2V0-21.23 Exam Prep Free – 50 Practice Questions to Get You Ready for Exam Day
Getting ready for the 2V0-21.23 certification? Our 2V0-21.23 Exam Prep Free resource includes 50 exam-style questions designed to help you practice effectively and feel confident on test day
Effective 2V0-21.23 exam prep free is the key to success. With our free practice questions, you can:
- Get familiar with exam format and question style
- Identify which topics you’ve mastered—and which need more review
- Boost your confidence and reduce exam anxiety
Below, you will find 50 realistic 2V0-21.23 Exam Prep Free questions that cover key exam topics. These questions are designed to reflect the structure and challenge level of the actual exam, making them perfect for your study routine.
An administrator is tasked with configuring certificates for a VMware software-defined data center (SDDC) based on the following requirements: All certificates should use certificates trusted by the Enterprise Certificate Authority (CA). The solution should minimize the ongoing management overhead of replacing certificates. Which three actions should the administrator take to ensure that the solution meets corporate policy? (Choose three.)
A. Replace the VMware Certificate Authority (VMCA) certificate with a self-signed certificate generated from the VMCA.
B. Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.
C. Replace the machine SSL certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
D. Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.
E. Replace the solution user certificates with custom certificates generated from the Enterprise CA.
F. Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
A combination of which two components of the software-defined data center (SDDC) are re-sponsible for the initial abstraction of CPU, memory, disk, and network resources and their sub-sequent management? (Choose two.)
A. VMware Aria Operations
B. VMware Aria Suite Lifecycle
C. VMware vCenter
D. VMware ESXi
E. VMware vCenter Cloud Gateway
An administrator is required to configure several Microsoft Windows virtual machines (VMs) to support Secure Boot for a critical secure application. The following information is provided: • The corporate security policy states that all forms of data encryption must utilize a key provider. • The firmware of each VM is currently set to use Unified Extensible Firmware Interface (UEFI). • Due to the nature of the application running within the VMs, the guest operating system for each VM is currently a minimum of Windows Server 2008 and Windows 7. Which security feature should the administrator implement to meet these requirements?
A. vSphere Virtual Machine Encryption
B. vSphere Visualization-Based Security
C. Virtual Intel Software Guard Extensions (vSGX)
D. Virtual Trusted Platform Module (vTPM)
An administrator enables Secure Boot on an ESXi host. On booting the ESXi host, the following error message appears: Fatal error: 39 (Secure Boot Failed) What is the cause of this issue?
A. The kernel hos been tampered with.
B. The Trusted Platform Module chip has failed.
C. The administrator attempted to boot with a bootloader that is unsigned or has been tampered with.
D. A package (VIB or driver) has been tampered with.
An administrator is tasked with providing users access to objects within an existing VMware vCenter instance. The vCenter inventory has a single data center with one management vSphere cluster and five workload vSphere clusters. The following requirements must be met for assigning the users access: Users must only be able to view all of the inventory objects associated with the management vSphere cluster. Users must be able to edit all of the inventory objects associated with the workload vSphere clusters. The administrator creates a custom role to provide the permissions needed to allow users to edit inventory objects. Which series of steps should the administrator complete to assign the custom role and provide the required level of access to users?
A. Apply Global permissions to assign the Read Only role to the root vCenter object.Apply vCenter permissions to assign the custom role to the workload vSphere clusters and enable propagation.
B. Apply Global permissions to assign the Read Only role to the root vCenter object and enable propagation.Apply vCenter permissions to assign the custom role to the workload vSphere clusters and enable propagation.
C. Apply Global permissions to assign the Read Only role to the root vCenter object.Apply vCenter permissions to assign the custom role to the workload vSphere clusters.
D. Apply Global permissions to assign the Read Only role to the root vCenter object and enable propagation.Apply vCenter permissions to assign the custom role to the workload vSphere clusters.
An administrator remotely deploys VMware ESXi using an out of band management connection and now needs to complete the configuration of the management network so that the host is ac-cessible through the vSphere Host Client. The following information has been provided to complete the configuration: • Host FQDN: esxi01.corp.local • Management VLAN ID: 10 • DHCP: No • Management IP Address: 172.16.10.101/24 • Management IP Gateway: 172.16.10.1 • Corporate DNS Servers: 172.16.10.5, 172.16.10.6 • DNS Domain: corp.local In addition, all host configurations must also meet the following requirements: • The management network must use only IPv4 network protocols. • The management network must be fault tolerant. Which four high level tasks should the administrator complete in the Direct Console User Inter-face (DCUI) in order to meet the requirements and successfully log into the vSphere Host Cli-ent? (Choose four.)
A. Set the value of the VMware ESXi Management Network VLAN ID to 10.
B. Configure at least two network adapters for the VMware ESXi Management Network.
C. Update the VMware ESXi Management Network IPv4 configuration to use a static IPv4 ad-dress.
D. Create a DNS A Record for the VMware ESXi host on the corporate DNS servers.
E. Disable IPv6 for the VMware ESXi Management Network.
F. Restore the original Management vSphere Standard Switch.
G. Update the VMware ESXi Management Network DNS configuration to use the corporate DNS servers for names resolution.
An administrator manages VM templates and ISO images for a remote office. Their main re-quirements are to store these templates in a single repository and manage different versions of the templates. What solution should the administrator deploy to meet these requirements?
A. A vSAN datatore
B. A shared VMFS datastore
C. A local content library
D. A subscribed content library
An administrator needs to configure a content library solution based on the following infor-mation: • A new corporate virtual machine (VM) template is created every month to include all of the latest patches. • The new VM template should be downloaded from the primary data center site (London) to two secondary data center sites (Tokyo and New York) as soon as possible. • There is limited disk space available at one of the secondary data center sites (Tokyo) due to an ongoing data center consolidation project. Which four steps should the administrator take to configure the content library solution before adding a VM template? (Choose four.)
A. Create a new published content library in each secondary site.
B. Configure the New York subscribed content library to download content immediately.
C. Configure the Tokyo subscribed content library to download content immediately.
D. Configure the Tokyo subscribed content library to download content when needed.
E. Create a new published content library at the primary site.
F. Configure the New York subscribed content library to download content when needed.
G. Create a new subscribed content library in each secondary site.
Which four elements can a vSphere Lifecycle Manager image contain? (Choose four.)
A. ESXi base image
B. ESXi configuration
C. Vendor agents
D. Vendor add-ons
E. BIOS updates
F. Firmware and drivers add-on
G. Independent components
An administrator is tasked with applying updates to a vSphere cluster running vSAN using vSphere Lifecycle Manager. Downtime to the ESXi hosts must be minimal while the work is completed. The administrator has already completed the following steps and no errors have been returned: Downloaded all applicable software and created a new image. Attached the new image to the cluster and run a compliance check against the image for the cluster. Ran a remediation pre-check for the cluster. Which two series of steps should the administrator perform to start the remediation of the cluster using the new image? (Choose two.)
A. 1. Use the Remediate option in vSphere Lifecycle Manager to remediate all of the ESXi hosts in the cluster in parallel.2. Allow vSphere Lifecycle Manager to automatically control maintenance mode on the ESXi hosts.
B. 1. Place each of the ESXi hosts into maintenance mode manually.2. Use the Stage option in vSphere Lifecycle Manager to stage the required software on all ESXi hosts one at a time.
C. 1. Leave all ESXi hosts in the cluster operational.2. Use the Stage All option in vSphere Lifecycle Manager to stage the required software onto all ESXi hosts one at a time.
D. 1. Leave all ESXi hosts in the cluster operational.2. Use the Stage All option in vSphere Lifecycle Manager to stage the required software onto all ESXi hosts in the cluster in parallel.
E. 1. Use the Remediate option in vSphere Lifecycle Manager to remediate all of the ESXi hosts in the cluster in sequence.2. Allow vSphere Lifecycle Manager to automatically control maintenance mode on the ESXi hosts.
During the staging of a patch on a vCenter Server Appliance, an error was encountered and the process stopped. An administrator resolved the root cause and is ready to continue with the staging of the patch. From the vCenter Management Interface, which action should the administrator take to continue the process from the point at which the error occurred?
A. Use the Stage and Install option to resume the staging.
B. Use the Resume option to resume the staging.
C. Use the Unstage option to restart the staging.
D. Use the Stage Only option to restart the staging.
An administrator is asked to configure a security policy at the port group level of a standard switch. The following requirements must be met: The security policy must apply to all virtual machines on portgroup-1. All traffic must be forwarded, regardless of the destination. Which security policy must the administrator configure?
A. Forged transmits set to reject
B. MAC address changes set to accept
C. Promiscuous mode set to reject
D. Promiscuous mode set to accept
An administrator has a requirement to revert a running virtual machine to a previous snapshot after a failed attempt to upgrade an application. When the administrator originally took the snapshot, the following choices in the Take Snapshot dialog were made: Snapshot the virtual machine’s memory = false Quiesce guest file system = false What will be the result of the administrator selecting the “Revert to Latest Snapshot” option to return the virtual machine to a previous snapshot?
A. The virtual machine will be restored to the parent snapshot in a powered on state.
B. The virtual machine will be restored to the parent snapshot in a powered off state.
C. The virtual machine will be restored to the child snapshot in a powered off state.
D. The virtual machine will be restored to the child snapshot in a powered on state.
An administrator is investigating user logon failures for a VMware vCenter instance. Where can the administrator find log files containing information related to user login activities?
A. On the vCenter Management Interface
B. On the ESXi host using the Direct Console User Interface
C. On the vCenter Server Appliance
D. In the vSphere Client when viewing the vCenter virtual machine
An administrator is configuring vSphere Lifecycle Manager to install patches to a vSphere cluster. The cluster runs workload virtual machines (VMs) that are incompatible with vSphere vMotion, and therefore cannot be live migrated between hosts during the installation of the patches. Which configuration in vSphere Lifecycle Manager will allow the administrator to reduce the downtime associated with the patching operation without migrating the VMs?
A. Enable Distributed Power Management (DPM) and set the VM power state to the suspend to disk option
B. Enable Quick Boot ana set the VM power stale to the suspend to disk option
C. Enable vSphere High Availability (HA) admission control and set the VM power stale to the suspend to memory option
D. Enable Quick Boot and set the VM power state to the suspend to memory option
Following a merger with another company, an administrator is tasked with configuring an identity source for VMware vCenter so that all vSphere administrators can authenticate using their existing Active Directory accounts. Each company has user accounts in their own Active Directory forests. The following additional information has been provided: The corporate policy states that only Windows-based machine accounts are allowed in Active Directory. Which action should the administrator take to configure vCenter Single Sign-On (SSO) to meet this requirement?
A. Configure SSO to use Active Directory over LDAP as the identity source.
B. Configure SSO to use OpenLDAP as the identity source.
C. Join the vCenter Server Appliance to the LDAP domain.
D. Configure SSO to use Active Directory (Integrated Windows Authentication) as the identity source.
Which two tasks can be completed using vSphere LifeCycle Manager? (Choose two.)
A. Manage the firmware lifecycle of ESXi hosts that are part of a managed cluster with a single image.
B. Check that the ESXi hosts are compliant with the recommended baseline and update the hosts.
C. Upgrade VMware vCenter from version 7 to 8.
D. Check the hardware compatibility of the hosts in a cluster against the VMware Compatibility Guide (VCG) using baselines.
E. Manage the firmware lifecycle of ESXi hosts are part of a managed cluster using baselines.
An administrator is working with VMware Support and is asked to provide log bundles for the ESXi hosts in an environment. Which three options does the administrator have? (Choose three.)
A. Generate a combined log bundle for all ESXi hosts using the vCenter Management Interface.
B. Generate a separate log bundle for each ESXi host using the vSphere Host Client.
C. Generate a combined log bundle for all ESXi hosts using the vSphere Client.
D. Generate a separate log bundle for each ESXi host using the vSphere Client.
E. Generate a separate log bundle for each ESXi host using the vCenter Management Interface.
F. Generate a combined log bundle for all ESXi hosts using the vSphere Host Client.
An administrator is tasked with deploying a new on-premises software-defined data center (SDDC) that will contain a total of eight VMware vCenter instances. The following requirements must be met: All vCenter instances should be visible in a single vSphere Client session. All vCenter inventory should be searchable from a single vSphere Client session. Any administrator must be able to complete operations on any vCenter instance using a single set of credentials. What should the administrator configure to meet these requirements?
A. Two Enhanced Linked Mode groups consisting of four vCenter instances each in a Single Sign-On domain.
B. A single Hybrid Linked Mode group consisting of four vCenter instances each in a Single Sign-On domain.
C. A single Enhanced Linked Mode group consisting of eight vCenter instances in one Single Sign-On domain.
D. A single Hybrid Linked Mode group consisting of eight vCenter instances in one Single Sign-On domain.
An administrator has Windows virtual machines (VMs) and VMware Tools is installed in each VM. The administrator performs a status check of VMware Tools using vSphere Lifecycle Manager. What is the VMware Tools status for the Windows VMs if the version of VMware Tools has a known problem and must be immediately upgraded?
A. Version Unsupported
B. Guest Managed
C. Unknown
D. Upgrade Available
An administrator manually configures a reference ESXi host that meets company security standards for vSphere environments. The administrator now needs to apply all of the security standards to every identically configured host across multiple vSphere clusters within a single VMware vCenter instance. Which four steps would the administrator complete to meet this requirement? (Choose four.)
A. Extract the host profile from the reference host.
B. Export the host profile from vCenter.
C. Import host customization on the reference host.
D. Attach the host profile to each cluster that requires the secure configuration.
E. Check the compliance of each host against the host profile.
F. Reset host customization on the reference host.
G. Remediate all non-compliant hosts.
The vCenter inventory contains a virtual machine (VM) template called Linux-01. The adminis-trator wants to install a software patch into Linux-01 while allowing users to continue to access Linux-01 to deploy VMs. Which series of steps should the administrator take to accomplish this task?
A. 1. Verify that Linux-01 is in a content library.2. Clone Linux-013. Convert the clone to a VM.4. Install the software patch.
B. 1. Convert Linux-01 to a VM2. Install the software patch.3. Convert the VM back to a VM template.4. Add Linux-01 to the content library.
C. 1. Verify that Linux-01 is in a content library.2. Check out Linux-01.3. Install the software patch.4. Check in Linux-01.
D. 1. Clone Linux-01.2. Convert the clone to a VM.3. Install the software patch.4. Convert the VM back to a template.
An administrator has been notified that a number of hosts are not compliant with the company policy for time synchronization. The relevant portion of the policy states: All physical servers must synchronize time with an external time source that is accurate to the microsecond. Which step should the administrator take to ensure compliance with the policy?
A. Ensure that each vCenter Server Appliance is configured to use a Network Time Protocol (NTP) source.
B. Ensure that each ESXi host is configured to use a Precision Time Protocol (PTP) source.
C. Ensure that each ESXi host is configured to use a Network Time Protocol (NTP) source.
D. Ensure that each vCenter Server Appliance is configured to use a Precision Time Protocol (PTP) source.
An administrator has mapped three vSphere zones to three vSphere clusters. Which two statements are true for this vSphere with Tanzu zonal Supervisor enablement? (Choose two.)
A. One Supervisor will be created in a specific zone.
B. One Supervisor will be created across all zones.
C. Three Supervisors will be created in Linked Mode.
D. Individual vSphere Namespaces will be placed into a specific zone.
E. Individual vSphere Namespaces will be spread across all zones.
An administrator is preparing for a deployment of a new vCenter Server Appliance. The follow-ing information has been provided to complete the deployment: • ESXi Host name (FQDN): esx01.corp.local • ESXi IP Address: 172.20.10.200 • vCenter Server Name (FQDN): vcsa01.corp.local • vCenter Server IP Address: 172.20.10.100 • NTP Server: 172.20.10.20 • DNS Server: 172.20.10.1 • Deployment Size: Tiny • Storage Size: Default Which two actions must the administrator complete before starting the installation of the vCenter Server Appliance? (Choose two.)
A. Create a DNS CNAME record for the vCenter Server (vcsa01.corp.local).
B. Create a DNS CNAME record for the ESXi Host server (esx01.corp.local).
C. Create a reverse DNS A record for the vCenter Server (vcsa01).
D. Create a reverse DNS A record for the ESXi Host server (esx01)
E. Create a forward DNS A record for the vCenter Server (vcsa01).
An administrator is looking to deploy a new VMware vCenter instance. The current environment consists of 75 hosts and is expected to grow up to 100 hosts over the next three years. Which deployment size should the administrator select?
A. Medium
B. Tiny
C. Large
D. Small
An administrator creates a new corporate virtual machine (VM) template every month to include all of the latest patches. The administrator needs to ensure that the new VM template is synchronized from the primary data center site (London) to two secondary data center sites (Tokyo and New York). The administrator is aware that datastore space is limited within the secondary data center sites. The administrator needs to ensure that the VM template is available in the secondary sites the first time a new virtual machine is requested. Which four steps should the administrator take to meet these requirements? (Choose four.)
A. Create a new published content library at the primary site.
B. Add the virtual machine template to the subscribed content library.
C. Create a new published content library in each secondary site.
D. Create a new subscribed content library in each secondary site.
E. Configure the subscribed content library to download content when needed.
F. Configure each subscribed content library to download content immediately.
G. Add the virtual machine template to the published content library.
Refer to the exhibit.An administrator is tasked with adding new capacity to an existing software-defined data center (SDDC). • The SDDC currently hosts two vSphere clusters (ClusterA and ClusterB) with different CPU compatibilities. • vSphere vMotion and vSphere Distributed Resource Scheduler (DRS) are currently in use in the SDDC. • The new capacity will be implemented by provisioning four ESXi hosts running a new generation of Intel Skylake CPUs. • All workload virtual machines (VMs) must support live migration to any cluster in the SDDC. The administrator noticed the running critical "evc1" virtual machine (VM) shown in the exhibit is not migrating using vSphere vMotion to the original Clusters A or B. Which three steps must the administrator take to support this functionality? (Choose three.)
A. Disable the Enhanced vMotion Compatibility (EVC) on the VM.
B. Reboot the VM.
C. Configure the Enhanced vMotion Compatibility (EVC) on the VM to Intel Skylake.
D. Power on the VM.
E. Configure the Enhanced vMotion Compatibility (EVC) on vSphere Cluster A and B to sup-port Intel Skylake.
F. Power off the VM.
An administrator is tasked with installing VMware vCenter. The vCenter Server Appliance must support an environment of: 400 hosts 4000 virtual machines Which two resources must be allocated, at a minimum, to meet the requirements? (Choose two.)
A. 16 vCPUs
B. 30 GB Memory
C. 4 vCPUs
D. 8 vCPUs
E. 20 GB Memory
An administrator is creating a content library to manage VM templates and ISO images. The administrator wants to password-protect the images and templates and share them with a remote site. Which two tasks must the administration perform when creating the content library? (Choose two.)
A. Publish the local content library.
B. Enable the security policy.
C. Create a subscribed content library.
D. Select an NFS datastore.
E. Enable authentication.
A vSphere cluster has the following vSphere Distributed Resource Scheduler (DRS) group configuration: Virtual machine (VM) group named DB Host groups named PROD11 and PROD55 The administrator wants to force the VMs in the DB group to run on the hosts in the PROD11 group. However, if all the hosts in PROD11 go offline for maintenance, then the VMs in the DB group should run on hosts in PROD55. Which VM/Host rule must the administrator create to ensure that these requirements are met?
A. A preferential rule between the DB group and the PROD11 group
B. A preferential rule between the DB group and the PROD55 group
C. A required rule between the DB group and the PROD11 group
D. A required rule between the DB group and the PROD55 group
Which two datastore types store the components of a virtual machine as a set of objects? (Choose two.)
A. VMware Virtual Machine File System (VMFS)
B. VMware vSAN
C. Network File System (NFS) 3
D. vSphere Virtual Volumes (vVols)
E. Network File System (NFS) 4.1
What is the minimum network throughput in Gb/s for vSAN using the Express Storage Architec-ture (ESA)?
A. 50
B. 25
C. 1
D. 10
An administrator needs to create affinity rules for the following vSphere cluster setup: • The cluster contains two virtual machines (VMs) named app01 and app02. • The cluster contains six hosts named esx11 through esx16. • The app01 and app02 VMs run software that is licensed to run only on esx11, esx12, or esx13. • vSphere Distributed Resource Scheduler (DRS) is configured. Which set of steps must the administrator perform to ensure that the licensing requirements are met for app01 and app02?
A. 1. Add all the hosts to a host group.2. Create a VM-VM anti-affinity rule for app01 and app02.
B. 1. Add the esx11 – esx13 hosts to a host group.2. Create a VM-VM affinity rule for app01 and app02.
C. 1. Add the VMs to a VM group and the esx11 – esx13 hosts to a host group.2. Create a VM-Host required rule between the VM group and the host group.
D. 1. Add the VMs to a VM group and the esx11 – esx13 hosts to a host group.2. Create a VM-Host preferential rule between the VM group and the host group.
Refer to the exhibit.Given the configuration shown in the exhibit, what should the administrator do if the latest VM template contains changes that are no longer needed?
A. Delete App-LibTemplate (2)
B. Revert to App-LibTemplate (2)
C. Delete App-LibTemplate (3)
D. Check out App-LibTemplate (3)
An administrator is completing the configuration of a new vSphere cluster and has enabled vSphere High Availability (HA) and vSphere Distributed Resource Scheduler (DRS). After adding the ESXi hosts to the cluster, which networking information will the administrator be prompted to provide when using the Cluster Quickstart workflow?
A. vMotion networking
B. Management networking
C. vSAN networking
D. Virtual machine networking
Refer to the exhibit.After updating a predefined alarm on VMware vCenter, an administrator enables email notifications as shown in the attached alarm; however, notifications are NOT being sent. Where must the mail server settings be configured by the administrator to resolve this issue?
A. In the ESXi host system config
B. In the alarm rule definition
C. In the vCenter settings in the vSphere Client
D. In the vCenter Management Interface
A VMkernel port is labelled PROD01 and uses the default TCP/IP stack. Currently, this VMkernel port is configured for supporting live virtual machine (VM) migrations. Which configuration change should the administrator make to isolate live VM migration traffic from other network traffic?
A. Remove PROD01 and create a new VMkernel port and set the TCP/IP stack to vSphere vMotion.
B. Remove PROD01 and create a new VMkernel port with the TCP/IP stack set to provisioning.
C. Create a new VMkernel port and set the TCP/IP stack to provisioning.
D. Modify PROD01 by changing the TCP/IP stack to vSphere vMotion.
An administrator is performing maintenance activities and discovers that a Virtual Machine File System (VMFS) datastore has a lot more used capacity than expected. The datastore contains 10 virtual machines (VMs) and, when the administrator reviews the contents of the associated datastore, discovers that five virtual machines have a snapshot file (-delta.vmdk files) that has not been modified in over 12 months. The administrator checks the Snapshot Manager within the vSphere Client and confirms that there are no snapshots visible. Which task should the administrator complete on the virtual machines to free up datastore space?
A. Consolidate the snapshots for each VM.
B. Inflate the disk files for each VM.
C. Delete all snapshots for each VM.
D. Storage vMotion each VM to another datastore.
If a distributed switch uses the “Route based on physical NIC load” load balancing algorithm, what does the mean send or receive utilization of an uplink need to exceed for the flow of traffic to move to the second uplink?
A. 75 percent of the capacity over a 30 second period
B. 60 percent of the capacity over a 30 second period
C. 60 percent of the capacity over a 40 second period
D. 75 percent of the capacity over a 40 second period
An administrator is tasked with configuring an appropriate Single Sign-On (SSO) solution for VMware vCenter based on the following criteria: The solution should support the creation of Enhanced Link Mode groups. All user accounts are stored within a single Active Directory domain and the solution must support only this Active Directory domain as the identity source. All user account password and account lockout policies must be managed within the Active Directory domain. The solution should support token-based authentication. Which SSO solution should the administrator choose based on the criteria?
A. vCenter Identity Provider Federation with Active Directory Federation Services as the identity provider
B. vCenter Single Sign-On with Active Directory over LDAP as the identity source
C. vCenter Single Sign-On with Active Directory (Windows Integrated Authentication) as the identity source
D. vCenter Identity Provider Federation with Active Directory over LDAP as the identity provider
An administrator wants to create virtual machine (VM) templates and store them in a content library. The administrator would like to use the content library to manage different versions of these templates so that reverting to an earlier version is an option. How should the administrator create these templates?
A. Select a VM in the vCenter inventory.Clone the VM to the content library as a VM template type.
B. Select a VM template in the vCenter inventory.Clone the template to the content library.
C. Export a VM in the vCenter inventory to an OVF template.Import the OVF template into the content library.
D. Convert a VM to a template in the vCenter inventory.Clone the template to the content library.
Refer to the exhibit.After removing an ESXi host from a cluster for maintenance, a number of virtual machines have encountered the warning seen in the exhibit. After re-adding the ESXi, the issue is resolved. Which step should the administrator take to move the triggered alarm to its normal state?
A. Ignore
B. Acknowledge
C. Disable
D. Reset to Green
After adding a new vSphere ESXi host with identical hardware configuration to an existing vSphere cluster, which task would an administrator complete prior to checking the compliance with an existing host profile?
A. Attach the host profile to the new host
B. Duplicate the host profile
C. Copy the host setting from the new host
D. Import the host profile
An administrator creates a virtual machine that contains the latest company-approved software, tools and security updates. Company policy requires that only full clones are allowed for server workloads. A combination of which two tasks should the administrator complete to prepare for the deployment of this virtual machine for multiple users? (Choose two.)
A. Set appropriate permissions on the virtual machine.
B. Create a virtual machine customization specification.
C. Upgrade the virtual hardware.
D. Convert the virtual machine to a template.
E. Take a snapshot of the virtual machine.
A vSphere environment is experiencing intermittent short bursts of CPU contention, causing brief production outages for some of the virtual machines (VMs). To understand the cause of the issue, the administrator wants to observe near real-time statistics tor all VMs. Which two vSphere reporting tools could the administrator use? (Choose two.)
A. Advanced Performance Charts
B. esxcli
C. resxtop
D. Overview Performance Charts
E. esxtop
An administrator is asked to segregate virtual machine (VM) traffic by VLAN on a vSphere standard switch. The following requirements must be met: • VLAN ID on the switch port group must be 4095. • VLAN tagging must be done at the VM level. Which tagging mode is required?
A. External Switch Tagging (EST)
B. None
C. Virtual Guest Tagging (VGT)
D. Virtual Switch Tagging (VST)
An administrator is attempting to configure Storage I/O Control (SIOC) on five datastores within a vSphere environment. The administrator is being asked to determine why SIOC configuration completed successfully on only four of the datastores. What are two possible reasons why the configuration was not successful? (Choose two.)
A. The datastore contains Raw Device Mappings (RDMs).
B. SAS disks are used for the datastore.
C. The datastore has multiple extents.
D. The datastore is using ISCSI.
E. The administrator is using NFS storage.
What are two uses cases for VMware Tools? (Choose two.)
A. Time synchronization with an NTP server
B. Direct deployment of the Aria Automation Config minion
C. Share folders between ESXi hosts and guest OS file systems
D. Ability to shut down a virtual machine remotely
E. Support for unsupported network device drivers
Which feature would allow for the non-disruptive migration of a virtual machine between two clusters in a single VMware vCenter instance?
A. vSphere vMotion
B. Cross vCenter Migration
C. vSphere Storage vMotion
D. vSphere Fault Tolerance
Access Full 2V0-21.23 Exam Prep Free
Want to go beyond these 50 questions? Click here to unlock a full set of 2V0-21.23 exam prep free questions covering every domain tested on the exam.
We continuously update our content to ensure you have the most current and effective prep materials.
Good luck with your 2V0-21.23 certification journey!