VMware VCP-DCV(2V0-21.23)认证考试题库,已全部更新,完整题库请扫描上方二维码访问。
If a distributed switch uses the “Route based on physical NIC load” load balancing algorithm, what does the mean send or receive utilization of an uplink need to exceed for the flow of traffic to move to the second uplink?
- A. 75 percent of the capacity over a 30 second period
- B. 60 percent of the capacity over a 30 second period
- C. 60 percent of the capacity over a 40 second period
- D. 75 percent of the capacity over a 40 second period
An administrator manually configures a reference ESXi host that meets company security standards for vSphere environments. The administrator now needs to apply all of the security standards to every identically configured host across multiple vSphere clusters within a single VMware vCenter instance.
Which four steps would the administrator complete to meet this requirement? (Choose four.)
- A. Extract the host profile from the reference host.
- B. Export the host profile from vCenter.
- C. Import host customization on the reference host.
- D. Attach the host profile to each cluster that requires the secure configuration.
- E. Check the compliance of each host against the host profile.
- F. Reset host customization on the reference host.
- G. Remediate all non-compliant hosts.
After a recent unexplained peak in virtual machine (VM) CPU usage, an administrator is asked to monitor the VM performance for a recurrence of the issue.
Which two tools can the administrator use? (Choose two.)
- A. vCenter Management Interface
- B. Direct Console User Interface (DCUI)
- C. vSphere Performance Charts
- D. vCenter Command Line Interface
- E. ESXi Shell
An administrator is tasked with configuring vSphere Trust Authority.
The administrator has completed the following steps:
Set up the workstation
Enabled the Trust Authority Administrator
Enabled the Trust Authority State
Collected information about the ESXi hosts and vCenter to be trusted
Which step does the administrator need to complete next?
- A. Import the Trusted Host information to the Trust Authority Cluster
- B. Import the Trusted Cluster information to the Trusted Hosts
- C. Create the Key Provider on the Trusted Cluster
- D. Import the Trusted Host information to the Trusted Cluster
完整题库请扫描上面二维码获取。