Q71. An administrator wants to reduce the memory overhead for a 3D graphics enabled virtual machine (VM).

What advanced feature can be added to the VM configuration file to reduce memory overhead?

A. vga.vgaOnly=TRUE

B. vga.svgaEnable=FALSE

C. svgaEnabled=FALSE

D. svgaDisable=TRUE

Answer: A


Q72. Which two groups of settings should be reviewed when attempting to increase the security of virtual machines (VMs)? (Choose two.)

A. Disable hardware devices

B. Disable unexposed features

C. Disable VMtools devices

D. Disable VM Template features

Answer: A,B


Q73. An administrator is concerned about possible vCPU over-commitment for an ESXi 6.x host.

Which two Performance Counters should be reviewed in the vSphere Web Client Performance Charts to confirm if there is contention on the host? (Choose two.)

A. Wait

B. Ready

C. Core Utilization

D. Co-Stop

Answer: B,D


Q74. An administrator tries to capture network traffic for a virtual machine, but cannot see the expected traffic in the packet capture tool.

Which step can resolve the problem?

A. Migrate the virtual machine to a Distributed Virtual Switch.

B. Enable Promiscous Mode on the relevant port group.

C. Modify the default value of MAC Address changes.

D. Enable Forged Transmits on the virtual machine.

Answer: B


Q75. When attempting to log in with the vSphere Web Client, users have reported the error: Incorrect Username/Password

The administrator has configured the Platform Services Controller Identity Source as:

✑ Type. Active Directory as an LDAP Server

✑ Domain: vmware.com

✑ Alias: VMWARE

✑ Default Domain: Yes

Which two statements would explain why users cannot login to the vSphere Web Client? (Choose two.)

A. Users are typing the password incorrectly.

B. Users are in a forest that has 1-way trust.

C. Users are in a forest that has 2-way trust.

D. Users are logging into vCenter Server with incorrect permissions.

Answer: A,B


Q76. Refer to the Exhibit.

An administrator has configured Distributed Resource Scheduler (DRS) groups and Affinity Rules as shown in the Exhibit.

Based on the exhibit, which two statements are true? (Choose two.)

A. If ESXi-A and ESXi-D failed, VM-A and VM-B would not failover.

B. A new conflicting affinity rule will be disabled by default.

C. VM-B and VM-D can run on the same hosts.

D. The administrator must disable Rule3 in order to enable Rule4.

Answer: B,D


Q77. An administrator is experiencing network connectivity issues between virtual machines. The virtual machines and hosts are configured as follows:

✑ VM1 is running on Host1

✑ VM2 is running on Host2

✑ Both Host1 and Host2 are attached to the vSphere Distributed Switch dvSwitch1

✑ Both Host1 and Host2 are using vmnic0 and vmnic1 on dvSwitch1

✑ Both virtual machines are using the default portgroup for network traffic

What are three settings the administrator should investigate while troubleshooting the connectivity issue? (Choose three.)

A. VLANs of the physical NICs

B. Failover order of the uplinks

C. Virtual NIC connectivity to the dvSwitch

D. Security policy of the portgroup

E. Traffic shaping on the portgroup

Answer: A,B,C


Q78. An administrator is configuring the clock tolerance for the Single Sign-On token configuration policy and wants to define the time skew tolerance between a client and the domain controller clock.

Which time measurement is used for the value?

A. Milliseconds

B. Seconds

C. Minutes

D. Hours

Answer: A


Q79. What are three recommended prerequisites before upgrading virtual machine hardware? (Choose three.)

A. Create a backup or snapshot of the virtual machine.

B. Upgrade VMware Tools to the latest version.

C. Verify that the virtual machine is stored on VMFS3, VMFS5, or NFS datastores.

D. Detach all CD-ROM/ISO images from the virtual machines.

E. Set the Advanced Parameter virtualHW.version = 11

Answer: A,B,C


Q80. An administrator is creating a new Content Library. It will subscribe to another remote Content Library without authentication enabled.

What information from the published library will they need in order to complete the

subscription?

A. Subscription URL

B. A security password from the publishing Content Library

C. Publisher's Items.json file

D. Username from the publishing Content Library

Answer: A