Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following 2V0-622PSE Exam is Retired now. Please select the alternative replacement for your Exam Certification.

2V0-622PSE Exam Dumps - VMware Certified Professional 6.5 - Data Center Virtualization (6.5) Exam

Go to page:
Question # 33

An administrator wants to enable VMware Fault Tolerance on a virtual machine.

Which two vSphere features are supported with Fault Tolerance? (Choose two.)

A.

VM Component Protection

B.

vSphere HA

C.

Storage DRS

D.

Snapshots

Full Access
Question # 34

A company has requested that a plan for Auto Deploy be built using VMware-recommended best practices for networking.

Which two considerations adhere to VMware-recommended networking best practices for Auto Deploy? (Choose two.)

A.

Using IPv4 as Auto Deploy will be able to boot hosts with a legacy BIOS.

B.

Using DHCP reservations for address allocations because providing fixed IP addresses through host customization is not supported.

C.

Using VLANs on the management network as it offers increased performance while hosts are booting.

D.

Using IPv6 as Auto Deploy will be able to boot hosts with a legacy BIOS and UEFI.

E.

Using DHCP reservations for address allocations because providing fixed IP addresses through host customization is not recommended.

Full Access
Question # 35

Which three prerequisites must be in place prior to enabling secure boot for a virtual machine? (Choose three.)

A.

VirtualMachine.Config.Settings privileges

B.

an encrypted USB drive

C.

Virtual Hardware version 13 or later

D.

Virtual Hardware version 12 or later

E.

EFI firmware

Full Access
Question # 36

An administrator is using virtual machine encryption in their vSphere 6.5 environment. The Key Management Server (KMS) has experienced a critical failure.

Which two statements are true about VM encryption when the KMS is not available? (Choose two.)

A.

VMs will shut down gracefully in the event of a KMS outage as a proactive measure to prevent data theft.

B.

VMs which were running at the time of the KMS failure will continue to run.

C.

If an ESXi host is rebooted, it will be unable to power on encrypted VMs until KMS connectivity is restored.

D.

vCenter Server will continue to distribute encryption keys as long as it is not rebooted while the KMS is unreachable.

E.

ESXi hosts within the same cluster will share keys with one another while the KMS is unreachable.

Full Access
Question # 37

Which three types of Content Libraries exist within vSphere 6.5? (Choose three.)

A.

Remote Content Library

B.

Published Content Library

C.

Local Content Library

D.

Shared Content Library

E.

Subscribed Content Library

Full Access
Question # 38

The administrator set Local OS as the default identity source of vCenter Single Sign-On. A user named “user1” belongs to domain “mydomain” and tries to log in to vCenter Single Sign-On.

Which two user names are appropriate to use for login? (Choose two.)

A.

user1\mydomain

B.

mydomain@user1

C.

mydomain\user1

D.

user1@vsphere.local

E.

user1@mydomain

Full Access
Question # 39

A cluster with two resource pools named RP-PROD and RP-DEV is configured based on custom requirements. A vSphere administrator temporarily disables DRS for this cluster.

Upon re-enabling DRS, how would the resource pool configuration have changed?

A.

Both resource pools still exist, but their shares have been reverted to the default share values.

B.

Nothing. Everything has stayed the same.

C.

Both resource pools no longer exist and all virtual machines that resided in the resource pools now reside under the hosts in the cluster.

D.

Both resource pools exist, but all virtual machines that resided in the resource pools now reside under the hosts in the cluster.

Full Access
Question # 40

An administrator would like to configure vSphere HA to use two isolation addresses.

How would this affect the behavior of HA?

A.

If both isolation addresses are not reachable, the host will be restarted by the HA agent.

B.

If both isolation addresses are not reachable, the host will use the vCenter Server IP address as a final isolation address before being marked isolated.

C.

If only one of the isolation addresses is reachable, the host will not be marked isolated by HA.

D.

If only one of the isolation addresses is reachable, the host will be considered in an isolated by HA.

Full Access
Go to page: