2V0-21.23 Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills
Are you preparing for the 2V0-21.23 certification exam? Kickstart your success with our 2V0-21.23 Practice Questions Free – a carefully selected set of 50 real exam-style questions to help you test your knowledge and identify areas for improvement.
Practicing with 2V0-21.23 practice questions free gives you a powerful edge by allowing you to:
- Understand the exam structure and question formats
- Discover your strong and weak areas
- Build the confidence you need for test day success
Below, you will find 50 free 2V0-21.23 practice questions designed to match the real exam in both difficulty and topic coverage. They’re ideal for self-assessment or final review. You can click on each Question to explore the details.
An administrator needs better performance and near-zero CPU utilization from the ESXi hosts for networking functions and processing. The administrator creates a new vSphere Distributed Switch and enables network offloads compatibility. Which solution would help achieve this goal?
A. vSphere Distributed Services Engine
B. Data Processing Units (DPUs)
C. vSphere Network I/O Control
D. Universal Passthrough version 2
An administrator has a host profile named Standard-Config. The administrator wants to change the other host profiles to use only the storage configuration settings that are defined in the Standard-Config host profile. What should the administrator do to make this change?
A. Export host customizations and import them to the other host profiles.
B. Copy the storage settings from Standard-Config to all other host profiles.
C. Duplicate the Standard-Config host profile and only modify the storage configuration settings.
D. Export the Standard-Config host profile and attach it to tile other hosts.
Refer to the exhibit.An administrator set up the following configuration: • The distributed switch has four ESXi hosts, and each host has two 10 Gbps NICs. • In the Network I/O Control configuration, the amount of bandwidth reserved for virtual machine (VM) traffic if 4 Gbps. The administrator wants to guarantee that VMs in the Retail distributed port group can access 50 percent of the available reserved bandwidth for VM traffic. Given this scenario, what should the size (in Gbps) of the Retail network resource pool be?
A. 40
B. 32
C. 8
D. 16
An administrator is tasked with migrating a single virtual machine (VM) from an existing VMware vCenter to a secure environment where corporate security policy requires that all VMs be encrypted. The secure environment consists of a dedicated vCenter instance with a 4-node vSphere cluster and already contains a number of encrypted VMs. Which two steps must the administrator take to ensure the migration is a success? (Choose two.)
A. Ensure that the source and destination vCenter instances share the same Key Management Server (KMS).
B. Ensure that Encrypted vMotion is turned off for the VM.
C. Ensure that the VM is encrypted before attempting the migration.
D. Ensure that the VM is powered off before attempting the migration.
E. Ensure that the source and destination vCenter Servers have a different Key Management Server (KMS).
An administrator notices a performance issue in VMware vCenter. To try and understand more about the performance issue, the administrator needs to gather more information about the vCenter database to eliminate a potential disk space issue. Which two tools can the administrator use? (Choose two.)
A. vCenter Management Interface (VAMI)
B. Perfmon
C. df
D. esxtop
E. vSphere Client
A vSphere cluster hosts a three-tier application. The cluster has 50% resources available. If a host in the cluster fails, the database server must be online before the application server, and the appli-cation server must be online before the Web server. Which feature can be used to meet these requirements?
A. Predictive DRS
B. vSphere HA Orchestrated Restart
C. vSphere HA Restart Priority
D. Proactive HA
An administrator remotely deploys VMware ESXi using an out of band management connection and now needs to complete the configuration of the management network so that the host is ac-cessible through the vSphere Host Client. The following information has been provided to complete the configuration: • Host FQDN: esxi01.corp.local • Management VLAN ID: 10 • DHCP: No • Management IP Address: 172.16.10.101/24 • Management IP Gateway: 172.16.10.1 • Corporate DNS Servers: 172.16.10.5, 172.16.10.6 • DNS Domain: corp.local In addition, all host configurations must also meet the following requirements: • The management network must use only IPv4 network protocols. • The management network must be fault tolerant. Which four high level tasks should the administrator complete in the Direct Console User Inter-face (DCUI) in order to meet the requirements and successfully log into the vSphere Host Cli-ent? (Choose four.)
A. Set the value of the VMware ESXi Management Network VLAN ID to 10.
B. Configure at least two network adapters for the VMware ESXi Management Network.
C. Update the VMware ESXi Management Network IPv4 configuration to use a static IPv4 ad-dress.
D. Create a DNS A Record for the VMware ESXi host on the corporate DNS servers.
E. Disable IPv6 for the VMware ESXi Management Network.
F. Restore the original Management vSphere Standard Switch.
G. Update the VMware ESXi Management Network DNS configuration to use the corporate DNS servers for names resolution.
An administrator is responsible for the management of a VMware vCenter instance that is currently experiencing performance issues. The administrator quickly identifies that the CPU and memory utilization of vCenter is consistently over 80%. Upon further analysis, it seems that the vpxd process is contributing significantly to the performance issue. A combination of which four steps should the administrator take to resolve the performance issues and ensure that a similar issue can be rectified without requiring downtime to vCenter moving forward? (Choose four.)
A. Gracefully shut down vCenter using the vSphere Client.
B. Enable CPU Hot Add on the vCenter virtual machine.
C. Power on the vCenter Server Appliance using the vSphere Host Client.
D. Enable CPU and Memory Hot Add on the vCenter virtual machine.
E. Add additional CPU and memory to the vCenter Server Appliance.
F. Power on the vCenter Server Appliance using the vSphere Client.
G. Enable Memory Not Add on the vCenter virtual machine.
An administrator plans to bring VMware vCenter offline in order to perform hardware mainte-nance on the host where the vCenter Server Appliance is running. Which vSphere feature must be configured to ensure that vCenter users experience minimal downtime?
A. vSphere Distributed Resource Scheduler
B. Hybrid Linked Mode
C. vCenter Server High Availability
D. Enhanced Linked Mode
When configuring vCenter High Availability (HA), which two statements are true regarding the active, passive, and witness nodes? (Choose two.)
A. Network latency must be less than 10 milliseconds.
B. They must have a supported Wide Area Network (WAN).
C. They must have a minimum of a 10 Gbps network adapter.
D. They must have a minimum of a 1 Gbps network adapter.
E. Network latency must be more than 10 milliseconds.
An administrator is attempting to configure Storage I/O Control (SIOC) on five datastores within a vSphere environment. The administrator is being asked to determine why SIOC configuration completed successfully on only four of the datastores. What are two possible reasons why the configuration was not successful? (Choose two.)
A. The datastore contains Raw Device Mappings (RDMs).
B. SAS disks are used for the datastore.
C. The datastore has multiple extents.
D. The datastore is using ISCSI.
E. The administrator is using NFS storage.
A vSphere cluster has the following configuration: Virtual machines (VMs) are running Production and Test workloads vSphere Distributed Resource Scheduler (DRS) is enabled There are no resource pools in the cluster Performance monitoring data shows that the Production workload VMs are not receiving their fully allocated memory when the vSphere cluster is fully utilized. A combination of which two steps could the administrator perform to ensure that the Production VMs are always guaranteed the full allocation of memory? (Choose two.)
A. Assign a custom memory share value to the resource pool containing the Production VMs.
B. Assign a memory reservation value to the resource pool containing the Production VMs.
C. Create a parent resource pool for the Production VMs.
D. Create a sibling resource pool for each of the Production and Test VMs.
E. Create a child resource pool for the Test VMs.
An administrator plans to update the Supervisor cluster and has noticed some of the Tanzu Kubernetes Grid clusters are running an incompatible version. Which action must the administrator take before proceeding with the Supervisor cluster update?
A. Update all Tanzu Kubernetes Grid clusters to the latest version prior to the Supervisor cluster update.
B. No action is needed – Tanzu Kubernetes Grid clusters will be updated automatically as part of the update process.
C. No action is needed – Incompatible Tanzu Kubernetes Grid clusters can be manually updated after the Supervisor cluster update.
D. Update incompatible Tanzu Kubernetes Grid clusters prior to the Supervisor cluster update.
Which feature would allow for the non-disruptive migration of a virtual machine between two clusters in a single VMware vCenter instance?
A. vSphere vMotion
B. Cross vCenter Migration
C. vSphere Storage vMotion
D. vSphere Fault Tolerance
A vSphere cluster has the following vSphere Distributed Resource Scheduler (DRS) group configuration: Virtual machine (VM) group named DB Host groups named PROD11 and PROD55 The administrator wants to force the VMs in the DB group to run on the hosts in the PROD11 group. However, if all the hosts in PROD11 go offline for maintenance, then the VMs in the DB group should run on hosts in PROD55. Which VM/Host rule must the administrator create to ensure that these requirements are met?
A. A preferential rule between the DB group and the PROD11 group
B. A preferential rule between the DB group and the PROD55 group
C. A required rule between the DB group and the PROD11 group
D. A required rule between the DB group and the PROD55 group
What are three options an administrator can configure after creating a vSphere Namespace? (Choose three.)
A. Backup schedule
B. Certificates
C. Storage policies
D. Update policies
E. Permissions
F. Resource and Object limits
Which step is completed during Stage 1 of the vCenter Server Appliance deployment?
A. Join a vCenter Single Sign-On domain
B. Create a new vCenter Single Sign-On domain
C. Select the deployment size
D. Configure SSH access
An administrator is working with VMware Support and is asked to provide log bundles for the ESXi hosts in an environment. Which three options does the administrator have? (Choose three.)
A. Generate a combined log bundle for all ESXi hosts using the vCenter Management Interface.
B. Generate a separate log bundle for each ESXi host using the vSphere Host Client.
C. Generate a combined log bundle for all ESXi hosts using the vSphere Client.
D. Generate a separate log bundle for each ESXi host using the vSphere Client.
E. Generate a separate log bundle for each ESXi host using the vCenter Management Interface.
F. Generate a combined log bundle for all ESXi hosts using the vSphere Host Client.
An administrator is tasked with configuring vSphere Trust Authority. The administrator has completed the following steps: Set up the workstation - Enabled the Trust Authority Administrator Enabled the Trust Authority State Collected information about the ESXi hosts and vCenter to be trusted Which step does the administrator need to complete next?
A. Import the Trusted Host information to the Trust Authority Cluster
B. Import the Trusted Cluster information to the Trusted Hosts
C. Create the Key Provider on the Trusted Cluster
D. Import the Trusted Host information to the Trusted Cluster
An administrator is tasked with configuring an appropriate Single Sign-On (SSO) solution for VMware vCenter based on the following criteria: The solution should support the creation of Enhanced Link Mode groups. All user accounts are stored within a single Active Directory domain and the solution must support only this Active Directory domain as the identity source. All user account password and account lockout policies must be managed within the Active Directory domain. The solution should support token-based authentication. Which SSO solution should the administrator choose based on the criteria?
A. vCenter Identity Provider Federation with Active Directory Federation Services as the identity provider
B. vCenter Single Sign-On with Active Directory over LDAP as the identity source
C. vCenter Single Sign-On with Active Directory (Windows Integrated Authentication) as the identity source
D. vCenter Identity Provider Federation with Active Directory over LDAP as the identity provider
An administrator is tasked with providing users access to objects within an existing VMware vCenter instance. The vCenter inventory has a single data center with one management vSphere cluster and five workload vSphere clusters. The following requirements must be met for assigning the users access: Users must only be able to view all of the inventory objects associated with the management vSphere cluster. Users must be able to edit all of the inventory objects associated with the workload vSphere clusters. The administrator creates a custom role to provide the permissions needed to allow users to edit inventory objects. Which series of steps should the administrator complete to assign the custom role and provide the required level of access to users?
A. Apply Global permissions to assign the Read Only role to the root vCenter object.Apply vCenter permissions to assign the custom role to the workload vSphere clusters and enable propagation.
B. Apply Global permissions to assign the Read Only role to the root vCenter object and enable propagation.Apply vCenter permissions to assign the custom role to the workload vSphere clusters and enable propagation.
C. Apply Global permissions to assign the Read Only role to the root vCenter object.Apply vCenter permissions to assign the custom role to the workload vSphere clusters.
D. Apply Global permissions to assign the Read Only role to the root vCenter object and enable propagation.Apply vCenter permissions to assign the custom role to the workload vSphere clusters.
If a distributed switch uses the “Route based on physical NIC load” load balancing algorithm, what does the mean send or receive utilization of an uplink need to exceed for the flow of traffic to move to the second uplink?
A. 75 percent of the capacity over a 30 second period
B. 60 percent of the capacity over a 30 second period
C. 60 percent of the capacity over a 40 second period
D. 75 percent of the capacity over a 40 second period
An administrator manually configures a reference ESXi host that meets company security standards for vSphere environments. The administrator now needs to apply all of the security standards to every identically configured host across multiple vSphere clusters within a single VMware vCenter instance. Which four steps would the administrator complete to meet this requirement? (Choose four.)
A. Extract the host profile from the reference host.
B. Export the host profile from vCenter.
C. Import host customization on the reference host.
D. Attach the host profile to each cluster that requires the secure configuration.
E. Check the compliance of each host against the host profile.
F. Reset host customization on the reference host.
G. Remediate all non-compliant hosts.
An administrator is tasked with deploying a new on-premises software-defined data center (SDDC) that will contain a total of eight VMware vCenter instances. The following requirements must be met: All vCenter instances should be visible in a single vSphere Client session. All vCenter inventory should be searchable from a single vSphere Client session. Any administrator must be able to complete operations on any vCenter instance using a single set of credentials. What should the administrator configure to meet these requirements?
A. Two Enhanced Linked Mode groups consisting of four vCenter instances each in a Single Sign-On domain.
B. A single Hybrid Linked Mode group consisting of four vCenter instances each in a Single Sign-On domain.
C. A single Enhanced Linked Mode group consisting of eight vCenter instances in one Single Sign-On domain.
D. A single Hybrid Linked Mode group consisting of eight vCenter instances in one Single Sign-On domain.
An administrator is preparing to perform an update to vSphere clusters that are running vSAN. The administrator wants to ensure that the following requirements are met as part of the update: • All hosts in the cluster are updated with the same software. • The firmware versions on the hosts are updated. • The new software versions are checked for compliance against the vSAN Hardware Compatibility List. Which three steps should the administrator take to meet these requirements? (Choose three.)
A. Configure vSphere Lifecycle Manager with an image for the cluster.
B. Register the vendor hardware management system as a vCenter Server extension.
C. Download the firmware updates from the VMware website.
D. Download the firmware updates from the vendor website.
E. Run a hardware compatibility check using vSphere Lifecycle Manager.
F. Configure vSphere Lifecycle Manager with a baseline for the cluster.
A combination of which two components of the software-defined data center (SDDC) are re-sponsible for the initial abstraction of CPU, memory, disk, and network resources and their sub-sequent management? (Choose two.)
A. VMware Aria Operations
B. VMware Aria Suite Lifecycle
C. VMware vCenter
D. VMware ESXi
E. VMware vCenter Cloud Gateway
What are two use cases for VMware vSphere+? (Choose two.)
A. Enhance on-premises workloads by managing them through the VMware Cloud Console.
B. Allow live migration between on-premises and VMware Cloud.
C. Increase the performance of the native vCenter vMotion capability.
D. Allow the creation of affinity and anti-affinity rules to be used during failover events.
E. Simplify vCenter lifecycle management through cloud-enabled automation.
An administrator needs to update a VMware vCenter instance to a newer minor release version. Due to restrictions within the environment, the vCenter instance does not have access to the In-ternet. As a first step, the administrator downloads the required update on another machine. What are the next steps the administrator must perform to complete the update?
A. Place the update ISO file in a Virtual Machine File System (VMFS) datastore.Use the vSphere Client to select the update ISO file as the source for the update.
B. Mount the ISO update file to the CD-ROM drive of the vCenter instance.Use the vCenter Management Interface to select the CD-ROM as the source for the update.
C. Place the ISO update file in a folder accessible to the vCenter instance over HTTPS.Use the vCenter Management Interface to select the update file as the source for the update.
D. Place the ZIP update file in a folder accessible to the vCenter instance over HTTPS.Use the vSphere Client to select the update file as the source for the update.
An administrator has configured Storage I/O Control (SIOC) on a Virtual Machine File System (VMFS) datastore. • The datastore supports 30,000 IOPS • Storage I/O Control has been set to manual • Storage I/O Control is triggered when latency hits 30 ms • The datastore contains 3 virtual machines (VMs) 1. A gold tier VM 2. A silver tier VM 3. A bronze tier VM Assuming the datastore latency does not exceed 29ms, what is the maximum number of IOPS the bronze tier VM is entitled to?
A. 30,000
B. 20,000
C. 10,000
D. 5,000
A VMkernel port is labelled PROD01 and uses the default TCP/IP stack. Currently, this VMkernel port is configured for supporting live virtual machine (VM) migrations. Which configuration change should the administrator make to isolate live VM migration traffic from other network traffic?
A. Remove PROD01 and create a new VMkernel port and set the TCP/IP stack to vSphere vMotion.
B. Remove PROD01 and create a new VMkernel port with the TCP/IP stack set to provisioning.
C. Create a new VMkernel port and set the TCP/IP stack to provisioning.
D. Modify PROD01 by changing the TCP/IP stack to vSphere vMotion.
An administrator is tasked with configuring certificates for a VMware software-defined data center (SDDC) based on the following requirements: All certificates should use certificates trusted by the Enterprise Certificate Authority (CA). The solution should minimize the ongoing management overhead of replacing certificates. Which three actions should the administrator take to ensure that the solution meets corporate policy? (Choose three.)
A. Replace the VMware Certificate Authority (VMCA) certificate with a self-signed certificate generated from the VMCA.
B. Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.
C. Replace the machine SSL certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
D. Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.
E. Replace the solution user certificates with custom certificates generated from the Enterprise CA.
F. Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
Refer to the exhibit.An administrator set up the following configuration: The distributed switch has three ESXi hosts, and each host has two 40 Gbps NICs. The amount of bandwidth reserved for virtual machine (VM) traffic is 6 Gbps. The administrator wants to guarantee that VMs in the Finance distributed port group can access 50 percent of the available reserved bandwidth for VM traffic. Given this scenario, what should the size (in Gbps) of the Finance network resource pool be?
A. 18
B. 80
C. 36
D. 120
An administrator enables Secure Boot on an ESXi host. On booting the ESXi host, the following error message appears: Fatal error: 39 (Secure Boot Failed) What is the cause of this issue?
A. The kernel hos been tampered with.
B. The Trusted Platform Module chip has failed.
C. The administrator attempted to boot with a bootloader that is unsigned or has been tampered with.
D. A package (VIB or driver) has been tampered with.
The vCenter inventory contains a virtual machine (VM) template called Linux-01. The adminis-trator wants to install a software patch into Linux-01 while allowing users to continue to access Linux-01 to deploy VMs. Which series of steps should the administrator take to accomplish this task?
A. 1. Verify that Linux-01 is in a content library.2. Clone Linux-013. Convert the clone to a VM.4. Install the software patch.
B. 1. Convert Linux-01 to a VM2. Install the software patch.3. Convert the VM back to a VM template.4. Add Linux-01 to the content library.
C. 1. Verify that Linux-01 is in a content library.2. Check out Linux-01.3. Install the software patch.4. Check in Linux-01.
D. 1. Clone Linux-01.2. Convert the clone to a VM.3. Install the software patch.4. Convert the VM back to a template.
An administrator is completing the configuration of a new vSphere cluster and has enabled vSphere High Availability (HA) and vSphere Distributed Resource Scheduler (DRS). After adding the ESXi hosts to the cluster, which networking information will the administrator be prompted to provide when using the Cluster Quickstart workflow?
A. vMotion networking
B. Management networking
C. vSAN networking
D. Virtual machine networking
An administrator is required to configure several Microsoft Windows virtual machines (VMs) to support Secure Boot for a critical secure application. The following information is provided: • The corporate security policy states that all forms of data encryption must utilize a key provider. • The firmware of each VM is currently set to use Unified Extensible Firmware Interface (UEFI). • Due to the nature of the application running within the VMs, the guest operating system for each VM is currently a minimum of Windows Server 2008 and Windows 7. Which security feature should the administrator implement to meet these requirements?
A. vSphere Virtual Machine Encryption
B. vSphere Visualization-Based Security
C. Virtual Intel Software Guard Extensions (vSGX)
D. Virtual Trusted Platform Module (vTPM)
An administrator is tasked with adding two additional hosts into an existing production vSphere cluster to support the need for additional capacity. The vSphere cluster currently has four identically configured ESXi hosts (esx01, esx02, esx03 and esx04) that utilize Intel Skylake-based CPUs. The two new hosts (esx05 and esx06) are con-figured identically in terms of memory and storage to the existing hosts, but utilize Intel Ice Lake-based CPUs. The administrator must ensure that: • Any virtual machine migrates to any of the six ESXi hosts running in the cluster. • There is no virtual machine downtime during the process of adding the new hosts. Which step should the administrator take to meet these requirements?
A. Create a new vSphere cluster with Enhanced vMotion Compatibility (EVC) enabled and move all hosts into the new cluster.
B. Create a new vSphere cluster and move only three hosts into the new cluster.
C. Configure Enhanced vMotion Compatibility (EVC) mode on the existing cluster and add the two new hosts into the cluster.
D. Create a new vSphere cluster with vSphere High Availability (HA) enabled and move all hosts into the new cluster.
An administrator is tasked with looking into the disaster recovery (DR) options for a software-defined data center (SDDC). The following requirements must be met: • All virtual machines (VMs) must be protected to a secondary site. • The source VMs must remain online until the failover. • When failing over to the secondary site, application downtime is allowed. • The DR failover must be managed from the vSphere Client. • Costs must remain as low as possible. How can the administrator accomplish this task?
A. Configure VMware Cloud Disaster Recovery (VCDR) and combine it with array-based stor-age replication.
B. Configure VMware a Site Recovery Manager and combine it with vSphere Replication.
C. Configure a subscribed content library on the secondary site.
D. Configure VMware Site Recovery Manager and combine it with array-based storage replica-tion.
An administrator needs to configure a content library solution based on the following infor-mation: • A new corporate virtual machine (VM) template is created every month to include all of the latest patches. • The new VM template should be downloaded from the primary data center site (London) to two secondary data center sites (Tokyo and New York) as soon as possible. • There is limited disk space available at one of the secondary data center sites (Tokyo) due to an ongoing data center consolidation project. Which four steps should the administrator take to configure the content library solution before adding a VM template? (Choose four.)
A. Create a new published content library in each secondary site.
B. Configure the New York subscribed content library to download content immediately.
C. Configure the Tokyo subscribed content library to download content immediately.
D. Configure the Tokyo subscribed content library to download content when needed.
E. Create a new published content library at the primary site.
F. Configure the New York subscribed content library to download content when needed.
G. Create a new subscribed content library in each secondary site.
An administrator is asked to segregate virtual machine (VM) traffic by VLAN on a vSphere standard switch. The following requirements must be met: • VLAN ID on the switch port group must be 4095. • VLAN tagging must be done at the VM level. Which tagging mode is required?
A. External Switch Tagging (EST)
B. None
C. Virtual Guest Tagging (VGT)
D. Virtual Switch Tagging (VST)
Which four elements can a vSphere Lifecycle Manager image contain? (Choose four.)
A. ESXi base image
B. ESXi configuration
C. Vendor agents
D. Vendor add-ons
E. BIOS updates
F. Firmware and drivers add-on
G. Independent components
An administrator needs to create affinity rules for the following vSphere cluster setup: • The cluster contains two virtual machines (VMs) named app01 and app02. • The cluster contains six hosts named esx11 through esx16. • The app01 and app02 VMs run software that is licensed to run only on esx11, esx12, or esx13. • vSphere Distributed Resource Scheduler (DRS) is configured. Which set of steps must the administrator perform to ensure that the licensing requirements are met for app01 and app02?
A. 1. Add all the hosts to a host group.2. Create a VM-VM anti-affinity rule for app01 and app02.
B. 1. Add the esx11 – esx13 hosts to a host group.2. Create a VM-VM affinity rule for app01 and app02.
C. 1. Add the VMs to a VM group and the esx11 – esx13 hosts to a host group.2. Create a VM-Host required rule between the VM group and the host group.
D. 1. Add the VMs to a VM group and the esx11 – esx13 hosts to a host group.2. Create a VM-Host preferential rule between the VM group and the host group.
An administrator has a requirement to revert a running virtual machine to a previous snapshot af-ter a failed attempt to upgrade an application. When the administrator originally took the snap-shot, the following choices in the Take Snapshot dialog were made: • Snapshot the virtual machine’s memory = false • Quiesce guest file system = false What will be the result of the administrator selecting the “Revert to Latest Snapshot” option to return the virtual machine to a previous snapshot? (Choose two.)
A. The virtual machine will be restored to the parent snapshot
B. The virtual machine will be restored in a powered off state.
C. The virtual machine will be restored to the child snapshot
D. The virtual machine will be restored in a powered on state.
E. The virtual machine will be restored in a suspended state.
Which two datastore types store the components of a virtual machine as a set of objects? (Choose two.)
A. VMware Virtual Machine File System (VMFS)
B. VMware vSAN
C. Network File System (NFS) 3
D. vSphere Virtual Volumes (vVols)
E. Network File System (NFS) 4.1
An administrator has a requirement to revert a running virtual machine to a previous snapshot after a failed attempt to upgrade an application. When the administrator originally took the snapshot, the following choices in the Take Snapshot dialog were made: Snapshot the virtual machine’s memory = false Quiesce guest file system = false What will be the result of the administrator selecting the “Revert to Latest Snapshot” option to return the virtual machine to a previous snapshot?
A. The virtual machine will be restored to the parent snapshot in a powered on state.
B. The virtual machine will be restored to the parent snapshot in a powered off state.
C. The virtual machine will be restored to the child snapshot in a powered off state.
D. The virtual machine will be restored to the child snapshot in a powered on state.
An administrator is creating a content library to manage VM templates and ISO images. The administrator wants to password-protect the images and templates and share them with a remote site. Which two tasks must the administration perform when creating the content library? (Choose two.)
A. Publish the local content library.
B. Enable the security policy.
C. Create a subscribed content library.
D. Select an NFS datastore.
E. Enable authentication.
Refer to the exhibit.Given the configuration shown in the exhibit, what should the administrator do if the latest VM template contains changes that are no longer needed?
A. Delete App-LibTemplate (2)
B. Revert to App-LibTemplate (2)
C. Delete App-LibTemplate (3)
D. Check out App-LibTemplate (3)
A group of new virtual machines have been deployed using thin-provisioned disks due to the limited storage space available in an environment. The storage team has expressed concern about extensive use of this type of provisioning. An administrator is tasked with creating a custom alarm to notify the storage team when thin provisioning reaches a certain capacity threshold. Where must the administrator define this alarm?
A. Datastore
B. Data center
C. Datastore cluster
D. Virtual machine
What is the role of vSphere Distributed Services Engine?
A. Provide a live shadow instance of a virtual machine (VM) that mirrors the primary VM to prevent data loss and downtime during outages
B. Implement Quality of Service (QoS) on network traffic within a vSphere Distributed Switch
C. Provide hardware accelerated data processing to boost infrastructure performance
D. Redistribute virtual machines across vSphere cluster hosts to comply with user-defined affinity and anti-affinity rules following host failures or during maintenance operations
What are two uses cases for VMware Tools? (Choose two.)
A. Time synchronization with an NTP server
B. Direct deployment of the Aria Automation Config minion
C. Share folders between ESXi hosts and guest OS file systems
D. Ability to shut down a virtual machine remotely
E. Support for unsupported network device drivers
Free Access Full 2V0-21.23 Practice Questions Free
Want more hands-on practice? Click here to access the full bank of 2V0-21.23 practice questions free and reinforce your understanding of all exam objectives.
We update our question sets regularly, so check back often for new and relevant content.
Good luck with your 2V0-21.23 certification journey!