Which two network settings are available on a vSphere Standard Switch?
Which two network settings are available on a vSphere Standard Switch? (Choose two.)
Which two types of information can be obtained about a VMFS datastore using the Summary tab for a connected ho
Which two types of information can be obtained about a VMFS datastore using the
Summary tab for a connected host in the vSphere Client? (Choose two.)
What would limit the maximum number of virtual sockets for the virtual machine to 8?
An administrator is creating a new virtual machine using the New Virtual Machine wizard in
custom mode on an ESXi 5.x host with two quad-core CPUs. What would limit the maximum
number of virtual sockets for the virtual machine to 8? (Choose three.)
What are two possible causes?
what is the maximum number of paths that can be used to send data to the VMFS datastores at any given time?
An administrator is configuring an ESXi 5.x host with two dual-port Fibre Channel (FC)
HBAs. The FC storage array has four active storage processor ports. Zoning is configured
on both fabrics, with ESXi HBA ports and the array ports in the same zone. There are two
LUNs with VMFS datastores configured. Using Round Robin multipathing, what is the
maximum number of paths that can be used to send data to the VMFS datastores at any
given time?
What are two methods of maximizing VMFS performance for virtual machines across all the hosts in a cluster?
What are two methods of maximizing VMFS performance for virtual machines across all the
hosts in a cluster? (Choose two.)
Which three features can be used in combination with network-attached storage (NAS)?
Which three features can be used in combination with network-attached storage (NAS)?
(Choose three.)
which security policy is set to reject on a vSphere Standard Switch?
A security team is validating policy settings in a vSphere environment. By default, which
security policy is set to reject on a vSphere Standard Switch?
Which three files are valid virtual machine files that might be identified when examining a folder that contai
Which three files are valid virtual machine files that might be identified when examining a
folder that contains a virtual machine template on a VMFS datastore? (Choose three.)
Which two roles should be assigned to IT personnel in order to configure the LDAP server?
In a large organization, IT personnel are setting up user access to a vCenter Chargeback
server. A decision is made to use LDAP instead of using local user accounts. Which two
roles should be assigned to IT personnel in order to configure the LDAP server? (Choose
two.)