Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

2V0-21.20 Exam Dumps - Professional VMware vSphere 7.x

Go to page:
Question # 9

An administrator wants to leverage the processor-specific technology that uses a security extension for securing virtual machines (VMs). This will allow user-level code to define private regions of memory called enclaves that are protected from external access.

What does the administrator need to configure to enable VMs to use this technology? (Choose the best answer.)

A.

Trusted Platform Module (TPM)

B.

Virtual Intel Software Guard Extensions (vSGX)

C.

Advanced Encryption Standard-New Instructions (AES-NI)

D.

Transparent Page Sharing (TPS)

Full Access
Question # 10

What is a requirement of Storage I/O Control? (Choose the best answer.)

A.

Storage connected through Fibre Channel

B.

Management by a single vCenter Server

C.

Datastores with multiple extents

D.

Automated storage tiering capabilities

Full Access
Question # 11

Which feature is a prerequisite for Proactive High Availability (HA)? (Choose the best answer.)

A.

vCenter High Availability

B.

vSAN Cluster

C.

Predictive Distributive Resource Scheduler (DRS)

D.

vSphere Distributive Resource Scheduler (DRS)

Full Access
Question # 12

What are two supported ESXi boot options? (Choose two.)

A.

NFS

B.

iSCSI

C.

vSAN

D.

SAN

E.

vSphere Virtual Volumes

Full Access
Question # 13

Which two statements are true regarding the use of firmware update packages in vSphere Lifecycle Manager? (Choose two.)

A.

A hardware support manager must be registered as a vCenter Server extension.

B.

The firmware and drivers add-on are distributed through the official VMware online depot.

C.

The firmware and drivers add-on can be used on clusters that are managed with baselines.

D.

The firmware and drivers add-on can add or remove components from the ESXi base image.

E.

The firmware and drivers add-on is provided by a third-party vendor.

Full Access
Question # 14

What is a pre-requisite for configuring virtualization-based security (VBS)? (Choose the best answer.)

A.

Change the firmware type from UEFI to Legacy BIOS

B.

Change the firmware type from Legacy BIOS to UEFI

C.

Use Windows Server 2012

D.

Use Windows Server 2008 R2

Full Access
Question # 15

There are two vSphere clusters in a company environment. One cluster is hosting development workloads and another is hosting production workloads. Both vSphere clusters are managed by the same vCenter Server.

The application team would like to move a new virtual machine from the development to production cluster with no downtime.

Which feature would allow non-disruptive movement between these two clusters? (Choose the best answer.)

A.

Cross vCenter Migration

B.

vSphere High Availability

C.

vSphere vMotion

D.

vSphere Replication

Full Access
Question # 16

An administrator is investigating the reason for a virtual machine restarting. In the vmware.log file, the administrator finds the following error:

What is a likely cause of this virtual machine restart? (Choose the best answer.)

A.

Guest operating system fault

B.

User or API request to shut down guest operating system

C.

High Availability

D.

User or API request to restart guest operating system

Full Access
Go to page: