Which feature would allow for the non-disruptive migration of a virtual machine between two clusters in a single VMware vCenter instance?
Answer(s): A
vSphere vMotion allows for the non-disruptive migration of a virtual machine between two clusters in a single vCenter instance, as long as there is shared storage and network connectivity between the clusters.
https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.vcenterhost.doc/GUID-3B41119A-1276-404B-8BFB- A32409052449.htmlvMotion is used to move the VM to a different cluster within the same vCenter. This only works if both clusters share the same storage. If they don't you also need to perform a Storage vMotion. Cross vCenter Migration is only used to migrate to a different vCenter.
Which four elements can a vSphere Lifecycle Manager image contain? (Choose four.)
Answer(s): A,D,F,G
https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-lifecycle-manager/GUID-9A20C2DA- F45F-4C9B-9D17-A89BCB62E6EF.htmlA vSphere Lifecycle Manager image can consist of the following four elements:ESXi base imageThe base image contains an image of VMware ESXi Server and additional components, such as drivers and adapters that are necessary to boot a server. The base image is the only mandatory element in a vSphere Lifecycle Manager image. All other elements are optional.Vendor add-onThe vendor add-on is a collection of software components that OEMs create and distribute. The vendor add-on can contain drivers, patches, and solutions.Firmware and drivers add-onThe firmware and drivers add-on is a special type of vendor add-on designed to assist in the firmware update process. The firmware and drivers add-on contains firmware for a specific server type and corresponding drivers. To add a firmware and drivers add-on to your image, you must install the hardware support manager plug-in provided by the hardware vendor for the hosts in the respective cluster.Independent componentsThe component is the smallest discrete unit in an image. The independent components that you add to an image contain third-party software, for example drivers or adapters.
If a distributed switch uses the "Route based on physical NIC load" load balancing algorithm, what does the mean send or receive utilization of an uplink need to exceed for the flow of traffic to move to the second uplink?
The distributed switch calculates uplinks for virtual machines by taking their port ID and the number of uplinks in the NIC team. The distributed switch tests the uplinks every 30 seconds, and if their load exceeds 75 percent of usage, the port ID of the virtual machine with the highest I/O is moved to a different uplink.
https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-networking/GUID- 959E1CFE-2AE4-4A67-B4D4-2D2E13765715.html
An administrator manually configures a reference ESXi host that meets company security standards for vSphere environments. The administrator now needs to apply all of the security standards to every identically configured host across multiple vSphere clusters within a single VMware vCenter instance.Which four steps would the administrator complete to meet this requirement? (Choose four.)
Answer(s): A,D,E,G
To apply the security standards from a reference host to other hosts across multiple clusters, the administrator needs to extract a host profile from the reference host, which captures its configuration settings; attach the host profile to each cluster that requires the same configuration; check the compliance of each host against the host profile, which compares their settings; and remediate all non-compliant hosts, which applies the configuration settings from the host profile.
https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.security.doc/GUID-F8F105EC-A6EA-4F4A-AF5E- E999DF27B14F.html
Post your Comments and Discuss VMware 2V0-21.23 exam with other Community members:
Murli commented on September 09, 2024 Good content as per exam prospective Anonymous upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the 2V0-21.23 content, but please register or login to continue.