Download VMware Certified Professional 6 - Data Center Virtualization Delta.2V0-621D.Prep4Sure.2018-10-02.148q.vcex

Vendor: VMware
Exam Code: 2V0-621D
Exam Name: VMware Certified Professional 6 - Data Center Virtualization Delta
Date: Oct 02, 2018
File Size: 3 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

ProfExam Discount

Demo Questions

Question 1
An administrator has been instructed to secure existing virtual machines in vCenter Server. 
Which two actions should the administrator take to secure these virtual machines? (Choose two.)
  1. Disable native remote management services
  2. Restrict Remote Console access. 
  3. Use Independent Non-Persistent virtual disks
  4. Prevent use of Independent Non-Persistent virtual disks
Correct answer: BD
Explanation:
Reference: http://www.vmware.com/files/pdf/techpaper/VMW-TWP-vSPHR-SECRTY-HRDNG-USLET-101-WEB-1.pdf (page 11, see the tables)
Reference: http://www.vmware.com/files/pdf/techpaper/VMW-TWP-vSPHR-SECRTY-HRDNG-USLET-101-WEB-1.pdf (page 11, see the tables)
Question 2
An administrator has recently audited the environment and found numerous virtual machines with sensitive data written to the configuration files. 
To prevent this in the future, which advanced parameter should be applied to the virtual machines?
  1. isolation.tools.setinfo.disable = true
  2. isolation.tools.setinfo.enable = true
  3. isolation.tools.setinfo.disable = false
  4. isolation.tools.setinfo.enable = false
Correct answer: A
Explanation:
It is configured on a per-VM basis. You can increase the guest operating system variable memory limit if large amounts of custom information are being stored in the configuration file. You can also prevent guests from writing any name-value pairs to the configuration file. To do so, use the following setting, and set it to ‘true’:
It is configured on a per-VM basis. You can increase the guest operating system variable memory limit if large amounts of custom information are being stored in the configuration file. You can also prevent guests from writing any name-value pairs to the configuration file. To do so, use the following setting, and set it to ‘true’:
Question 3
Which two statements are correct regarding vSphere certificates? (Choose two.)
  1. ESXi host upgrades do not preserve the SSL certificate and reissue one from the VMware Certificate Authority (VMCA).
  2. ESXi host upgrades preserve the existing SSL certificate.
  3. ESXi hosts have assigned SSL certificates from the VMware Certificate Authority (VMCA) during install.
  4. ESXi hosts have self-signed SSL certificates by default.
Correct answer: BC
Explanation:
Of course, ESXi host upgrades preserve existing SSL certificate and it also have assigned SSL certificates from VMCA during the installation process.
Of course, ESXi host upgrades preserve existing SSL certificate and it also have assigned SSL certificates from VMCA during the installation process.
Question 4
Which three options are available for replacing vCenter Server Security Certificates? (Choose three.)
  1. Replace with Certificates signed by the VMware Certificate Authority.
  2. Make VMware Certificate Authority an Intermediate Certificate Authority.
  3. Do not use VMware Certificate Authority, provision your own Certificates.
  4. Use SSL Thumbprint mode.
  5. Replace all VMware Certificate Authority issued Certificates with self-signed Certificates.
Correct answer: ABC
Explanation:
There are three options for replace vCenter server security certificates. You can replace it with certificates signed by VMware certificate authority; you can make the VMCA an intermediate certificate authority. Likewise, you can provision your own certificates. 
There are three options for replace vCenter server security certificates. You can replace it with certificates signed by VMware certificate authority; you can make the VMCA an intermediate certificate authority. Likewise, you can provision your own certificates. 
Question 5
An administrator is configuring the clock tolerance for the Single Sign-On token configuration policy and wants to define the time skew tolerance between a client and the domain controller clock. 
Which time measurement is used for the value?
  1. Milliseconds
  2. Seconds
  3. Minutes
  4. Hours
Correct answer: A
Explanation:
The time skew tolerance between a client and the domain controller clock is measured in milliseconds.
The time skew tolerance between a client and the domain controller clock is measured in milliseconds.
Question 6
Which VMware Single Sign-On component issues Security Assertion Markup Language (SAML) tokens?
  1. VMware Security Token Service
  2. Administration Server
  3. VMware Directory Service
  4. Identity Management Service
Correct answer: A
Explanation:
The security token service issues Security Assertion Markup Language (SAML) tokens. These security tokens pass information about a system user between an identity provider and a web service. This service enables a user who has logged on through vCenter Single Sign-On to use multiple web-service delivered applications without authenticating to each one. Reference: https://pubs.vmware.com/vsphere-51/index.jsp?topic=%2Fcom.vmware.vsphere.upgrade.doc%2FGUID-90C1E3DC-4397-4BF0-808E-DF3802E56BC6.html  
The security token service issues Security Assertion Markup Language (SAML) tokens. These security tokens pass information about a system user between an identity provider and a web service. This service enables a user who has logged on through vCenter Single Sign-On to use multiple web-service delivered applications without authenticating to each one. 
Reference: https://pubs.vmware.com/vsphere-51/index.jsp?topic=%2Fcom.vmware.vsphere.upgrade.doc%2FGUID-90C1E3DC-4397-4BF0-808E-DF3802E56BC6.html  
Question 7
Which two are valid Identity Sources when configuring vCenter Single Sign-On? (Choose two.)
  1. Radius
  2. NIS
  3. OpenLDAP
  4. LocalOS
Correct answer: CD
Explanation:
Active Directory (Integrated Windows Authentication) Use this option for native Active Directory implementations. The machine on which the vCenter Single Sign-Onservice is running must be in an Active Directory domain if you want to use this option. See Active Directory Identity Source Settings. Active Directory as an LDAP Server This option is available for backward compatibility. It requires that you specify the domain controller and other information. See Active Directory LDAP Server and OpenLDAP Server Identity Source Settings. OpenLDAP Use this option for an OpenLDAP identity source. See Active Directory LDAP Server and OpenLDAP Server Identity Source Settings. LocalOS Use this option to add the local operating system as an identity source. You are prompted only for the name of the local operating system. If you select this option, all users on the specified machine are visible to vCenter Single Sign-On, even if those users are not part of another domain. Reference: http://pubs.vmware.com/vsphere-60/index.jsp?topic=%2Fcom.vmware.vsphere.security.doc%2FGUID-B23B1360-8838-4FF2-B074-71643C4CB040.html
Active Directory (Integrated Windows Authentication) 
Use this option for native Active Directory implementations. The machine on which the vCenter Single Sign-Onservice is running must be in an Active Directory domain if you want to use this option. 
See Active Directory Identity Source Settings. 
Active Directory as an LDAP Server 
This option is available for backward compatibility. It requires that you specify the domain controller and other information. See Active Directory LDAP Server and OpenLDAP Server Identity Source Settings. 
OpenLDAP 
Use this option for an OpenLDAP identity source. See Active Directory LDAP Server and OpenLDAP Server Identity Source Settings. 
LocalOS 
Use this option to add the local operating system as an identity source. You are prompted only for the name of the local operating system. If you select this option, all users on the specified machine are visible to vCenter Single Sign-On, even if those users are not part of another domain. 
Reference: http://pubs.vmware.com/vsphere-60/index.jsp?topic=%2Fcom.vmware.vsphere.security.doc%2FGUID-B23B1360-8838-4FF2-B074-71643C4CB040.html
Question 8
An administrator needs to create an Integrated Windows Authentication (IWA) Identity Source on a newly deployed vCenter Server Appliance (VCSA). 
  
Which two actions will accomplish this? (Choose two.)
  1. Use a Service Principal Name (SPN) to configure the Identity Source. 
  2. Use a Domain administrator to configure the Identity Source.
  3. Join the VCSA to Active Directory and configure the Identity Source with a Machine Account.
  4. Create a computer account in Active Directory for the VCSA and configure the Identity Source.
Correct answer: AC
Explanation:
Using a machine account when configuring an Active Directory identity source for vCenter Server requires that the Windows system be joined to the domain. If the system is not joined to the domain, SSO cannot leverage the machine account to create the identity source and perform its function as the secure token service user. To resolve this issue in VCVA 5.5, use only the Use SPN option. Reference: http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2058919
Using a machine account when configuring an Active Directory identity source for vCenter Server requires that the Windows system be joined to the domain. If the system is not joined to the domain, SSO cannot leverage the machine account to create the identity source and perform its function as the secure token service user. 
To resolve this issue in VCVA 5.5, use only the Use SPN option. 
Reference: http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2058919
Question 9
An administrator is creating a new Content Library. It will subscribe to another remote Content Library without authentication enabled. 
What information from the published library will they need in order to complete the subscription?
  1. Subscription URL
  2. A security password from the publishing Content Library
  3. Publisher's Items.json file
  4. Username from the publishing Content Library
Correct answer: A
Explanation:
Subscription URL from the published library is needed to complete the subscription.
Subscription URL from the published library is needed to complete the subscription.
Question 10
An administrator is assigning a user the Content Library administrator role. The user will only be creating the library for a single vCenter Server. 
What is the lowest level of the permission heirarchy that this role can be granted to the user and still allow them to create a Content Library? 
  1. Global
  2. Datacenter Folder
  3. Virtual Center
  4. Datacenter
Correct answer: A
Explanation:
To let a user manage a content library and its items, an Administrator can assign the Content Library Administrator role to that user as a global permission. The Content Library Administrator role is a sample role in the vSphere Web Client. Users who are Administrators can also manage libraries and their contents. If a user is an Administrator at a vCenter Server level, they have sufficient privileges to manage the libraries that belong to this vCenter Server instance, but cannot see the libraries unless they have a Read-Only role as a global permission. Reference: http://pubs.vmware.com/vsphere-60/index.jsp?topic=%2Fcom.vmware.vsphere.vm_admin.doc%2FGUID-18F4B892-D685-4473-AC25-3195D68DFD90.html
To let a user manage a content library and its items, an Administrator can assign the Content Library Administrator role to that user as a global permission. The Content Library Administrator role is a sample role in the vSphere Web Client. 
Users who are Administrators can also manage libraries and their contents. If a user is an Administrator at a vCenter Server level, they have sufficient privileges to manage the libraries that belong to this vCenter Server instance, but cannot see the libraries unless they have a Read-Only role as a global permission. 
Reference: http://pubs.vmware.com/vsphere-60/index.jsp?topic=%2Fcom.vmware.vsphere.vm_admin.doc%2FGUID-18F4B892-D685-4473-AC25-3195D68DFD90.html
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!