PrepAway - Latest Free Exam Questions & Answers

Tag: 5V0-21.19 1-0

An all-flash vSAN cluster contains four nodes.

Which two storage policies can the cluster satisfy? (Choose two.) A. FTT=2 (RAID-1 Mirroring) B. FTT=2 (RAID-6 Erasure Coding) C. FTT=1 (RAID-1 Mirroring) D. FTT=1 (RAID-5 Erasure Coding) E. FTT=3 (RAID-1 Mirroring) Reference: https://docs.vmware.com/en/VMware-Cloud-on-AWS/services/com.vmware.vsphere.vmc-aws-manage-data-center.doc/GUID-EDBB551B-51B0-421B-9C44-6ECB66ED660B.html

Which two conditions should be verified before removing the ESXi host from a vSAN cluster? (Choose two.)

Which two conditions should be verified before removing the ESXi host from a vSAN cluster? (Choose two.) A. Data evacuation is complete. B. Encryption is disabled. C. ESXi host is in maintenance mode. D. Resyncs are running. E. All objects are currently healthy. Reference: https://vsan-essentials.gitbooks.io/vsan-6-2/content/chapter7.html

What must be considered when configuring the new vSAN cluster?

An administrator is planning to deploy a new vSAN cluster with these requirements: -Physical adapters will share capacity among several traffic types -Guaranteed bandwidth for vSAN during bandwidth contention -Enhanced security and performance What must be considered when configuring the new vSAN cluster? A. Isolate traffic in a VLAN and utilize Network I/O Control B. […]

What are two purposes of a vSAN storage policy? (Choose two.)

What are two purposes of a vSAN storage policy? (Choose two.) A. Determine how storage objects are provisioned B. Determine vSAN encryption level C. Guarantee the required level of service D. Enable deduplication and compression E. Enable TRIM/UNMAP Reference: http://www.vmwarearena.com/understanding-vmware-virtual-san-storage-policies-detailed-view/

An organization is no longer compliant with security requirements because a vSphere administrator disabled enc

Which vCenter Server role ensures only authorized vSphere administrators have access to encryption functionality? A. Administrator B. Read-only C. No cryptography administrator D. No access Reference: https://docs.vmware.com/en/VMware-vSphere/6.5/com.vmware.vsphere.security.doc/GUID-6C181D08-6650-4AD1-92D1-AAFDA3A3E38C.html


Page 1 of 212