VCP Test Exam Questions

Card Set Information

Author:
daveg
ID:
254509
Filename:
VCP Test Exam Questions
Updated:
2014-01-05 19:02:26
Tags:
90 vcp
Folders:

Description:
Questoisn from test exams
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user daveg on FreezingBlue Flashcards. What would you like to do?


  1. You have a Windows 2003 Server virtual machine (VM) that is experiencing performance problems. Task Manager displays the following information:
    CPU Usage: 85%
    Memory Available: 3 GB
    Network Utilization: 25%
    vCenter Server displays this additional information:
    ESXi host CPU Utilization: 60%
    VMkernel Swap Activity: None
    Average Network Usage: 900 Mbps
    What is the most likely cause for the performance problems?

    A. The VM is CPU constrained.
    B. The ESXi host NIC is being over utilized.
    C. The ESXi host needs more memory installed.
    D. The ESXi host is CPU constrained.
    B. The ESXi host NIC is being over utilized
    (this multiple choice question has been scrambled)
  2. An administrator determines that a virtual machine configured for the Development port group lost network connectivity when it was migrated with vMotion from one ESXi 5.x host to another. The administrator notices that machines configured for the Production port group are not experiencing the issue. The hosts have port groups with the following network configuration:
    Host A:Production (VLAN 100) Development
    Host B:Production (VLAN 100) Development (VLAN 200)
    Which two conditions would explain the loss of network connectivity for the virtual machine? (Choose two.) 
    A. The configured VLAN for Production on Host A is incorrect.
    B. The configured VLAN for Development on Host B is incorrect.
    C. An improper native VLAN is configured on the uplinks to Host A.
    D. An improper native VLAN is configured on the uplinks to Host B.
    not sure
  3. Which vSwitch or vSwitch port group policy setting allows a virtual machine to listen to traffic other than that which is specifically destined for the given VM?
    Traffic Shaping
    Promiscuous Mode
    MAC Address Changes
    Forged Transmits
    Promiscuous Mode
  4. VMware vSphere can be evaluated prior to purchase. What is the maximum number of days the evaluation can be used before a license must be purchased?
    30
    60
    90
    120
    60 days
  5. What would cause the proportional share mechanism to be invoked?
    A. there is resource contention
    B. CPU ready time exceeds a threshold
    C. More than 1 virtual machine is running
    D. the sum of reservations exceeds the physical resources
    D. the sum of reservations exceeds the physical resources
    (this multiple choice question has been scrambled)
  6. A vSphere 5 implementation contains two ESXi hosts, ESXi01 and ESXi02. A virtual machine, VM21a on ESXi01 is connected to a vSphere Standard Switch (vSS) in a port group called Production. The vSS is connected to an uplink on the 10.1.20.0/24 network. ESXi02 is configured with a vSS connected to an uplink on the 10.1.30.0/24 network. A port group called Engineering exists on this switch.Which two statements are true about this configuration? (Choose two.) 
    A. Broadcasts from the Production port group can be received on the Engineering port group.
    B. Broadcasts from the Production port group can not be received on the Engineering port group.
    C. The virtual machine can be vMotion migrated to the target host.
    D. The virtual machine can not be vMotion migrated to the target host.
    B, D
  7. Which VMware solution provides rich, personalized virtual desktops to Thin Clients and repurposed PCs with all the benefits of centralized desktop management?

    VMware Workstation
    VMware Fusion
    Horizon Workspace
    Horizon View
    Horizon Workspace
  8. An administrator finds that an ESXi host cannot be managed by vCenter Server.Which three logs can be reviewed using the DCUI? (Choose three.)
    The ESXi shell logs
    The HA agent logs
    The management agent log
    The vmkernel log
    The VMware ESXi Observation log
    not certai
  9. What are the iSCSI discovery methods that are supported by ESXi hosts?
    Static Targets, Dynamic Targets
    Static Discovery, SendTargets
    Static Discovery, FindTargets
    Dynamic Discovery, FindTargets
    Static Discovery and SendTargets.
  10. If you do not want to have remove targets discovered through Dynamic Discovery, what options do you have?
    Use Static Discovery instead.
  11. An administrator has a mixture of Intel-based ESX Hosts in a DRS cluster where the CPUs are compatible in every way except that some support the NX/XD feature and some do not.Which two actions will minimize the effect of these differences? (Choose two.) 

    a. Mask the NX/XD bit in the processor section of the Configuration tab on the ESXi hosts
    b. Mask the NX/XD bit on every virtual machine in the cluster
    c. Enable Enhanced VMotion Compatibility
    d. Enable Rapid Virtualization Indexing
    A, C
  12. Which feature allows a running virtual machine to be moved from one ESXi host to another without interruption?
    Storage VMotion
    HA
    Cold Migration
    VMotion
    VMotion
  13. Which two actions have no effect on the amount of physical memory resources used for virtualization overhead? (Choose two.) 
    Installing a 64-bit versus 32-bit operating system.
    Increasing the amount of RAM in the virtual machine.
    Increasing the number of virtual CPUs in the virtual machine.
    Increasing the memory shares for the virtual machine.
    b and c, i think
  14. What protocol is used by an ESXi host to communicate with NAS devices?
    iSCSI
    CIFS
    NFS
    SMB
    NFS
  15. To prevent non-ESXi hosts from seeing VMFS datastores, which would be the most efficent place to configure LUN masking?
    • on the ESXi host
    • on the SAN Storage Device
    • on the non-ESXi hosts
    • on the Fibre Channel Switch
    • on the Fibre Channel Switch
  16. An administrator would like to set up Host Profiles in a vSphere architecture. Using the vSphere Client, the administrator connects to vCenter Server and navigates to Management, then begins to build a new Host Profile but is unable to save the profile.
    Why is the administrator unable to save the completed profile?
    A. No ESXi hosts have been added to vCenter Server, and this option will not be available until at least one host is managed
    B. The administrator does not have the proper vSphere edition so this feature is not licensed
    C. The Host Profiles service is stopped and must be restarted to access this option
    D. No DRS/HA Cluster has been defined, and Host Profiles must be applied to a cluster.
    B. The administrator does not have the proper vSphere edition so this feature is not licensed
    (this multiple choice question has been scrambled)
  17. A company has been utilizing templates in its environment. It is running a 10-node ESXi 5.x Cluster and DRS has not been configured. Several virtual machines have been deployed from this template and successfully powered on, but a newly deployed virtual machine will not power on. There appears to be adequate CPU and Memory resources available on the host.Which three things can be done to allow more virtual machines to be deployed into the cluster from this template? (Choose three.)

    A. Deploy the virtual machine to a different host using the same datastore
    B. Enable DRS on the cluster to balance the virtual load out across hosts
    C. Increase the virtual machine memory reservation
    D. Move the swap file to a different location
    E. Select a different datastore for the virtual machine
    B, D, E (I think)
  18. You are running into disk contention problems on a VMFS datastore. Which two actions will resolve this problem? (Choose two.)
    A. Adjust disk shares for each ESXi host accessing this datastore.
    B. Adjust disk shares for all virtual machines accessing this datastore from the same ESXi host
    C. Move some of the virtual machines from this VMFS datastore to another datastore on the same LUN.
    D. Move some of the virtual machines from this VMFS datastore to another datastore on a different LUN.
    B, D - I think
  19. What are two types of CHAP authentication supported by ESXi
    A. Automatic
    B. Unidirectional
    C. Bidirectional
    D. Dynamic
    • B. Unidirectional
    • C. Bidirectional
  20. What types of CHAP authentication are supported with Hardware iSCSI. Identify all that apply
    A. Bidirectional
    B. Unidrectional
    C. Dynamic
    D. Per-target CHAP
    B. Unidirectional. Bidirectional and Per-Target CHAP are only supported with software iSCSI
    (this multiple choice question has been scrambled)
  21. With Unidirectional CHAP, which is true:
    A. The Target authenticates the Initiator
    B. Unidirectional CHAP is enabled by default
    C. Unidiretional CHAP has been replaced with Bidirectional CHAP
    D. The Initiator authenticates the Target
    A. The Target authenticates the Initiator
    (this multiple choice question has been scrambled)
  22. Identify the unique benefits afforded by Software iSCSI (select all that apply)
    A. Automatic CHAP configuration
    B. Bidirectional CHAP
    C. Bidirectional and Unidirectional CHAP
    D. Different credentials for each Target
    E. Ability to not use CHAP unless rewquired by Target
    F. Use CHAP - Ability to require a successful CHAP authentication
    B, D, E
  23. You have changed the iSCSI name of the hardware initiator. When is the new name recognized for iSCSI sessions?
    A. Immediately for new and existing sessions
    B. Only on HBA reboot for existing and new sessions
    C. Immediately for new sessions, only on subsequent login for existing sessions
    D. Immediately for new sessions and upon HBA reboot for existing sessions
    C. Immediately for new sessions, only on subsequent login for existing sessions
    (this multiple choice question has been scrambled)
  24. An ESXi host is configured to access an iSCSI target using CHAP authentication.What happens to the access if CHAP is disabled on the ESXi host?
    A. Access is unaffected until the CHAP is disabled at the iSCSI target
    B. Access is immediately removed
    C. Access is unaffected until either the ESXi host or the iSCSI Array are restarted
    D. Access is removed on the next rescan
    C
  25. An administrator wants to restrict the ability of selected administrators to install plug-ins in their vSphere Client applications.Which action should the administrator perform?

    A. Modify permissions for the administrators and remove the Register Extension privilege.
    B. Modify permissions for the administrators and add the Validate Session privilege.
    C. Modify permissions for the administrators and remove the CIM Interaction privilege.
    D. Modify permissions for the administrators and add the Disable Methods privilege.
    A. ( I tihnk)
    (this multiple choice question has been scrambled)
  26. When is a 64-bit Windows Operating System required for the installation of vCenter Server?
    A. vCenter Server is not supported on 64-bit Windows operating systems
    B. When the managed vSphere environment exceeds 1000 virtual machines
    C. When deploying vSphere 4.1 or later
    D. When the managed vSphere environment exceeds 200 ESX hosts
    C.
    (this multiple choice question has been scrambled)
  27. What is a valid use case for the No Access role?
    A. An administrator wants to revoke permissions on an object that would otherwise be propagated
    B. An administrator wants to allow the state and details of an object to be viewed, but provide no other access.
    C. An administrator wants to allow only the status of an object to be viewed, but provide no other access.
    D. An administrator wants to prevent a user from launching the vSphere Client.
    A
  28. An administrator finds that the Hardware Status tab is unavailable when an ESXi host is selected in vCenter Server.Which two steps could be taken to investigate the issue? (Choose two.)
    A. Check to see if TCP port 5989 is open on the vCenter Server to allow CIM traffic
    B. Check the status of the vCenter Hardware Service in vCenter Service Status
    C. Check the status of the CIM Server service on the Security Profile of the host
    D. Check to see if UDP port 5989 is open on the vCenter Server to allow CIM traffic.
    A and B, I think
  29. Which two conditions will cause a vMotion validation check to fail? (Choose two.)
    A, B
  30. What is the connection type of the primary VLAN in a Private VLAN?
    Promiscuous
  31. A storage array containing a VMFS datastore must be taken offline for maintenance.What can be done to avoid virtual machine downtime on VMs running in this datastore?
    Storage VMotion could be used to accomplish this operation with no virtual machine downtime.
  32. An administrator is setting up vMotion in a vSphere environment. A migration is run to test the configuration, but fails.On which vSphere component does vMotion need to be enabled?
    Port Group
  33. Which CHAP authentication mechanisms are only available when using software and dependent hardware iSCSI adapters (Choose Two)
    Per-subnet CHAP
    Per-target CHAP
    Bidrectional CHAP
    Per IP CHAP
    • Per-target CHAP
    • Bidrectional CHAP
  34. If the vCenter Virtual Appliance is named vcva.vclass.local what address will you type into a browser to manage it?
    https://vcva.vclass.local:5480
  35. Name 4 views available when you run the vSphere Client against a vCenter server?
    • datastores,
    • vm templates, host and clusters, networking
  36. How many ports by default for a vSS?
    120  + 8 for management
  37. What are the 3 security policies and what
    are their defaults?
    • Promiscuous mode (reject),
    • MAC address changes (enabled),
    • Forged transmits (enabled)
  38. What port do you use for downloading a web client?
    9443
  39. What port is used for connecting to vcenter?
    5480
  40. What is lockdown mode?
    A mode through the DCUI that disables all root access to ESXi machines
  41. What port/protocol does NTP use?
    Port 123 over UDP
  42. When would you want to use an RDM?
    When a VM  must interact with a real disk / SAN, such as when you make disk aray snapshots or have a large amount of dat that you do not want to move onto a virtual disk as part of a physical to virtual conversion.
  43. What is the difference between ovf and ova files?
    • OVF =Platform, independent, folder
    • OVA = ZIP
  44. Identify three network security policy exceptions and explain them:
    • Promiscuous mode 
    • Default: reject

    • MAC Address Changes:
    • Default: Accept
    • Definition: Prevents (when set to reject) VM from receiving when packet when a guest attempts to change the MAC assigned to the virtual network.

    • Forged Transmits:
    • Default: Accept
    • Definition: In Reject, the vNIC drops frame that the guest sends where the source address field contains a MAC other than the assigned vNIC MAC address.
  45. Which of the following is a valid definition for burst size?
    A. seconds
    B. Mbps
    C. kbps
    D. kbytes
    D. Kbytes
    (this multiple choice question has been scrambled)
  46. Which of the following is a valid definition for peak bandwidth size?
    A. kbytes
    B. kbps
    C. Mbps
    D. seconds
    B. kbps
    (this multiple choice question has been scrambled)
  47. Which of the following is a valid definition for peak bandwidth size?
    A. kbps
    B. seconds
    C. kbytes
    D. Mbps
    kbps
  48. Idenitfy five NIC teaming policies
    • 1. Load Balancing (outbound only)
    • 2. Netowrk Failure Detection
    • 3. Notify Switches
    • 4. Failback
    • 5. Failover
  49. I need a deterministic load balancing policy, which one can I use?
    • 1. virtual port ID load balancing
    • 2. source mac hash
  50. Identify three load balancing methods?
    • Originating Virtual Port ID
    • Source MAC Hash
    • IP-Hash
  51. Which capabilities can NFS support (identify all that apply):
    A. Boot from SAN
    B. vMotion
    C. vSphere HA
    D. DRS
    E. RDM
    B, C, and D
  52. Which capabilities can DASsupport (identify all that apply):
    A. Boot from SAN
    B. vMotion
    C. vSphere HA
    D. DRS
    E. RDM
    • B (with new enhanced v-motion)
    • E
  53. What five steps must be taken to configure iSCSI software intiator?
    • 1. configure a vmkernal port for ip storage
    • 2. enable the iscsi software adapter
    • 3. configure the iscsci qualified name (IQN) and alias (if required)
    • 4. configure iscsi software properties - static/dynamic discovery addresses and iSCSI port binding
    • 5. configure chap
  54. Storage DRS provides initial placement and load balancing recommendations. I/O load is evaluated by default every
    A. 24 Hours
    B. 8 Hours
    C. 2 Hours
    D. 6 Hours
    TK
  55. By default, HA picks how many heartbeat datastores?
    A. 1
    B. 2
    C. 3
    D. 4
    TK
  56. When configuring resource allocation settings on a VDS switch, which two settings are available?
    A. System network resource pools
    B. System resource pools
    C. User-defined resource pools
    D. User-defined network resource pools.
    TK
  57. What steps must you take to configure software iSCSI multipathing?
    • 1. Create two VMKernal ports
    • 2. Attach NICS to each port
    • 3. Use port-binding to associate the VMKernal ports with the iSCSI initiator

    Once setup they all share the same IQN but differnet IP addresses. The routing table is not consululte,d but managed by vSphere multipahting modules.

What would you like to do?

Home > Flashcards > Print Preview