An administrator needs to provide encryption for workloads within an existing vSphere cluster.
The following requirements must be met:
Workloads should be encrypted at rest.
Encrypted workloads must automatically be encrypted during transit.
Encryption should not require any specific hardware.
What should the administrator configure to meet these requirements?
c
An administrator creates a virtual machine that contains the latest company-approved software, tools and security updates. Company policy requires that only full clones are allowed for server workloads.
A combination of which two tasks should the administrator complete to prepare for the deployment of this virtual machine for multiple users? (Choose two.)
ab
An administrator wants to allow a DevOps engineer the ability to delete Tanzu Kubernetes Grid (TKG) cluster objects in a vSphere Namespace.
Which role would provide the minimum required permissions to perform this operation?
d
If a distributed switch uses the Route based on physical NIC load load balancing algorithm, what does the mean send or receive utilization of an uplink need to exceed for the flow of traffic to move to the second uplink?
b
Refer to the exhibit.
After removing an ESXi host from a cluster for maintenance, a number of virtual machines have encountered the warning seen in the exhibit.
After re-adding the ESXi, the issue is resolved.
Which step should the administrator take to move the triggered alarm to its normal state?
d
An administrator has a host profile named Standard-Config. The administrator wants to change the other host profiles to use only the storage configuration settings that are defined in the Standard-Config host profile.
What should the administrator do to make this change?
b
An administrator has a requirement to revert a running virtual machine to a previous snapshot af-ter a failed attempt to upgrade an application. When the administrator originally took the snap-shot, the following choices in the Take Snapshot dialog were made:
Snapshot the virtual machines memory = false
Quiesce guest file system = false
What will be the result of the administrator selecting the Revert to Latest Snapshot option to return the virtual machine to a previous snapshot? (Choose two.)
ad
An administrator needs to create affinity rules for the following vSphere cluster setup:
The cluster contains two virtual machines (VMs) named app01 and app02.
The cluster contains six hosts named esx11 through esx16.
The app01 and app02 VMs run software that is licensed to run only on esx11, esx12, or esx13.
vSphere Distributed Resource Scheduler (DRS) is configured.
Which set of steps must the administrator perform to ensure that the licensing requirements are met for app01 and app02?
c
An administrator is tasked with allowing a single user the ability to take snapshots on a virtual machine. When looking in vCenter, the administrator can see that there are already users and groups assigned permissions on the virtual machine as follows:
The group VM_Users has the Virtual Machine Power User role.
The group VM_Viewers has the Read Only role.
The administrator confirms that the user requesting the additional access is currently one of five members of the VM_Viewers group.
Which two steps should the administrator take to grant this user the additional access required without impacting the user access of others? (Choose two.)
bd
An administrator is tasked with migrating a single virtual machine (VM) from an existing VMware vCenter to a secure environment where corporate security policy requires that all VMs be encrypted. The secure environment consists of a dedicated vCenter instance with a 4-node vSphere cluster and already contains a number of encrypted VMs.
Which two steps must the administrator take to ensure the migration is a success? (Choose two.)
ac