Tags can be assigned to which two object types? (Choose two.)
A. Virtual machines
B. Datastores
C. Snapshots
D. VMNICs
How does Storage I/O Control protect the service level of critical virtual machines?
A. Gives preferential I/O resource allocation to critical virtual machines
B. Allocates I/O resources equally among all virtual machines
C. Monitors the storage habits of the virtual machines
D. takes a count of virtual machines on the storage device
Which process could be used to increase compute resources to a virtual machine (VM) without first powering down?
A. Increase the CPU Share value on the VM.
B. Move the VM into a Resource Poolwith a larger CPU resource allocation.
C. vMotion the VM to an ESXi host with greater CPU capacity.
D. Add a vCPU to the VM using CPU hot add
The vRealize Suite provides high availability and business continuity disaster recovery for which of these three components? (Choose three)
A. Routers
B. Switches
C. Clusters
D. servers
E. Applications
Refer to the Exhibit
What vSphere inventory object is represented by this image?
A. Datastore Log
B. VSAN License
C. Customization Specification
D. Storage Policy
Which vsphere feature , when combined with a supported third-party antivirus vendor, Enables an administrator to offload antivirus processing from the guest to an appliance running on the esxi host ?
A. Distributed switch
B. vShield endpoint
C. Storage id control
D. Network io control
What should be done if an administrator wants to use Storage DRS, but prevent it from performing balancing functions automatically?
A. Use manual mode in Storage DRS
B. Use Storage vMotion
C. Use automatic mode in Storage DRS
D. Disable Storage DRS
In what two ways can vSphere Replication minimize network bandwidth consumption while replicating and storing virtual machines?
A. it can use pre-shipped VMDK files as seeds
B. It limits CPU cycles used during data transfer.
C. it can use dedicated network resources for replication.
D. It stores the replicated data in compressed format
When using a standard switch in the network how many network adapters can you connect to each port?
A. One
B. two
C. three
D. five
What is Fault Tolerance logging?
A. The act of logging a failure in the primary virtual machine and transferring to the secondary virtual machine in an FT pair
B. The act of logging errors in data transfers between primary and secondary virtual machines in an FT pair.
C. The act of logging runtime state changes made to the virtual machines in an FT pair.
D. The act of transmitting runtime state information to the virtual machines in an FT pair.