Practice Free 2V0-16.25 Exam Online Questions
A virtual machine (VM) owner has requested to move a VM from one cluster to another. The following information has been provided:
The VM cannot have downtime during the transfer.
The same network is present on both clusters.
The datastore that the VM is currently on is not present in the destination cluster.
What step should the administrator perform to move the VM?
- A . Perform a vMotion of the VM to the new cluster.
- B . Backup the VM and restore it to the new cluster.
- C . Perform a vMotion with Storage vMotion to the new cluster.
- D . Inform the owner the VM cannot be moved to the new cluster.
The security team has requested that high-sensitivity workloads be protected using Confidential Computing in your VMware vSphere Foundation (VVF) 9.0 environment. These workloads handle
regulated data that must be isolated from the hypervisor and other tenants, even when running on the same ESX host.
The vSphere administrator is responsible for ensuring that only trusted hosts are used and that virtual machines are configured with hardware-enforced memory isolation.
Which two configurations must you implement to support Confidential Computing for these workloads? (Choose two.)
- A . Create virtual machines with hardware version 22 and set the Confidential Computing flag.
- B . Use TPM 2.0 on the guest OS to generate attestation reports for VM launch.
- C . Enable AMD SEV-SNP or Intel TDX support in the host BIOS and confirm compatibility in vSphere.
- D . Configure Encrypted vMotion with "Required" mode for the VM.
- E . Enable vSphere Trust Authority and set the Confidential Computing flag.
An administrator is tasked with enabling a Supervisor in a VMware vSphere Foundation (VVF) environment using vSphere networking and the Foundation Load Balancer. The vSAN-backed cluster has been configured with a vSphere Distributed Switch.
Which two actions must the administrator perform when enabling a Supervisor using vSphere networking? (Choose two.)
- A . Select a vSphere namespace template to define initial namespace limits.
- B . Provide a static IP address range for the Supervisor control plane VMs.
- C . Configure a Tier-0 Gateway with BGP or static routing.
- D . Enable the VM Service before deploying the Supervisor.
- E . Assign a vSphere Distributed Switch and a corresponding port group.
During a recent audit, it was determined that a group of users may have been compromised. These users should not have access to any VMware vCenter resources while an investigation is underway. All the affected users have been placed into a SUSPECT_USERS group.
Which step is required to ensure that the suspect users will never have access to resources in vCenter?
- A . Assign the SUSPECT_USERS group the No access role to the vCenter Object and check propagate.
- B . Assign the SUSPECT_USERS group the Administrator role to the vCenter Object and uncheck propagate.
- C . Disconnect the vCenter from Active Directory.
- D . Assign the SUSPECT_USERS group the Read-only role to the vCenter Object and check propagate.
An administrator is preparing to deploy VMware vSphere Foundation using the VMware Cloud Foundation (VCF) Installer wizard. During host onboarding, it is discovered that the VMware ESX hosts each have different root passwords.
Which deployment method must be used to continue the installation?
- A . Proceed with the wizard and override host credentials during staging.
- B . Use the deployment wizard and enter credentials per host manually.
- C . Set the password to expire on all ESX hosts.
- D . Use a JSON specification file to define per-host credentials.
The security team requests the ability to log into VMware vCenter and review datacenter, cluster and network configurations. The following details are provided:
The security team is not authorized to make any changes to the environment.
Each user must login with unique credentials.
What steps should the administrator perform to grant access to the security team?
- A . Share the password for ‘[email protected] ‘ with the security team.
- B . Create a security user, assign the user the Read-Only role, share the credentials with the security team.
- C . Create a group for the security team, add the users to the group, and assign the group the Network Administrator role.
- D . Create a group for the security team, add the users to the group, and assign the group the Read-Only role.
An administrator needs to enable the enhanced capabilities of Storage Operations for vSAN 9.0 in VMware Cloud Foundation (VCF) Operations.
What three prerequisite steps must be completed in order to enable the advanced Diagnostic Troubleshooting, Benchmarking and Optimizing? (Choose three.)
- A . No configuration required, Run New Diagnostics is enabled automatically.
- B . Enable and start the vSAN Performance service in the target vCenter.
- C . Configure a vSAN account for the vCenter Integration Instance.
- D . Assign the VCF Operations Service Account administrative rights to vSAN Objects.
- E . Assign the credentials configured in the vCenter Integration instance have access to vSAN objects.
- F . Open port 5989 on each VCF Operations node on which the vSAN adapter exists.
The operations team is tasked with the preparation of a weekly health status overview of a VMware vSphere Foundation (VVF) environment to senior management with the following requirements:
It should be sent every Monday morning.
It must include KPIs related to cluster health, storage usage, and virtual machine (VM) growth trends.
Operational overhead should be minimized.
Which two actions must the administrator perform to satisfy these requirements? (Choose two.)
- A . Create a custom dashboard with the required KPIs.
- B . Configure the scheduler to send the report via e-mail weekly.
- C . Export the built-in Cluster Summary report via FTP.
- D . Create a custom View with the KPIs and add it to a new Report Template.
- E . Export the desired metrics from the Metrics Explorer to CSV.
