2V0-21.23 Practice Exam Free – 50 Questions to Simulate the Real Exam
Are you getting ready for the 2V0-21.23 certification? Take your preparation to the next level with our 2V0-21.23 Practice Exam Free – a carefully designed set of 50 realistic exam-style questions to help you evaluate your knowledge and boost your confidence.
Using a 2V0-21.23 practice exam free is one of the best ways to:
- Experience the format and difficulty of the real exam
- Identify your strengths and focus on weak areas
- Improve your test-taking speed and accuracy
Below, you will find 50 realistic 2V0-21.23 practice exam free questions covering key exam topics. Each question reflects the structure and challenge of the actual exam.
What are two use cases for VMware vSphere+? (Choose two.)
A. Enhance on-premises workloads by managing them through the VMware Cloud Console.
B. Allow live migration between on-premises and VMware Cloud.
C. Increase the performance of the native vCenter vMotion capability.
D. Allow the creation of affinity and anti-affinity rules to be used during failover events.
E. Simplify vCenter lifecycle management through cloud-enabled automation.
An administrator is tasked with configuring remote direct memory access (RDMA) over Converged Ethernet v2 (RoCE v2). Which two types of adapters must the administrator configure? (Choose two.)
A. Paravirtual RDMA adapter
B. RDMA network adapter
C. Software iSCSi adapter
D. Fibre Channel over Ethernet (FCoE) adapter
E. Software NVMe over RDMA storage adapter
An administrator is attempting to configure Storage I/O Control (SIOC) on five datastores within a vSphere environment. The administrator is being asked to determine why SIOC configuration completed successfully on only four of the datastores. What are two possible reasons why the configuration was not successful? (Choose two.)
A. The datastore contains Raw Device Mappings (RDMs).
B. SAS disks are used for the datastore.
C. The datastore has multiple extents.
D. The datastore is using ISCSI.
E. The administrator is using NFS storage.
An administrator decides to restore VMware vCenter from a file-based backup following a failed upgrade. Which interface should the administrator use to complete the restore?
A. Direct Console User Interface (DCUI)
B. vCenter Management Interface (VAMI)
C. vSphere Client
D. vCenter GUI Installer
Refer to the exhibit.An administrator set up the following configuration: • The distributed switch has four ESXi hosts, and each host has two 10 Gbps NICs. • In the Network I/O Control configuration, the amount of bandwidth reserved for virtual machine (VM) traffic if 4 Gbps. The administrator wants to guarantee that VMs in the Retail distributed port group can access 50 percent of the available reserved bandwidth for VM traffic. Given this scenario, what should the size (in Gbps) of the Retail network resource pool be?
A. 40
B. 32
C. 8
D. 16
A vSphere cluster has the following configuration: Virtual machines (VMs) are running Production and Test workloads vSphere Distributed Resource Scheduler (DRS) is enabled There are no resource pools in the cluster Performance monitoring data shows that the Production workload VMs are not receiving their fully allocated memory when the vSphere cluster is fully utilized. A combination of which two steps could the administrator perform to ensure that the Production VMs are always guaranteed the full allocation of memory? (Choose two.)
A. Assign a custom memory share value to the resource pool containing the Production VMs.
B. Assign a memory reservation value to the resource pool containing the Production VMs.
C. Create a parent resource pool for the Production VMs.
D. Create a sibling resource pool for each of the Production and Test VMs.
E. Create a child resource pool for the Test VMs.
An administrator has been notified that a number of hosts are not compliant with the company policy for time synchronization. The relevant portion of the policy states: All physical servers must synchronize time with an external time source that is accurate to the microsecond. Which step should the administrator take to ensure compliance with the policy?
A. Ensure that each vCenter Server Appliance is configured to use a Network Time Protocol (NTP) source.
B. Ensure that each ESXi host is configured to use a Precision Time Protocol (PTP) source.
C. Ensure that each ESXi host is configured to use a Network Time Protocol (NTP) source.
D. Ensure that each vCenter Server Appliance is configured to use a Precision Time Protocol (PTP) source.
An administrator notices a performance issue in VMware vCenter. To try and understand more about the performance issue, the administrator needs to gather more information about the vCenter database to eliminate a potential disk space issue. Which two tools can the administrator use? (Choose two.)
A. vCenter Management Interface (VAMI)
B. Perfmon
C. df
D. esxtop
E. vSphere Client
The vCenter inventory contains a virtual machine (VM) template called Linux-01. The adminis-trator wants to install a software patch into Linux-01 while allowing users to continue to access Linux-01 to deploy VMs. Which series of steps should the administrator take to accomplish this task?
A. 1. Verify that Linux-01 is in a content library.2. Clone Linux-013. Convert the clone to a VM.4. Install the software patch.
B. 1. Convert Linux-01 to a VM2. Install the software patch.3. Convert the VM back to a VM template.4. Add Linux-01 to the content library.
C. 1. Verify that Linux-01 is in a content library.2. Check out Linux-01.3. Install the software patch.4. Check in Linux-01.
D. 1. Clone Linux-01.2. Convert the clone to a VM.3. Install the software patch.4. Convert the VM back to a template.
An administrator needs to provide encryption for workloads within an existing vSphere cluster. The following requirements must be met: Workloads should be encrypted at rest. Encrypted workloads must automatically be encrypted during transit. Encryption should not require any specific hardware. What should the administrator configure to meet these requirements?
A. Encrypted vSphere vMotion
B. Unified Extensible Firmware Interface (UEFI) Secure Boot
C. Host Encryption
D. VM Encryption
An administrator is configuring vSphere Lifecycle Manager to install patches to a vSphere cluster. The cluster runs workload virtual machines (VMs) that are incompatible with vSphere vMotion, and therefore cannot be live migrated between hosts during the installation of the patches. Which configuration in vSphere Lifecycle Manager will allow the administrator to reduce the downtime associated with the patching operation without migrating the VMs?
A. Enable Distributed Power Management (DPM) and set the VM power state to the suspend to disk option
B. Enable Quick Boot ana set the VM power stale to the suspend to disk option
C. Enable vSphere High Availability (HA) admission control and set the VM power stale to the suspend to memory option
D. Enable Quick Boot and set the VM power state to the suspend to memory option
Refer to the exhibit.An administrator configures a distributed switch and adds the first VMware ESXi server to it. The administrator also performs the following activities: • The administrator assigns two uplinks to the distributed switch. • The administrator enables uplink teaming. When attempting to perform a health check of the teaming policy, the health status of the Team-ing and Failover reports as “Unknown”, as seen in the exhibit. What can the administrator changes in the distributed switch for the health status to report cor-rectly?
A. Add a minimum of three hosts with two uplinks each
B. Add a minimum of two hosts with two uplinks each
C. Add a minimum of three hosts with four uplinks each
D. Add a minimum of two hosts with one uplink each
An administrator notices a Fibre Channel adapter in an ESXi host has been experiencing incon-sistent connectivity states. Which trigger can be used to quickly identify the issue and alert the administrator so that the is-sue can be resolved?
A. Host Connection Lost
B. Lost Network Path Redundancy
C. Lost Network Connectivity
D. Lost Storage Connectivity
An administrator needs to perform maintenance on a datastore that is running the vSphere Cluster Services (vCLS) virtual machines (VMs). Which feature can the administrator use in this scenario to avoid the use of Storage vMotion on the vCLS VMs?
A. vSphere Distributed Resource Scheduler (DRS)
B. vSphere vMotion
C. vSphere Fault Tolerance
D. vCLS Retreat Mode
An administrator is required to configure several Microsoft Windows virtual machines (VMs) to support Secure Boot for a critical secure application. The following information is provided: • The corporate security policy states that all forms of data encryption must utilize a key provider. • The firmware of each VM is currently set to use Unified Extensible Firmware Interface (UEFI). • Due to the nature of the application running within the VMs, the guest operating system for each VM is currently a minimum of Windows Server 2008 and Windows 7. Which security feature should the administrator implement to meet these requirements?
A. vSphere Virtual Machine Encryption
B. vSphere Visualization-Based Security
C. Virtual Intel Software Guard Extensions (vSGX)
D. Virtual Trusted Platform Module (vTPM)
An administrator is tasked with configuring vSphere Trust Authority. The administrator has completed the following steps: Set up the workstation - Enabled the Trust Authority Administrator Enabled the Trust Authority State Collected information about the ESXi hosts and vCenter to be trusted Which step does the administrator need to complete next?
A. Import the Trusted Host information to the Trust Authority Cluster
B. Import the Trusted Cluster information to the Trusted Hosts
C. Create the Key Provider on the Trusted Cluster
D. Import the Trusted Host information to the Trusted Cluster
What is the minimum network throughput in Gb/s for vSAN using the Express Storage Architec-ture (ESA)?
A. 50
B. 25
C. 1
D. 10
An administrator has mapped three vSphere zones to three vSphere clusters. Which two statements are true for this vSphere with Tanzu zonal Supervisor enablement? (Choose two.)
A. One Supervisor will be created in a specific zone.
B. One Supervisor will be created across all zones.
C. Three Supervisors will be created in Linked Mode.
D. Individual vSphere Namespaces will be placed into a specific zone.
E. Individual vSphere Namespaces will be spread across all zones.
An administrator needs to create affinity rules for the following vSphere cluster setup: • The cluster contains two virtual machines (VMs) named app01 and app02. • The cluster contains six hosts named esx11 through esx16. • The app01 and app02 VMs run software that is licensed to run only on esx11, esx12, or esx13. • vSphere Distributed Resource Scheduler (DRS) is configured. Which set of steps must the administrator perform to ensure that the licensing requirements are met for app01 and app02?
A. 1. Add all the hosts to a host group.2. Create a VM-VM anti-affinity rule for app01 and app02.
B. 1. Add the esx11 – esx13 hosts to a host group.2. Create a VM-VM affinity rule for app01 and app02.
C. 1. Add the VMs to a VM group and the esx11 – esx13 hosts to a host group.2. Create a VM-Host required rule between the VM group and the host group.
D. 1. Add the VMs to a VM group and the esx11 – esx13 hosts to a host group.2. Create a VM-Host preferential rule between the VM group and the host group.
An administrator is tasked with looking into the disaster recovery (DR) options for a software-defined data center (SDDC). The following requirements must be met: • All virtual machines (VMs) must be protected to a secondary site. • The source VMs must remain online until the failover. • When failing over to the secondary site, application downtime is allowed. • The DR failover must be managed from the vSphere Client. • Costs must remain as low as possible. How can the administrator accomplish this task?
A. Configure VMware Cloud Disaster Recovery (VCDR) and combine it with array-based stor-age replication.
B. Configure VMware a Site Recovery Manager and combine it with vSphere Replication.
C. Configure a subscribed content library on the secondary site.
D. Configure VMware Site Recovery Manager and combine it with array-based storage replica-tion.
Which three features are only available when using vSphere Distributed Switches instead of vSphere Standard Switches? (Choose three.)
A. 802.1Q tagging
B. Port mirroring
C. Netflow
D. Configuration backup and restore
E. IPv6 support
F. IPv4 support
A vSphere cluster hosts a three-tier application. The cluster has 50% resources available. If a host in the cluster fails, the database server must be online before the application server, and the appli-cation server must be online before the Web server. Which feature can be used to meet these requirements?
A. Predictive DRS
B. vSphere HA Orchestrated Restart
C. vSphere HA Restart Priority
D. Proactive HA
After a recent unexplained peak in virtual machine (VM) CPU usage, an administrator is asked to monitor the VM performance for a recurrence of the issue. Which two tools can the administrator use? (Choose two.)
A. vCenter Management Interface
B. Direct Console User Interface (DCUI)
C. vSphere Performance Charts
D. vCenter Command Line Interface
E. ESXi Shell
An administrator successfully installs VMware ESXi onto the first host of a new vSphere cluster but makes no additional configuration changes. When attempting to log into the vSphere Host Client using the Fully Qualified Domain Name (FQDN) of the host, the administrator receives the following error message: “Server Not Found – We can’t connect to the server at esxi101.corp.local.” The following information has been provided to complete the configuration: Host FQDN: esxi101.corp.local - Management VLAN ID: 10 - DHCP: No - Management IP Address: 172.16.10.101 / 24 Management IP Gateway: 172.16.10.1 Corporate DNS Servers: 172.16.10.5, 172.16.10.6 ONS Domain: corp.local - In addition, all host configurations must also meet the following requirements: The management network must use only IPv4 network protocols. The management network must be fault tolerant. Which three high level tasks should the administrator complete, at a minimum, in order to successfully log into the vSphere Host Client using the FQDN for esxi101 and complete the configuration? (Choose three.)
A. Ensure a DNS A Record is created for the VMware ESXi host on the corporate DNS servers.
B. Update the VMware ESXi Management Network DNS configuration to use the corporate DNS servers for names resolution.
C. Update the VMware ESXi Management Network IPv4 configuration to use a static a IPv4 address.
D. Configure at least two network adapters for the VMware ESXi Management Network.
E. Set the value of the VMware ESXi Management Network VLAN ID to 10.
F. Disable IPv6 for the VMware ESXi Management Network.
An administrator enables Secure Boot on an ESXi host. On booting the ESXi host, the following error message appears: Fatal error: 39 (Secure Boot Failed) What is the cause of this issue?
A. The kernel hos been tampered with.
B. The Trusted Platform Module chip has failed.
C. The administrator attempted to boot with a bootloader that is unsigned or has been tampered with.
D. A package (VIB or driver) has been tampered with.
An administrator is tasked with providing users access to objects within an existing VMware vCenter instance. The vCenter inventory has a single data center with one management vSphere cluster and five workload vSphere clusters. The following requirements must be met for assigning the users access: Users must only be able to view all of the inventory objects associated with the management vSphere cluster. Users must be able to edit all of the inventory objects associated with the workload vSphere clusters. The administrator creates a custom role to provide the permissions needed to allow users to edit inventory objects. Which series of steps should the administrator complete to assign the custom role and provide the required level of access to users?
A. Apply Global permissions to assign the Read Only role to the root vCenter object.Apply vCenter permissions to assign the custom role to the workload vSphere clusters and enable propagation.
B. Apply Global permissions to assign the Read Only role to the root vCenter object and enable propagation.Apply vCenter permissions to assign the custom role to the workload vSphere clusters and enable propagation.
C. Apply Global permissions to assign the Read Only role to the root vCenter object.Apply vCenter permissions to assign the custom role to the workload vSphere clusters.
D. Apply Global permissions to assign the Read Only role to the root vCenter object and enable propagation.Apply vCenter permissions to assign the custom role to the workload vSphere clusters.
During the staging of a patch on a vCenter Server Appliance, an error was encountered and the process stopped. An administrator resolved the root cause and is ready to continue with the staging of the patch. From the vCenter Management Interface, which action should the administrator take to continue the process from the point at which the error occurred?
A. Use the Stage and Install option to resume the staging.
B. Use the Resume option to resume the staging.
C. Use the Unstage option to restart the staging.
D. Use the Stage Only option to restart the staging.
An administrator has a requirement to revert a running virtual machine to a previous snapshot after a failed attempt to upgrade an application. When the administrator originally took the snapshot, the following choices in the Take Snapshot dialog were made: Snapshot the virtual machine’s memory = false Quiesce guest file system = false What will be the result of the administrator selecting the “Revert to Latest Snapshot” option to return the virtual machine to a previous snapshot?
A. The virtual machine will be restored to the parent snapshot in a powered on state.
B. The virtual machine will be restored to the parent snapshot in a powered off state.
C. The virtual machine will be restored to the child snapshot in a powered off state.
D. The virtual machine will be restored to the child snapshot in a powered on state.
A combination of which two components of the software-defined data center (SDDC) are re-sponsible for the initial abstraction of CPU, memory, disk, and network resources and their sub-sequent management? (Choose two.)
A. VMware Aria Operations
B. VMware Aria Suite Lifecycle
C. VMware vCenter
D. VMware ESXi
E. VMware vCenter Cloud Gateway
Which four elements can a vSphere Lifecycle Manager image contain? (Choose four.)
A. ESXi base image
B. ESXi configuration
C. Vendor agents
D. Vendor add-ons
E. BIOS updates
F. Firmware and drivers add-on
G. Independent components
An administrator is tasked with moving an application and guest operating system (OS) running on top of a physical server to a software-defined data center (SDDC) in a remote secure location. The following constraints apply: The remote secure location has no network connectivity to the outside world. The business owner is not concerned if all changes in the application make it to the SDDC in the secure location. The application’s data is hosted in a database with a high number of transactions. What could the administrator do to create an image of the guest OS and application that can be moved to this remote data center?
A. Create a hot clone of the physical server using VMware vCenter Converter.
B. Create a cold clone of the physical server using VMware vCenter Converter.
C. Restore the guest OS from a backup.
D. Use storage replication to replicate the guest OS and application.
A group of new virtual machines have been deployed using thin-provisioned disks due to the limited storage space available in an environment. The storage team has expressed concern about extensive use of this type of provisioning. An administrator is tasked with creating a custom alarm to notify the storage team when thin provisioning reaches a certain capacity threshold. Where must the administrator define this alarm?
A. Datastore
B. Data center
C. Datastore cluster
D. Virtual machine
Refer to the exhibit.After removing an ESXi host from a cluster for maintenance, a number of virtual machines have encountered the warning seen in the exhibit. After re-adding the ESXi, the issue is resolved. Which step should the administrator take to move the triggered alarm to its normal state?
A. Ignore
B. Acknowledge
C. Disable
D. Reset to Green
Refer to the exhibit.An environment has the following configuration: 1. Resource Pool “RP-MOM” has a reservation of 6GHz and one running virtual machine (VM) “VM-M1” with 1 GHz reserved. 2. Resource Pool “RP-KID” has a reservation of 2GHz, and expandable reservations is activated. The administrator creates two VMs, “VM-K1” and “VM-K2”, in the “RP-KID” resource pool with 2GHz reserved for each, and turns on “VM-M1.” Given this scenario, which statement is true?
A. The administrator must deactivate expandable reservations to turn on VM-K2.
B. The administrator can create a third VM (“VM-K3”) at RP-KID and reserve 6GHz.
C. VM-K2 can be powered on because it can get the resources needed from RP-MOM.
D. VM-K2 cannot be powered on because there are not enough resources in RP-KID.
An administrator has a host profile named Standard-Config. The administrator wants to change the other host profiles to use only the storage configuration settings that are defined in the Standard-Config host profile. What should the administrator do to make this change?
A. Export host customizations and import them to the other host profiles.
B. Copy the storage settings from Standard-Config to all other host profiles.
C. Duplicate the Standard-Config host profile and only modify the storage configuration settings.
D. Export the Standard-Config host profile and attach it to tile other hosts.
Refer to the exhibit.An administrator is tasked with adding new capacity to an existing software-defined data center (SDDC). • The SDDC currently hosts two vSphere clusters (ClusterA and ClusterB) with different CPU compatibilities. • vSphere vMotion and vSphere Distributed Resource Scheduler (DRS) are currently in use in the SDDC. • The new capacity will be implemented by provisioning four ESXi hosts running a new generation of Intel Skylake CPUs. • All workload virtual machines (VMs) must support live migration to any cluster in the SDDC. The administrator noticed the running critical "evc1" virtual machine (VM) shown in the exhibit is not migrating using vSphere vMotion to the original Clusters A or B. Which three steps must the administrator take to support this functionality? (Choose three.)
A. Disable the Enhanced vMotion Compatibility (EVC) on the VM.
B. Reboot the VM.
C. Configure the Enhanced vMotion Compatibility (EVC) on the VM to Intel Skylake.
D. Power on the VM.
E. Configure the Enhanced vMotion Compatibility (EVC) on vSphere Cluster A and B to sup-port Intel Skylake.
F. Power off the VM.
An administrator is responsible for the management of a VMware vCenter instance that is currently experiencing performance issues. The administrator quickly identifies that the CPU and memory utilization of vCenter is consistently over 80%. Upon further analysis, it seems that the vpxd process is contributing significantly to the performance issue. A combination of which four steps should the administrator take to resolve the performance issues and ensure that a similar issue can be rectified without requiring downtime to vCenter moving forward? (Choose four.)
A. Gracefully shut down vCenter using the vSphere Client.
B. Enable CPU Hot Add on the vCenter virtual machine.
C. Power on the vCenter Server Appliance using the vSphere Host Client.
D. Enable CPU and Memory Hot Add on the vCenter virtual machine.
E. Add additional CPU and memory to the vCenter Server Appliance.
F. Power on the vCenter Server Appliance using the vSphere Client.
G. Enable Memory Not Add on the vCenter virtual machine.
An administrator is deploying a new all flash vSAN cluster based on the vSAN Original Storage Architecture (OSA). What is the minimum supported network throughput in Gb/s for each host?
A. 50
B. 10
C. 25
D. 1
An administrator has configured Storage I/O Control (SIOC) on a Virtual Machine File System (VMFS) datastore. • The datastore supports 30,000 IOPS • Storage I/O Control has been set to manual • Storage I/O Control is triggered when latency hits 30 ms • The datastore contains 3 virtual machines (VMs) 1. A gold tier VM 2. A silver tier VM 3. A bronze tier VM Assuming the datastore latency does not exceed 29ms, what is the maximum number of IOPS the bronze tier VM is entitled to?
A. 30,000
B. 20,000
C. 10,000
D. 5,000
An administrator is creating a content library to manage VM templates and ISO images. The administrator wants to password-protect the images and templates and share them with a remote site. Which two tasks must the administration perform when creating the content library? (Choose two.)
A. Publish the local content library.
B. Enable the security policy.
C. Create a subscribed content library.
D. Select an NFS datastore.
E. Enable authentication.
Which step is completed during Stage 1 of the vCenter Server Appliance deployment?
A. Join a vCenter Single Sign-On domain
B. Create a new vCenter Single Sign-On domain
C. Select the deployment size
D. Configure SSH access
An administrator is adding a new ESXi host to an existing vSphere cluster. When selecting the cluster, the administrator is unable to use the Cluster Quickstart workflow to add and configure the additional host. What could be the root cause of this issue?
A. The administrator has previously dismissed the Cluster Quickstart workflow.
B. The administrator must manually add the host to the cluster before using the Cluster Quickstart workflow.
C. The administrator has not been assigned the required permissions to use the Cluster Quickstart workflow.
D. The administrator must enable the Cluster Quickstart workflow option in VMware vCenter.
An administrator manually configures a reference ESXi host that meets company security standards for vSphere environments. The administrator now needs to apply all of the security standards to every identically configured host across multiple vSphere clusters within a single VMware vCenter instance. Which four steps would the administrator complete to meet this requirement? (Choose four.)
A. Extract the host profile from the reference host.
B. Export the host profile from vCenter.
C. Import host customization on the reference host.
D. Attach the host profile to each cluster that requires the secure configuration.
E. Check the compliance of each host against the host profile.
F. Reset host customization on the reference host.
G. Remediate all non-compliant hosts.
An administrator is preparing to perform an update to vSphere clusters that are running vSAN. The administrator wants to ensure that the following requirements are met as part of the update: • All hosts in the cluster are updated with the same software. • The firmware versions on the hosts are updated. • The new software versions are checked for compliance against the vSAN Hardware Compatibility List. Which three steps should the administrator take to meet these requirements? (Choose three.)
A. Configure vSphere Lifecycle Manager with an image for the cluster.
B. Register the vendor hardware management system as a vCenter Server extension.
C. Download the firmware updates from the VMware website.
D. Download the firmware updates from the vendor website.
E. Run a hardware compatibility check using vSphere Lifecycle Manager.
F. Configure vSphere Lifecycle Manager with a baseline for the cluster.
An administrator wants to use tag-based placement rules on their virtual machine disks using VMware vCenter. Which option would allow the administrator to achieve this?
A. Storage Policy Based Management
B. Storage I/O Control
C. vSphere Storage APIs for Storage Awareness (VASA)
D. vSphere Distributed Resource Scheduler (DRS)
After adding a new vSphere ESXi host with identical hardware configuration to an existing vSphere cluster, which task would an administrator complete prior to checking the compliance with an existing host profile?
A. Attach the host profile to the new host
B. Duplicate the host profile
C. Copy the host setting from the new host
D. Import the host profile
An administrator is tasked with applying updates to a vSphere cluster running vSAN using vSphere Lifecycle Manager. Downtime to the ESXi hosts must be minimal while the work is completed. The administrator has already completed the following steps and no errors have been returned: Downloaded all applicable software and created a new image. Attached the new image to the cluster and run a compliance check against the image for the cluster. Ran a remediation pre-check for the cluster. Which two series of steps should the administrator perform to start the remediation of the cluster using the new image? (Choose two.)
A. 1. Use the Remediate option in vSphere Lifecycle Manager to remediate all of the ESXi hosts in the cluster in parallel.2. Allow vSphere Lifecycle Manager to automatically control maintenance mode on the ESXi hosts.
B. 1. Place each of the ESXi hosts into maintenance mode manually.2. Use the Stage option in vSphere Lifecycle Manager to stage the required software on all ESXi hosts one at a time.
C. 1. Leave all ESXi hosts in the cluster operational.2. Use the Stage All option in vSphere Lifecycle Manager to stage the required software onto all ESXi hosts one at a time.
D. 1. Leave all ESXi hosts in the cluster operational.2. Use the Stage All option in vSphere Lifecycle Manager to stage the required software onto all ESXi hosts in the cluster in parallel.
E. 1. Use the Remediate option in vSphere Lifecycle Manager to remediate all of the ESXi hosts in the cluster in sequence.2. Allow vSphere Lifecycle Manager to automatically control maintenance mode on the ESXi hosts.
A vSphere environment is experiencing intermittent short bursts of CPU contention, causing brief production outages for some of the virtual machines (VMs). To understand the cause of the issue, the administrator wants to observe near real-time statistics tor all VMs. Which two vSphere reporting tools could the administrator use? (Choose two.)
A. Advanced Performance Charts
B. esxcli
C. resxtop
D. Overview Performance Charts
E. esxtop
When configuring vCenter High Availability (HA), which two statements are true regarding the active, passive, and witness nodes? (Choose two.)
A. Network latency must be less than 10 milliseconds.
B. They must have a supported Wide Area Network (WAN).
C. They must have a minimum of a 10 Gbps network adapter.
D. They must have a minimum of a 1 Gbps network adapter.
E. Network latency must be more than 10 milliseconds.
An administrator creates a virtual machine that contains the latest company-approved software, tools and security updates. Company policy requires that only full clones are allowed for server workloads. A combination of which two tasks should the administrator complete to prepare for the deployment of this virtual machine for multiple users? (Choose two.)
A. Set appropriate permissions on the virtual machine.
B. Create a virtual machine customization specification.
C. Upgrade the virtual hardware.
D. Convert the virtual machine to a template.
E. Take a snapshot of the virtual machine.
Free Access Full 2V0-21.23 Practice Exam Free
Looking for additional practice? Click here to access a full set of 2V0-21.23 practice exam free questions and continue building your skills across all exam domains.
Our question sets are updated regularly to ensure they stay aligned with the latest exam objectives—so be sure to visit often!
Good luck with your 2V0-21.23 certification journey!