VMware 2V0-21.23 Real Exam Questions
The questions for 2V0-21.23 were last updated at Nov 21,2024.
- Exam Code: 2V0-21.23
- Exam Name: VMware vSphere 8.x Professional
- Certification Provider: VMware
- Latest update: Nov 21,2024
An administrator creates a virtual machine that contains the latest company-approved software, tools and security updates. Company policy requires that only full clones are allowed for server workloads.
A combination of which two tasks should the administrator complete to prepare for the deployment of this virtual machine for multiple users? (Choose two.)
- A . Set appropriate permissions on the virtual machine.
- B . Create a virtual machine customization specification.
- C . Upgrade the virtual hardware.
- D . Convert the virtual machine to a template.
- E . Take a snapshot of the virtual machine.
An administrator is attempting to configure Storage I/O Control (SIOC) on five datastores within a vSphere environment. The administrator is being asked to determine why SIOC configuration completed successfully on only four of the datastores.
What are two possible reasons why the configuration was not successful? (Choose two.)
- A . The datastore contains Raw Device Mappings (RDMs).
- B . SAS disks are used for the datastore.
- C . The datastore has multiple extents.
- D . The datastore is using ISCSI.
- E . The administrator is using NFS storage.
An administrator is tasked with configuring vSphere Trust Authority.
The administrator has completed the following steps:
Set up the workstation –
Enabled the Trust Authority Administrator
Enabled the Trust Authority State
Collected information about the ESXi hosts and vCenter to be trusted
Which step does the administrator need to complete next?
- A . Import the Trusted Host information to the Trust Authority Cluster
- B . Import the Trusted Cluster information to the Trusted Hosts
- C . Create the Key Provider on the Trusted Cluster
- D . Import the Trusted Host information to the Trusted Cluster
An administrator manually configures a reference ESXi host that meets company security standards for vSphere environments. The administrator now needs to apply all of the security standards to every identically configured host across multiple vSphere clusters within a single VMware vCenter instance.
Which four steps would the administrator complete to meet this requirement? (Choose four.)
- A . Extract the host profile from the reference host.
- B . Export the host profile from vCenter.
- C . Import host customization on the reference host.
- D . Attach the host profile to each cluster that requires the secure configuration.
- E . Check the compliance of each host against the host profile.
- F . Reset host customization on the reference host.
- G . Remediate all non-compliant hosts.
Which feature would allow for the non-disruptive migration of a virtual machine between two clusters in a single VMware vCenter instance?
- A . vSphere vMotion
- B . Cross vCenter Migration
- C . vSphere Storage vMotion
- D . vSphere Fault Tolerance
An administrator has mapped three vSphere zones to three vSphere clusters.
Which two statements are true for this vSphere with Tanzu zonal Supervisor enablement? (Choose two.)
- A . One Supervisor will be created in a specific zone.
- B . One Supervisor will be created across all zones.
- C . Three Supervisors will be created in Linked Mode.
- D . Individual vSphere Namespaces will be placed into a specific zone.
- E . Individual vSphere Namespaces will be spread across all zones.
An administrator is looking to deploy a new VMware vCenter instance. The current environment consists of 75 hosts and is expected to grow up to 100 hosts over the next three years.
Which deployment size should the administrator select?
- A . Medium
- B . Tiny
- C . Large
- D . Small
An administrator is tasked with moving an application and guest operating system (OS) running on top of a physical server to a software-defined data center (SDDC) in a remote secure location.
The following constraints apply:
The remote secure location has no network connectivity to the outside world.
The business owner is not concerned if all changes in the application make it to the SDDC in the secure location.
The application’s data is hosted in a database with a high number of transactions.
What could the administrator do to create an image of the guest OS and application that can be moved to this remote data center?
- A . Create a hot clone of the physical server using VMware vCenter Converter.
- B . Create a cold clone of the physical server using VMware vCenter Converter.
- C . Restore the guest OS from a backup.
- D . Use storage replication to replicate the guest OS and application.
A vSphere environment is experiencing intermittent short bursts of CPU contention, causing brief production outages for some of the virtual machines (VMs). To understand the cause of the issue, the administrator wants to observe near real-time statistics tor all VMs.
Which two vSphere reporting tools could the administrator use? (Choose two.)
- A . Advanced Performance Charts
- B . esxcli
- C . resxtop
- D . Overview Performance Charts
- E . esxtop
An administrator is adding a new ESXi host to an existing vSphere cluster. When selecting the cluster, the administrator is unable to use the Cluster Quickstart workflow to add and configure the additional host.
What could be the root cause of this issue?
- A . The administrator has previously dismissed the Cluster Quickstart workflow.
- B . The administrator must manually add the host to the cluster before using the Cluster Quickstart workflow.
- C . The administrator has not been assigned the required permissions to use the Cluster Quickstart workflow.
- D . The administrator must enable the Cluster Quickstart workflow option in VMware vCenter.