
D. Attach the host profile to each cluster that requires the secure configuration.
E. Check the compliance of each host against the host profile.
F. Reset host customization on the reference host.
G. 在引用主机上重置主机定制。
H.
I.
J.
解析:解析: To apply the security standards from a reference host to other hosts across multiple clusters, the administrator needs to extract a host profile from the reference host, which captures its configuration settings; attach the host profile to each cluster that requires the same configuration; check the compliance of each host against the host profile, which compares their settings; and remediate all non-compliant hosts, which applies the configuration settings from the host profile.为了将来自参考主机的安全标准应用到跨多个集群的其他主机,管理员需要从参考主机提取主机配置文件,该主机配置文件捕获其配置设置;将主机配置文件附加到需要相同配置的每个群集;对照主机配置文件检查每台主机的合规性,主机配置文件会比较它们的设置;并修复所有不符合的主机,这将应用主机配置文件中的配置设置。
A. Assign a custom memory share value to the resource pool containing the Production VMs.
B. Assign a memory reservation value to the resource pool containing the Production VMs.
C. Create a parent resource pool for the Production VMs
D. Create a sibling resource pool for each of the Production and Test VMs.
E. Create a child resource pool for the Test VMs.
F.
G.
H.
I.
J.
解析:
A. 40
B. 32
C. 8
D. 16
E.
F.
G.
H.
I.
J.
解析:解析: 4Gbps*8Nic=32Gbps*50%=16Gbps
A. VMware Aria Operations for Logs
B. VMware Skyline Advisor Pro
C. VMware Skyline Health
D. VMware Aria Operations
解析:解析: The solution that should be recommended to reduce the risk of outages by proactively identifying and resolving issues with the environment and reducing the complexity of uploading log bundles is VMware Skyline Health, which provides automated support and proactive recommendations for vSphere.应推荐的解决方案是VMware Skyline Health,它通过主动识别和解决环境问题以及降低上传日志捆绑包的复杂性来降低停机风险,为vSphere提供自动化支持和主动建议。
A. Datastore
B. Data center
C. Datastore cluster
D. Virtual machine
解析:解析: To create a custom alarm to notify when thin provisioning reaches a certain capacity threshold, the administrator must define this alarm at the datastore level, as it is related to datastore usage要创建自定义警报以在精简资源调配达到特定容量阈值时发出通知,管理员必须在数据存储区级别定义此警报,因为它与数据存储区使用情况相关
A. Replace the VMware Certificate Authority (VMCA) certificate with a self-signed certificate generated from the
B. Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.
C. Replace the machine SSL certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
D. Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.
E. Replace the solution user certificates wife custom certificates generated from the Enterprise CA.
F. Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
G.
H.
I.
J.
解析:解析: Option B, D and E are correct because they allow the administrator to replace the machine SSL certificates,the VMware Certificate Authority (VMCA) certificate and the solution user certificates with custom certificates generated from the Enterprise CA, which will ensure that all certificates are trusted by the Enterprise CA and minimize the ongoing management overhead of replacing certificates. Option A is incorrect because replacing the VMCA certificate with a self-signed certificate generated from the VMCA will not ensure that the certificate is trusted by the Enterprise CA. Option C is incorrect because replacing the machine SSL certificates with trusted certificates generated from the VMCA will not ensure that the certificates are trusted by the Enterprise CA. Option F is incorrect because replacing the solution user certificates with trusted certificates generated from the VMCA will not ensure that the certificates are trusted by the Enterprise CA. 选项B、D和E是正确的,因为它们允许管理员用企业CA生成的自定义证书替换机器SSL证书、VMware证书颁发机构(VMCA)证书和解决方案用户证书,这将确保企业CA信任所有证书,并将替换证书的持续管理开销降至最低。选项A不正确,因为用从VMCA生成的自签名证书替换VMCA证书不能确保该证书受到企业CA的信任。选项C是不正确的,因为用从VMCA生成的可信证书替换机器SSL证书不能确保证书被企业CA信任。选项F是不正确的,因为用从VMCA生成的可信证书替换解决方案用户证书不能确保证书被企业CA信任。