What is the effect of applying a memory limit to these virtual machines?
A new ESXi 5.x host is set up with two virtual machines. A memory limit is applied so that users
will have predictable performance as virtual machines are added to the host.
What is the effect of applying a memory limit to these virtual machines?
Which two options cannot be edited if vApp Options is disabled in the Options tab of a virtual machine that is
Which two options cannot be edited if vApp Options is disabled in the Options tab of a virtual
machine that is part of a vApp? (Choose two.)
Which step can be taken to enable access to the .iso file for the affected virtual machine?
An administrator is updating a program running on a virtual machine. The update file has been
downloaded as an .iso file and placed on a shared NFS datastore. An attempt to mount the .iso file
to the virtual machine fails, but subsequent testing shows that the .iso file can be mounted to a
virtual machine running on another ESXi 5.x host.
Which step can be taken to enable access to the .iso file for the affected virtual machine?
Which memory management method can be used to guarantee that the application performs well at all times?
During peak operating hours, an administrator finds that a business-critical application running in a
virtual machine is not performing as well as during normal hours.
Which memory management method can be used to guarantee that the application performs well
at all times?
what could be checked next?
A database administrator has reported periodic poor performance on a particular virtual machine.
The virtual machine administrator has noticed a significant drop in performance when utilized
memory exceeds 1GB.
What does this indicate and what could be checked next?
What are possible valid uses for the default No Access role in vCenter?
What are possible valid uses for the default No Access role in vCenter? (Choose two.)
Which memory conservation technique collaborates with the server to reclaim pages that are redundant in a virt
Which memory conservation technique collaborates with the server to reclaim pages that are
redundant in a virtual machine or virtual machines?
Which statement is true about the network performance of the virtual machine in the exhibit?
Which two operations ensure these requirements are met?
An administrator is deploying several ESXi 5.x hosts. Centralized logging with accurate
timestamps is a requirement for the deployment. Which two operations ensure these requirements
are met? (Choose two.)
What are two likely causes of this issue?
An administrator attempts to increase the number of vCPUs in a virtual machine to 8. The
configuration cannot be successfully completed.
What are two likely causes of this issue? (Choose two.)