[Lead2pass New] Free Lead2pass VMware 2V0-622D VCE And PDF Instant Download (21-30)

2017 November VMware Official New Released 2V0-622D Dumps in Lead2pass.com!

100% Free Download! 100% Pass Guaranteed!

Lead2pass provides 100% pass 2V0-622D exam questions and answers for your VMware 2V0-622D exam. We provide VMware 2V0-622D exam questions from Lead2pass dumps and answers for the training of 2V0-622D practice test.

Following questions and answers are all new published by VMware Official Exam Center: https://www.lead2pass.com/2v0-622d.html

QUESTION 21
Which two encryption keys does the host use when encrypting virtual machine files? (Choose two.)

A.    Public Key Infrastructure Encryption Key (PKI)
B.    Master Encryption Key (MEK)
C.    Data Encryption Key (DEK)
D.    Key Encryption Key (KEK)

Answer: CD
Explanation:
https://pubs.vmware.com/vsphere-65/index.jsp?topic=%2Fcom.vmware.wssdk.pg.doc%2FPG_VM_Encryption.14.2.html

QUESTION 22
An administrator wants to upgrade ESXi 5.5 hosts to ESXi 6.5 using Update Manager.
When performing a scan for baseline compliance, the host’s status is marked Compliant.
Which has happened?

A.    Host must be version 6.0 in order to upgrade to 6.5.
B.    Host has some third-party software installed.
C.    Host has no upgrade baseline attached.
D.    Host hardware is not supported for upgrade.

Answer: C

QUESTION 23
A VM-Host affinity rule states that VM group “X” must run on hosts in group “Y”.
If all ESXi hosts in group “Y” fail, which is the resulting behavior with vSphere HA enabled?

A.    The virtual machines in group “X” will failover to hosts that do not belong to group “Y”, but will vMotion back to hosts in group “Y” when they become available.
B.    The virtual machines in group “X” will not failover to hosts that do not belong to group “Y”.
C.    This scenario is not possible because vSphere HA and DRS cannot work together.
D.    The virtual machines in group “X” will only fail over to hosts that do not belong to group “Y” if they are marked as “High” VM Restart Priority within vSphere HA.

Answer: B
Explanation:
VM-Host affinity rules place specified virtual machines on a particular host or a member of a defined group of hosts during failover actions.
https://docs.vmware.com/en/VMware-vSphere/6.5/com.vmware.vsphere.avail.doc/GUID-E137A9F8-17E4-4DE7-B986-94A0999CF327.html

QUESTION 24
An administrator wants to ensure that any virtual machine added to a certain port group always has sufficient network resources. Network I/O Control version 3 has been enabled on the Distributed Switch. Which three steps will achieve this objective? (Choose three.)

A.    Reserve bandwidth for virtual machine system traffic on the Distributed Switch Port Group.
B.    Edit the virtual machine’s Resource settings and set a reservation for virtual machine system traffic.
C.    Create a Network Resource Pool on the Distributed Switch and set a reservation quota.
D.    Reserve bandwidth for virtual machine system traffic on the Distributed Switch.
E.    Add the Network Resource Pool on the Distributed Switch Port Group.

Answer: CDE
Explanation:
https://docs.vmware.com/en/VMware-vSphere/6.5/com.vmware.vsphere.networking.doc/GUID-E333032F-C292-4351-8318-C201F0579846.html#GUID-E333032F-C292-4351-8318-C201F0579846
To limit via port group you must create a network resource pool and add the VDS port group to it. To create a quota in the network resource pool you need a reservation at the VDS level first.

QUESTION 25
An administrator would like to configure vSphere HA to use two isolation addresses.
How would this affect the behavior of HA?

A.    If both isolation addresses are not reachable, the host will be restarted by the HA agent.
B.    If both isolation addresses are not reachable, the host will use the vCenter Server IP address as a final isolation address before being marked isolated.
C.    If only one of the isolation addresses is reachable, the host will not be marked isolated by HA.
D.    If only one of the isolation addresses is reachable, the host will be considered in an isolated by HA.

Answer: C

QUESTION 26
ESXi hosts with 10Gbps network cards are attached to a distributed switch. The administrator has upgraded to NIOC3 and wants to allow vMotion traffic to use as much bandwidth as possible but must ensure that other services always have sufficient bandwidth.
How can this be done?

A.    Configure shares on the distributed switch for the vMotion traffic type.
B.    Configure limits on the distributed switch on the on vMotion traffic type.
C.    Associate vMotion traffic with a network resource pool and use CoS tagging.
D.    Set shares on user-defined network resource pool and associate it with vMotion traffic.

Answer: A

QUESTION 27
An administrator notices that a virtual machine running SQL Server is not performing as expected.

vmware.log> vmx| W110: NUMA and VCPU hot add are incompatible. Forcing UMA

How can the administrator resolve this issue?

A.    Power off the virtual machine and disable vCPU hot plug.
B.    Reinstall VMware Tools.
C.    Modify the .vmx file to force NUMA and vCPU hot add to function.
D.    Installation third party plug-in to enable NUMA and vCPU hot add to function.

Answer: A
Explanation:
http://vspheres.blogspot.com/2012/02/nasty-bug-in-esxi-5-with-hot-add-cpu.html

QUESTION 28
An administrator wants to create and use a vApp.
Which pre-requisite must be met before the administrator can create a vApp?

A.    The vApp can only be deployed in an EVC enabled cluster.
B.    The vApp must be created within a StorageDRS cluster.
C.    None. vSphere 6.5 does not support vApp deployments.
D.    The vApp can only be created in a DRS enabled cluster.

Answer: D

QUESTION 29
An administrator is using virtual machine encryption in their vSphere 6.5 environment. The Key Management Server (KMS) has experienced a critical failure.
Which two statements are true about VM encryption when the KMS is not available? (Choose two.)

A.    VMs will shut down gracefully in the event of a KMS outage as a proactive measure to prevent data theft.
B.    VMs which were running at the time of the KMS failure will continue to run.
C.    If an ESXi host is rebooted, it will be unable to power on encrypted VMs until KMS connectivity is restored.
D.    vCenter Server will continue to distribute encryption keys as long as it is not rebooted while the KMS is unreachable.
E.    ESXi hosts within the same cluster will share keys with one another while the KMS is unreachable.

Answer: BC

QUESTION 30
Examine the LUN properties that are shown in the exhibit. Which action should be taken to utilize all active paths?

 

A.    Change PSP to Most Recently Used
B.    No action required. All paths are already utilized.
C.    Change PSP to Fixed.
D.    Change PSP to Round Robin.

Answer: D

Lead2pass is the leader in 2V0-622D certification test questions with training materials for VMware 2V0-622D exam dumps. Lead2pass VMware training tools are constantly being revised and updated. We 100% guarantee VMware 2V0-622D exam questions with quality and reliability which will help you pass VMware 2V0-622D exam.

2V0-622D new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDTkkwTk43VTR2aGs

2017 VMware 2V0-622D exam dumps (All 140 Q&As) from Lead2pass:

https://www.lead2pass.com/2v0-622d.html [100% Exam Pass Guaranteed]