2V0-21.23 Mock Test Free – 50 Realistic Questions to Prepare with Confidence.
Getting ready for your 2V0-21.23 certification exam? Start your preparation the smart way with our 2V0-21.23 Mock Test Free – a carefully crafted set of 50 realistic, exam-style questions to help you practice effectively and boost your confidence.
Using a mock test free for 2V0-21.23 exam is one of the best ways to:
- Familiarize yourself with the actual exam format and question style
- Identify areas where you need more review
- Strengthen your time management and test-taking strategy
Below, you will find 50 free questions from our 2V0-21.23 Mock Test Free resource. These questions are structured to reflect the real exam’s difficulty and content areas, helping you assess your readiness accurately.
An administrator is completing the configuration of a new vSphere cluster and has enabled vSphere High Availability (HA) and vSphere Distributed Resource Scheduler (DRS). After adding the ESXi hosts to the cluster, which networking information will the administrator be prompted to provide when using the Cluster Quickstart workflow?
A. vMotion networking
B. Management networking
C. vSAN networking
D. Virtual machine networking
What are two use cases for VMware vSphere+? (Choose two.)
A. Enhance on-premises workloads by managing them through the VMware Cloud Console.
B. Allow live migration between on-premises and VMware Cloud.
C. Increase the performance of the native vCenter vMotion capability.
D. Allow the creation of affinity and anti-affinity rules to be used during failover events.
E. Simplify vCenter lifecycle management through cloud-enabled automation.
Refer to the exhibit.Given the configuration shown in the exhibit, what should the administrator do if the latest VM template contains changes that are no longer needed?
A. Delete App-LibTemplate (2)
B. Revert to App-LibTemplate (2)
C. Delete App-LibTemplate (3)
D. Check out App-LibTemplate (3)
An administrator is planning to upgrade a VMware vCenter instance to version 8. It is currently integrated with the following solutions: VMware Aria Automation - VMware Cloud Director - Which tool can the administrator use to run interoperability reports before the upgrade process?
A. vSphere Update Manager
B. VMware Aria Suite Lifecycle
C. vCenter Server Update Planner
D. vSphere Lifecycle Manager
An administrator is adding a new ESXi host to an existing vSphere cluster. When selecting the cluster, the administrator is unable to use the Cluster Quickstart workflow to add and configure the additional host. What could be the root cause of this issue?
A. The administrator has previously dismissed the Cluster Quickstart workflow.
B. The administrator must manually add the host to the cluster before using the Cluster Quickstart workflow.
C. The administrator has not been assigned the required permissions to use the Cluster Quickstart workflow.
D. The administrator must enable the Cluster Quickstart workflow option in VMware vCenter.
An administrator is tasked with deploying a new on-premises software-defined data center (SDDC) that will contain a total of eight VMware vCenter instances. The following requirements must be met: All vCenter instances should be visible in a single vSphere Client session. All vCenter inventory should be searchable from a single vSphere Client session. Any administrator must be able to complete operations on any vCenter instance using a single set of credentials. What should the administrator configure to meet these requirements?
A. Two Enhanced Linked Mode groups consisting of four vCenter instances each in a Single Sign-On domain.
B. A single Hybrid Linked Mode group consisting of four vCenter instances each in a Single Sign-On domain.
C. A single Enhanced Linked Mode group consisting of eight vCenter instances in one Single Sign-On domain.
D. A single Hybrid Linked Mode group consisting of eight vCenter instances in one Single Sign-On domain.
An administrator needs to provide encryption for workloads within an existing vSphere cluster. The following requirements must be met: Workloads should be encrypted at rest. Encrypted workloads must automatically be encrypted during transit. Encryption should not require any specific hardware. What should the administrator configure to meet these requirements?
A. Encrypted vSphere vMotion
B. Unified Extensible Firmware Interface (UEFI) Secure Boot
C. Host Encryption
D. VM Encryption
An administrator is asked to segregate virtual machine (VM) traffic by VLAN on a vSphere standard switch. The following requirements must be met: • VLAN ID on the switch port group must be 4095. • VLAN tagging must be done at the VM level. Which tagging mode is required?
A. External Switch Tagging (EST)
B. None
C. Virtual Guest Tagging (VGT)
D. Virtual Switch Tagging (VST)
An administrator needs to consolidate a number of physical servers by migrating the workloads to a software-defined data center solution. Which VMware solution should the administrator recommend?
A. VMware Horizon
B. VMware vSAN
C. VMware vSphere
D. VMware NSX
During the staging of a patch on a vCenter Server Appliance, an error was encountered and the process stopped. An administrator resolved the root cause and is ready to continue with the staging of the patch. From the vCenter Management Interface, which action should the administrator take to continue the process from the point at which the error occurred?
A. Use the Stage and Install option to resume the staging.
B. Use the Resume option to resume the staging.
C. Use the Unstage option to restart the staging.
D. Use the Stage Only option to restart the staging.
A company has two sites: Site A and Site B. The administrator would like to manage the VMware vCenter inventories in both sites from a single vSphere Client session. Which vCenter feature must be configured?
A. VMware Certificate Authority
B. VMware Site Recovery Manager
C. vCenter Single Sign-On
D. Enhanced Linked Mode
An administrator receives reports from the application team of poor performance of a virtual ma-chine (VM). The administrator reviews the virtual machine and discovers that it has 20 snapshots that are over 12 months old. What could the administrator do to improve the VM’s performance?
A. Inflate the base disk to make space for future snapshots.
B. Revert to the latest snapshot.
C. Consolidate all of the snapshots into the base VM.
D. Identify and delete the largest delta .vmdk file.
An administrator needs to perform maintenance on a datastore that is running the vSphere Cluster Services (vCLS) virtual machines (VMs). Which feature can the administrator use in this scenario to avoid the use of Storage vMotion on the vCLS VMs?
A. vSphere Distributed Resource Scheduler (DRS)
B. vSphere vMotion
C. vSphere Fault Tolerance
D. vCLS Retreat Mode
An administrator has configured Storage I/O Control (SIOC) on a Virtual Machine File System (VMFS) datastore. • The datastore supports 30,000 IOPS • Storage I/O Control has been set to manual • Storage I/O Control is triggered when latency hits 30 ms • The datastore contains 3 virtual machines (VMs) 1. A gold tier VM 2. A silver tier VM 3. A bronze tier VM Assuming the datastore latency does not exceed 29ms, what is the maximum number of IOPS the bronze tier VM is entitled to?
A. 30,000
B. 20,000
C. 10,000
D. 5,000
An administrator has a host profile named Standard-Config. The administrator wants to change the other host profiles to use only the storage configuration settings that are defined in the Standard-Config host profile. What should the administrator do to make this change?
A. Export host customizations and import them to the other host profiles.
B. Copy the storage settings from Standard-Config to all other host profiles.
C. Duplicate the Standard-Config host profile and only modify the storage configuration settings.
D. Export the Standard-Config host profile and attach it to tile other hosts.
Which two datastore types store the components of a virtual machine as a set of objects? (Choose two.)
A. VMware Virtual Machine File System (VMFS)
B. VMware vSAN
C. Network File System (NFS) 3
D. vSphere Virtual Volumes (vVols)
E. Network File System (NFS) 4.1
An administrator manually configures a reference ESXi host that meets company security standards for vSphere environments. The administrator now needs to apply all of the security standards to every identically configured host across multiple vSphere clusters within a single VMware vCenter instance. Which four steps would the administrator complete to meet this requirement? (Choose four.)
A. Extract the host profile from the reference host.
B. Export the host profile from vCenter.
C. Import host customization on the reference host.
D. Attach the host profile to each cluster that requires the secure configuration.
E. Check the compliance of each host against the host profile.
F. Reset host customization on the reference host.
G. Remediate all non-compliant hosts.
Refer to the exhibit.An administrator set up the following configuration: • The distributed switch has four ESXi hosts, and each host has two 10 Gbps NICs. • In the Network I/O Control configuration, the amount of bandwidth reserved for virtual machine (VM) traffic if 4 Gbps. The administrator wants to guarantee that VMs in the Retail distributed port group can access 50 percent of the available reserved bandwidth for VM traffic. Given this scenario, what should the size (in Gbps) of the Retail network resource pool be?
A. 40
B. 32
C. 8
D. 16
An administrator is tasked with configuring remote direct memory access (RDMA) over Converged Ethernet v2 (RoCE v2). Which two types of adapters must the administrator configure? (Choose two.)
A. Paravirtual RDMA adapter
B. RDMA network adapter
C. Software iSCSi adapter
D. Fibre Channel over Ethernet (FCoE) adapter
E. Software NVMe over RDMA storage adapter
If a distributed switch uses the “Route based on physical NIC load” load balancing algorithm, what does the mean send or receive utilization of an uplink need to exceed for the flow of traffic to move to the second uplink?
A. 75 percent of the capacity over a 30 second period
B. 60 percent of the capacity over a 30 second period
C. 60 percent of the capacity over a 40 second period
D. 75 percent of the capacity over a 40 second period
When configuring vCenter High Availability (HA), which two statements are true regarding the active, passive, and witness nodes? (Choose two.)
A. Network latency must be less than 10 milliseconds.
B. They must have a supported Wide Area Network (WAN).
C. They must have a minimum of a 10 Gbps network adapter.
D. They must have a minimum of a 1 Gbps network adapter.
E. Network latency must be more than 10 milliseconds.
An administrator is deploying a new all flash vSAN cluster based on the vSAN Original Storage Architecture (OSA). What is the minimum supported network throughput in Gb/s for each host?
A. 50
B. 10
C. 25
D. 1
An administrator wants to allow a DevOps engineer the ability to delete Tanzu Kubernetes Grid (TKG) cluster objects in a vSphere Namespace. Which role would provide the minimum required permissions to perform this operation?
A. Administrator
B. Can View
C. Owner
D. Can Edit
An administrator needs better performance and near-zero CPU utilization from the ESXi hosts for networking functions and processing. The administrator creates a new vSphere Distributed Switch and enables network offloads compatibility. Which solution would help achieve this goal?
A. vSphere Distributed Services Engine
B. Data Processing Units (DPUs)
C. vSphere Network I/O Control
D. Universal Passthrough version 2
An administrator creates a new corporate virtual machine (VM) template every month to include all of the latest patches. The administrator needs to ensure that the new VM template is synchronized from the primary data center site (London) to two secondary data center sites (Tokyo and New York). The administrator is aware that datastore space is limited within the secondary data center sites. The administrator needs to ensure that the VM template is available in the secondary sites the first time a new virtual machine is requested. Which four steps should the administrator take to meet these requirements? (Choose four.)
A. Create a new published content library at the primary site.
B. Add the virtual machine template to the subscribed content library.
C. Create a new published content library in each secondary site.
D. Create a new subscribed content library in each secondary site.
E. Configure the subscribed content library to download content when needed.
F. Configure each subscribed content library to download content immediately.
G. Add the virtual machine template to the published content library.
Which two tasks can be completed using vSphere LifeCycle Manager? (Choose two.)
A. Manage the firmware lifecycle of ESXi hosts that are part of a managed cluster with a single image.
B. Check that the ESXi hosts are compliant with the recommended baseline and update the hosts.
C. Upgrade VMware vCenter from version 7 to 8.
D. Check the hardware compatibility of the hosts in a cluster against the VMware Compatibility Guide (VCG) using baselines.
E. Manage the firmware lifecycle of ESXi hosts are part of a managed cluster using baselines.
An administrator needs to configure a content library solution based on the following infor-mation: • A new corporate virtual machine (VM) template is created every month to include all of the latest patches. • The new VM template should be downloaded from the primary data center site (London) to two secondary data center sites (Tokyo and New York) as soon as possible. • There is limited disk space available at one of the secondary data center sites (Tokyo) due to an ongoing data center consolidation project. Which four steps should the administrator take to configure the content library solution before adding a VM template? (Choose four.)
A. Create a new published content library in each secondary site.
B. Configure the New York subscribed content library to download content immediately.
C. Configure the Tokyo subscribed content library to download content immediately.
D. Configure the Tokyo subscribed content library to download content when needed.
E. Create a new published content library at the primary site.
F. Configure the New York subscribed content library to download content when needed.
G. Create a new subscribed content library in each secondary site.
An administrator has a requirement to revert a running virtual machine to a previous snapshot after a failed attempt to upgrade an application. When the administrator originally took the snapshot, the following choices in the Take Snapshot dialog were made: Snapshot the virtual machine’s memory = false Quiesce guest file system = false What will be the result of the administrator selecting the “Revert to Latest Snapshot” option to return the virtual machine to a previous snapshot?
A. The virtual machine will be restored to the parent snapshot in a powered on state.
B. The virtual machine will be restored to the parent snapshot in a powered off state.
C. The virtual machine will be restored to the child snapshot in a powered off state.
D. The virtual machine will be restored to the child snapshot in a powered on state.
An administrator is performing maintenance activities and discovers that a Virtual Machine File System (VMFS) datastore has a lot more used capacity than expected. The datastore contains 10 virtual machines (VMs) and, when the administrator reviews the contents of the associated datastore, discovers that five virtual machines have a snapshot file (-delta.vmdk files) that has not been modified in over 12 months. The administrator checks the Snapshot Manager within the vSphere Client and confirms that there are no snapshots visible. Which task should the administrator complete on the virtual machines to free up datastore space?
A. Consolidate the snapshots for each VM.
B. Inflate the disk files for each VM.
C. Delete all snapshots for each VM.
D. Storage vMotion each VM to another datastore.
A combination of which two components of the software-defined data center (SDDC) are re-sponsible for the initial abstraction of CPU, memory, disk, and network resources and their sub-sequent management? (Choose two.)
A. VMware Aria Operations
B. VMware Aria Suite Lifecycle
C. VMware vCenter
D. VMware ESXi
E. VMware vCenter Cloud Gateway
Refer to the exhibit.After removing an ESXi host from a cluster for maintenance, a number of virtual machines have encountered the warning seen in the exhibit. After re-adding the ESXi, the issue is resolved. Which step should the administrator take to move the triggered alarm to its normal state?
A. Ignore
B. Acknowledge
C. Disable
D. Reset to Green
After adding a new vSphere ESXi host with identical hardware configuration to an existing vSphere cluster, which task would an administrator complete prior to checking the compliance with an existing host profile?
A. Attach the host profile to the new host
B. Duplicate the host profile
C. Copy the host setting from the new host
D. Import the host profile
An administrator is tasked with migrating a single virtual machine (VM) from an existing VMware vCenter to a secure environment where corporate security policy requires that all VMs be encrypted. The secure environment consists of a dedicated vCenter instance with a 4-node vSphere cluster and already contains a number of encrypted VMs. Which two steps must the administrator take to ensure the migration is a success? (Choose two.)
A. Ensure that the source and destination vCenter instances share the same Key Management Server (KMS).
B. Ensure that Encrypted vMotion is turned off for the VM.
C. Ensure that the VM is encrypted before attempting the migration.
D. Ensure that the VM is powered off before attempting the migration.
E. Ensure that the source and destination vCenter Servers have a different Key Management Server (KMS).
An administrator is creating a content library to manage VM templates and ISO images. The administrator wants to password-protect the images and templates and share them with a remote site. Which two tasks must the administration perform when creating the content library? (Choose two.)
A. Publish the local content library.
B. Enable the security policy.
C. Create a subscribed content library.
D. Select an NFS datastore.
E. Enable authentication.
An administrator wants to use tag-based placement rules on their virtual machine disks using VMware vCenter. Which option would allow the administrator to achieve this?
A. Storage Policy Based Management
B. Storage I/O Control
C. vSphere Storage APIs for Storage Awareness (VASA)
D. vSphere Distributed Resource Scheduler (DRS)
An administrator is tasked with configuring certificates for a VMware software-defined data center (SDDC) based on the following requirements: All certificates should use certificates trusted by the Enterprise Certificate Authority (CA). The solution should minimize the ongoing management overhead of replacing certificates. Which three actions should the administrator take to ensure that the solution meets corporate policy? (Choose three.)
A. Replace the VMware Certificate Authority (VMCA) certificate with a self-signed certificate generated from the VMCA.
B. Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.
C. Replace the machine SSL certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
D. Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.
E. Replace the solution user certificates with custom certificates generated from the Enterprise CA.
F. Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
Which three vSphere features are still supported for Windows-based virtual machines when enabling vSphere’s virtualization-based security feature? (Choose three.)
A. vSphere vMotion
B. PCI passthrough
C. vSphere High Availability (HA)
D. vSphere Fault Tolerance
E. vSphere Distributed Resources Scheduler (DRS)
F. Hot Add of CPU or memory
Which VMware offering will allow an administrator to manage the lifecycle of multiple vCenter Server instances in a single software as a service (SaaS)-based solution to help drive operational efficiency?
A. VMware vSphere with Tanzu
B. VMware Cloud Foundation
C. VMware vSphere+
D. VMware Aria Suite Lifecycle
A group of new virtual machines have been deployed using thin-provisioned disks due to the limited storage space available in an environment. The storage team has expressed concern about extensive use of this type of provisioning. An administrator is tasked with creating a custom alarm to notify the storage team when thin provisioning reaches a certain capacity threshold. Where must the administrator define this alarm?
A. Datastore
B. Data center
C. Datastore cluster
D. Virtual machine
An administrator is tasked with allowing a single user the ability to take snapshots on a virtual machine. When looking in vCenter, the administrator can see that there are already users and groups assigned permissions on the virtual machine as follows: • The group VM_Users has the Virtual Machine Power User role. • The group VM_Viewers has the Read Only role. The administrator confirms that the user requesting the additional access is currently one of five members of the VM_Viewers group. Which two steps should the administrator take to grant this user the additional access required without impacting the user access of others? (Choose two.)
A. Add the user to the VM_Users group and leave the permissions on the virtual machine object unchanged.
B. Add a new permission on the virtual machine object selecting the user and the new custom role.
C. Edit the Read Only role to add the Virtual Machine Snapshot Management privileges.
D. Create a new custom role with the Virtual Machine Snapshot Management privileges.
E. Add a new permission on the virtual machine object selecting the VM_Viewers group and the new custom role.
A vSphere environment is experiencing intermittent short bursts of CPU contention, causing brief production outages for some of the virtual machines (VMs). To understand the cause of the issue, the administrator wants to observe near real-time statistics tor all VMs. Which two vSphere reporting tools could the administrator use? (Choose two.)
A. Advanced Performance Charts
B. esxcli
C. resxtop
D. Overview Performance Charts
E. esxtop
Which three features are only available when using vSphere Distributed Switches instead of vSphere Standard Switches? (Choose three.)
A. 802.1Q tagging
B. Port mirroring
C. Netflow
D. Configuration backup and restore
E. IPv6 support
F. IPv4 support
An administrator is preparing to perform an update to vSphere clusters that are running vSAN. The administrator wants to ensure that the following requirements are met as part of the update: • All hosts in the cluster are updated with the same software. • The firmware versions on the hosts are updated. • The new software versions are checked for compliance against the vSAN Hardware Compatibility List. Which three steps should the administrator take to meet these requirements? (Choose three.)
A. Configure vSphere Lifecycle Manager with an image for the cluster.
B. Register the vendor hardware management system as a vCenter Server extension.
C. Download the firmware updates from the VMware website.
D. Download the firmware updates from the vendor website.
E. Run a hardware compatibility check using vSphere Lifecycle Manager.
F. Configure vSphere Lifecycle Manager with a baseline for the cluster.
An administrator enables Secure Boot on an ESXi host. On booting the ESXi host, the following error message appears: Fatal error: 39 (Secure Boot Failed) What is the cause of this issue?
A. The kernel hos been tampered with.
B. The Trusted Platform Module chip has failed.
C. The administrator attempted to boot with a bootloader that is unsigned or has been tampered with.
D. A package (VIB or driver) has been tampered with.
Which feature would allow for the non-disruptive migration of a virtual machine between two clusters in a single VMware vCenter instance?
A. vSphere vMotion
B. Cross vCenter Migration
C. vSphere Storage vMotion
D. vSphere Fault Tolerance
A VMkernel port is labelled PROD01 and uses the default TCP/IP stack. Currently, this VMkernel port is configured for supporting live virtual machine (VM) migrations. Which configuration change should the administrator make to isolate live VM migration traffic from other network traffic?
A. Remove PROD01 and create a new VMkernel port and set the TCP/IP stack to vSphere vMotion.
B. Remove PROD01 and create a new VMkernel port with the TCP/IP stack set to provisioning.
C. Create a new VMkernel port and set the TCP/IP stack to provisioning.
D. Modify PROD01 by changing the TCP/IP stack to vSphere vMotion.
An administrator must gracefully restart a virtual machine (VM) through the vSphere Client but the option is greyed out. The administrator has full administrative access on VMware vCenter and all the objects available in vCenter, but has no access to log onto the operating system. Which action should the administrator take to meet the objective?
A. Upgrade the virtual hardware
B. Migrate the VM to another host
C. Install VMware Tools
D. Restart vCenter
Refer to the exhibit.After updating a predefined alarm on VMware vCenter, an administrator enables email notifications as shown in the attached alarm; however, notifications are NOT being sent. Where must the mail server settings be configured by the administrator to resolve this issue?
A. In the ESXi host system config
B. In the alarm rule definition
C. In the vCenter settings in the vSphere Client
D. In the vCenter Management Interface
To keep virtual machines (VMs) up and running at all times in a vSphere cluster, an administrator would like VMs to be migrated automatically when the host hardware health status becomes degraded. Which cluster feature can be used to meet this requirement?
A. Predictive DRS
B. Proactive HA
C. vSphere HA Orchestrated Restart
D. vSphere Fault Tolerance
An administrator is required to configure several Microsoft Windows virtual machines (VMs) to support Secure Boot for a critical secure application. The following information is provided: • The corporate security policy states that all forms of data encryption must utilize a key provider. • The firmware of each VM is currently set to use Unified Extensible Firmware Interface (UEFI). • Due to the nature of the application running within the VMs, the guest operating system for each VM is currently a minimum of Windows Server 2008 and Windows 7. Which security feature should the administrator implement to meet these requirements?
A. vSphere Virtual Machine Encryption
B. vSphere Visualization-Based Security
C. Virtual Intel Software Guard Extensions (vSGX)
D. Virtual Trusted Platform Module (vTPM)
Access Full 2V0-21.23 Mock Test Free
Want a full-length mock test experience? Click here to unlock the complete 2V0-21.23 Mock Test Free set and get access to hundreds of additional practice questions covering all key topics.
We regularly update our question sets to stay aligned with the latest exam objectives—so check back often for fresh content!
Start practicing with our 2V0-21.23 mock test free today—and take a major step toward exam success!