Free 2V0-21.23 Exam Braindumps (page: 5)

Page 5 of 27

An administrator is tasked with configuring certificates for a VMware software-defined data center (SDDC) based on the following requirements:

- All certificates should use certificates trusted by the Enterprise Certificate Authority (CA).
- The solution should minimize the ongoing management overhead of replacing certificates. Which three actions should the administrator take to ensure that the solution meets corporate policy? (Choose three.)

  1. Replace the VMware Certificate Authority (VMCA) certificate with a self-signed certificate generated from the
  2. Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.
  3. Replace the machine SSL certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
  4. Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.
  5. Replace the solution user certificates wife custom certificates generated from the Enterprise CA.
  6. Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).

Answer(s): B,D,E

Explanation:

Option B, D and E are correct because they allow the administrator to replace the machine SSL certificates, the VMware Certificate Authority (VMCA) certificate and the solution user certificates with custom certificates generated from the Enterprise CA, which will ensure that all certificates are trusted by the Enterprise CA and minimize the ongoing management overhead of replacing certificates.
Option A is incorrect because replacing the VMCA certificate with a self-signed certificate generated from the VMCA will not ensure that the certificate is trusted by the Enterprise CA.
Option C is incorrect because replacing the machine SSL certificates with trusted certificates generated from the VMCA will not ensure that the certificates are trusted by the Enterprise CA.
Option F is incorrect because replacing the solution user certificates with trusted certificates generated from the VMCA will not ensure that the certificates are trusted by the Enterprise CA.


Reference:

https://docs.vmware.com/en/VMware-
vSphere/7.0/com.vmware.vsphere.security.doc/GUID-A2A4371A-B888-404C-B23F- C422A8C40F54.html



An administrator is tasked with moving an application and guest operating system (OS) running on top of a physical server to a software-defined data center (SDDC) in a remote secure location.

The following constraints apply:

- The remote secure location has no network connectivity to the outside world.
- The business owner is not concerned if all changes in the application make it to the SDDC in the secure location.
- The application's data is hosted in a database with a high number of transactions. What could the administrator do to create an image of the guest OS and application that can be moved to this remote data center?

  1. Create a hot clone of the physical server using VMware vCenter Converter.
  2. Create a cold clone of the physical server using VMware vCenter Converter.
  3. Restore the guest OS from a backup.
  4. Use storage replication to replicate the guest OS and application.

Answer(s): B

Explanation:

Option B is correct because it allows the administrator to create a cold clone of the physical server using VMware vCenter Converter, which will create an image of the guest OS and application that can be moved to this remote data center without requiring network connectivity or affecting the application's data.
Option A is incorrect because creating a hot clone of the physical server using VMware vCenter Converter will require network connectivity and may affect the application's data due to changes during conversion.
Option C is incorrect because restoring the guest OS from a backup will require network connectivity and may not include the latest changes in the application.
Option D is incorrect because using storage replication to replicate the guest OS and application will require network connectivity and may not be feasible for a physical server.


Reference:

https://docs.vmware.com/en/vCenter-Converter-Standalone/6.2/com.vmware.convsa.guide/GUID- 9F9E3F8C-0E2B-4B6A-8C5C-3F8E5F6B4E9D.html



An administrator is tasked with configuring an appropriate Single Sign-On (SSO) solution for VMware vCenter based on the following criteria:

- The solution should support the creation of Enhanced Link Mode groups.
- All user accounts are stored within a single Active Directory domain and the solution must support only this Active Directory domain as the identity source.
- All user account password and account lockout policies must be managed within the Active Directory domain.
- The solution should support token-based authentication. Which SSO solution should the administrator choose based on the criteria?

  1. vCenter Identity Provider Federation with Active Directory Federation Services as the identity provider
  2. vCenter Single Sign-On with Active Directory over LDAP as the identity source
  3. vCenter Single Sign-On with Active Directory (Windows Integrated Authentication) as the identity source
  4. vCenter Identity Provider Federation with Active Directory over LDAP as the identity provider

Answer(s): A

Explanation:

,, In vCenter Server Identity Provider Federation, vCenter Server uses the OpenID Connect (OIDC) protocol to receive an identity token that authenticates the user with vCenter Server." Integrated Windows Authentication is deprecated since vSphere 7.0 . Option


Reference:

https://docs.vmware.com/en/VMware- vSphere/7.0/com.vmware.vsphere.authentication.doc/GUID-157188E3-531C-4CC2-BDD4- 8BF01EA26BDC.html



An administrator is tasked with looking into the disaster recovery options for protecting a database server using VMware vSphere Replication.
The following requirements must be met:

- The virtual machine must remain online during the protection.
- The virtual machine's snapshots must be used as part of the replication process. Which step must the administrator complete to accomplish this task?

  1. Configure the virtual machine storage policy.
  2. Enable guest OS VSS quiescing for this virtual machine.
  3. Perform a full initial synchronization of the source virtual machine to the target location.
  4. Configure network traffic isolation for vSphere Replication.

Answer(s): C


Reference:

https://docs.vmware.com/en/vSphere-Replication/8.7/com.vmware.vsphere.replication- admin.doc/GUID-C249300C-2BC0-4128-88B5-046C3DE6BC5B.html



Page 5 of 27



Post your Comments and Discuss VMware 2V0-21.23 exam with other Community members:

Murli commented on September 09, 2024
Good content as per exam prospective
Anonymous
upvote