VMware VCP DCV(2V0-21.23)题库 (增)

VMware VCP-DCV(2V0-21.23)认证考试题库,已全部更新,完整题库请扫描上方二维码访问。

If a distributed switch uses the “Route based on physical NIC load” load balancing algorithm, what does the mean send or receive utilization of an uplink need to exceed for the flow of traffic to move to the second uplink?

  • A. 75 percent of the capacity over a 30 second period
  • B. 60 percent of the capacity over a 30 second period
  • C. 60 percent of the capacity over a 40 second period
  • D. 75 percent of the capacity over a 40 second period

An administrator manually configures a reference ESXi host that meets company security standards for vSphere environments. The administrator now needs to apply all of the security standards to every identically configured host across multiple vSphere clusters within a single VMware vCenter instance.
Which four steps would the administrator complete to meet this requirement? (Choose four.)

  • A. Extract the host profile from the reference host.
  • B. Export the host profile from vCenter.
  • C. Import host customization on the reference host.
  • D. Attach the host profile to each cluster that requires the secure configuration.
  • E. Check the compliance of each host against the host profile.
  • F. Reset host customization on the reference host.
  • G. Remediate all non-compliant hosts.

After a recent unexplained peak in virtual machine (VM) CPU usage, an administrator is asked to monitor the VM performance for a recurrence of the issue.
Which two tools can the administrator use? (Choose two.)

  • A. vCenter Management Interface
  • B. Direct Console User Interface (DCUI)
  • C. vSphere Performance Charts
  • D. vCenter Command Line Interface
  • E. ESXi Shell

An administrator is tasked with configuring vSphere Trust Authority.
The administrator has completed the following steps:

Set up the workstation
Enabled the Trust Authority Administrator
Enabled the Trust Authority State
Collected information about the ESXi hosts and vCenter to be trusted


Which step does the administrator need to complete next?

  • A. Import the Trusted Host information to the Trust Authority Cluster
  • B. Import the Trusted Cluster information to the Trusted Hosts
  • C. Create the Key Provider on the Trusted Cluster
  • D. Import the Trusted Host information to the Trusted Cluster

完整题库请扫描上面二维码获取。

  • 13
    点赞
  • 17
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值