Which replicated objects can be directly monitored and …
An administrator subscribes to the vCloud Air Disaster Recovery service.
Which replicated objects can be directly monitored and managed?
Which three connection types are supported between a re…
Which three connection types are supported between a remote site and vCloud Air? (Choose three.)
what happens to the files contained on the backing storage?
When a Content Library is deleted, what happens to the files contained on the backing storage?
What is a possible solution?
A user notifies an administrator that Content Libraries are not visible.
What is a possible solution?
What is the lowest level of the permission heirarchy th…
An administrator is assigning a user the Content Library administrator role. The user will only be creating the library for a single vCenter Server.
What is the lowest level of the permission heirarchy that this role can be granted to the user and still allow them to create a Content Library?
What information from the published library will they n…
An administrator is creating a new Content Library. It will subscribe to another remote Content Library without authentication enabled.
What information from the published library will they need in order to complete the subscription?
Which two features are available for virtual machines c…
Which two features are available for virtual machines configured with DirectPath I/O? (Choose two.)
What is the maximum number of virtual CPUs that the vir…
An administrator is building a large virtual machine that will require as many vCPUs as the host can support. An ESXi 6.x host has these specifications:
Six 32-core Intel Xeon Processors
256 GB of Memory
512 GB Local disk space using VMFS5
What is the maximum number of virtual CPUs that the virtual machine can be allocated?
What advanced feature can be added to the VM configurat…
An administrator wants to reduce the memory overhead for a 3D graphics enabled virtual machine (VM).
What advanced feature can be added to the VM configuration file to reduce memory overhead?
Which two actions will accomplish this?
An administrator needs to create an Integrated Windows Authentication (IWA) Identity Source on a newly deployed vCenter Server Appliance (VCSA).
Which two actions will accomplish this? (Choose two.)