Vcp Data Center (2v0-621-mod-1-4)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Prakash Pathak
Prakash Pathak
Community Contributor
Quizzes Created: 1 | Total Attempts: 132
| Attempts: 132 | Questions: 44
Please wait...
Question 1 / 44
0 %
0/100
Score 0/100
1. Which Platform Service Controller Password Policy determines the number of days a password can exist before the user must change it?  

Explanation

The correct answer is "Maximum Lifetime". The Maximum Lifetime password policy determines the number of days a password can exist before the user is required to change it. This policy helps ensure the security of user accounts by enforcing regular password changes and reducing the risk of unauthorized access.

Submit
Please wait...
About This Quiz
Vcp Data Center  (2v0-621-mod-1-4) - Quiz

This quiz titled 'VCP Data Center (2V0-621-Mod-1-4)' evaluates knowledge on VMware vCenter Server configurations, including password policies, system upgrades, and Single Sign-On token settings. It is essential for professionals managing large-scale virtual environments.

2. An administrator is configuring the clock tolerance for the Single Sign-On token configuration policy andwants to define the time skew tolerance between a client and the domain controller clock.Which time measurement is used for the value?

Explanation

The administrator is configuring the clock tolerance for the Single Sign-On token configuration policy. They want to define the time skew tolerance between a client and the domain controller clock. The time measurement used for the value is milliseconds.

Submit
3. An administrator is upgrading a vCenter Server Appliance and wants to ensure that all the prerequisitesare met.What action must be taken before upgrading the vCenter Server Appliance?

Explanation

Before upgrading the vCenter Server Appliance, the administrator must install the Client Integration Plug-in. This plug-in is required for the vCenter Server Appliance upgrade process as it provides the necessary functionality for tasks such as deploying OVF templates, transferring files, and accessing the vSphere Web Client. Without the Client Integration Plug-in, the upgrade process may encounter issues or fail to complete successfully. Therefore, it is essential to have this plug-in installed to ensure all the prerequisites are met for the vCenter Server Appliance upgrade.

Submit
4. Which password meets ESXi 6.x host password requirements?  

Explanation

The password "8kMVnn2x!" meets ESXi 6.x host password requirements because it is a combination of uppercase and lowercase letters, numbers, and special characters. It also has a minimum length of 8 characters, which is a common requirement for strong passwords.

Submit
5. An administrator wants to clone a virtual machine using the vSphere Client.Which explains why the Clone option is missing?

Explanation

The Clone option is missing because the vSphere Client is directly connected to the ESXi host. This means that the vSphere Client does not have access to the necessary features and functionalities required for cloning a virtual machine. To perform cloning, the vSphere Client needs to be connected to vCenter Server, which provides the necessary management and control capabilities.

Submit
6. What will occur if the .nvram file is deleted from a powered off virtual machine?

Explanation

If the .nvram file is deleted from a powered off virtual machine, the file will be automatically created the next time the virtual machine is powered on.

Submit
7. What is the minimum Virtual Hardware version required for vFlash Read Cache?

Explanation

The minimum Virtual Hardware version required for vFlash Read Cache is Version 10. This means that in order to use vFlash Read Cache, the virtual machine must be running on at least Virtual Hardware version 10.

Submit
8. An administrator wants to provide users restricted access. The users should only be able to perform thefollowing tasks:- Create and consolidate virtual machine snapshots- Add/Remove virtual disks- Snapshot ManagementWhich default role in vCenter Server would meet the administrator's requirements for the users?

Explanation

The virtual machine power user role in vCenter Server would meet the administrator's requirements for the users. This role allows users to create and consolidate virtual machine snapshots, as well as add/remove virtual disks. It also includes the ability to perform snapshot management tasks. This role provides the necessary level of access and control for the specified tasks, without granting full administrative privileges.

Submit
9. An administrator would like to use a passphrase for their ESXi 6.x hosts which has these characteristics:-Minimum of 21 characters-Minimum of 2 wordsWhich advanced options must be set to allow this passphrase configuration to be used?

Explanation

The correct answer is "retry=3 min=disabled, disabled, 21, 7, 7 passphrase=2". This is because the passphrase must have a minimum of 21 characters and a minimum of 2 words. The "retry=3" option specifies that the user can retry the passphrase 3 times before being locked out. The "min=disabled" option disables the use of a minimum passphrase length. The "21, 7, 7" values specify the minimum number of uppercase letters, lowercase letters, and numbers required in the passphrase. The "passphrase=2" option allows the use of a passphrase.

Submit
10. An administrator is performing a silent automatic update of VMware Tools on a Windows virtual machine.What syntax needs to be entered into the Advanced Options box?

Explanation

The correct answer is "/s /v "/qn" /l "c:\Windows\filename.log". This syntax is used to perform a silent automatic update of VMware Tools on a Windows virtual machine. The "/s" option is used to run the installer silently, the "/v" option is used to pass command line parameters to the installer, "/qn" is a parameter that specifies a silent installation with no user interface, and "/l" is used to specify the log file location. The log file will be saved in the "c:\Windows" directory with the name "filename.log".

Submit
11. What are two sample roles that are provided with vCenter Server by default? (Choose two.)

Explanation

vCenter Server is a management platform for VMware virtualization environments. It provides various roles with different levels of access and permissions. The "Virtual machine User" role is one of the default roles that allows users to interact with virtual machines, perform basic tasks, and view their own virtual machines. The "Network Administrator" role is another default role that grants users permissions to manage and configure network settings within the vCenter Server environment. These two roles are provided by default to ensure that users have the necessary access and control over virtual machines and network configurations.

Submit
12. Which Advanced Setting should be created for the vCenter Server to change the expiration policy of thevpxuser password?

Explanation

The correct answer is "VimPasswordExpirationInDays". This advanced setting should be created for the vCenter Server to change the expiration policy of the vpxuser password. This setting allows administrators to specify the number of days after which the vpxuser password will expire and need to be changed. By setting this value, administrators can enhance the security of the vCenter Server by ensuring that passwords are regularly updated.

Submit
13. An administrator wants to upgrade to vCenter Server 6.x.The vCenter Server:- Is hosted on a virtual machine server running Microsoft Windows Server 2008 R2, with 8 vCPUs and16GB RAM.- Will have an embedded Platform Services Controller.- Hosts a Large Environment with 1,000 ESXi hosts and 10,000 Virtual Machines.Why does the vCenter Server not meet the minimum requirements?

Explanation

The virtual machine server running Windows Server 2008 R2 with 8 vCPUs and 16GB RAM does not meet the minimum requirements because it does not have enough resources to handle the large environment with 1,000 ESXi hosts and 10,000 Virtual Machines. To effectively manage such a large environment, the vCenter Server would need more CPU and RAM resources.

Submit
14. An administrator is able to manage an ESXi 6.x host connected to vCenter Server using the vSphere WebClient but is unable to connect to the host directly.Which action should the administrator take to correct this behavior?

Explanation

To correct the behavior of being unable to connect to the ESXi host directly, the administrator should disable Lockdown Mode on the ESXi host through vCenter Server. Lockdown Mode restricts access to the host directly and only allows management through vCenter Server. By disabling Lockdown Mode, the administrator will regain the ability to manage the host directly using the vSphere WebClient.

Submit
15. An administrator has migrated a vCenter Server Appliance from version 5.5 to version 6.x.During the migration, the administrator selected DHCP for the appliance and obtained a hostname fromthe DHCP server.The administrator adjusts the hostname after the migration and uses a static IP and hostname.What should the administrator do immediately after this change to prevent service failures?

Explanation

not-available-via-ai

Submit
16. An administrator is building a large virtual machine that will require as many vCPUs as the host can support. An ESXi 6.x host has these specifications: - Six 32-core Intel Xeon Processors - 256 GB of Memory - 512 GB Local disk space using VMFS5 What is the maximum number of virtual CPUs that the virtual machine can be allocated?  

Explanation

The maximum number of virtual CPUs that the virtual machine can be allocated is 128. This is because the host has six 32-core processors, which means a total of 192 cores. However, ESXi reserves some cores for system use, so not all 192 cores can be allocated to virtual machines. Typically, ESXi reserves 1 core per socket, so in this case, 6 cores would be reserved. Therefore, the maximum number of virtual CPUs that can be allocated is 192 - 6 = 186. However, ESXi also has a limit of 128 virtual CPUs per virtual machine, so the maximum number of virtual CPUs that can be allocated is 128.

Submit
17. An administrator tries to connect the vSphere 5.5 Client to an ESXi 6.x host.What will happen when this takes place?

Explanation

When an administrator tries to connect the vSphere 5.5 Client to an ESXi 6.x host, the operation will prompt the administrator to run a script to upgrade the vSphere Client. This means that the current version of the vSphere Client is not compatible with the ESXi 6.x host, and the administrator will be prompted to upgrade the client using a script.

Submit
18. Which group in the vsphere.local domain will have administrator privileges for the VMware CertificateAuthority (VMCA)?

Explanation

CAAdmins group in the vsphere.local domain will have administrator privileges for the VMware Certificate Authority (VMCA). This group is specifically designed to manage and administer the VMCA, including tasks such as issuing and revoking certificates, configuring certificate policies, and managing certificate trust. The other groups mentioned, such as SolutionUsers, DCAAdmins, and SystemConfiguration.Administrators, do not have the same level of privileges and responsibilities as the CAAdmins group in relation to the VMCA.

Submit
19. Which two vCenter Server services are migrated automatically as part of an upgrade from a DistributedvCenter Server running 5.x? (Choose two.)

Explanation

As part of an upgrade from a Distributed vCenter Server running 5.x, the vSphere Web Client and vSphere Inventory Service are migrated automatically. The vSphere Web Client is a user interface for managing vCenter Server and allows for the management of virtual machines, hosts, and other resources. The vSphere Inventory Service provides a consolidated view of virtual machine inventory across multiple vCenter Server instances. These two services are essential components of vCenter Server and are necessary for its proper functioning.

Submit
20. Lockdown Mode has been enabled on an ESXi 6.x host and users are restricted from logging into theDirect Console User Interface (DCUI).Which two statements are true given this configuration? (Choose two.)

Explanation

When Lockdown Mode is enabled on an ESXi 6.x host, it restricts users from logging into the Direct Console User Interface (DCUI). However, there are two exceptions to this restriction. Firstly, a user who has been granted administrative privileges in the Exception User list can still login. Secondly, a user who is defined in the DCUI.Access without administrative privileges can also login. Therefore, both of these statements are true given this configuration.

Submit
21. Which two advanced features should be disabled for virtual machines that are only hosted on a vSpheresystem? (Choose two.)

Explanation

The two advanced features that should be disabled for virtual machines hosted on a vSphere system are "isolation.tools.unity.push.update.disable" and "isolation.tools.ghi.launchmenu.change". These features are related to Unity integration and Guest Host Interaction (GHI) respectively. Disabling these features ensures that the virtual machines are isolated and do not have access to the host system's Unity interface or the ability to change the launch menu.

Submit
22. To reduce the attack vectors for a virtual machine, which two settings should an administrator set tofalse? (Choose two.)

Explanation

To reduce the attack vectors for a virtual machine, an administrator should set the "ideX:Y.present" and "serial.present" settings to false. By disabling these settings, the virtual machine will not have access to any IDE or serial ports, which can be potential entry points for attackers. Disabling these settings ensures that the virtual machine is more secure and less vulnerable to attacks through these vectors.

Submit
23. Which two groups of settings should be reviewed when attempting to increase the security of virtualmachines (VMs)? (Choose two.)

Explanation

To increase the security of virtual machines (VMs), two groups of settings should be reviewed. First, disabling hardware devices is important as it prevents unauthorized access or tampering with the VMs through physical devices. By disabling hardware devices, only authorized personnel can access and control the VMs. Second, disabling unexposed features is crucial as it reduces the attack surface and minimizes the risk of vulnerabilities. Unexposed features may provide potential entry points for attackers, so disabling them ensures that only necessary and secure features are enabled on the VMs.

Submit
24. Which two features are available for virtual machines configured with DirectPath I/O? (Choose two.)

Explanation

not-available-via-ai

Submit
25. Strict Lockdown Mode has been enabled on an ESXi host.Which action should an administrator perform to allow ESXi Shell or SSH access for users withadministrator privileges?

Explanation

To allow ESXi Shell or SSH access for users with administrator privileges in Strict Lockdown Mode, the administrator should add the users to Exception Users and enable the service. This will exempt the specified users from the restrictions imposed by Strict Lockdown Mode and allow them to access the ESXi Shell or SSH. Granting the users the administrator role alone will not be sufficient as Strict Lockdown Mode prevents direct access, so the exception needs to be added to bypass this restriction. Adding the users to vsphere.local and enabling the service is not the correct action in this scenario.

Submit
26. When attempting to log in with the vSphere Web Client, users have reported the error:Incorrect Username/PasswordThe administrator has configured the Platform Services Controller Identity Source as:- Type. Active Directory as an LDAP Server- Domain: vmware.com- Alias: VMWARE- Default Domain: YesWhich two statements would explain why users cannot login to the vSphere Web Client? (Choose two.)

Explanation

The first statement suggests that users might be typing the password incorrectly, which could be the reason for the login error. The second statement suggests that users might be in a forest that has a one-way trust, which means that the identity source (Active Directory) does not trust the vSphere Web Client. This lack of trust could prevent users from logging in successfully.

Submit
27. An administrator wants to allow users to login to the vSphere Web Client using the Use Windows sessionauthentication check box for faster authentication.Which three requirements must be met for this feature to be available and functional? (Choose three.)

Explanation

In order for users to login to the vSphere Web Client using the Use Windows session authentication check box, three requirements must be met. First, the vSphere Web Client Integration browser plug-in must be installed on each workstation from where a user will sign in. Second, the users must be signed into Windows using Active Directory user accounts. Finally, the administrator must create a valid Identity Source in Single Sign-On for the users' domain. These three requirements ensure that the feature is available and functional for users to authenticate using their Windows session.

Submit
28. An administrator is troubleshooting a virtual machine that has unexpectedly powered off.Which two logs should be used to troubleshoot the issue? (Choose two.)

Explanation

To troubleshoot a virtual machine that has unexpectedly powered off, the administrator should refer to the vmware.log and hostd.log. The vmware.log contains detailed information about the virtual machine's activity, including any errors or warnings that may have occurred. The hostd.log, on the other hand, provides logs specific to the ESXi host, which can help identify any host-related issues that may have caused the virtual machine to power off. By analyzing these two logs, the administrator can gain insights into the possible causes of the unexpected power-off and take appropriate actions to resolve the issue.

Submit
29. Which three connection types are supported between a remote site and vCloud Air? (Choose three.)

Explanation

The three connection types that are supported between a remote site and vCloud Air are Secure Internet Connectivity, Direct Connect, and Secure VPN. Secure Internet Connectivity allows for a secure connection between the remote site and vCloud Air over the internet. Direct Connect provides a dedicated, private network connection between the remote site and vCloud Air. Secure VPN establishes a secure virtual private network connection between the remote site and vCloud Air, ensuring the confidentiality and integrity of the data transmitted between the two.

Submit
30. An administrator decides to change the root password for an ESXi 6.x host to comply with the company'ssecurity policies.What are two ways that this can be accomplished? (Choose two.)

Explanation

The Direct Console User Interface (DCUI) is a text-based interface that allows administrators to perform various tasks on an ESXi host, including changing the root password. This can be done by accessing the DCUI directly on the host and navigating through the settings to change the password.

The passwd command in the ESXi Shell is another way to change the root password. The ESXi Shell is a command-line interface that provides access to the underlying operating system of the host. By using the passwd command, administrators can change the root password directly from the shell.

Both methods mentioned provide ways to change the root password on an ESXi host to comply with the company's security policies.

Submit
31. An administrator connects to an ESXi 6.x host console in order to shutdown the host. Which option in the Direct Console User Interface would perform this task?

Explanation

Pressing the F12 key in the Direct Console User Interface (DCUI) of an ESXi 6.x host would perform the task of shutting down the host. This key is typically used to initiate a graceful shutdown of the host, allowing all virtual machines and services to be properly stopped before the host powers off.

Submit
32. Which two methods are recommended for managing the VMware Directory Service? (Choose two.)

Explanation

The vmdir command is recommended for managing the VMware Directory Service as it allows for direct management and configuration of the directory service. Managing through the vSphere Web Client is also recommended as it provides a user-friendly interface for managing various VMware services, including the Directory Service.

Submit
33. Which three options are available for ESXi Certificate Replacement? (Choose three.)

Explanation

The three options available for ESXi Certificate Replacement are VMware Certificate Authority mode, Custom Certificate Authority mode, and Thumbprint mode. VMware Certificate Authority mode allows the ESXi host to obtain a certificate from a VMware Certificate Authority. Custom Certificate Authority mode allows the ESXi host to obtain a certificate from a custom Certificate Authority. Thumbprint mode allows the ESXi host to replace the certificate with a certificate that has a specific thumbprint. These options provide flexibility in managing and replacing certificates in ESXi environments.

Submit
34. An administrator has been instructed to secure existing virtual machines in vCenter Server.Which two actions should the administrator take to secure these virtual machines? (Choose two.)

Explanation

The administrator should restrict Remote Console access to secure the virtual machines. By limiting access to the console, unauthorized users will not be able to interact with the virtual machines directly. Additionally, the administrator should prevent the use of Independent Non-Persistent virtual disks. These disks do not retain any changes made to them, which can be a security risk as any malicious activity or data breach would not be saved. By preventing their use, the administrator can ensure that all changes made to the virtual machines are persistent and can be audited if necessary.

Submit
35. Which two solutions require Physical Mode Raw Device Mapping (RDM)? (Choose two.)

Explanation

Physical Mode Raw Device Mapping (RDM) is required for two solutions: direct access to the storage array device and guest clustering across ESXi hosts.

Direct access to the storage array device allows virtual machines to directly access the storage without going through the virtualization layer, which can be useful for certain applications or storage configurations.

Guest clustering across ESXi hosts requires RDM to provide shared access to the same storage device for multiple virtual machines in a cluster. This allows for high availability and failover capabilities within the cluster.

Submit
36. Which three ports are used by the vSphere Web Client when connecting directly to an ESXi 6.x host?(Choose three.)

Explanation

The vSphere Web Client uses three ports when connecting directly to an ESXi 6.x host. Port 443 TCP is used for HTTPS communication, allowing secure access to the ESXi host. Port 902 TCP and UDP are used for communication between the vSphere Web Client and the ESXi host's management agents. Port 903 TCP is used for communication between the vSphere Web Client and the ESXi host's hostd agent. These ports are essential for establishing a connection and managing the ESXi host through the vSphere Web Client.

Submit
37. An administrator notices that the time on an ESXi 6.x host is incorrect.Which two actions should the administrator take to correct this issue? (Choose two.)

Explanation

The administrator should first modify the time for the host using the vSphere client. This can be done by accessing the vSphere client, selecting the host, and navigating to the Configure tab, where the time settings can be adjusted. Secondly, the administrator should correct the NTP settings in the /etc/ntp.conf file. This file contains the configuration settings for the NTP (Network Time Protocol) service, and by making the necessary corrections, the host's time can be synchronized accurately.

Submit
38. What are two ways to view the DNS settings for an ESXi 6.x host? (Choose two.)

Explanation

The correct answer is to use the vicfg-dns command from the vSphere Management Appliance and to view the /etc/resolv.conf file on the ESXi host. These are two ways to view the DNS settings for an ESXi 6.x host. The vicfg-dns command can be used through the vSphere Management Appliance to configure and view DNS settings, while the /etc/resolv.conf file on the ESXi host contains the DNS configuration information that can be viewed directly.

Submit
39. Which two statements are correct regarding vSphere certificates? (Choose two.)

Explanation

ESXi host upgrades preserve the existing SSL certificate because the upgrade process does not involve replacing or reissuing the SSL certificate. Instead, it maintains the existing certificate, ensuring continuity in secure communication.

ESXi hosts have assigned SSL certificates from the VMware Certificate Authority (VMCA) during install. This means that during the installation process, the ESXi hosts are issued SSL certificates by the VMware Certificate Authority, ensuring that the communication between the hosts and other components is secure.

Submit
40. An administrator needs to create an Integrated Windows Authentication (IWA) Identity Source on a newlydeployed vCenter Server Appliance (VCSA).Which two actions will accomplish this? (Choose two.)

Explanation

not-available-via-ai

Submit
41. Which three services can be enabled/disabled in the Security Profile for an ESXi host? (Choose three.)

Explanation

The CIM Server service can be enabled/disabled in the Security Profile for an ESXi host. This service provides management and monitoring capabilities for the host. The Direct Console UI service can also be enabled/disabled, which allows administrators to access the host's console directly. Lastly, the Syslog Server service can be enabled/disabled, which allows the host to send log messages to a remote syslog server for centralized logging and analysis.

Submit
42. An administrator would like to use the VMware Certificate Authority (VMCA) as an Intermediate CertificateAuthority (CA). The first two steps performed are:- Replace the Root Certificate- Replace Machine Certificates (Intermediate CA)Which two steps would need to be performed next? (Choose two.)

Explanation

The next two steps that need to be performed are to replace the Solution User Certificates (Intermediate CA) and to replace the VMware Directory Service Certificate. These steps are necessary in order to fully utilize the VMware Certificate Authority (VMCA) as an Intermediate Certificate Authority (CA). By replacing the Solution User Certificates, the administrator ensures that all user certificates are updated and compatible with the VMCA. Similarly, by replacing the VMware Directory Service Certificate, the administrator ensures that the directory service is also updated and compatible with the VMCA.

Submit
43. A common root user account has been configured for a group of ESXi 6.x hosts.Which two steps should be taken to mitigate security risks associated with this configuration? (Choosetwo.)

Explanation

To mitigate security risks associated with a common root user account configured for a group of ESXi 6.x hosts, two steps should be taken. First, setting a complex password for the root account and limiting its use helps to enhance security by making it difficult for unauthorized users to gain access. Second, using ESXi Active Directory capabilities to assign users the administrator role allows for better control and management of user access, reducing the reliance on a single root account and distributing administrative privileges among authorized users.

Submit
44. Which three options are available for replacing vCenter Server Security Certificates? (Choose three.)

Explanation

The three options available for replacing vCenter Server Security Certificates are:
1. Replace with Certificates signed by the VMware Certificate Authority: This option involves obtaining new certificates from the VMware Certificate Authority and replacing the existing ones.
2. Make VMware Certificate Authority an Intermediate Certificate Authority: This option allows the VMware Certificate Authority to issue certificates that can be used by other certificate authorities.
3. Do not use VMware Certificate Authority, provision your own Certificates: This option involves using certificates from a different certificate authority or generating self-signed certificates instead of using the VMware Certificate Authority.

Submit
View My Results

Quiz Review Timeline (Updated): May 10, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • May 10, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 15, 2016
    Quiz Created by
    Prakash Pathak
Cancel
  • All
    All (44)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which Platform Service Controller Password Policy determines the...
An administrator is configuring the clock tolerance for the Single...
An administrator is upgrading a vCenter Server Appliance and wants to...
Which password meets ESXi 6.x host password requirements?  
An administrator wants to clone a virtual machine using the vSphere...
What will occur if the .nvram file is deleted from a powered off...
What is the minimum Virtual Hardware version required for vFlash Read...
An administrator wants to provide users restricted access. The users...
An administrator would like to use a passphrase for their ESXi 6.x...
An administrator is performing a silent automatic update of VMware...
What are two sample roles that are provided with vCenter Server by...
Which Advanced Setting should be created for the vCenter Server to...
An administrator wants to upgrade to vCenter Server 6.x.The vCenter...
An administrator is able to manage an ESXi 6.x host connected to...
An administrator has migrated a vCenter Server Appliance from version...
An administrator is building a large virtual machine that will require...
An administrator tries to connect the vSphere 5.5 Client to an ESXi...
Which group in the vsphere.local domain will have administrator...
Which two vCenter Server services are migrated automatically as part...
Lockdown Mode has been enabled on an ESXi 6.x host and users are...
Which two advanced features should be disabled for virtual machines...
To reduce the attack vectors for a virtual machine, which two settings...
Which two groups of settings should be reviewed when attempting to...
Which two features are available for virtual machines configured with...
Strict Lockdown Mode has been enabled on an ESXi host.Which action...
When attempting to log in with the vSphere Web Client, users have...
An administrator wants to allow users to login to the vSphere Web...
An administrator is troubleshooting a virtual machine that has...
Which three connection types are supported between a remote site and...
An administrator decides to change the root password for an ESXi 6.x...
An administrator connects to an ESXi 6.x host console in order to...
Which two methods are recommended for managing the VMware Directory...
Which three options are available for ESXi Certificate Replacement?...
An administrator has been instructed to secure existing virtual...
Which two solutions require Physical Mode Raw Device Mapping (RDM)?...
Which three ports are used by the vSphere Web Client when connecting...
An administrator notices that the time on an ESXi 6.x host is...
What are two ways to view the DNS settings for an ESXi 6.x host?...
Which two statements are correct regarding vSphere certificates?...
An administrator needs to create an Integrated Windows Authentication...
Which three services can be enabled/disabled in the Security Profile...
An administrator would like to use the VMware Certificate Authority...
A common root user account has been configured for a group of ESXi 6.x...
Which three options are available for replacing vCenter Server...
Alert!

Advertisement