Aric Hansen
Quiz by , created more than 1 year ago

Intermediate vSphere 6 Certification Quiz on 2. vSphere 6 Professional Certification Exam, created by Aric Hansen on 17/02/2016.

19
1
0
Aric Hansen
Created by Aric Hansen over 8 years ago
Close

2. vSphere 6 Professional Certification Exam

Question 1 of 30

1

Which two methods are recommended for managing the VMware Directory Service? (Choose two.)

Select one or more of the following:

  • Utilize the vmdir command.

  • Manage through the vSphere Web Client.

  • Manage using the VMware Directory Service.

  • Utilize the dc rep command.

Explanation

Question 2 of 30

1

What are two sample roles that are provided with vCenter Server by default? (Choose two.)

Select one or more of the following:

  • Virtual machine User

  • Network Administrator

  • Content Library Administrator

  • Storage Administrator

Explanation

Question 3 of 30

1

Which three services can be enabled/disabled in the Security Profile for an ESXi host? (Choose three.)

Select one or more of the following:

  • CIM Server

  • Single Sign-On

  • Direct Console UI

  • Syslog Server

  • vSphere Web Access

Explanation

Question 4 of 30

1

An administrator would like to use the VMware Certificate Authority (VMCA) as an Intermediate Certificate Authority (CA). The first two steps performed are:
- Replace the Root Certificate
- Replace Machine Certificates (Intermediate CA)
Which two steps would need to be performed next? (Choose two.)

Select one or more of the following:

  • Replace Solution User Certificates (Intermediate CA)

  • Replace the VMware Directory Service Certificate (Intermediate CA)

  • Replace the VMware Directory Service Certificate

  • Replace Solution User Certificates

Explanation

Question 5 of 30

1

Which three options are available for ESXi Certificate Replacement? (Choose three.)

Select one or more of the following:

  • VMware Certificate Authority mode

  • Custom Certificate Authority mode

  • Thumbprint mode

  • Hybrid Deployment

  • VMware Certificate Endpoint Authority Mode

Explanation

Question 6 of 30

1

Lockdown Mode has been enabled on an ESXi 6.x host and users are restricted from logging into the Direct Console User Interface (DCUI).
Which two statements are true given this configuration? (Choose two.)

Select one or more of the following:

  • A user granted administrative privileges in the Exception User list can login.

  • A user defined in the DCUI.Access without administrative privileges can login.

  • A user defined in the ESXi Admins domain group can login.

  • A user set to the vCenter Administrator role can login.

Explanation

Question 7 of 30

1

Strict Lockdown Mode has been enabled on an ESXi host.
Which action should an administrator perform to allow ESXi Shell or SSH access for users with administrator privileges?

Select one of the following:

  • Grant the users the administrator role and enable the service.

  • Add the users to Exception Users and enable the service.

  • No action can be taken, Strict Lockdown Mode prevents direct access.

  • Add the users to vsphere.local and enable the service.

Explanation

Question 8 of 30

1

A common root user account has been configured for a group of ESXi 6.x hosts.
Which two steps should be taken to mitigate security risks associated with this configuration? (Choose two.)

Select one or more of the following:

  • Remove the root user account from the ESXi host.

  • Set a complex password for the root account and limit its use.

  • Use ESXi Active Directory capabilities to assign users the administrator role.

  • Use Lockdown mode to restrict root account access.

Explanation

Question 9 of 30

1

An administrator wants to configure an ESXi 6.x host to use Active Directory (AD) to manage users and groups.
The AD domain group ESX Admins is planned for administrative access to the host.
Which two conditions should be considered when planning this configuration? (Choose two.)

Select one or more of the following:

  • If administrative access for ESX Admins is not required, this setting can be altered.

  • The users in ESX Admins are not restricted by Lockdown Mode.

  • An ESXi host provisioned with Auto Deploy cannot store AD credentials.

  • The users in ESX Admins are granted administrative privileges in vCenter Server.

Explanation

Question 10 of 30

1

Which two advanced features should be disabled for virtual machines that are only hosted on a vSphere system? (Choose two.)

Select one or more of the following:

  • isolation.tools.unity.push.update.disable

  • isolation.tools.ghi.launchmenu.change

  • isolation.tools.bbs.disable

  • isolation.tools.hgfsServerSet.enable

Explanation

Question 11 of 30

1

To reduce the attack vectors for a virtual machine, which two settings should an administrator set to false? (Choose two.)

Select one or more of the following:

  • ideX:Y.present

  • serial.present

  • ideX:Y.enabled

  • serial.enabled

Explanation

Question 12 of 30

1

Which two groups of settings should be reviewed when attempting to increase the security of virtual machines (VMs)? (Choose two.)

Select one or more of the following:

  • Disable hardware devices

  • Disable unexposed features

  • Disable VMtools devices

  • Disable VM Template features

Explanation

Question 13 of 30

1

Which password meets ESXi 6.x host password requirements?

Select one of the following:

  • 8kMVnn2x!

  • zNgtnJBA2

  • Nvgt34kn44

  • !b74wr

Explanation

Question 14 of 30

1

An administrator would like to use a passphrase for their ESXi 6.x hosts which has these characteristics:
-Minimum of 21 characters
-Minimum of 2 words
Which advanced options must be set to allow this passphrase configuration to be used?

Select one of the following:

  • retry=3 min=disabled, disabled, 7, 21, 7 passphrase=2

  • retry=3 min=disabled, disabled, 21, 7, 7 passphrase=2

  • retry=3 min=disabled, disabled, 2, 21, 7

  • retry=3 min=disabled, disabled, 21, 21, 2

Explanation

Question 15 of 30

1

Which Advanced Setting should be created for the vCenter Server to change the expiration policy of the vpxuser password?

Select one of the following:

  • VimPasswordExpirationInDays

  • VimExpirationPasswordDays

  • VimPassExpirationInDays

  • VimPasswordRefreshDays

Explanation

Question 16 of 30

1

An administrator has been instructed to secure existing virtual machines in vCenter Server.
Which two actions should the administrator take to secure these virtual machines? (Choose two.)

Select one or more of the following:

  • Disable native remote management services

  • Restrict Remote Console access

  • Use Independent Non-Persistent virtual disks

  • Prevent use of Independent Non-Persistent virtual disks

Explanation

Question 17 of 30

1

An administrator has recently audited the environment and found numerous virtual machines with sensitive data written to the configuration files.
To prevent this in the future, which advanced parameter should be applied to the virtual machines?

Select one of the following:

  • isolation.tools.setinfo.disable = true

  • isolation.tools.setinfo.enable = true

  • isolation.tools.setinfo.disable = false

  • isolation.tools.setinfo.enable = false

Explanation

Question 18 of 30

1

Which two statements are correct regarding vSphere certificates? (Choose two.)

Select one or more of the following:

  • ESXi host upgrades do not preserve the SSL certificate and reissue one from the VMware Certificate Authority (VMCA).

  • ESXi host upgrades preserve the existing SSL certificate.

  • ESXi hosts have assigned SSL certificates from the VMware Certificate Authority (VMCA) during install.

  • ESXi hosts have self-signed SSL certificates by default

Explanation

Question 19 of 30

1

Which three options are available for replacing vCenter Server Security Certificates? (Choose three.)

Select one or more of the following:

  • Replace with Certificates signed by the VMware Certificate Authority.

  • Make VMware Certificate Authority an Intermediate Certificate Authority.

  • Do not use VMware Certificate Authority, provision your own Certificates.

  • Use SSL Thumbprint mode.

  • Replace all VMware Certificate Authority issued Certificates with self-signed Certificates.

Explanation

Question 20 of 30

1

When attempting to log in with the vSphere Web Client, users have reported the error:
Incorrect Username/Password
The administrator has configured the Platform Services Controller Identity Source as:
- Type. Active Directory as an LDAP Server
- Domain: vmware.com
- Alias: VMWARE
- Default Domain: Yes
Which two statements would explain why users cannot login to the vSphere Web Client? (Choose two.)

Select one or more of the following:

  • Users are typing the password incorrectly

  • Users are in a forest that has 1-way trust.

  • Users are in a forest that has 2-way trust.

  • Users are logging into vCenter Server with incorrect permissions.

Explanation

Question 21 of 30

1

Which group in the vsphere.local domain will have administrator privileges for the VMware Certificate Authority (VMCA)?

Select one of the following:

  • SolutionUsers

  • CAAdmins

  • DCAAdmins

  • SystemConfiguration.Administrators

Explanation

Question 22 of 30

1

Which Platform Service Controller Password Policy determines the number of days a password can exist before the user must change it?

Select one of the following:

  • Maximum Lifetime

  • Password Age

  • Maximum Days

  • Password Lifetime

Explanation

Question 23 of 30

1

An administrator is configuring the clock tolerance for the Single Sign-On token configuration policy and wants to define the time skew tolerance between a client
and the domain controller clock.
Which time measurement is used for the value?

Select one of the following:

  • Milliseconds

  • Seconds

  • Minutes

  • Hours

Explanation

Question 24 of 30

1

Which VMware Single Sign-On component issues Security Assertion Markup Language (SAML) tokens?

Select one of the following:

  • VMware Security Token Service

  • Administration Server

  • VMware Directory Service

  • Identity Management Service

Explanation

Question 25 of 30

1

Which two are valid Identity Sources when configuring vCenter Single Sign-On? (Choose two.)

Select one or more of the following:

  • Radius

  • NIS

  • OpenLDAP

  • LocalOS

Explanation

Question 26 of 30

1

An administrator needs to create an Integrated Windows Authentication (IWA) Identity Source on a newly deployed vCenter Server Appliance (VCSA).
Which two actions will accomplish this? (Choose two.)

Select one or more of the following:

  • Use a Service Principal Name (SPN) to configure the Identity Source.

  • Use a Domain administrator to configure the Identity Source.

  • Join the VCSA to Active Directory and configure the Identity Source with a Machine Account.

  • Create a computer account in Active Directory for the VCSA and configure the Identity Source.

Explanation

Question 27 of 30

1

An administrator wants to reduce the memory overhead for a 3D graphics enabled virtual machine (VM).
What advanced feature can be added to the VM configuration file to reduce memory overhead?

Select one of the following:

  • vga.vgaOnly=TRUE

  • vga.svgaEnable=FALSE

  • svgaEnabled=FALSE

  • svgaDisable=TRUE

Explanation

Question 28 of 30

1

An administrator is building a large virtual machine that will require as many vCPUs as the host can support.
An ESXi 6.x host has these specifications:
- Six 32-core Intel Xeon Processors
- 256 GB of Memory
- 512 GB Local disk space using VMFS5
What is the maximum number of virtual CPUs that the virtual machine can be allocated?

Select one of the following:

  • 64

  • 128

  • 192

  • 256

Explanation

Question 29 of 30

1

Which two features are available for virtual machines configured with DirectPath I/O? (Choose two.)

Select one or more of the following:

  • Fault Tolerance

  • Suspend and Resume

  • Virtual Symmetric Multi-Processing (vSMP)

  • Virtual Non-Uniform Memory Access (vNUMA)

Explanation

Question 30 of 30

1

An administrator is creating a new Content Library. It will subscribe to another remote Content Library without authentication enabled.
What information from the published library will they need in order to complete the subscription?

Select one of the following:

  • Subscription URL

  • A security password from the publishing Content Library

  • Publisher's Items.json file

  • Username from the publishing Content Library

Explanation