Q41. An administrator creates a custom ESXi firewall rule using an XML file, however the rules do not appear in the
vSphere Web Client.
Which action should the administrator take to correct the problem?
A. Load the new rules using esxcli network firewall reload.
B. Load the new rules using esxcli network firewall refresh.
C. Verify the entries in the XML file and then reboot the ESXi host.
D. Remove the ESXi host from the inventory and add it back.\\\
Q42. A common root user account has been configured for a group of ESXi 6.x hosts.
Which two steps should be taken to mitigate security risks associated with this configuration? (Choose two.)
A. Remove the root user account from the ESXi host.
B. Set a complex password for the root account and limit its use.
C. Use ESXi Active Directory capabilities to assign users the administrator role.
D. Use Lockdown mode to restrict root account access.
Q43. Which two advanced features should be disabled for virtual machines that are only hosted on a vSphere system?
(Choose two.)
A. isolation.tools.unity.push.update.disable
B. isolation.tools.ghi.launchmenu.change
C. isolation.tools.bbs.disable
D. isolation.tools.hgfsServerSet.enable
Q44. To reduce the attack vectors for a virtual machine, which two settings should an administrator set to false?
(Choose two.)
A. ideX:Y.present
B. serial.present
C. ideX:Y.enabled
D. serial.enabled
Q45. Which two groups of settings should be reviewed when attempting to increase the security of
virtual machines (VMs)? (Choose two.)
A. Disable hardware devices
B. Disable unexposed features
C. Disable Vmtools devices
D. Disable VM Template features
Q46. Refer to the Exhibit.
An administrator is changing the settings on a vSphere Distributed Switch (vDS). During this process, the ESXi
Management IP address is set to an address which can no longer communicate with the vCenter Server.
What is the most likely outcome of this action?
A. The host will disconnect from the vCenter Server and remain disconnected.
B. The host will automatically detect the communication issue and revert the change.
C. The host will stay connected with the change, but show an alert.
D. The host will disconnect and migrate the vDS portgroup to a standard switch.
Q47. Which secondary Private VLAN (PVLAN) type can communicate and send packets to an Isolated PVLAN?
A. Community
B. Isolated
C. Promiscuous
D. Primary
Q48. Which three traffic types can be configured for dedicated Vmkernel adapters? (Choose three.)
A. Discovery traffic
B. vMotion traffic
C. vSphere Replication NFC traffic
D. Provisioning traffic
E. vSphere Custom traffic
Q49. What are two limitations of Link Aggregation Control Protocol (LACP) on a vSphere Distributed Switch? (Choose
two.)
A. IP Hash load balancing is not a supported Teaming Policy.
B. Software iSCSI multipathing is not compatible.
C. Link Status Network failover detection must be disabled.
D. It does not support configuration through Host Profiles.
Q50. Which two features are deprecated in Network I/O Control 3 (NIOC3)? (Choose two.)
A. Class Of Service (COS) Tagging
B. Bandwidth Allocation
C. User-defined network resource pools
D. Admission control
Q51. An administrator runs the command esxcli storage core device list and sees the following output:
mpx.vmhba1:C0:T0:L0 Display Name: RAID 5 (mpx.vmhba1:C0:T0:L0) Has Settable Display Name: false SizE. 40960
Device Type: Direct-Access Multipath Plugin: NMP Devfs Path:
/vmfs/devices/disks/mpx.vmhba1:C0:T0:L0 Status: off Is Local: true
What can be determined by this output?
A. The device is a being used for vFlash Read Cache.
B. The device is in a Permanent Device Loss (PDL) state.
C. The device is a local Solid State Device (SSD).
D. The device is in an All Paths Down (APD) state.
Q52. An administrator notices that there is an all paths down (APD) event occurring for the software FcoE storage.
What is a likely cause?
A. Spanning Tree Protocol is enabled on the network ports.
B. Spanning Tree Protocol is disabled on the network ports.
C. Spanning Tree Protocol is enabled on the storage processors.
D. Spanning Tree Protocol is disabled on the storage processors.
Q53. Which two statements are true regarding iSCSI adapters? (Choose two.)
A. Software iSCSI adapters require vmkernel networking.
B. Independent Hardware iSCSI adapters offload processing from the ESXi host.
C. Dependent Hardware iSCSI adapters do not require vmkernel networking.
D. Independent Hardware iSCSI adapters require vmkernel networking.
Q54. Which command shows the Physical Uplink status for a vmnic?
A. esxcli network ip get
B. esxcli network nic list
C. esxcli network vmnic list
D. esxcli network ifconfig get
Q55. An administrator creates a Private VLAN with a Primary VLAN ID of 2. The administrator then creates three
Private VLANs as follows:
- Marketing
- PVLAN ID. 4
- PVLAN Type. Isolated
- Accounting
- PVLAN ID. 5
- PVLAN Type. Community
- Secretary
- PVLAN ID. 17
- PVLAN Type. Isolated
Users in the Accounting PVLAN are reporting problems communicating with servers in the Marketing PVLAN.
Which two actions could the administrator take to resolve this problem? (Choose two.)
A. Change the PVLAN type for the Accounting network to Promiscuous.
B. Change the PVLAN ID for the Accounting network to 2.
C. Change the PVLAN type for Marketing network to Promiscuous.
D. Change the PVLAN ID for Accounting network to 4.
Q56. What are two use cases for Fibre Channel Zoning in a vSphere environment? (Choose two.)
A. Increases the number of targets presented to an ESXi host.
B. Controls and isolates paths in a fabric.
C. Controls and isolates paths to an NFS share.
D. Can be used to separate different environments.
Q57. Which two considerations should an administrator keep in mind when booting from Software Fiber Channel over
Ethernet (FCoE)? (Choose two.)
A. Software FCoE boot configuration can be changed from within ESXi.
B. Software FCoE boot firmware cannot export information in FBFT format.
C. Multipathing is not supported at pre-boot.
D. Boot LUN cannot be shared with other hosts even on shared storage.
Q58. An administrator is configuring virtual machines to use Worldwide Port Names (WWPNs) to access the storage.
Which two conditions are required? (Choose two.)
A. The switches in the fabric must be N-Port ID Virtualization aware.
B. The virtual machines must be using passthrough Raw Disk Mapping (RDMp).
C. The virtual machines must be using Virtual Machine Disk (VMDK).
D. The switches in the fabric must be Storage I/O Control aware
Q59. Which two statements are true regarding VMFS3 volumes in ESXi 6.x? (Choose two.)
A. Creation of VMFS3 volumes is unsupported.
B. Upgrading VMFS3 volumes to VMFS5 is supported.
C. Existing VMFS3 volumes are unsupported.
D. Upgrading VMFS3 volumes to VMFS5 is unsupport
Q60. Which three statements are correct regarding Fibre Channel over Ethernet (FCOE)? (Choose three.)
A. The network switch must have Priority-based Flow Control (PFC) set to AUTO.
B. The network switch must have Priority-based Flow Control (PFC) set to ON.
C. Each port on the FCoE card must reside on the same vSwitch.
D. Each port on the FCoE card must reside on a separate vSwitch.
E. The ESXi host will require a reboot after moving an FCoE card to a different vSwitch.