亚洲综合日韩无码久久,超高清欧美videosseⅹo,精品国产免费第一区二区三区日韩,午夜国产精品久久影院,亚洲国产中文精品无码久久一线北

您好,歡迎來到江浙滬招生考試網(wǎng) !

設(shè)為首頁|加入收藏|聯(lián)系我們|網(wǎng)站地圖|

江浙滬招生考試網(wǎng)

您現(xiàn)在的位置: test4exam >> 歷年真題 >> it認證題庫 >> 正文

最新VMware vcp-410 題庫分享

日期:2013/1/23 19:42:03 來源:本站原創(chuàng) 訪問量:

江浙滬招生考試網(wǎng)it認證小組研發(fā)最新 vcp-410題庫分享給大家學習參考:

1. An administrator is installing ESX 4.0 on a physical server. Which of the following components would
need to be modified or replaced to support a successful installation?
A. 4 Intel PRO 1000 Network Adapters
B. 2 LSI Logic LSI7202XP-LC Fibre Channel HBAs
C. 2 AMD Opteron CPUs
D. 4GB RAM
Answer: B
2. Which of the following partitions is specific to ESXi 4.0?
A. usr
B. vmkcore
C. scratch
D. swap
Answer: C
3. An ESX Administrator plans to install additional supported components on the ESX Server that would
increase the memory requirements for the Service Console. Which ESX Server partition would also need
to be increased during installation as a result?
A. /
B. vmfs3
C. swap
D. /boot
Answer: C
4. Which of the following tasks can be selected from the home page of an ESX Server (Choose Three)?
A. Download VMware vCenter Server
B. Browse Objects Managed by this Host
C. Browse Virtual Machines in this Host's inventory
D. Browse Datastores in this Host's inventory
E. Download VMware Web Access Client


Answer: ABD
5. When installing ESX 4.0, where is the Service Console file system located?
A. In a virtual disk on a local VMFS datastore
B. In a virtual disk on a local or shared VMFS datastore
C. On a local physical disk or on a mapped SAN LUN
D. On a local physical disk
Answer: A
6. The default swap partition size for ESX 4.0 is which of the following?
A. 800MB
B. 1.6GB
C. 544MB
D. 600MB
Answer: D
7. Creating which of the following optional partitions would change the default partition size for /?
A. /tmp
B. /home
C. /var/log
D. /usr
Answer: D
8. Additional licensing is required once the number of cores per CPU reaches which of the following?
A. 16 or more cores
B. 12 or more cores
C. 8 or more cores
D. 6 or more cores
Answer: C


9. What is the maximum number of cores that can be used with Standard licensing?
A. 8
B. 16
C. 12
D. 6
Answer: D
10. Once vCenter 4.x has been installed, a License Server is required in which of the following instances?
A. A License Server is always required
B. To support ESXi 4.x Hosts
C. To support ESX 3.5 Hosts
D. A License Server is no longer required
Answer: C
11. Which of the following features is not a part of the vSphere Advanced Edition?
A. VMware Storage VMotion
B. VMware VMotion
C. VMware Data Recovery
D. VMware Fault Tolerance
Answer: A
12. Which vSphere Editions include VMware Data Recovery (Choose Two)?
A. vSphere Essentials Plus or higher
B. vSphere Advanced or higher
C. vSphere Standard or higher
D. vSphere Essentials or higher
Answer: AB
13. What are the minimum vSphere Small Business and Medium/Enterprise Editions that include VMware
Data Recovery (Choose Two)?


A. vSphere Essentials Plus
B. vSphere Standard
C. vSphere Advanced
D. vSphere Essentials
Answer: AC
14. Which of the following functions cannot be performed remotely and must be performed from the ESXi
Direct Console (Choose Three)?
A. Configure DNS Settings
B. Restart Management Agents
C. Test the Management Network
D. Restore a Standard Switch
E. Configure a Static IP Address
Answer: BCD
15. The vSphere 4 Host Update Utility provides a graphical user interface for (Choose Two):
A. performing a host compatibility check
B. upgrading standalone ESX/ESXi hosts
C. upgrading ESX hosts in DRS/HA clusters
D. keeping guest operating systems patched
Answer: AB
16. After upgrading an ESX host to vSphere 4, which of the following three actions should be taken (Choose
Three)
A. restore files to the service console
B. boot into Troubleshooting Mode for proper operation
C. configure licensing
D. verify virtual machine operation
E. connect the host to vCenter if managed
Answer: CDE


17. Before you upgrade an ESX host:
A. back up /proc, /mnt, /tmp, custom scripts and all VMFS datastores
B. back up /home, /etc/init.d and /boot
C. back up /etc/passwd, /etc/groups, /etc/shadow, /etc/gshadow, custom scripts and local VMFS
D. back up /var/logs, /usr, /bin and the dmesg output
Answer: C
18. Before you upgrade an ESXi host:
A. update the ESXi restore CD with the current ESXi image
B. save the current ESXi image to another ESXi server
C. copy the embedded ESXi image to a USB flash drive
D. save the ESXi configuration using vicfg-cfgbackp s from the vCLI
Answer: D
19. Before you upgrade an ESX/ESXi host (Choose Three):
A. verify current hardware is supported per the vSphere Systems Compatibility Guide
B. compare the md5sum of the downloaded file to the value on the VMware download website
C. schedule a maintenance window for 32-bit hardware
D. run the vSphere 4 Pre-Upgrade Script from the command line
E. run the VMware CPU Identification Utility
Answer: ABE
20. The following ESX versions are supported for direct upgrading to vSphere 4 (Choose Two):
A. ESX 2.1
B. ESX 2.5.5
C. ESX/ESXi 3.5
D. ESX 3.0.0, 3.0.1, 3.0.2
Answer: CD


21. In order to upgrade to vSphere 4, an ESX host must have a /boot partition of at least:
A. 150 MB
B. 200 MB
C. 100 MB
D. 50 MB
Answer: C
22. The vSphere 4 Host Update Utility upgrades the (Choose Two):
A. VMkernel
B. virtual machine hardware
C. VMFS datastores
D. service console if present
Answer: AD
23. The vSphere 4 Update Manager upgrades (Choose Three):
A. virtual machine Tools
B. VMFS datastores
C. virtual machine hardware
D. vSphere Client
E. vCenter
Answer: ABC
24. vCenter Update Manager is capable of upgrading which of the following (Choose Three):
A. vCenter
B. Service Console
C. Virtual Machine Hardware
D. vSphere Client
E. VMware Tools
Answer: BCE


25. The ESX 4.x Service Console Virtual Disk can be located on (Choose Two):
A. a VMFS datastore on software iSCSI attached storage
B. a VMFS datastore on non-shared FC attached storage
C. an NFS datastore
D. a VMFS datastore on locally attached storage
Answer: BD
26. Securing an ESX service console is important because:
A. Service Console actions can affect all VMs on an ESX host
B. Service Console permissions are applied to users when logging in to a host via vCenter
C. VMs run in the service console
D. VMs depend on the patch level of the service console
Answer: A
27. ESX Service Console patches should be applied (Choose Two):
A. as instructed by VMware authorized technical support personnel
B. when an issue is identified
C. as Red Hat makes patches available
D. as VMware makes patches available
Answer: AD
28. ESX Service Console patches should be applied (Choose Two):
A. in accordance with VMware Security Advisories
B. when notified on the VMware Security Blog
C. when advised by VMware authorized technical support personnel
D. in accordance with VMware and RedHat Security Advisories
Answer: AC
29. The ESX Service Console file system structure should (Choose Two):
A. provide separate mount points for /tmp, /var/log and /home


B. avoid filling /
C. avoid filling /home
D. provide separate mount points for /tmp, /var/log, /home and /etc
Answer: AB
30. Which of the following are true regarding the ESX Service Console file system structure (Choose Two)?
A. separate mount points are created for /tmp, /var/log and swap by default
B. running out of space on /var/log can cause vSphere Client connectivity disruptions
C. running out of space on / can cause vSphere Client connectivity disruptions
D. separate mount points are created for /var/log and swap by default
Answer: CD
31. The default ESX service console firewall (Choose Two):
A. blocks all traffic unless specifically allowed
B. is configured for medium security
C. allows all traffic unless specifically blocked
D. is configured for high security
Answer: AD
32. ESX Service Console user authentication (Choose Two):
A. requires users to change their passwords every 6 months by default
B. can use a central directory service for password checking only
C. requires local accounts
D. controls vCenter authentication for vSphere Client users
Answer: BC
33. Installing additional software in the ESX Service Console is supported in which of the following
instances:
A. for hardware management support
B. for improved utilization of the ESX host resources


C. for graphical desktop access for administrative purposes
D. for enhanced virus protection
Answer: A
34. An administrator is installing an ESX Host to boot from a SAN LUN. Which of the following two
requirements are necessary when configuring the HBA in the ESX Host (Choose Two)?
A. The HBA BIOS must be enabled
B. The HBA must be plugged into the lowest available PCI bus and slot number
C. The HBA BIOS must be disabled
D. The HBA must be plugged into the highest available PCI bus and slot number
Answer: AB
35. An administrator is installing an ESX Host to boot from a SAN LUN. The storage array is an
active/passive array. After configuring the boot LUN and installing ESX, the system does not boot properly.
Which of the following could cause this issue?
A. The Storage Processor port specified in the BIOS configuration of the HBA is passive
B. The LUN specified in the BIOS configuration of the HBA is active
C. The Storage Processor port specified in the BIOS configuration of the HBA is active
D. The LUN specified in the BIOS configuration of the HBA is passive
Answer: A
36. Under which of the following conditions would an administrator consider using the Boot from SAN
option for the ESX Host (Choose Two)?
A. When concern exists that contention might occur between the Service Console and the VMkernel
B. When using Microsoft Cluster Service
C. To easily replicate the Service Console to a remote site
D. In diskless hardware configurations
Answer: CD
37. What is the proper LUN Masking configuration for LUNs presented to an ESX Host when using the Boot


from SAN option?
A. The Boot LUN should be masked so that only one ESX Host can see the LUN, while the datastore LUNS
should be masked so that all ESX Hosts can see the LUNs
B. The Boot LUN and datastore LUNS should be masked so that all ESX Hosts can see the LUNs
C. The Boot LUN should be masked so that all ESX Hosts can see the LUN, while the datastore LUNS
should be masked so that only one ESX Host can see the LUNs
D. The Boot LUN and datastore LUNS should be masked so that only one ESX Host can see the LUNs
Answer: A
38. Which two are requirements when booting from SAN? (Choose Two)
A. The Storage Array port WWN specified in the BIOS configuration of the HBA must be passive
B. The HBA should be plugged into the lowest PCI bus and slot number
C. The boot LUN should only be visible to the ESX Server that is booting from it
D. The boot LUN should be visible to all ESX Servers for HA failover
Answer: BC
39. What VMware solution is identified by hosting user desktops in a centralized manner and brokering user
access?
A. VMware View
B. VMware vCenter Site Recovery Manager
C. VMware Workstation
D. VMware vCenter Orchestrator
Answer: A
40. VMware Site Recovery Manager requires which of the following two VMware products as part of the
solution (Choose Two)?
A. VMware vCenter Server
B. VMware HA
C. VMware Data Recovery
D. VMware ESX/ESXi


Answer: AD
41. Which of the following VMware solutions provides developers and test engineers the equivalent of a
fully-equipped datacenter with dedicated provisioning staff?
A. VMware vCenter Orchestrator
B. VMware vCenter Lab Manager
C. VMware vCenter Capacity IQ
D. VMware vCenter Lifecycle Manager
Answer: B
42. An administrator manages a site with remote workers, business partners and third-party service
providers. These users need access to corporate data and network resources while adhering to security
and corporate governance regulations. Which of the following VMware solutions can provide the power
and versatility of virtual machines with the security and control of centrally managed desktops?
A. VMware Lifecycle Manager
B. VMware Workstation
C. VMware View
D. VMware Server
Answer: C
43. An administrator needs to verify the functionality of virtual machines created in several different formats
prior to converting them to ESX/ESXi. Using VMware Player, which of the following virtual machines can
be run directly on an administrator desktop (Choose Two)?
A. Norton Ghost 10
B. Acronis True Image
C. Microsoft Virtual Server/Virtual PC
D. VMware Fusion
Answer: CD
44. Which of the following VMware solutions provides rich, personalized virtual desktops to Thin Clients and


repurposed PCs with all the benefits of centralized desktop management?
A. VMware Workstation
B. VMware ACE
C. VMware View
D. VMware Fusion
Answer: C
45. Which of the following files are part of a typical virtual machine (Choose Three)?
A. Virtual Machine Backup File (.vmbk)
B. Configuration File (.vmx)
C. Virtual Disk File (.vmdk)
D. VMotion Transfer File (.vmt)
E. Virtual Machine Snapshot Metadata File (.vmsd)
Answer: BCE
46. Which of the following is a benefit of ESXi over ESX?
A. Improved Fault Isolation
B. Increased Security and Reliability
C. Dynamic Resource Allocation
D. Memory Overcommitment
Answer: B
47. Which of the following are benefits of ESXi over ESX (Choose Two)?
A. RCLI support
B. Scripted Installation
C. Smaller Attack Surface
D. Less Code to Patch
Answer: CD
48. What are two reasons why a company would choose to use VMware ESXi instead of using VMware


Server 2? (Choose Two)
A. The company wants to be able to patch the servers hosting their virtual machines with zero virtual
machine downtime
B. The company is virtualizing several physical servers and wants a centralized management option
C. The company needs to access their virtual machines remotely and VMware Server 2 does not support a
remote console option
D. The company needs the ability to run dual-processor virtual machines
Answer: AB
49. Networking policies, such as traffic shaping and security, can be configured on the following vSphere
elements:
A. On the physical network interface and the vSwitch
B. On the port group and the physical network interface
C. On the port group and the vSwitch
D. On the vSwitch and the attached virtual machine
Answer: C
50. The following connection types can all be configured on a single vSwitch:
A. VMkernel, virtual machine and no Service Console port groups
B. Service Console, virtual machine and VMkernel port groups
C. Service Console and 2 VMkernel port groups
D. Service Console and 2 virtual machine port groups
Answer: B
51. An administrator needs to determine the current network adapter configuration for an uplink on an ESX
Host. Which of the following items can be viewed from the Network Adapters section of the Configuration
tab using the vSphere Client? (Choose Three)
A. Wake on LAN support
B. Speed and Duplex settings


C. Observed IP ranges
D. TCP Segmentation Offload (TSO) support
E. Jumbo Frame support
Answer: ABC
52. Assuming VLANs are not configured, which of the following is true about traffic from a virtual machine
connected to a port group on a vNetwork Standard Switch with no uplinks?
A. Virtual machines in any port group on the virtual switch can receive the traffic
B. The virtual switch will drop the packets if no uplink is present
C. Virtual machines on any virtual switch on the same ESX Server can receive the traffic
D. Only virtual machines in the same port group on the virtual switch can receive the traffic
Answer: A
53. A network administrator has asked you to enable NetQueue to improve networking performance for
virtual machines on an ESX Host. Where is this feature enabled (Choose Two)?
A. On the physical network adapter driver
B. On the virtual NIC in the virtual machine
C. On the Properties tab for the virtual switch
D. In the Advanced Settings for the VMkernel
Answer: AD
54. When configuring the vSwitch NIC teaming policy, what happens when the Notify Switches option is set
to Yes?
A. The virtual switch is notified when the location of a physical NIC changes
B. The physical switch is notified when the location of a virtual NIC changes
C. The virtual switch is notified when the physical NIC link state changes
D. The physical switch is notified when the virtual NIC link state changes
Answer: B
55. Which two statements are true about port groups and VLANs defined on a vNetwork Standard Switch?


(Choose Two)
A. Only one VLAN can be specified in a port group
B. Multiple VLANs can be specified in a port group
C. The same VLAN cannot be specified in multiple port groups
D. Multiple port groups can specify the same VLAN
Answer: AD
56. Which of the following describes the default behavior of uplinks added to a vNetwork Standard Switch:
A. All uplinks are active
B. The first uplink is active, additional uplinks are standby
C. The first uplink is active, additional uplinks are unused
D. Only one uplink can be attached to a virtual switch
Answer: A
57. Traffic Shaping can be configured on the following vSphere elements (Choose Two):
A. On a vNetwork Standard Switch port group or the entire vSwitch for outbound traffic only
B. On a vNetwork Distributed Switch dvPort or the entire dvPort Group for outbound traffic only
C. On a vNetwork Standard Switch port group or the entire vSwitch for inbound traffic only
D. On a vNetwork Distributed Switch dvPort or the entire dvPort Group for inbound and outbound traffic
Answer: AD
58. vSphere virtual switches are configured, based on the number of physical uplinks bound, in which of the
following methods?
A. vSwitch with none, one or more NICs
B. vSwitch with a binding to another vSwitch and one or more NICs
C. vSwitch with bindings to a virtual machine, and HBA and the Service Console
D. vSwitch with one, two or more NICs
Answer: A
59. Which of the following two statements are true regarding vSphere virtual switch uplinks (Choose Two)?


A. vSphere virtual switches must be configured with at least one uplink
B. vSphere virtual switches can be configured to use the same uplink
C. Multiple vSphere virtual switches cannot be configured to use the same uplink
D. vSphere virtual switches do not need to be configured with an uplink
Answer: CD
60. In vSphere, a bound physical NIC can be configured to transmit and receive Jumbo Frames. What is
the Maximum Transmission Unit (MTU) for Jumbo Frames in vSphere?
A. 9000
B. 9500
C. 5500
D. 5000
Answer: A
61. The vSwitch or vSwitch port group policy setting that allows a virtual machine to listen to traffic other
than that which is specifically destined for the given VM is:
A. MAC Address Changes
B. Promiscuous Mode
C. Forged Transmits
D. Traffic Shaping
Answer: B
62. The vSwitch or vSwitch port group policy setting that allows a virtual machine to transmit packets that
contain a MAC address other than the address defined for the VM is:
A. Promiscuous Mode
B. Forged Transmits
C. Traffic Shaping
D. MAC Address Changes
Answer: B


63. When an explicit failover order has not been configured on a virtual switch with multiple uplinks, what
determines which uplink is used when a failover event occurs?
A. The first available uplink that reports a positive Link State
B. The uplink with the shortest route
C. The next available uplink on the list
D. The reported uptime for the surviving uplinks
Answer: D
64. When using the Explicit Failover option for a virtual switch with multiple uplinks, ESX determines the
uplink to use in a failover event by:
A. a specified list
B. using beacon probing to discover which uplink has the shortest route
C. using the reported uptime to determine which uplink to select
D. using link state tracking to see which uplinks are connected
Answer: A
65. Beacon Probing is used in vSphere networking to:
A. discover which uplink has the shortest route
B. identify when an upstream link failure has occurred
C. discover alternate default gateway addresses
D. identify which uplink has the longest reported uptime
Answer: B
66. An administrator is building a vNetwork Distributed Switch. Which of the following describes what
happens if an attempt is made to add an uplink to the switch that is in use by a vNetwork Standard Switch?
A. A warning is displayed saying the uplink is currently in use and the uplink cannot be added
B. The uplink is added and any virtual machines that were using the uplink lose connectivity
C. The uplink and the vNetwork Standard Switch are added to the vNetwork Distributed Switch
D. The uplink is added and any virtual machines that were using the uplink are added to the vNetwork
Distributed Switch


Answer: B
67. Which three are valid network load balancing policies for a vNetwork Distributed Switch (Choose
Three)?
A. route based on source IP hash
B. route based on source MAC hash
C. route based on source and destination MAC hash
D. route based on explicit failover order
E. route based on the originating virtual port ID
Answer: BDE
68. The primary VLAN in a Private VLAN is considered:
A. Promiscuous
B. Isolated
C. Community
D. Trunked
Answer: A
69. Which of the following methods can be used to migrate a virtual machine from a vNetwork Standard
Switch to a vNetwork Distributed Switch (Choose Two)?
A. Migrate the port group containing the virtual machine from a vNetwork Standard Switch using the Migrate
Virtual Machine Networking option
B. Drag the virtual machine from the vNetwork Standard Switch to a vNetwork Distributed Switch dvPort
group in the Configuration tab for the ESX Host
C. Edit the Network Adapter settings for the virtual machine and select a dvPort group from the list
D. Select the virtual machine from a list of virtual machines using the Migrate Virtual Machine Networking
option
Answer: CD
70. A vNetwork Distributed Switch is best described as:


A. A single virtual switch that aggregates existing vNetwork Standard Switches
B. A distributed set of vNetwork Standard Switches that allow a virtual machine to maintain a consistent
network configuration between multiple ESX Hosts
C. A single virtual switch shared between multiple ESX Hosts
D. A distributed set of vNetwork Standard Switches on individual ESX Hosts capable of forwarding traffic
between hosts
Answer: C
71. When creating a dvPort group, which of the following port binding options assigns a port to a virtual
machine the first time the virtual machine powers on after it has been connected to the dvPort Group?
A. Static Binding
B. Ephemeral
C. Flexible
D. Dynamic Binding
Answer: D
72. Which of the following network policies is only available with vNetwork Distributed Switches?
A. Traffic Shaping Policy
B. VLAN Policy
C. Port Blocking Policy
D. Security Policy
Answer: C
73. Which of the following describes the functionality of traffic shaping on a vNetwork Distributed Switch?
A. vNetwork Distributed Switches support Best-Effort Traffic Shaping based on Quality of Service (QoS)
B. vNetwork Distributed Switches support Ingress Traffic Shaping only
C. vNetwork Distributed Switches support both Ingress and Egress Traffic Shaping
D. vNetwork Distributed Switches support Egress Traffic Shaping only
Answer: C


74. Suppose you have 10000 Virtual Machines across 2 Datacenters, with approximately 5000 Virtual
Machines in each Datacenter. What is the minimum number of vCenter installations and vNetwork
Distributed Switches required to support this configuration (Choose Two)?
A. 2 vNetwork Distributed Switches per Datacenter
B. 1 vCenter Server
C. 1 vNetwork Distributed Switch per Datacenter
D. 2 vCenter Servers
Answer: AB
75. Suppose you have 10000 Virtual Machines across 2 Datacenters, with approximately 5000 Virtual
Machines in each Datacenter. What is the minimum number of vCenter installations and vNetwork
Distributed Switches required to support this configuration if all virtual machines were powered on (Choose
Two)?
A. 1 vNetwork Distributed Switch per Datacenter
B. 4 64-bit Windows based vCenter Servers in Linked Mode
C. 2 vNetwork Distributed Switches per Datacenter
D. 4 32-bit Windows based vCenter Servers in Linked Mode
Answer: BC
76. Which is an important benefit provided by VLANs?
A. higher tolerance to broken physical hardware
B. improved security
C. improved memory access
D. higher network availability
Answer: B
77. When creating a Service Console port, what is the purpose of the gateway device (Choose Two)?
A. The gateway device is the network adapter used for the default route.
B. A gateway device is required when 2 or more uplinks are using the same subnet.
C. The gateway device is the Service Console port used for VMkernel networking.


D. A gateway device is always required.
Answer: AB
78. Which of the following describe methods of adding Service Console networking to a vNetwork
Distributed Switch (Choose Three)?
A. A Service Console Network Adapter can be created and added to a Standalone Port
B. A Service Console port can be cloned from an existing vNetwork Standard Switch
C. A Service Console Network Adapter can be associated with an existing port group on a vNetwork
Distributed Switch
D. A Service Console port can be migrated from an existing vNetwork Standard Switch
E. A Service Console Network Adapter can be created along with a Service Console port group on the
selected vNetwork Distributed Switch
Answer: ACD
79. An administrator is unable to connect a vSphere Client to an ESXi Host. Which of the following options
can be selected from the Direct Console to restore connectivity without disrupting running virtual machines?
A. Disable the Management Network
B. Restart the Management Agents
C. Restore the Standard Switch
D. Restart the Management Network
Answer: B
80. An administrator is creating a vNetwork Standard Switch with Service Console and VMkernel
networking. The administrator has two uplinks attached to the switch, but wants to separate the Service
Console and VMkernel traffic to the two uplinks. Which of the following Load Balancing Policies will
guarantee this, even if additional management or virtual machine traffic is added to the switch in the future?
A. Route based on the originating port ID
B. Route based on IP hash
C. Use Explicit Failover
D. Route based on source MAC hash


Answer: C
81. In vSphere 4, when multiple Multipathing Plugins (MPPs) exist, the Pluggable Storage Architecture
(PSA) performs which of the following three tasks (Choose Three)?
A. Association of physical paths with logical devices
B. I/O queuing to the logical devices
C. Physical path discovery and removal
D. Management tasks such as abort or reset of logical devices
E. I/O queuing to the physical storage HBAs
Answer: BCE
82. How many paths to a LUN can be simultaneously used when Round Robin multi-pathing is enabled?
A. Round Robin will use only one path to send I/O
B. Round Robin can use up to 4 paths simultaneously to send I/O
C. Round Robin can be set to use additional paths simultaneously for every 1000 blocks of I/O transmitted
D. Round Robin can use up to 2 paths simultaneously to send I/O
Answer: A
83. What are two functions of zoning in Fibre Channel Switches (Choose Two)?
A. Reduces the number of targets and LUNs presented by a Fibre Channel Storage Array
B. Prevents non-ESX Hosts from possibly destroying VMFS data
C. Controls and isolates LUNs on a Fibre Channel Storage Array
D. Restrict connections on a storage array to ESX Hosts that utilize the array
Answer: BD
84. To prevent non-ESX Servers from seeing VMFS datastores, where should LUN masking be configured?
A. on the non-ESX Hosts
B. on the SAN Storage Device
C. on the Fibre Channel Switch
D. on the ESX Host


Answer: B
85. When configuring a FC-SAN with ESX 4, which of the following are valid requirements and/or
recommendations (Choose Two)?
A. Each LUN must present the same LUN ID number to all ESX/ESXi hosts
B. RDMs should not be used to access raw disks from previous ESX 2.5 or 3.x Hosts
C. Virtual machine multipathing software should be used to perform I/O load balancing to individual LUNs
D. Each LUN should contain only one VMFS datastore
Answer: AD
86. What is the maximum number of LUNs that can be assigned per ESX Host?
A. 256
B. 128
C. 255
D. 127
Answer: A
87. An administrator is configuring an ESX Host with 2 Fibre Channel HBAs. The attached FC Storage
Array has two active Storage Processor ports. No zoning is configured. Using Round Robin multipathing,
how many paths are used to send data to a VMFS Datastore at any given time?
A. 2
B. 1
C. 3
D. 4
Answer: B
88. A virtual machine is using a Fibre Channel attached Raw Device Mapped (RDM) LUN. Which of the
following applications used with the virtual machine would require the RDM to be in Physical Compatibility
Mode (Choose Three)?
A. SAN Management Agents


B. Physical Server to Virtual Machine Clustering
C. Storage Array based Replication
D. VMware Snapshots
E. SCSI-target based software
Answer: ABE
89. A virtual machine has been configured with N-Port ID Virtualization. The Guest OS virtual disk is
placed in a RAID5 datastore, while the Production virtual disk is placed in a RAID1+0 datastore. Why
would an administrator consider placing both disks on the same datastore (Choose Two)?
A. VMotion can be used with NPIV enabled virtual machines, but not with disks in multiple datastores
B. Storage VMotion cannot be used on a virtual machine with NPIV enabled
C. VMotion cannot be used on a virtual machine with NPIV enabled
D. Storage VMotion can be used with NPIV enabled virtual machines, but not with disks in multiple
datastores
Answer: AB
90. An administrator finds that a VMotion and Storage vMotion operations do not succeed on a virtual
machine. The virtual machine has been configured with N-Port ID Virtualization. The virtual machine has
two data RDMs, one using a RAID5 LUN and one using a RAID0+1 LUN. When created, the mapping file
for the RAID5 LUN was created on the same datastore as the virtual machine, while the mapping file for the
RAID0+1 LUN was placed in a datastore used for production data virtual disks.
Which of the following statements are true about this configuration (Choose Two)?
A. VMotion cannot be used with NPIV
B. Storage VMotion cannot be used with NPIV
C. VMotion cannot be used unless both mapping files are placed on the same datastore
D. Storage VMotion cannot be used unless both mapping files are placed on the same datastore
Answer: BC
91. When writes from a virtual machine are delivered to a Fibre Channel Storage Array, which of the
following actions is taken by the VMkernel (Choose Three)?


A. The file corresponding to the virtual machine is located on the VMFS datastore
B. The I/O request is converted from binary data form to optical form
C. The modified I/O request is sent from the device driver to the physical HBA
D. The request for blocks on the virtual disk is mapped to blocks on the appropriate physical device
E. The commands are forwarded by the virtual SCSI Controller
Answer: ACD
92. The Runtime Name for a Fibre Channel storage device is equivalent to:
A. The Network Address Authority (NAA) name of the device
B. The name of the current path to the device in vmhba:C:T:L format
C. The Universally Unique Identifier (UUID) to the device
D. The name of the first discovered path to the device in vmhba:C:T:L format
Answer: D
93. How are new LUNs discovered by an ESX Host?
A. A rescan operation is required every time a new LUN is added
B. ESX Server automatically detects new LUNs as they are presented
C. ESX Server periodically performs a rescan operation to detect any new LUNs
D. A reboot operation is required to detect newly presented LUNs
Answer: A
94. What is the maximum number of paths allowed in ESX 4.x for an iSCSI LUN?
A. 4
B. 8
C. 2
D. 16
Answer: B
95. An administrator is configuring software iSCSI multipathing. Which of the following is the minimum
required configuration for Round Robin multipathing?


A. Configure 1 VMkernel port. Bind the port to multiple uplinks on the same virtual switch. Choose the
Round Robin Path Selection Plugin (PSP)
B. Configure 2 VMkernel ports. Connect each port to a unique virtual switch with uplinks on separate
subnets. Choose the Round Robin Path Selection Plugin (PSP)
C. Configure 1 VMkernel port. Connect the port to a switch with multiple uplinks. Choose the Round
Robin Path Selection Plugin (PSP)
D. Configure 2 VMkernel ports. Bind each port to a different uplink on the same virtual switch. Choose
the Round Robin Path Selection Plugin (PSP)
Answer: D
96. Which of the following steps, required for iSCSI software multipathing, must be performed using the
esxcli interface?
A. Binding the VMkernel ports to the selected uplinks
B. Connecting the iSCSI software initiator to the VMkernel ports
C. Connecting the VMkernel ports to the virtual switch
D. Configuring Dynamic Discovery for the iSCSI software initiator
Answer: B
97. Which of the following CHAP Authentication mechanisms is available when using Software iSCSI, but
not Hardware iSCSI?
A. Per-Subnet CHAP
B. One-way CHAP
C. Mutual CHAP
D. Per-Target CHAP
Answer: C
98. Which of the following components must be modified in order to enable Jumbo Frame support for the
Software iSCSI Initiator (Choose Two)?
A. The iSCSI vmhba
B. The VMkernel port


C. The virtual machine port group
D. The virtual switch
Answer: BD
99. Using Hardware iSCSI Initiators with ESX/ESXi hosts allows which of the following tasks to be offloaded
from the VMkernel?
A. Issuing SCSI commands to the virtual disk
B. Encapsulation of I/O requests into iSCSI Protocol Data Units (PDUs)
C. Encapsulation of iSCSI PDUs into TCP/IP packets
D. Mapping requests for blocks on the virtual disk to blocks on the appropriate physical device
Answer: B
100. Using Hardware iSCSI Initiators with ESX/ESXi hosts allows which of the following tasks to be
offloaded from the VMkernel (Choose Two)?
A. Encapsulation of I/O requests into iSCSI Protocol Data Units (PDUs)
B. Mapping requests for blocks on the virtual disk to blocks on the appropriate physical device
C. Encapsulation of iSCSI PDUs into TCP/IP packets
D. Issuing SCSI commands to the virtual disk
Answer: AC
101. A company wants to increase disk capacity for their VMware vSphere environment. Management
mandates that:
(1) VMotion must work in this environment
(2) the existing LAN infrastructure must be used
(3) the storage must support VMFS volumes
Which storage option would best meet company objectives?
A. NFS
B. Fibre Channel
C. iSCSI
D. SATA


Answer: C
102. Which of the following is true about use of the delegate user functionality that enables access to NFS
devices using non-root credentials?
A. The functionality is not supported with ESX or ESXi 4.x
B. The functionality is experimental in ESX and ESXi 4.x
C. The functionality is fully supported in ESX and ESXi 4.x
D. The functionality is supported in ESX, but not in ESXi 4.x
Answer: A
103. Virtual Disks created on NFS datastores are:
A. in a format dictated by the NFS Server
B. zeroedthick
C. thin
D. thick
Answer: A
104. An ESX Host gains exclusive access to Virtual Machines created on NFS datastores using:
A. SCSI Reservations
B. a special .lck-XXX lock file
C. NFS File Locking Protocol
D. Distributed File Locking
Answer: B
105. What is the default port used by iSCSI in a VMware vSphere environment?
A. 902
B. 2049
C. 443
D. 3260
Answer: D


106. An ESX Server is configured to access an iSCSI target using CHAP authentication. What happens to
the access if CHAP is disabled on the ESX Host?
A. Access is immediately removed
B. Access is unaffected until either the ESX Server or the iSCSI Array are restarted
C. Access is removed on the next rescan
D. Access is unaffected until the ESX Server is restarted
Answer: B
107. What is the maximum configurable number of NFS datastores that can be mounted to an ESX/ESXi 4
Host?
A. 8
B. 64
C. 32
D. 16
Answer: B
108. Which of the following features can be used in combination with Network Attached Storage (Choose
Three)?
A. VMware HA
B. Virtual Machine Snapshots
C. Storage VMotion
D. Raw Device Mapping
E. MSCS Clustering
Answer: ABC
109. When you delete a VMFS datastore, it is destroyed and disappears from:
A. all hosts in the same DRS/HA cluster
B. the storage device containing the datastore
C. only the host that you have deleted it from


D. all hosts with connectivity to the datastore
Answer: D
110. When you delete a VMFS datastore from an ESX Host, which of the following occurs?
A. all hosts that were configured to use the datastore will no longer see the datastore and it is deleted from
the storage device
B. all hosts that were configured to use the datastore will no longer see the datastore, but it will remain on
the storage device and can be remounted as needed
C. the datastore will no longer be available to the host that it was deleted from, but all other hosts that were
configured to use the datastore will remain connected
D. only hosts in the same DRS/HA cluster no longer see the datastore, but it will remain on the storage
device and can be remounted as needed
Answer: A
111. Which of the following is a valid object to add an extent to?
A. an available unused storage volume
B. an existing VMFS or NFS datastore
C. an existing VMFS datastore
D. an existing NFS datastore
Answer: C
112. By default, VMware supports the following Path Selection Policies (Choose Three):
A. Fixed
B. MRU (Most recently used)
C. Least Busy
D. Round Robin
E. Least I/O
Answer: ABD
113. Raw Device Mapping using Physical Compatibility Mode is supported with which of the following


vSphere features (Choose Two)?
A. Cloning
B. VMotion
C. Virtual Machine Snapshots
D. High Availability (HA)
Answer: BD
114. Which two statements are true about shared storage capabilities on NFS datastores supported by ESX
Server (Choose Two)?
A. You can use Storage VMotion to move virtual machines between NFS datastores
B. You can create Raw Device Mapped (RDM) virtual disks on NFS datastores
C. You can use VMware Consolidated Backup with an NFS datastore
D. You can cluster virtual machines using MSCS across ESX Servers using an NFS datastore
Answer: AC
115. Which version of NFS does ESX Server require?
A. version 2 over TCP
B. version 3 over UDP
C. version 3 over TCP
D. version 2 over UDP
Answer: C
116. What is the maximum number of VMFS datastores that can be configured per ESX Host?
A. 256
B. 128
C. 1024
D. 512
Answer: A
117. Which of the following types of datastores can be unmounted (Choose Two)?


A. VMFS datastore copies mounted with resignaturing
B. VMFS datastore copies mounted without resignaturing
C. Any NFS datastore
D. Only NFS datastores configured as Read Only
Answer: BC
118. When planning storage for a Virtual Infrastructure, an administrator chooses a 4MB block size for the
VMFS datastore. What is the largest virtual disk that can be created on this datastore?
A. 1TB minus 512B
B. 256GB minus 512B
C. 512GB minus 512B
D. 2TB minus 512B
Answer: A
119. Which of the following statements characterize the VMware Virtual Machine File System (VMFS)
(Choose Two)?
A. SCSI commands issued by virtual machines are passed through to the VMFS file system
B. The VMFS is optimized to run multiple virtual machines as a single workload
C. SCSI commands issued by virtual machines are translated at the virtualization layer to VMFS file
operations
D. The VMFS prioritizes single virtual machine workloads for optimal performance
Answer: BC
120. What are two benefits of Virtual Compatibility Mode for RDMs, as compared to Physical Compatibility
Mode (Choose Two)?
A. Allows for template creation of the related virtual machine
B. Allows for cloning
C. Allows for the use of array-based snapshots
D. Allows the use of SAN-aware applications
Answer: AB


121. Which of the following are accurate descriptions of the Predictive and Adaptive Schemes for placing
VMFS datastores (Choose Two)?
A. The Predictive Scheme utilizes several LUNs with different storage characteristics
B. The Predictive Scheme utilizes a small number of large LUNs
C. The Adaptive Scheme utilizes a small number of large LUNs
D. The Adaptive Scheme utilizes several LUNs with different storage characteristics
Answer: AC
122. A VMFS datastore with several running virtual machines is nearing 100% capacity. An administrator
intends to grow the datastore so that existing virtual machines will have room for re-sizing, thin provisioning
and snapshots. Which action can be taken to provide additional capacity for these functions?
A. Add an Extent to the existing Datastore from an ESX Host running the virtual machines in the datastore
B. Add an Extent to the existing Datastore from the Datastore section in vCenter
C. Use VMFS Volume Grow from an ESX Host running the virtual machines in the datastore
D. Use VMFS Volume Grow from the Datastore section in vCenter
Answer: C
123. Which of the following are modules that are not pre-installed and must be added to a vCenter
installation (Choose Three)?
A. VMware vCenter Converter
B. VMware vCenter Guided Consolidation
C. VMware vCenter Orchestrator
D. VMware vCenter Update Manager
E. VMware vCenter Storage Monitoring
Answer: ABD
124. vCenter Server allows you to centrally manage hosts and use which of the following services that
would otherwise be unavailable (Choose Three)?
A. High Availability (HA)


B. Resource Pools
C. Distributed Resource Scheduler (DRS)
D. Data Recovery
E. Host Health Status
Answer: ACD
125. Which of the following are valid reasons for deploying vCenter Server in a virtual machine (Choose
Three)?
A. vCenter Server must be deployed as a virtual machine to be migrated using VMotion
B. vCenter Server must be deployed as virtual machines to join a Linked Mode group
C. vCenter Server must be deployed as a virtual machine to support failover using Site Recovery Manager
D. vCenter Server must be deployed as a virtual machine to be protected by High Availability
E. vCenter Server must be deployed as a virtual machine to back it up using vCenter Data Recovery
Answer: ADE
126. What is the maximum number of ESX/ESXi Hosts that can be managed with vCenter Foundation?
A. 10
B. 6
C. 5
D. 3
Answer: D
127. When configuring the Oracle Connection to work remotely with vCenter Server, which of the following
is required (Choose Two)?
A. The tnsnames.ora file must be edited with the managed host name
B. The TNS Service Name option must be configured in the ODBC DSN
C. Use the Net8 Configuration Utility to add the service name
D. Add the entry open_cursors = 300 to the C:.ora file
Answer: AB


128. An administrator is installing vCenter in a virtual machine. The selected database is Microsoft SQL
Server 2005. Which of the following actions must be taken before vCenter is installed (Choose Two)?
A. If the guest OS has MSXML Core Services 6.0 installed, it must be removed
B. The Microsoft SQL Native Client should be removed
C. The Microsoft SQL Server Client should be removed
D. If the guest OS is Windows XP, MDAC 2.8 SP1 must be applied
Answer: AD
129. An administrator is installing vCenter. The selected database is Oracle 11g. Which of the following
steps are required to configure the database for use with vCenter (Choose Two)?
A. Use a Script to Create the Oracle Database Schema
B. Use a Script to Create a Local or Remote Database
C. Configure an Oracle Database User
D. Configure an Oracle Connection for Local or Remote Access
Answer: CD
130. Which of the following are prerequisites for installing vCenter Server (Choose Three)?
A. The system vCenter is installed on can be in a workgroup or a domain
B. The system vCenter is installed on must belong to a domain
C. The system vCenter is installed on must be a physical server
D. The system vCenter is installed on can be a virtual machine or physical server
E. The system vCenter is installed on must have a Static IP address or be registered with DNS if using
DHCP
Answer: BDE
131. An administrator is creating a database for a vCenter installation. Approximately how much
additional space is needed for every 50 virtual machines being managed, assuming statistic collection is at
the default level?
A. 500MB
B. 100MB


C. 700MB
D. 1GB
Answer: C
132. An administrator is installing a vCenter Server to manage 10 ESX hosts and 100 virtual machines.
Approximately how much additional space is required to increase the statistic collection level to maximum
for all collection periods compared to a standard installation?
A. 6GB
B. 2GB
C. 1GB
D. 4GB
Answer: A
133. Which of the following are valid use cases for vCenter Server Linked Mode for a vCenter server
installed on a 32-bit guest (Choose Two)?
A. An administrator wants to view Service Status for all vCenter Server inventory objects from one Client
B. An administrator wants to migrate virtual machines between vCenter Servers
C. An administrator wants to define permissions once and have them applied to all vCenter Servers
D. The environment has 400 ESX Hosts
Answer: AD
134. During the installation of vCenter Server, if you choose Join Group, which of the following actions is
taken:
A. The vCenter Server is joined to a Linked Mode group
B. The vCenter Server is clustered with an existing vCenter Server for high availability
C. The /etc/group file on ESX Hosts managed by vCenter Server are configured for vpxuser authentication
D. The vCenter Server is configured for VMware Fault Tolerance
Answer: A
135. Which of the following vCenter plugins are installed with a default vCenter installation (Choose


Three)?
A. VMware vCenter Service Status
B. VMware vCenter Storage Monitoring
C. VMware vCenter Update Manager
D. VMware vCenter Hardware Status
E. VMware vCenter Converter
Answer: ABD
136. Using the Plug-In Manager, which of the following actions can be taken (Choose Two)?
A. Enable an installed Plug-in
B. Configure permissions for a Plug-in
C. View available Plug-ins that are not installed
D. Remove an installed Plug-in
Answer: AC
137. An administrator wants to monitor the health status of an ESX Host. When the host is highlighted in
the vSphere Client, the Hardware Status tab is not visible. Which of the following explains the problem
and the action needed to resolve this issue?
A. The name of the vCenter Server system could not be resolved. Fix the DNS issue or edit the
extensions.xml file and replace the vCenter Server name with the IP address
B. Alarm Actions have not been enabled for this host. Right-Click the host and choose Enable Alarm
Actions from the Alarm option
C. The vCenter Hardware Status Plug-in is not enabled. Enable the Plug-in using the Plug-in Manager
D. The security settings for Internet Explorer are too high. Allow scripting of Internet Explorer Web
Browser must be set to Enabled
Answer: C
138. An administrator wants to restrict the ability of selected administrators to install plug-ins in their
vSphere Client applications. Which of the following would accomplish this?


A. Right-Click on the plug-in under Manage Plug-ins and choose Disable
B. Remove the plug-in or plug-ins from the vCenter Server
C. Modify permissions for the administrators and remove the Register Extension privilege
D. Modify the extensions.xml file and remove the unwanted plug-ins
Answer: C
139. Using the vSphere Client, which of the following actions can be scheduled through the New Task
Wizard (Choose Two)?
A. Change the power state of a host
B. Add a host
C. Enter Maintenance Mode
D. Create a snapshot of a virtual machine
Answer: BD
140. Which of the following Power Management settings can be configured from the Options tab of a Virtual
Machine (Choose Two)?
A. Suspend the Virtual Machine
B. Shutdown the Guest OS
C. Power off the Virtual Machine
D. Put the Guest OS in Standby
Answer: AD
141. Which of the following are default displayed fields when viewing a report for a VMFS Datastore in the
Storage Views tab (Choose Two)?
A. Virtual Disk Space
B. Swap Space
C. Space Used
D. Multipathing Redundancy for VM
Answer: CD


142. Which of the following is information that can be obtained about a VMFS Datastore using Storage
Views in the vSphere Client (Choose Two)?
A. vmhba Adapter used to access the datastore
B. Runtime Name of the datastore
C. Space Used in the datastore
D. Multipathing Status for the datastore
Answer: CD
143. An administrator wants to export a Map from vCenter to edit and place into support documentation.
Which of the following are valid formats for the export (Choose Two)?
A. .BMP
B. .CAD
C. .JPG
D. .VSD
Answer: AC
144. An administrator wants to enable Guest Customization in vCenter Server for various Windows and
Linux virtual machines. Which of the following steps must be performed on the vCenter Server and in the
guest virtual machines (Choose Two)?
A. The Windows guest OS must be Windows NT4, 2000, 2003 or 2008
B. Perl must be installed in the Linux guest OS
C. The Linux Open Source tools must be added to the vCenter Server
D. Microsoft Sysprep tools must be placed on the vCenter Server
Answer: BD
145. An administrator is configuring vCenter Server to support e-mail notification. Which of the following
parameters must be configured in the vCenter Server settings (Choose Two)?
A. Sender e-mail address
B. SNMP address information
C. SMTP server information


D. Receiver e-mail address
Answer: AC
146. Which of the following resources can be viewed using the vCenter Maps (Choose Two)?
A. Network Resources
B. Datastore Resources
C. Host Resources
D. HA Resources
Answer: BC
147. On an ESX Host, a particular user is assigned the Administrator role. However, when that user logs
into the vCenter Server, he has Read Only permissions.
What most likely caused this?
A. The permissions assigned on the ESX Server will not update in vCenter until the next scheduled update
interval
B. The ESX Server is not joined to the Active Directory domain
C. The user has Read Only permissions specifically assigned to an item, which overrides propagated
permissions
D. ESX Server permission assignments do not propagate to the vCenter Server
Answer: D
148. Which vCenter Server role, by default, has performance privileges?
A. Virtual Machine Power User
B. Resource Pool Administrator
C. Virtual Machine Administrator
D. Datacenter Administrator
Answer: C
149. Which pre-defined vCenter Server role can assign permissions to users?
A. Administrator


B. Virtual Machine Power User
C. Datacenter Administrator
D. Resource Pool Administrator
Answer: A
150. Which of the following are not valid permissions for a Datacenter Administrator (Choose Two)?
A. Create a Virtual Machine
B. Add a Host
C. Assign Permissions to a user
D. Create a Resource Pool
Answer: AC
151. Which of the following are valid permissions for a Resource Pool Administrator (Choose Two)?
A. Assign a vApp to a Resource Pool
B. Modify Permissions
C. Move a Resource Pool
D. Add a Host to a Cluster
Answer: BC
152. When cloning a role, which of the following applies (Choose Two)?
A. The cloned role is applied to the same users and groups as the original role
B. The cloned role is not applied to the same users or groups as the original role
C. The cloned role can be edited during the cloning process to adjust the privileges in the role
D. The cloned role contains all of the same privileges as the original role
Answer: BD
153. When an existing role that has been assigned to users is removed from vCenter Server, which of the
following can occur (Choose Two)?
A. Users or groups retain the removed role until they are manually assigned a new role
B. Users or groups can be reassigned to any available role


C. Users or groups that had privileges may no longer have any permissions in vCenter
D. Users or groups are automatically assigned to the next most restrictive role available
Answer: BC
154. Assuming a user or a group is assigned a single vCenter Server role, if the role is then removed, which
of the following occurs?
A. Users or groups are automatically assigned the Read Only role until an administrator can manually
assign a new role
B. Users or groups retain the permissions associated with the removed role until they are manually
assigned a new role
C. Users or groups assigned the removed role no longer have any permissions in vCenter
D. A role assigned to existing users or groups cannot be removed until all users or groups are removed from
the role
Answer: C
155. By default, if you remove a user from an Active Directory domain who is currently logged in to vCenter
Server, which of the following actions is taken?
A. The user can remain logged in indefinitely, but once they log out they cannot log back in
B. The user can remain logged in for up to 24 hours
C. The user is logged out of vCenter Server and cannot log back in
D. The user is given a warning they are about to be logged out and given a 1 hour grace period
Answer: B
156. When assigning a user permissions on an ESX Server, which of the following objects cannot be
assigned permissions (Choose Two)?
A. Resource Pools
B. Hosts
C. Folders
D. Virtual Machines
Answer: CD


157. What is a valid use case for the No Access role?
A. An administrator wants to prevent a user from launching the vSphere Client
B. An administrator wants to allow only the status of an object to be viewed, but provide no other access
C. An administrator wants to revoke permissions on an object that would otherwise be propagated
D. An administrator wants to allow the state and details of an object to be viewed, but provide no other
access
Answer: C
158. The OVF format allows virtual machine templates to be:
A. converted
B. transported
C. automated
D. upgraded
Answer: B
159. An administrator wants to use standard images for virtual machine deployment. What are two
benefits that can be achieved by creating these images as templates (Choose Two)?
A. easier to upgrade and manage multiple VMs
B. templates deploy faster than cloning
C. base images cannot be directly modified
D. less disk space used for base images
Answer: CD
160. What is a characteristic of a mapped SAN LUN (RDM) set to Physical Compatibility mode?
A. allows the virtual machine to use VMware snapshots
B. allows the LUN to be made into a template
C. allows the guest operating system to access the hardware directly
D. allows the VMkernel to natively access NTFS data on the LUN
Answer: C


161. Which of the following system images is not a supported import option for vCenter Converter?
A. Acronis True Image 9/10 (.tib)
B. VMware Consolidated Backup (VCB) full backup images
C. Altiris Image File (.img)
D. Norton Ghost 9/10/12 (.gho)
Answer: C
162. An administrator wishes to cold clone a physical server using vCenter Converter. What is the
minimum amount of RAM required for this operation?
A. 264 MB
B. 128 MB
C. 256 MB
D. 136 MB
Answer: A
163. vCenter Converter allows the following type of conversions (Choose Three):
A. Disk Image to Virtual
B. Virtual to Physical
C. Virtual to Virtual
D. Physical to Virtual
E. Physical to Disk Image
Answer: ACD
164. vCenter Converter supports the following types of cloning (Choose Two):
A. Local
B. Remote
C. Imaged
D. Staged
Answer: AB


165. To convert a remote physical machine vCenter Converter requires the following TCP ports to be open:
A. 139, 902 and 905
B. 137, 443 and 902
C. 138, 443, 902 and 905
D. 139, 443, 445 and 902
Answer: D
166. Which of the following indicates how suitable an analyzed system is for Guided Consolidation?
A. Performance Factor
B. Suitability Metric
C. Confidence Metric
D. Consolidation Factor
Answer: C
167. Guided consolidation shows you the following information after a successful analysis (Choose Two):
A. Memory Utilization
B. Hardware Profile
C. Network Usage
D. CPU Clock Speed
Answer: AD
168. What is the maximum number of systems guided consolidation can simultaneously analyze?
A. 250
B. 1000
C. 500
D. 100
Answer: D
169. The recommended maximum memory value displayed when configuring a VM represents:


A. The threshold needed in order for the ESX Host to satisfy a reservation value
B. The value that the OS vendor reports as being optimal for performance
C. The maximum value the guest OS supports
D. The threshold above which a host's physical memory is insufficient to run the virtual machine at optimal
performance
Answer: D
170. In Guided Consolidation, a higher Confidence Metric indicates which of the following?
A. The displayed destination ESX Server is the best fit from all available ESX Servers
B. A given destination ESX Server is a better fit for the source machine
C. The source machine is a better candidate for virtualization
D. The data collected from the source machine is more reliable
Answer: D
171. During Guided Consolidation, how is disk space for the virtual machine calculated?
A. The virtual machine disk is sized to the amount of data contained on the source disk
B. The virtual machine disk is sized to 125% of the data contained on the source disk
C. Guided Consolidation prompts for the virtual machine disk size during conversion
D. The virtual machine disk is equal in size to the source disk
Answer: B
172. Which of the following are valid conditions for installing the Paravirtualized SCSI (PVSCSI) adapter in
a guest (Choose Two)?
A. The Guest Operating Systems can be any guest that supports Paravirtualization
B. The adapter should be used with the data virtual disk
C. The Guest Operating System must be Windows 2003,2008 or RHEL 5
D. The adapter should be used with the OS virtual disk
Answer: BC
173. When attempting to VMotion migrate a newly built running virtual machine, the migration fails. Which


of the following conditions would cause a failed migration under these conditions?
A. VMI Paravirtualization Support has been enabled for the virtual machine, but is not supported on the
target host
B. The source host supports hyperthreading, but the target host does not
C. NPIV has been enabled on the virtual machine, and VMotion is not supported with NPIV
D. The number of processor cores differs between the source and target hosts
Answer: A
174. Which of the following network drivers is only supported with Virtual Machine version 7?
A. Flexible
B. Enhanced vmxnet
C. E1000
D. vmxnet3
Answer: D
175. A virtual machine has been created using the Typical option. What specific configuration options will
be skipped during virtual machine creation (Choose Three)?
A. Resource Pool
B. Virtual Memory configuration
C. Virtual Machine version
D. Number of vCPUs
E. Datastore location
Answer: BCD
176. An administrator is creating a VM that will be running Windows 2008 Enterprise (64-bit). The
application to be installed in the VM requires 8 vCPUs to run effectively. During installation, the only
available options are 1,2,3 or 4 vCPUs. Which of the following explains the available vCPU selections?
A. The Virtual Machine Version is 7
B. 8 vCPU support is only available for 32-bit guest OS VMs
C. The ESX Host has 2 Intel dual-core CPUs


D. The ESX Host has 2 AMD dual-core CPUs
Answer: D
177. An administrator is using Guided Consolidation and has added a system for Analysis. After 30
minutes, the status has not changed from Collecting System Information to Analyzing. Which of the
following statements indicates why this might occur?
A. The status change should be immediate and the Guided Consolidation Service status should be checked
on the vCenter Server
B. Guided Consolidation can take up to 8 hours to collect system information before the status changes to
Analyzing
C. Guided Consolidation can take up to 1 hour to collect system information before the status changes to
Analyzing
D. Guided Consolidation can take up to 24 hours to collect system information before the status changes to
Analyzing
Answer: C
178. Company X wants to install Application Y in a virtualized environment. The underlying operating
system has to be Windows 2003 SP1. In a physical environment, the application and supporting software
have very strict minimum hardware requirements.
Which requirement(s) would prohibit the use of this application inside a virtual machine?
A. a minimum disk size of 2 TB
B. a minimum of 4 available SCSI adapters
C. 3 NICs and 3 SCSI adapters
D. 4 CPUs and 4.5 GB RAM
Answer: C
179. The maximum available memory for a Virtual Machine in vSphere 4.0 is:
A. 256GB
B. 128GB
C. 512GB


D. 255GB
Answer: D
180. In order to reach the BIOS of a Virtual Machine (Choose Two):
A. The System Administration can power on the Virtual Machine and press F2 as the VM starts up
B. The System Administrator can manually edit the .NVRAM file in the Virtual Machine's home directory
C. The System Administrator can force the Virtual Machine to boot into the BIOS by changing a Virtual
Machine property
D. The System Administrator can edit the .vmx settings for the Virtual Machine
Answer: AC
181. An administrator has a mixture of Intel-based ESX Hosts in a DRS cluster where the CPUs are
compatible in every way except that some support the NX/XD feature and some do not.
What can you do to minimize the effect of these differences (Choose Two)?
A. Mask the NX/XD bit on every virtual machine in the cluster
B. Enable enhanced VMotion compatibility
C. Mask the NX/XD bit in the Processor section of the Configuration tab on the ESX Hosts
D. Enable Rapid Virtualization Indexing
Answer: AB
182. Windows VM's use a page file and Linux VM's use a swap partition for virtual memory. When
determining the appropriate size for these, which of the following files would be affected?
A. the .vswp file
B. the .vmdk file
C. the -flat.vmdk file
D. the Service Console swap partition
Answer: C
183. When is the page file for a Windows guest OS or the swap partition for a Linux guest OS created?
A. When the Virtual Machine is created


B. When a Virtual Machine is first powered on
C. When the Guest OS is installed on the Virtual Machine
D. When a reservation is set for the Virtual Machine
Answer: C
184. What does the Virtualized Memory Management Unit (MMU) do and what is it required for (Choose
Two):
A. Virtualized MMU enables Hardware Page Table Virtualization
B. Virtualized MMU is required for the vmmemctl driver
C. Virtualized MMU is required for Virtual Machine Direct Path PCI devices
D. Virtualized MMU enables memory reclamation from the guest OS
Answer: CD
185. What is the size of a Virtual Machine .vswp file if defaults are taken for the VM reservations, limits, and
shares?
A. The VM .vswp file is equal to twice the amount of available memory configured for the VM when it was
created
B. The VM .vswp file is set to zero length when the VM is created and grows as necessary
C. The VM .vswp file is equal to the amount of virtual memory (VM available memory plus VM overhead)
configured for the VM when it was created
D. The VM .vswp file is equal to the amount of available memory configured for the VM when it was created
Answer: D
186. Which action can be successfully performed when multiple datacenters are configured in vCenter
Server?
A. Virtual Machines can exist on hosts in a DRS cluster that spans datacenters
B. Virtual Machines in one datacenter can be cloned to another datacenter
C. Virtual Machines in one datacenter can be VMotion migrated to another datacenter
D. Virtual Machines can be failed over to another datacenter (using HA)
Answer: B


187. You may create a new vApp under the following three conditions (Choose Three):
A. CPU and memory resources have been allocated in the Resource Allocation page.
B. A folder is chosen in the Virtual Machines and Templates view.
C. A DRS-enabled cluster is chosen in the inventory.
D. A host is selected in the inventory that is running ESX 3.0 or greater.
E. Startup and shutdown options have been defined in Service Settings on the summary page.
Answer: BCD
188. You may create a new vApp under which of the following conditions (Choose Two):
A. The ESX Server hosting the vApp must in a DRS-enabled Cluster
B. The ESX Server can be a standalone host or reside in a DRS Cluster
C. The ESX Server can be version 3.0 or later
D. The ESX Server must be version 4.x
Answer: AD
189. An administrator is editing the IP Allocation Policy for a vApp. Which of the following three options
are available (Choose Three)?
A. Automatic
B. Roaming
C. DHCP
D. Fixed
E. Transient
Answer: CDE
190. Which of the following two options cannot be edited if Appliance Options are disabled (Choose Two)?
A. Resources
B. License Agreement
C. Startup and Shutdown
D. Properties


Answer: BD
191. Which of the following options cannot be edited if vApp Options is disabed in the Options tab for a
Virtual Machine that is part of a vApp (Choose Two)?
A. vApp Startup and Shutdown Options
B. IP Allocation Policy
C. OVF Environment Transport
D. vApp Resources
Answer: BC
192. What is the maximum number of characters that can be used when naming a vApp?
A. 60
B. 80
C. 120
D. 40
Answer: B
193. Which of the following are valid objects to place in a vApp (Choose Three)?
A. Resource Pools
B. vApps
C. Virtual Machines
D. Folders
E. Hosts
Answer: ABC
194. Which of the following are valid default upgrade baselines included with vCenter Update Manager
(Choose Two)?
A. Host Upgrade to Latest
B. VMFS Upgrade to Match Host
C. VMware Tools Upgrade to Match Host


D. VA Upgrade to Latest
Answer: CD
195. Which of the following are valid severity levels for Update Manager (Choose Three)?
A. Non-Critical
B. Critical
C. Host General
D. Low
E. Host Critical
Answer: BCD
196. Which of the following are valid severity levels for host updates in vCenter Update Manager (Choose
Three)?
A. Important
B. Security
C. Critical
D. Moderate
E. General
Answer: BCE
197. Following a Remediation with Update Manager, the following error is displayed:
Failed to remediate DBVM virtual machine because of an invalid state: Unknown
Which of the following actions will allow the virtual machine to be successfully remediated?
A. Power Off the virtual machine
B. Repeat the Remediation process
C. Restart the Update Manager Service
D. Restart the virtual machine
Answer: D
198. Which of the following is a valid example of a vCenter Update Manager Orchestrated Upgrade?


A. A virtual machine upgrade that upgrades VM hardware, VMware Tools and patches the guest OS all at
once
B. A virtual machine upgrade that upgrades VM hardware and VMware Tools in a staged manner with no
VM downtime
C. A host upgrade that upgrades multiple ESX/ESXi hosts in a staged manner with no Host downtime
D. A host upgrade that upgrades and patches ESX hosts, preserving the existing Service Console and any
added applications or components
Answer: A
199. Which of the following objects can be updated using vCenter Update Manager (Choose Three)?
A. VCB Images
B. Templates
C. Windows, Linux and Solaris Virtual Machines
D. ESX and ESXi Hosts
E. Virtual Appliances
Answer: BDE
200. An administrator has a 6 node DRS cluster. Using vCenter Update Manager, what is the maximum
number of host upgrade operations that can be performed at any given time in this cluster?
A. 2
B. 8
C. 4
D. 1
Answer: D
201. An administrator finds that scans on virtual machines that were part of a recently completed
remediation show that they are still non-compliant. The remediation shows that it completed successfully
on the remaining virtual machines. Which of the following are possible causes (Choose Two)?
A. VMware Tools is not installed on the affected virtual machines
B. Insufficient disk space exists on the virtual machine for one or more updated in the baseline


C. The updates that are part of the baseline conflict with running applications
D. The updates that are part of the baseline are not applicable to the affected virtual machines
Answer: BC
202. Which of the following are valid sub-profile configurations that may be edited with the Host Profile
editor (Choose Three)?
A. Advanced
B. Virtual Machine Options
C. Security
D. Memory Reservation
E. CPU Reservation
Answer: ACD
203. An administrator is checking a HA/DRS Cluster for Compliance. Which of the following occurs if a
host profile is not attached to the cluster?
A. The compliance check asks for a valid host profile
B. The compliance check uses the default Datacenter host profile
C. The compliance check generates an error
D. The cluster is checked for specific HA, DRS and DPM cluster requirements
Answer: D
204. Which of the following would prevent the application of a Host Profile to an ESX Host (Choose Two)?
A. The host is an ESXi Host
B. The host has not been placed into Maintenance Mode
C. The host has multiple profiles attached
D. The host is an ESX 3.5 Host
Answer: BD
205. Which of the following are valid methods of creating a Host Profile (Choose Two)?
A. Create a profile using the Profile Editor


B. Create a profile from an existing ESX 4 Host
C. Import a profile from an existing .vpf file
D. Clone a profile from an existing profile
Answer: BC
206. (Click the Exhibit button)
1776317154.jpg
The information shown in the exhibit must be configured to support which cluster feature?
A. HA
B. EVC
C. DRS
D. DPM
Answer: D
207. An ESX Server in a DRS cluster is placed into Maintenance Mode. Which of the following conditions
are true (Choose Two)?
A. If the DRS cluster is in partially automated mode then the vCenter Administrator must VMotion Virtual
Machines to another ESX Server
B. If the DRS cluster is in fully automated mode, DRS will automatically VMotion Virtual Machines to other
ESX Servers
C. If the DRS cluster is in partially automated mode then the Virtual Machines that have a High Restart
Priority will be moved to another ESX Server
D. If the DRS cluster is in fully automated mode, DRS will make a migration recommendation and then
VMotion Virtual Machines to other ESX servers
Answer: AB
208. Which of the following can be configured or modified from the Resource Allocation tab of a DRS
Cluster (Choose Two)?
A. share priority for resource pools in the cluster
B. virtual machine CPU share value


C. expandable reservation for resource pools in the cluster
D. virtual machine memory reservation
Answer: BD
209. Which of the following is true regarding a mixed DRS cluster with Intel and AMD based ESX Hosts
(Choose Two)?
A. VMware DRS can load balance running virtual machines using all hosts in the cluster
B. Storage VMotion will function with any host in the cluster
C. VMotion can move live virtual machines between any two hosts in the cluster
D. VMware HA will failover virtual machines to any host in the cluster
Answer: BD
210. In configuring a VMware HA Cluster the System Administrator can configure Admission Control.
There are two options: Prevent VMs from being powered on if they violate availability constraints, or Allow
VMs to be powered on even if they violate availability constraints. If the System Administrator chooses the
option Prevent VMs from being powered on if they violate availability constraints then which of the following
apply in the event of an ESX Host failure (Choose Two)?
A. VMware HA restarts Virtual Machines on surviving hosts with the most unreserved capacity
B. Virtual Machines running on failed ESX Hosts will not be restarted on surviving ESX Hosts
C. VMware HA enforces the failover capacity defined for the cluster
D. Only Virtual Machines with a high restart priority will be restarted on surviving ESX Hosts
Answer: AC
211. Assuming the appropriate HA configuration options have been selected, which of the following
situations would result in VMware HA restarting virtual machines (Choose Two)?
A. An ESX Server in the cluster becomes isolated from the network
B. An ESX Server in the cluster is put into Maintenance Mode
C. A guest OS is manually powered off
D. A guest OS fails
Answer: AD


212. Which of the following conditions could prevent HA from powering on a virtual machine (Choose Two)?
A. The VM is connected to the ESX Host CD-ROM drive
B. The target host is not compatible with the virtual machine
C. Strict admission control is configured
D. The VM has a low priority setting
Answer: CD
213. An Administrator is configuring a VMware HA Cluster for three hosts and their resident VMs. The HA
cluster will be configured to support a single host failure and resource considerations must be enforced
during a failover event. To accomplish this task:
A. Each host in the cluster must be able to accommodate the VM with the largest configured available
memory
B. All potential remaining hosts during a failure event must be able to accommodate the sum total of all VM
memory configurations
C. There must be enough cluster resources based on memory and CPU reservations to account for any
potential host failure
D. Each host in the cluster must be able to accommodate the VM with the highest CPU limit value
Answer: C
214. An administrator is configuring a VMware HA Cluster for three hosts and their resident VMs. The HA
cluster will be configured to support a single host failure and resource reservations must be enforced during
a failover event. Assuming default settings, how does HA determine the failover capacity determined?
A. Using the highest CPU Reservation and the Available Memory values for any given virtual machine in
the cluster
B. Using an average of the total CPU Reservation and Available Memory values of all virtual machines in
the cluster
C. Using an average of the total CPU Reservation and Memory Reservation values of all virtual machines in
the cluster
D. Using the highest CPU Reservation and Memory Reservation values of any given virtual machine in the


cluster
Answer: D
215. Which of the following are requirements for a fully functional VMware HA cluster (Choose Two)?
A. compatible CPUs in each host
B. sufficient capacity to support at least one host failover
C. access to shared storage from all hosts
D. a minimum of 2 Service Console ports
Answer: BC
216. vCenter Server is running within a virtual machine (VM) that is part of a VMware HA and DRS cluster.
The vCenter Server VM can migrate between all hosts in the cluster by using VMotion. DRS is configured
for partial automation.
What happens if the ESX host that is currently running the vCenter Server VM experiences a power
outage?
A. VMware HA will restart the vCenter Server VM on another host
B. vCenter Server will remain offline, but all virtual machines on the remaining hosts will continue without
interruption
C. This situation cannot occur because vCenter Server cannot be installed on a VMware HA cluster
D. All DRS cluster operations will be unavailable until the failed ESX Host is brought back online
Answer: A
217. The maximum number of hosts in a VMware HA cluster is:
A. 8
B. 16
C. 32
D. 24
Answer: C
218. Which of the following is the technology used by VMware Fault Tolerance?


A. VMware vSafe
B. VMware vCluster
C. VMware vLockstep
D. VMware vShield
Answer: C
219. Thanks to Anti-affinity rules, VMware Fault Tolerant virtual machines are:
A. Sometimes located on the same host, but only in a powered off state
B. Never located on the same host
C. Sometimes located on the same host if an HA event occurs
D. Never located within the same cluster
Answer: A
220. Which of the following are valid use cases for VMware Fault Tolerance (Choose Three)?
A. An administrator wants to provide continuous availability if a business critical application fails
B. An administrator wants to provide on-demand fault tolerance for a virtual machine during a critical
operation
C. An administrator wants application high availability for applications that are not cluster aware
D. An administrator wants to provide continuous availability if a critical hardware component fails
E. An administrator wants to provide fault tolerance for one or more physical servers
Answer: BCD
221. Which of the following occurs if VMware Fault Tolerance is enabled for a virtual machine in a DRS/HA
cluster, but Host Monitoring is not enabled for VMware HA?
A. If the primary FT VM fails, the secondary FT VM does not take over
B. Anti-affinity rules for the FT VM cannot be upheld and both the primary and secondary FT VM could
reside on the same host
C. If the primary FT VM fails, a new secondary FT VM is not created and the VM is no longer redundant
D. Memory reservations for the FT VM cannot be upheld and there might not be sufficient resources to
restore redundancy if an HA event occurs


Answer: C
222. Which of the following vSphere features cannot be used with virtual machines that are enabled for
VMware Fault Tolerance (Choose Two)?
A. VMware SMP
B. VMware DRS
C. VMware EVC
D. RDMs in Virtual Compatibility Mode
Answer: AB
223. An administrator views the Fault Tolerance pane of the summary tab of a VM and finds that the current
status is Not Protected. Which of the following is a valid reason the VM might not be protected (Choose
Two)?
A. Stopped - Fault Tolerance has been stopped on the Secondary VM
B. Need Primary VM - The Secondary VM is running and a new Primary VM can not be generated
C. Need Secondary VM - The Primary VM is running without a Secondary VM and is not protected
D. Disabled - Fault Tolerance is currently disabled
Answer: CD
224. Establishing a Virtual Machine memory reservation guarantees (Choose Two):
A. Minimum physical memory guaranteed to the Virtual Machine while the VM is running
B. Virtual memory for the VMkernel to start the Virtual Machine
C. Minimum virtual memory guaranteed to the Virtual Machine while the VM is running
D. Physical memory for the VMkernel to start the Virtual Machine
Answer: AD
225. An Administrator notices that when a virtual machine is placed into a resource pool, a warning
indicates that the virtual machine would receive a very large percentage of the total shares for memory.
Which of the following actions could be taken to resolve this problem?
A. Increase the memory resource allocation to the resource pool


B. Change the Shares setting from High to Medium or Low for the virtual machine
C. Change the Shares setting from custom to High, Medium or Low for the virtual machine
D. Increase the Share value for the resource pool
Answer: C
226. An administrator has 2 ESX Hosts, both with a Production and a Test Resource Pool. Which of the
following is true when these hosts are added to a cluster that is not enabled for DRS?
A. The resource pools are grafted into the cluster, resulting in 2 sets of separate Production and Test pools
B. The resource pools are combined into a single Production and a single Test pool for the cluster
C. The resource pools are removed
D. An option is given during the process to graft or combine the pools
Answer: C
227. Click the Exhibit button.
1902682337.jpg
Assuming this is the only virtual machine, and the only resource pool, what is the maximum amount of
memory that could be configured for use by the virtual machine that is part of the Finance Resource Pool?
A. 13375 MB less virtual machine overhead
B. 57 MB less virtual machine overhead
C. 3009 MB less virtual machine overhead
D. 16384 MB less virtual machine overhead
Answer: D
228. With vSphere 4.0 the following operations are possible when working with Virtual Machine disks
(Choose Three):
A. A virtual disk can be inflated from a thin-provisioned virtual disk to thick-provisioned while the Virtual
Machine is powered on
B. A single Virtual Machine cannot use both thick-provisioned and thin-provisioned virtual disks
C. A single Virtual Machine can use both thick-provisioned and thin-provisioned virtual disks
D. A virtual disk can be inflated from a thin-provisioned virtual disk to thick-provisioned but only while the


Virtual Machine is powered off
E. A virtual disk can be converted from thick-provisioned to thin-provisioned while the Virtual Machine is
powered on but only through the use of Storage VMotion
Answer: CDE
229. Resource Pools at the same level are called?
A. Parent Pools
B. Root Resource Pools
C. Child Pools
D. Sibling Pools
Answer: D
230. When adjusting the slider to allocate resources for a Resource Pool, the yellow indicator on the
resource bar indicates:
A. A warning flag set at 75% of the remaining available resources
B. the remaining resources available
C. the recommended resource amount
D. the minimum required resource amount
Answer: B
231. A resource pool exists with a memory reservation of 16GB. The pool has 5 single-processor virtual
machines and 2 dual-processor virtual machines. Each of these VMs has a memory reservation of 2GB.
When an attempt is made to power on the sixth Virtual Machine in the resource pool, a single-processor VM
with a 2GB memory reservation, a warning states there is insufficient memory resources to power on the
VM. The reason for this warning is:
A. Overhead memory for the VMs is consuming memory in the resource pool
B. Service Console memory has not been increased to accommodate the virtual machine workload
C. The VMkernel device drivers are consuming memory
D. Memory reservations for the VMs are consuming memory in the pool
Answer: A


232. Which of the following are benefits of using resource pools (Choose Two)?
A. access control and delegation
B. isolation within pools, sharing between pools
C. separation of resources from hardware
D. automatically apply reservations and limits to groups of virtual machines
Answer: AC
233. In the vSphere Client the Virtual Machine Resource Allocation tab shows Host Memory and Guest
Memory. What is the meaning of these terms? (Choose Two):
A. Guest Memory is the actual memory usage of the Virtual Machine
B. Host memory is the amount of physical memory that has been allocated to a Virtual Machine
C. Guest Memory is amount of physical memory that has been allocated to a Virtual Machine
D. Host memory is the actual memory usage of the Virtual Machine.
Answer: AB
234. Several Virtual Machines residing in a resource pool are exhibiting poor performance, and a critical
VM in the pool appears hung. The resource pool has been allocated exactly 500 MHz of CPU and does not
have the Expandable Reservation option selected. The cluster in which the resource pool resides has a
total of 6000 MHz, with 1000 MHz available.
Which step can be used to increase the performance of the critical VM?
A. increase the CPU Reservations on the resource pool
B. increase the CPU Limit on the resource pool
C. increase the CPU Limit on the critical VM
D. increase the CPU Reservations on the critical VM
Answer: B
235. Which of the following are true about the share value for a virtual machine after it has been added to a
Resource Pool (Choose Two)?
A. If a previously defined share level (high,medium,low) exists, the %Shares value is adjusted to reflect the


total number of shares in use in the Resource Pool
B. If a previously defined custom share value exists, the %Shares value is adjusted to reflect the total
number of shares in use in the Resource Pool
C. If a previously defined share level (high,medium,low) exists, the %Shares value is maintained
D. If a previously defined custom share value exists, the %Shares value is maintained
Answer: AD
236. Which of the following migration techniques can be used to move virtual disk files to another datastore
(Choose Two)?
A. VMware Data Recovery
B. VMotion
C. Migrating a Suspended Virtual Machine
D. Storage VMotion
Answer: CD
237. What function does VMware Enhanced VMotion Compatibility provide?
A. The ability to VMotion virtual machines between CPUs with a common supported baseline
B. The ability to VMotion virtual machines between Intel and AMD processors
C. The ability to VMotion virtual machines between ESX Hosts with different core counts
D. The ability to VMotion virtual machines between CPUs with hardware virtualization and CPUs without
this support
Answer: A
238. A virtual machine has been created with a guest OS virtual disk in one datastore and a data virtual disk
in another datastore. Snapshots are being used on the virtual machine. Under which of the following
conditions can the virtual machine be succesfully migrated (Choose Two)?
A. When using Storage VMotion
B. When using Cold Migration to move the Virtual Machine to a different datastore(s)
C. When using VMotion migration
D. When using Cold Migration to move between AMD and Intel CPUs


Answer: CD
239. Which of the following are requirements for successful VMotion migration (Choose Two)?
A. Virtual Machines must have access to the same subnets on the source and destination hosts
B. Gigabit Ethernet networking must exist between the source and destination hosts
C. Virtual Machines cannot be configured to use RDMs
D. CPUs with the same clock speed and cache size must exist on both the source and destination hosts
Answer: AB
240. When migrating a machine with VMotion, what is the difference between High Priority and Low Priority
(Choose Two)?
A. High priority reserves resources on the host and destination. High priority migrations will not proceed if
the resources are unavailable.
B. Low priority does not reserve resources on the host and destination. Low priority migrations will not
proceed if the resources are unavailable.
C. Low priority does not reserve resources on the host and destination. Low priority migrations always
succeed.
D. High priority reserves resources on the host and destination. High priority migrations always succeed.
Answer: AC
241. Which of the following is true regarding backups created with VMware Data Recovery?
A. Backups of ESX 3.x VMs take longer than backups of ESX 4 VMs
B. Backups of ESX 3.x and later VMs take the same amount of time to complete
C. Backups of ESX 3.0 VMs are not supported, but ESX 3.5 VMs are supported
D. Backups of ESX 3.x VMs are not supported
Answer: A
242. An administrator uses vCenter Data Recovery to make backups of virtual machines. Checking on the
backup jobs run the previous evening, the administrator notices some jobs completed while others did not.
Which of the following are possible causes for the failure?


A. Compress the virtual machine files before the backup job runs.
B. Four backup jobs were running simultaneously, causing new jobs to fail to start
C. CPU utilization on one or more ESX Hosts exceeded 90 percent prior to one or more jobs executing
D. Four restore jobs were running simultaneously, causing new jobs to fail to start
Answer: C
243. When backing up a virtual machine using a backup client in the Service Console, which of the
following benefits are realized?
A. Backup time is reduced since the backup occurs in the virtual Ethernet
B. Individual virtual machine files can be easily restored
C. A full virtual machine restore is possible
D. Load on the ESX Server is reduced
Answer: C
244. When backing up a virtual machine using a backup server running in another virtual machine on the
same ESX Server, which of the following benefits are realized?
A. A full virtual machine restore is possible
B. A backup window is not needed
C. Load on the ESX Server is reduced
D. Backup time is reduced since the backup uses CPU cycles
Answer: D
245. What is the technology VMware Data Recovery uses to back up a Windows 2003 virtual machine?
A. Volume Shadow Copy Service
B. LGTO SYNC driver
C. EMC Autostart Manager
D. Crash-consistent quiescing
Answer: A
246. Which of the following steps are required to successfully install VMware Data Recovery (Choose


Two)?
A. The Client Plug-in must be installed in the vSphere Client
B. The VMware Data Recovery server component must be installed on the vCenter Server
C. A shared backup disk or tape device must be designated
D. The VMware Data Recovery Backup Appliance must be installed to a managed ESX Host
Answer: AD
247. What is the maximum number of backup or restore jobs that VMware Data Recovery can run
concurrently?
A. 8
B. 4
C. 16
D. 2
Answer: A
248. An administrator decides to use vCenter Data Recovery to back up virtual machines. After
downloading the VMware Data Recovery virtual appliance and importing it into vCenter, the administrator
does not see the plugin listed as an available plugin in vCenter.
What additional action must be taken before the plugin is available in vCenter?
A. The vCenter Server Service must be restarted
B. The VMwareDataRecoveryPlugin.msi file must be installed on the VDR Appliance
C. The VMwareDataRecoveryPlugin.msi file must be installed on the vCenter Server
D. The VMwareDataRecoveryPlugin.msi file must be installed on the system running the vSphere Client
Answer: D
249. An administrator decides to use vCenter Data Recovery to backup some key virtual machines. Which
of the following describes the process needed to install vCenter Data Recovery?
A. Run the vCenter installer using Custom as the choice for type of installation then follow the prompts to
install the tool.
B. Locate the folder on the vCenter media and install VDR to the vCenter Server


C. Download the OVF and copy it to a datastore that is visible to the managed hosts. Right-click on
the .ovf file and choose Add to Inventory
D. Download the OVF and import it using the vSphere Client
Answer: D
250. An administrator is in the process of upgrading ESX 3.5 Hosts to vSphere. vCenter Data Recovery
has been installed and configured to back up the virtual machines in the datacenter. However, after a
scheduled backup it appears that not all of the virtual machines selected were successfully backed up.
What is most likely the cause for this issue?
A. The virtual machines which were not backed up are running unsupported Operating Systems.
B. Some of the virtual machines were running during the backup window.
C. The affected virtual machines did not have the VDR agent installed
D. Some of the virtual machines are on the ESX 3.5 hosts.
Answer: D
251. To restart the VMware Host Agent on an ESX Host, which command would you use?
A. service mgmt-hostd restart
B. service vmware-hostd restart
C. service vmware-vpxa restart
D. service mgmt-vmware restart
Answer: D
252. If you cannot connect to a standalone ESX Host with the vSphere client, which command would you
use to verify that the VMware Host Agent is running (Choose Two)?
A. esxcfg-info
B. ps -ef | grep hostd
C. service mgmt-vmware status
D. vmware -v
Answer: BC


253. To list the current firewall settings which command would you use?
A. esxcfg-firewall -d
B. esxcfg-firewall -l
C. esxcfg-firewall -q
D. esxcfg-firewall -u
Answer: C
254. An Administrator is troubleshooting an ESX 4.x Host and needs to export diagnostic information. The
ESX Host is not managed by a vCenter Server. How can the information be gathered using the vSphere
Client?
A. From the Administration navigation, select System Logs, then click the Export System Logs. Select the
ESX Host and click OK
B. From the vSphere Client, click File, Export and Export System Logs, select a location and click OK
C. The vSphere Client can only be used to export diagnostic data from an ESX Host managed by vCenter
D. From the Administration Drop-Down Menu, select Export Diagnostic Data, select a location and click OK
Answer: B
255. The remote console performance for a virtual machine on an ESXi Host appears to be degraded.
Which of the following could be a possible cause of the problem (Choose Two)?
A. The physical NIC assigned to the virtual machine port group containing the affected virtual machine has
a speed or duplex mismatch
B. The virtual NIC assigned to the virtual machine has a speed or duplex mismatch
C. The physical NIC assigned to the Service Console port group has a speed or duplex mismatch
D. The physical NIC assigned to the VMkernel port group has a speed or duplex mismatch
Answer: AD
256. A developer wishes to disable logging for a number of virtual machines used for testing purposes, in
order to maximize available datastore space. Which of the following methods can be used to disable
virtual machine logging?
A. Manually edit the virtual machine .vmx file and set log.keepOld=0


B. Manually edit the virtual machine .vmx file and set logging=false
C. Choose Edit Settings in the vSphere Client. Under Options > Advanced > General, check Disable
Logging
D. Choose Edit Settings in the vSphere Client. Under Options > Advanced > General, uncheck Enable
Logging
Answer: D
257. A developer wishes to disable logging for a number of virtual machines used for testing purposes, in
order to maximize available datastore space. The virtual machines reside on an ESX Host managed by
vCenter Server. Which of the following methods can be used to disable virtual machine logging?
A. Manually edit each virtual machines .vmx file and set logging=false
B. From the Configuration tab for the ESX Host running the virtual machines, choose Advanced Settings.
Set the Disable Logging parameter to Yes
C. Edit the settings for each virtual machine. Under Options > Advanced > General, uncheck Enable
Logging
D. Connect a vSphere Client to vCenter Server. Under the Administration drop-down, check Disable
Virtual Machine Logging
Answer: C
258. Which type of virtual NIC must be used for a 32 bit Windows Server 2003 server in an MSCS cluster?
A. Flexible
B. pro1000
C. vmxnet
D. e1000
Answer: A
259. Which type of Virtual SCSI adapter must be used for a Windows Server 2008 server in a MSCS
cluster?
A. LSI Logic SAS
B. LSI Logic Parallel


C. BusLogic SAS
D. BusLogic Parallel
Answer: A
260. When configuring the NTP server with MSCS clustered virtual machines, the best practice is:
A. Enable host based time synchronization for domain controllers, cluster nodes and guest virtual
machines.
B. Synchronize domain controllers and cluster nodes with a common NTP server and enable host based
time synchronization in the guest.
C. NTP should not be used in conjunction with MSCS clustered virtual machines.
D. Synchronize domain controllers and cluster nodes with a common NTP server, and disable host based
time synchronization in the guest.
Answer: D
261. When creating an MSCS Cluster across 2 ESX 4 Hosts, what type of Virtual Disks can be used?
A. Raw Device Mapped (RDM) disks in Physical or Virtual Compatibility Mode
B. Raw Device Mapped (RDM) disks in Physical or Virtual Compatibility Mode, or virtual disks on a shared
VMFS datastore
C. Raw Device Mapped (RDM) disks in Virtual Compatibility Mode only
D. Raw Device Mapped (RDM) disks in Physical Compatibility Mode only
Answer: A
262. (Click the Exhibit Button) An administrator has received reports of poor network performance with a
virtual machine. Which of the following steps would improve the network performance of this virtual
machine (VM)?
1639228130.jpg
A. Add an additional uplink to the virtual switch this virtual machine is attached to
B. Increase memory to the virtual machine
C. Adjust shares for the virtual NIC on the virtual machine
D. Traffic shape this virtual machine


Answer: A
263. (Click the Exhibit button)
The graph shown in the exhibit indicates a problem with which of the following resources?
A. CPU
B. Network
C. Disk
D. Memory
Answer: C
264. (Click the Exhibit button)
676432611.jpg
The graph shown in the exhibit indicates which of the following?
A. Average amount of time SCSI reads and writes spend in the queue
B. Average amount of time required to read and write from the Guest OS to the Virtual Machine virtual disk
file
C. Average amount of time spent by the VMkernel processing SCSI read and write commands
D. Average amount of time spent reading and writing to the physical storage device
Answer: B
265. Click the Exhibit button.
392441059.jpg
Which statement is true about the network performance of the virtual machine (VM) shown in the exhibit?
A. The VM can send traffic as fast as the underlying physical NIC.
B. The underlying physical NIC is configured for 100 Mbps/half-duplex.
C. The VM can send at the maximum of 10 Mbps.
D. Virtual Switch autonegotiation settings need to be adjusted to improve performance.
Answer: A
266. Which of the following resource management techniques could be used to relieve a network


bottleneck caused by a VM with occasional high outbound network activity?
A. apply traffic shaping to the VM with high activity
B. apply traffic shaping to the port group containing the virtual machine
C. convert the switch from a vNetwork Standard Switch to a vNetwork Distributed Switch
D. apply traffic shaping to the other VMs in the same port group
Answer: B
267. (Click the Exhibit button)
566334691.jpg
You have a newly set up 2 node cluster with HA and DRS enabled with DRS in fully automated mode. While
testing DRS, you notice no virtual machines are moving from one ESX host to any other despite great
disparity in resource utilization between the ESX hosts.
Based on the information shown in the exhibit, what is the best solution for this problem?
A. Change the IP address to 10.0.0.204 for the VMkernel interface.
B. Remove the uplink used by the VMkernel port group and connect the proper uplink.
C. Disable HA for this cluster.
D. Enable the VMkernel port for Vmotion.
Answer: A
268. (Click the Exhibit button)
1756429538.jpg
An administrator has a DRS/HA cluster with 5 ESX 4 Hosts. When trying to start a new web server Virtual
Machine, an error is displayed saying insufficient resources exist for HA.
Based on the HA configuration shown in the exhibit, how can this issue be resolved? (Choose Two)
A. Add another server to the cluster.
B. Allow virtual machines to be powered on even if they violate HA availability constraints.
C. Change the percentage of resources to reserve to 30%.
D. Specify one of the servers to be a failover host
Answer: AB


269. An Administrator has determined that storage performance to a group of virtual machines is reduced
during peak activity. The virtual machines are all located in a VMFS datastore called Production1.
Which of the following actions could be taken to improve the storage performance of these virtual
machines?
A. Add additional physical storage, create a new VMFS datastore called Production2 on the new storage,
then migrate a portion of the virtual machines from Production1 to Production2
B. Add additional physical storage and add an extent to the VMFS datastore called Production1
C. Add additional physical storage, expand the underlying volume, then grow the VMFS datastore into the
new space
D. Change the storage multipathing policy to Most Recently Used (MRU)
Answer: A
270. Which of these factors indicates a high likelihood that the performance of a virtual machine is being
constrained by disk I/O?
A. A long SCSI queue length
B. A large number of disk shares
C. A large number of kilobytes read and written
D. A large number of virtual disks on its SCSI bus
Answer: A
271. An administrator is responsible for enabling file access for desktop users. A number of users have
logged complaints that they cannot access their files. An alert in the vSphere client states that storage
connectivity to all hosts has been triggered. The storage screen indicates everything is connected, but the
alert has not been acknowledged this alert.
Which of the following would successfully correct the user access issue?
A. Rescan the storage on the File sharing virtual machine on which the users are seeing the problem.
B. Tell each user to reboot their computers.
C. Rescan the storage on all the hosts in the cluster.
D. Reconnect the storage containing the users files to the host which is running the File sharing virtual
machine.


Answer: D
272. Recently, a network interface card in an ESX 4 host has been experiencing inconsistent connectivity
states.
Which of the following two methods could be used to quickly identify the issue and immediately notify an
administrator so the issue can be resolved? (Choose Two)
A. Set up an alarm with the Lost Network Connectivity trigger and configure an SNMP trap for notification
when the connection is lost
B. Set up an alarm with the Lost Network Connectivity trigger to send an e-mail for notification when the
connection is lost
C. Set up an alarm with the Network Redundancy Degraded trigger and configure an SNMP trap for
notification when the connection is lost
D. Set up an alarm with the Lost Network Redundancy trigger to send an e-mail for notification when the
connection is lost
Answer: AB
273. While verifying host connectivity to datastores using Topology Maps, you see that one of the hosts in a
DRS/HA Cluster has a red X. What does this indicate?
A. The host has failed as part of an HA event
B. The host cannot access the selected datastore
C. The host cannot be contacted to update the Topology Map
D. The host is not compatible for VMotion migration
Answer: D
274. What is the meaning of a red, or critical, indicator on a DRS cluster?
A. Red clusters are the highest priority and will receive resource allocations first
B. At least one host in the cluster is attempting to go into Maintenance Mode
C. Yellow clusters will become red after 15 minutes if DRS is unable to dynamically balance the load
D. Red clusters indicate virtual machines are using more resources than the fixed reservation allows
Answer: D


275. During an attempt to create a new resource pool in a cluster, the New Resource Pool selection
appears to be unavailable.
What could be the cause?
A. The cluster has too few resources to create a new resource pool
B. VMware HA has not been enabled on the cluster
C. DRS has not been enabled on the cluster
D. There are no servers in the cluster
Answer: C
276. DRS on a cluster with two ESX Hosts is set to Fully Automated mode. One server in the cluster is
running at 98% CPU utilization, while the other host is running at 52% utilization. Upon analysis, it appears
that none of the virtual machines (VMs) are being migrated to the other server, and no recommendations
are being generated. Which of the following are the most likely causes of the problem (Choose Two)?
A. The current DRS Migration Threshold setting is too conservative
B. The VMotion licenses for the cluster have expired
C. Insufficient resources exist to perform the VMotion migration
D. The ESX Server has CPU features that are incompatible with other hosts in the cluster
Answer: CD
277. A request has been made to the SAN Administrator to provision a new LUN. A LUN (LUN 6) is created
and the SAN administrator presents the LUN to the ESX Server using the storage array SAN Management
software. After a Rescan operation on the ESX Server, the LUN does not show up. Other LUNs from the
same storage array are visible. Which of the following could be the cause (Choose Two)?
A. The HBA on the active path is shared with the service console
B. The LUN was not presented to the correct ESX Server
C. LUN masking on a range of LUNS is enabled on the ESX Server, causing LUN 6 to be ignored
D. Zoning is not set up correctly
Answer: BC


278. A new LUN has been presented to two ESX Servers, ESXA and ESXB. The LUN can be seen from
both servers. A new VMFS-3 volume is created on the LUN using a vSphere Client attached to ESX
Server A. The new datastore is visible on ESX Server A, but not on ESX Server B. What steps must be
taken to make the datastore visible to ESX Server B?
A. Modify LUN masking settings on ESX Server B
B. Perform a Rescan operation on ESX Server B
C. Reboot ESX Server B
D. Modify the FC-Switch zoning configuration
Answer: B
279. A group of virtual machines has been deployed using thin disks due to limited storage space
availability. The storage team has expressed concern about extensive use of this type of provisioning.
Which of the following actions can be taken to inform an administrator when an unacceptably large number
of virtual machines are being deployed using thin disk provisioning?
A. Use the default Host Storage Status alarm. Create a trigger for the alarm with an e-mail or SNMP
notification option.
B. Create an alarm for Disk Usage and determine the appropriate amount. Create a trigger for the alarm
with an e-mail or SNMP notification option.
C. Modify the default Datastore Usage on Disk alarm with a determined percentage. Create a trigger for
the alarm with an e-mail or SNMP notification option.
D. Create an alarm for Datastore Disk Overallocation and determine an appropriate percentage. Create a
trigger for the alarm with an e-mail or SNMP notification option.
Answer: D
280. (Click the Exhibit button) Users are having difficulty accessing a web server since a new web
application was configured to run on sc-titanium03.vmeduc.com. The vSphere client reports the error
shown in the exhibit. DRS is set to fully automated mode, but the problem has not resolved.
1220479202.jpg
Which of the following actions could be taken to resolve the issue?
A. Hot add another CPU to the web server virtual machine.


B. Migrate one or more running virtual machines on the host with the web server virtual machine to the
other host in the cluster.
C. Power down one or more virtual machines on the host running the web server virtual machine and
migrate them to the other server in the cluster.
D. Add another server to the cluster.
Answer: C
281. A user's permission set is modified so that they can no longer create alarms.
What will happen to the alarms already created by this user?
A. Alarms will be triggered for critical state changes only
B. Alarms will be triggered if the event occurs
C. Only ESX host alarms will be triggered
D. Alarms will never be triggered
Answer: B
282. (Click the Exhibit button) An administrator has deployed a new virtual machine on an ESX Host,
sc-vicuna04.vmeduc.com. Users are complaining of poor performance on the application running on the
virtual machine. Performance tools display the results shown in the exhibit.
1834139361.jpg
Which two tasks could you perform to try to improve the user experience (Choose Two)?
A. Add another vCPU to the virtual machine.
B. Remove the limit on the CPU settings of the virtual machine.
C. Migrate the virtual machine to another ESX host.
D. Remove CPU affinity on the Advanced CPU setting of the virtual machine.
Answer: AB
283. Users are complaining that a Windows application server Virtual Machine configured with 1GB RAM is
not performing satisfactorily. An administrator opens the Performance Tab for the guest virtual machine
and adds the counter for Memory Ballooned in MB. The Performance Chart displays a value of 240.
Which of the following actions should be taken?


A. Adjust the Mem.CtlMaxPercent to read 75.
B. Add more memory to the Virtual Machine.
C. Migrate the Virtual Machine to another host.
D. Monitor memory ballooning from the ESX host Performance Tab
Answer: C
284. A Windows virtual machine (VM) viewed through Task Manager shows CPU utilization averaging
95-100%.
What does this indicate?
A. The VM has an impending performance problem. The running processes in Windows Task Manager
should be checked to determine what applications are consuming CPU resources.
B. The VM is utilizing most of the CPU resources allocated to it. The CPU Ready value should be checked
to determine if this is a resource constraint.
C. The VM has CPU affinity set to CPU 0 and is competing with the service console for CPU resources.
esxtop should be run to confirm the diagnosis.
D. The VM CPU reservation is not sufficient.
Answer: B
285. It appears that a virtual machine (VM) in a DRS Cluster is having performance problems because it
does not have enough CPU resources available.
Which of the following methods could be used to improve performance and reduce CPU contention of this
VM while maintaining compatibility with DRS (Choose Two)?
A. set the CPU reservation for this VM to the Average CPU Utilization and the CPU limit for this VM to Peak
CPU Utilization
B. set the CPU reservation for this VM to 100%
C. increase CPU shares for this VM to High
D. set CPU affinity on the VM
Answer: BC
286. A new ESX Server is set up initially with two virtual machines (VMs) for users to access. The


applications running in the virtual machines can take advantage of all Available Memory in the VM. 20
additional VMs with the same application will be installed within six months, which may lead to memory
contention on the ESX Host.
How can the first two VMs be configured so that their performance remains equal to the future VMs that will
be deployed?
A. set a memory limit on the VMs that is a lower value than the Available Memory for the VMs
B. set the memory shares so that the VMs get 10 shares per megabyte of configured memory for the VMs
C. set an expandable memory reservation on the VM that is lower than 50% of the configured memory for
the VMs
D. set a memory reservation on the VMs that is lower than 50% of the Available Memory for the VMs
Answer: A
287. A virtual machine performance graph shows Memory Swap In to be at 95%. Users of the VM are
complaining that performance is slow.
Which of the following actions can be done to increase performance of the VM (Choose Two)?
A. move the VM using VMotion to another server
B. increase the memory reservation of the VM
C. decrease the memory limit of the VM
D. decrease the memory reservation of the VM
Answer: AB
288. A user wants to receive an email notification when the virtual machine CPU usage enters a warning
state, and again when the condition has been resolved. Which two state changes must be selected to
receive the appropriate notifications (Choose Two)?
A. yellow-green state change
B. yellow-red state change
C. red-green state change
D. green-yellow state change
Answer: AD


289. An administrator is updating a program running on a virtual machine. The update file has been
downloaded as an .iso file and placed on a shared NFS datastore. An attempt to mount the .iso to the
virtual machine fails, but subsequent testing shows that the .iso can be mounted to a VM running on
another ESX Host. Which of the following steps should be taken to enable access to the .iso for the
affected VM?
A. Reboot the ESX Server running the affected VM
B. Remount the NFS volume to the ESX server running the affected VM
C. Reboot the NFS Server
D. Rescan all datastores
Answer: B
290. What is the maximum number of VMkernel swap files that an ESX Server can have on a single VMFS
volume?
A. 1 per virtual disk
B. 1
C. 1 per virtual machine
D. VMkernel swap files must be stored locally on the ESX Server
Answer: C
291. During peak operating hours, an Administrator finds that a business critical application is not
performing as well as during normal hours. Which of the following memory management methods could
be used to guarantee the application performs well at all times?
A. Set the Share level to High for the virtual machine running the application and set all other virtual
machines to Low
B. Set a Reservation equal to the Peak Memory utilization of the virtual machine running the application
C. Set the Share level to High for the virtual machine running the application
D. Set a Reservation equal to the Average Memory utilization of the virtual machine running the application
Answer: B
292. Users are complaining that they cannot access their files located on a file server virtual machine. The


vSphere client shows a triggered alarm stating disk latency is beyond the default threshold for the datastore
where the user file server is located. The Path Selection Policy has been set by the ESX Host to Fixed with
default path settings.
Which of the following two options could be used to increase performance of the file server VM (Choose
Two)?
A. Change the Path Selection Policy to Round Robin
B. Use Storage VMotion to move the file server VM to a datastore with lower latency
C. Use disk shares to increase the priority for the datastore housing the file server VM
D. Change the Path Selection Policy to Most Recently Used (MRU)
Answer: AB
293. An administrator is reporting slow access to datastores from multiple ESX Hosts. The datastores are
all FC SAN on ESX 3.x and ESX 4 Hosts. Which of the following two actions can be taken to improve
performance (Choose Two)?
A. Unload the VMFS-2 driver using the vmkload_mod -u vmfs2
B. Unload the LUN Masking driver using the vmkload_mod -u qla2300
C. Unload the NFS driver using the vmkload_mod -u nfsclient
D. Unload the FSAUX driver using the vmkload_mod -u fsaux
Answer: AC
294. An administrator wants to apply Disk Shares to ensure proper storage performance. These shares
are configured on which object?
A. Storage Adapter
B. Virtual Machine
C. Datastore
D. Resource Pool
Answer: B
295. When memory is reclaimed from a virtual machine using vmmemctl, what is the maximum amount that
can be reclaimed by default?


A. 65% of the unreserved memory
B. 65% of the available memory
C. 50% of the available memory
D. 50% of the unreserved memory
Answer: A
296. Which is a valid traffic shaping adjustment?
A. peak bandwidth adjusted in mbps
B. peak bandwidth adjusted in kbps
C. minimum bandwidth adjusted in mbps
D. minimum bandwidth adjusted in kbps
Answer: B
297. A Windows virtual machine (VM) is experiencing poor application performance. The suspected issue is
a lack of available memory. Windows Task Manager shows 30% of the memory within the VM is not
currently being used.
What does this indicate and what could be checked next?
A. The VM has memory available, however it may not actually have physical memory available. VMkernel
swap activity on the ESX Server host should be checked next.
B. Windows Task Manager is not reading actual memory usage in the VM. Windows System Monitor should
be used to get a precise reading on memory usage.
C. The application problems are definitely due to a non-memory related problem. CPU affinity settings
should be checked for this VM.
D. The application problems are definitely due to a non-memory related problem. CPU utilization should be
checked next using Windows Task Manager.
Answer: A
298. What is a function of the vmmemctl driver?
A. enables transparent page sharing
B. reclaims unused memory from the guest OS


C. allows the operation of unsupported guest OS types
D. enables swapping of the virtual machines
Answer: B
299. Which memory conservation technique allows the secure elimination of redundant copies of memory
pages between virtual machines on the host?
A. VMkernel Swap
B. RAM Overcommit
C. Memory Balloon Driver
D. Transparent Page Sharing
Answer: D
300. Which of the following commands can be used to display information about virtual switches (Choose
Two)?
A. ifconfig
B. esxcfg-info
C. vmware-info</tt.
D. esxcg-vswitch
Answer: BD

相關(guān)閱讀
·推薦文章

Copyright ©2013-2015 江浙滬招生考試網(wǎng) All Rights Reserved.
地址: 蘇州市姑蘇區(qū)閶胥路483號(工投創(chuàng)業(yè)園)  電話:0512-85551931 郵編: 214000
郵箱: [email protected] 版權(quán)所有:蘇州邁峰教育科技有限公司 蘇ICP備15050684號-2