An administrator tries to connect the vSphere 5.5 Client to an ESXi 6.x host.
What will happen when this takes place?
A. The operation will fail, since the vSphere Client is deprecated in vSphere 6.x.
B. The operation will fail and the administrator will need to delete the client and install the 6.x version.
C. The operation will prompt the administrator to run a script to upgrade the vSphere Client.
D. The operation will update the vSphere Client silently in the background, then connect.
An administrator notices that one virtual machine is in an orphaned state.
What are two reasons that a virtual machine can appear as orphaned? (Choose two.)
A. A VMware High Availability host failure has occurred.
B. The virtual machine was unregistered directly on the host.
C. The ESXi host is disconnected.
D. The user does not have privilege to access the virtual machine.
After configuring a Virtual SAN cluster, an administrator using the vSphere Web Client notices that the Virtual SAN datastore is smaller than expected. The cluster contains:
1.
Three ESXi hosts
2.
Each host has one 10GB SDD
3.
Each host has one 100GB HDD
Why would the Virtual SAN datastore show as 100GB instead of 300GB?
A. There is a network problem with the Virtual SAN vmkernel ports.
B. The Virtual SAN VASA provider is disabled.
C. vSphere High Availability is enabled on the Virtual SAN cluster.
D. The Virtual SAN cluster must be managed using the vSphere Web Client.
An administrator needs to migrate a very large virtual machine to vCloud Air from a branch office.
Which two components can be used to meet this requirement? (Choose two)
A. Offline Data Transfer
B. vCloud Air Disaster Recovery
C. Data Center Extensions
D. vCloud Connector
Which two are valid Identity Sources when configuring vCenter Single Sign-On? (Choose two.)
A. Radius
B. NIS
C. OpenLDAP
D. LocalOS
Which two features are available for virtual machines configured with DirectPath I/O? (Choose two.)
A. Fault Tolerance
B. Suspend and Resume
C. Virtual Symmetric Multi-Processing (vSMP)
D. Virtual Non-Uniform Memory Access (vNUMA)
When a Content Library is deleted, what happens to the files contained on the backing storage?
A. The files will be unchanged.
B. The files will be deleted.
C. The files will remain and be marked as orphaned.
D. The containing folder will be marked as orphaned.
What are two use cases for Fibre Channel Zoning in a vSphere environment? (Choose two.)
A. Increases the number of targets presented to an ESXi host.
B. Controls and isolates paths in a fabric.
C. Controls and isolates paths to an NFS share.
D. Can be used to separate different environments.
Which three statements are correct regarding Fibre Channel over Ethernet (FCOE)? (Choose three.)
A. The network switch must have Priority-based Flow Control (PFC) set to AUTO.
B. The network switch must have Priority-based Flow Control (PFC) set to ON.
C. Each port on the FCoE card must reside on the same vSwitch.
D. Each port on the FCoE card must reside on a separate vSwitch.
E. The ESXi host will require a reboot after moving an FCoE card to a different vSwitch.
Which file determines the location of the installation script during a scripted upgrade?
A. boot.cfg
B. ks.cfg
C. script.cfg
D. upgrade.cfg