What are the installation requirements of vCenter Server 5?
What are the installation requirements of vCenter Server 5? Select two.
How many iSCSI LUN per Host ?
How many iSCSI LUN per Host ?
How are new LUNs discovered by an ESXi host?
How are new LUNs discovered by an ESXi host?
What are two most likely reasons that VMs cannot power up on this host?
An administrtor has just completed an upgrade of an ESXi 5.x host. Prior to the upgrade, a backup of the host configuration was performed. After the upgrade the backup was restored to the upgraded host. Shortly the administrator receives complaints that users are unable to power on virtual machines.
What are two most likely reasons that VMs cannot power up on this host? (Choose two)
What are two alternate ways to provide the ESXi 5.x installer to the host?
An administrator plans to deploy ESXi 5.x. but does not want to use a CD or DVD. What are two alternate ways to provide the ESXi 5.x installer to the host? (Choose two)
What does the OVF format allows to be done to virtual machine templates?
What does the OVF format allows to be done to virtual machine templates?
Which two methods can be used to quickly identify the issue and immediately notify an administrator so tha the
Recently, a network interface card in an ESXi 5.x host has been experiencing connectivity problems.
Which two methods can be used to quickly identify the issue and immediately notify an administrator so tha the issue can be resolved? (Choose two)
which three circumstances might the VMkernel use a swap file for a running virtual machine?
Assuming that ballooning is possible, under which three circumstances might the VMkernel use a swap file for a running virtual machine? Select three.
Which two objects can be migrated using the Migrate option in the vSphere Client?
Which two objects can be migrated using the Migrate option in the vSphere Client? (Choose two.)
Which VMware solution uses the security of a vSphere implementation and provides linked-clone technology to vi
Which VMware solution uses the security of a vSphere implementation and provides linked-clone technology to virtual desktops?