What are two ways to examine the storage policy compliance of a virtual machine? (Choose two.)
A. 1. Browse to the virtual machine in the vSphere Web Client navigator.
2. On the Summary tab, examine the value of the VM Storage Policy Compliance property under VM Storage Policies.
B. 1. Browse to the virtual machine in the vSphere Web Client navigator.
2. Right-click the virtual machine and select "Check storage policy compliance".
C. 1. In the vSphere Web Client, navigate to the vSAN cluster.
2.
On the Storage tab, click vSAN and select Virtual Disks.
3.
Right-click on the virtual machine and select "Compliance status".
D. 1. In the vSphere Web Client, navigate to the vSAN cluster.
2.
On the Monitor tab, click vSAN and select Virtual Objects.
3.
Select a virtual object.
4.
Examine the value in the Compliance Status property for the object.
Consider the following vSAN cluster scenario:
1.
All hosts are members of the same cluster.
2.
All hosts are contributing storage capacity to the vSAN datastore.
3.
There is not vSAN Witness Host.
4.
All virtual machines are assigned a storage policy where Primary level of failures to tolerate = 1.
What is the minimum number of physical hosts required to be a supported vSAN configuration?
A. Five (5)
B. Three (3)
C. Two (2)
D. Four (4)
Given a limited maximum queue depth, what can an administrator do to potentially improve performance when deploying vSAN iSCSI volumes?
A. Utilize multiple iSCSI targets.
B. Change the erasure coding to RAID-6
C. Adjust the maximum iSCSI queue depth values
D. Configure multiple VMkernel ports
Which vSAN health check category is viewed to confirm supported storage controller drivers are in use across all hosts in the cluster?
A. Online health
B. Hardware Compatibility
C. Physical disk
D. Cluster
Which statement is true about the deduplication and compression feature in vSAN?
A. Redundant blocks across multiple disk groups are NOT deduplicated.
B. Compression removes redundant data blocks, whereas deduplication removes additional redundant data within each data block.
C. Compression occurs as data is moved from the capacity tier to the cache tier.
D. Deduplication and compression are enabled by default when the vSAN cluster is created.
Which three sources can be queried to retrieve storage policy components? (Choose three.)
A. vSphere API for IO Filtering (VAIO)
B. Virtual Volumes (VVols)
C. vCenter
D. vSAN
E. Storage IO Control (SIOC)
What is the procedure for presenting an iSCSI LUN as a target for a VMFS datastore?
A. Ensure that the ANY_INITIATOR is listed in the Allowed Initiators tab in vSAN iSCSI Target configuration.
B. Add as a traditional VMFS datastore and connect using the vSAN iSCSI Target IQN.
C. The use of the vSAN iSCSI Target for providing storage directly to vSphere is not currently supported.
D. Use iSCSI vCenter Server Plugin on the target ESXi host.
With the Default vSAN Storage Policy applied to all virtual machines, which statement is true about a vSAN three-node configuration?
A. RAID-5/6 erasure coding can be enabled to save space in an all-flash vSAN configuration.
B. It can migrate all data from a node during maintenance.
C. It requires a witness appliance.
D. It can tolerate only one host failure.
Which are two types of flash-based storage devices? (Choose two.)
A. M.2 HDD
B. NVMe SSD
C. SATA SSD
D. SAS Expander FD
When using vSAN encryption, where and how is the Data Encryption Key (DEK) stored?
A. Persistently on the disk
B. In host memory in a secure KeyCache
C. In vCenter server memory
D. Persistently in the KMS cluster