Test your knowledge of VMware data center virtualization topics, Part 2
Posted on
September 19, 2023
by
‍
Get inside the world of data center virtualization.

Last month, we looked at the first three of the seven domains on the VMware vSphere 8.x Professional (2V0-21.23) certification exam with 25 self-test questions based on exam topics covered in those first three domains.Β 

This time around, the focus is on the rest of the domains and topics related to them. This exam uses a range of 100-500, with 300 being the required passing score. The exam is currently priced at $250 and is available at Pearson VUE testing centers.

The answers appear at the end of the questions. Good luck!

1. Which of the following is used to unlock the power of Data Processing Units (DPUs) for hardware accelerated data processing?
A) vSphere Distributed Services Engine
B) vSAN Data Services
C) vPhoton
D) vCluster

2. Which of the following is the process of bringing on-disk data of a physical or virtual computer into a state suitable for backups before making a snapshot or backup?
A) Bleaching
B) Sanitizing
C) Purging
D) Quiescing

3. By leveraging which of the following can vSphere integrate with various authentication mechanisms to establish trust and exchange authentication information?
A) Dependence keeper
B) Trust maker
C) Product locker
D) Identify federation

4. Which of the following is a feature in VMware vSphere that enables live migration of virtual machines (VMs) between physical hosts without any downtime or service disruption β€” allowing you to move a running VM from one host to another while the VM is still actively serving client requests?
A) vMigrate
B) vTransfer
C) vMotion
D) vManage

5. Which of the following can be used for user authentication and authorization purposes within the vSphere environment?
A) Namespaces
B) Identity sources
C) Standard switches
D) Tanzu filters

6. With vSphere 8, what was previously known as vSphere Update Manager is now known as which of the following?
A) vCenter
B) vSphere Quick Manager
C) Federation Manager
D) Baseline lifecycle management

7. While encrypted virtual machines (VMs) offer enhanced security for data-at-rest within VMware environments, they do come with a few disadvantages compared to non-encrypted VMs. Which of the following could be one of them?
A) Lack of Data Confidentiality
B) Performance Issues
C) Compliance and Regulatory Requirements
D) Limited Data Breach Detection

8. Which of the following is a preconfigured virtual appliance that provides a centralized management platform for VMware vSphere environments and is used to control various aspects of the vSphere environment, including virtual machines, hosts, storage, and networking?
A) VMEX
B) VCSA
C) VAXM
D) VESA

9. You want to configure an alarm to notify you when a virtual machine is powered off, suspended, or has a power state issue. This is a standard, predefined, alarm configurable where?
A) VMware vStore
B) VMware vManager
C) VMware vCenter
D) VMware vLink

10. Which component of VMware vSphere is the web-based user interface (UI) used to access and manage the VMware vSphere environment?
A) vCenter Server
B) ESXi host
C) VMware Tools
D) vSphere Web Client

11. Which of the following is typically utilized in scenarios where multiple VMs share the same storage infrastructure, such as SAN (Storage Area Network) or NAS (Network-Attached Storage) environments?
A) NIOC
B) SIOC
C) QoS
D) DPU

12. Which of the following provides the foundation that is used to create a decoupled and distributed control plane for clustering services in vSphere?
A) vCLS
B) vRDM
C) vSAN
D) vNAS

13. When working with vSphere Cluster Quickstart, hosts should be placed in which mode to be added to a cluster?
A) hidden
B) sleep
C) maintenance
D) quiet

14. Which of the following is available as a subscription service integrated with the My VMware portal and is designed to improve the overall support experience, reduce the time spent on reactive support cases, and enhance the operational efficiency and stability of the vSphere environment?
A) Concord
B) Eventide
C) Skyline
D) Harmony

15. After choosing to add an identify source (Active Directory, LDAP, LocalOS, etc.) in VMware vSphere, what should you do before saving the configuration?
A) Under the "System" section, select "Identity Sources"
B) Log in to the vSphere Client or vSphere Web Client
C) In the "Add Identity Source" window, select the type of identity source you want to configure
D) Click "Test Connection" to verify the connectivity and authentication to the identity source

Please visit GoCertify to attempt the remaining 10 questions of this quiz.


‍

ANSWERS

Get inside the world of data center virtualization.

1. A: According to VMware, vSphere Distributed Services Engine unlocks the power of Data Processing Units (DPUs) for hardware accelerated data processing to improve infrastructure performance, boost infrastructure security and simplify DPU lifecycle management.
‍2. D: Quiescing a file system means bringing the on-disk data from a physical or virtual computer into a state suitable for backups, snapshots, etc.
‍3. D: By leveraging identity federation, vSphere can integrate with various authentication mechanisms, such as Security Assertion Markup Language (SAML), OAuth, or OpenID Connect, to establish trust and exchange authentication information.
‍4. C: vMotion is a feature in VMware vSphere that enables live migration of virtual machines (VMs) between physical hosts without any downtime or service disruption. It allows you to move a running VM from one host to another while the VM is still actively serving client requests.
‍5. B: Once the identity sources are set up, they can be used for user authentication and authorization purposes within the vSphere environment. Users from the configured identity sources will be able to log in to vCenter Server or ESXi hosts using their respective credentials.
‍6. D: With vSphere 8, what was previously known as vSphere Update Manager is now known as Baseline lifecycle management.
‍7. B: Encryption and decryption processes can introduce additional overhead, which may result in a slight performance impact on encrypted VMs. The exact impact depends on factors such as encryption algorithms used, CPU capabilities, and workload characteristics.
‍8. B: A VMware vCenter Server Appliance (VCSA) is a preconfigured virtual appliance that provides a centralized management platform for VMware vSphere environments. It serves as the core component for managing virtual infrastructure and enables administrators to control various aspects of their vSphere environment, including virtual machines, hosts, storage, networking, and more.
‍9. C: In VMware vCenter, there are several predefined alarms available that help monitor and manage the virtual infrastructure. These alarms are designed to trigger notifications or perform specific actions based on predefined conditions. The exact set of predefined alarms may vary depending on the version and edition of vCenter you are using.
‍10. D: The vSphere Client provides a graphical interface that allows users to interact with and control various aspects of their virtual infrastructure, such as virtual machines, hosts, storage, networking, and more. It provides a centralized management platform for administrators to configure, monitor, and troubleshoot their vSphere environment.
‍11. B: SIOC (Storage I/O Control) is typically utilized in scenarios where multiple VMs share the same storage infrastructure, such as SAN (Storage Area Network) or NAS (Network-Attached Storage) environments. Contrasting that, NIOC (Network I/O Control) is typically used in environments with shared network resources, such as vSphere Distributed Switches (VDS), to optimize network traffic and prioritize critical operations.
‍12. A: The vSphere Clustering Service (vCLS) provides the foundation that is used to create a decoupled and distributed control plane for clustering services in vSphere.
‍13. C: Hosts are placed in maintenance mode and added to the cluster.
‍14. C: VMware Skyline is available as a subscription service integrated with the My VMware portal and is designed to improve the overall support experience, reduce the time spent on reactive support cases, and enhance the operational efficiency and stability of the vSphere environment.
‍15. D: You should always click "Test Connection" to verify the connectivity and authentication to the identity source before saving the configuration. All the other options listed are steps that should be done before reaching this point.

‍

About the Author

Emmett Dulaney is a professor at Anderson University and the author of several books including Linux All-in-One For Dummies and the CompTIA Network+ N10-008 Exam Cram, Seventh Edition.

Posted to topic:
Certification

Important Update: We have updated our Privacy Policy to comply with the California Consumer Privacy Act (CCPA)

CompTIA IT Project Management - Project+ - Advance Your IT Career by adding IT Project Manager to your resume - Learn More