Appendix A

Answers to Review Questions

Chapter 2: Plan, Install, Configure, and Upgrade vCenter Server and VMware ESXi

1. C, D. The version of VMware Tools that is included with vSphere 5 is supported on both vSphere 4.x and vSphere 5 virtual machines.
2. A. The bundled Microsoft SQL Server 2008 R2 Express edition database can be used with up to 5 VMware ESX hosts and 50 virtual machines in the inventory.
3. D. During the install, you can leave this password blank. Obviously, this is not a recommended practice.
4. C. ESX/ESXi 3.5 hosts will require the use of the legacy license server, which may be downloaded as a separate component from the VMware website.
5. A, B. vCenter Server 5 requires two vCPUs or one dual-core vCPU to be a supported configuration.
6. C. You can upgrade a dvSwitch to version 5.0.0 only if all of the ESXi hosts are also running ESXi 5.
7. A, B, C. ESXi 5 can create, edit, and run virtual machine hardware versions 8 and 7. ESXi 5 can edit and run virtual machine hardware version 4.
8. A. vCenter Server is always upgraded first. The vSphere Client would be next, because the latest version would be required to manage the vCenter Server 5 instance.
9. B, C. ESXi 5 hosts can PXE boot and receive an IP address from a DHCP server. Then the Auto Deploy server will stream the ESXi image into the host's memory.
10. B. ESXi 5 requires a minimum of two processor cores.
11. C. The vSphere Client can be used to apply license keys to ESXi hosts.
12. B. Mem.MemZipEnable is used to enable/disable the memory compression cache. By default the setting is 1, or enabled.
13. A, D. DNS and routing can be configured using either vSphere Client or the DCUI.
14. C. The vSphere Web Client is a web application that can be used on Linux, and it is particularly well-suited for virtual machine administrators.
15. A, B, C, D. These are the four available vCenter Server Support Tools that can be installed from the VMware vCenter Installer.
16. B, D. VMware vCenter Server Standard is used in the vSphere 5 Standard, Enterprise, and Enterprise Plus kits.
17. A. The vCenter Server Appliance requires a minimum of 7GB of disk space and a maximum of 80GB.
18. A, C. A virtual machine must be powered off to upgrade the virtual hardware, and a virtual machine that is already using the latest version of the virtual hardware would be ineligible for an upgrade to the latest version.
19. B. An existing ESX/ESXi host must have a static IP address if it is going to be updated by Update Manager.
20. D. Update Manager, interactive, and scripted upgrades are the supported upgrade methods when upgrading ESX/ESXi 4.x versions to ESXi 5.

Chapter 3: Secure vCenter Server and ESXi and Identify vSphere Architecture and Solutions

1. B. There are three default system roles: Administrator, Read-Only, and No Access.
2. C. A privilege defines individual user rights.
3. C. A role is a collection of privileges.
4. B. A permission is created by pairing a role with a user or group and associating it with an object in the vCenter Server inventory.
5. A, D. Any permission defined on a child object will override permissions propagated from parent objects, and virtual machines do inherit multiple permissions.
6. B. The ESXi firewall is enabled by default and also blocks all traffic by default, except for default management services traffic.
7. A. Start Automatically If Any Ports Are Open, And Stop When All Ports Are Closed is the VMware-recommended setting.
8. C. All operations performed against an ESXi host in lockdown mode must originate from the vCenter Server that is managing the ESXi host. The exceptions are the ESXi Shell, SSH, or the Direct Console User Interface (DCUI), if these services are enabled on the ESXi host in lockdown mode.
9. B, C. MAC Address Changes and Forge Transmits are set to Accept by default, and Promiscuous Mode is set to Reject by default.
10. B. The list of local ESXi users and groups is accessible from the vSphere Client connected directly to the ESXi host. vCenter Server has no ability to view these local ESXi accounts.
11. C. Active Directory security groups are the preferred method for managing permissions in vCenter Server.
12. D. The default system roles of No Access, Read-Only, and Administrator cannot be edited or removed. The Administrator and Read-Only roles can be cloned; however, the No Access role cannot be cloned.
13. D. There must be a group in Active Directory with the name ESX Admins, and the Active Directory user accounts that should have access to the ESXi host(s) will be placed in this group.
14. A, B, C, D. Permission changes via host profiles require vSphere 4.0 or newer hosts to be configured to use Active Directory. The Enterprise Plus edition of vSphere is required from a licensing perspective, and the use of vCenter Server is also required.
15. A, C. The Virtual Machine.State.Create Snapshots privilege and the Datastore.Allocate privilege are both required to take a snapshot of a virtual machine.
16. B, D. Storage I/O Control and Storage DRS are both included only in the Enterprise Plus Edition of vSphere 5.
17. A, B, C, D. All four of these features are available only in Enterprise or higher editions of vSphere 5.
18. A, C, D. The vSphere architecture is composed of three distinct layers: the virtualization layer, the management layer, and the interface layer.
19. A. You are running a private cloud, if vSphere is running in your datacenter, is running on your hardware, and is providing services to your internal customers.
20. A. The Enterprise Plus edition of vSphere would be required in this case, because the customer could use the Auto Deploy feature to achieve the diskless and stateless ESXi hosts.

Chapter 4: Plan and Configure vSphere Networking

1. C. CDP information can be obtained for peer devices connected to the network adapters on vNetwork standard switches by clicking the information icon beside the vSwitch.
2. A, D. The two connection types available when creating a vSwitch are virtual machine and VMkernel. Connection types are also known as port groups.
3. A, B, C, D. All of these are common policies in both the vSwitch and the dvSwitch.
4. B, C. Virtual Switch Tagging (VST) and Virtual Guest Tagging (VGT) each require the use of trunked VLANs.
5. A, B, C, D. Any vSphere environment can make use of a vSwitch.
6. B. The Route Based On Physical NIC Load policy is available only in the dvSwitch.
7. A. Adding and removing NICs from a vSwitch with a virtual machine port group is a nondisruptive action, as long as there remains at least one active NIC.
8. D. The dvSwitch version 5.0.0 provides Network I/O Control, NetFlow, and port mirroring.
9. A, C. Add Now and Add Later are the two options presented in the wizard.
10. B. VLAN trunking allows a range of trunked VLANs to be entered, which requires only a single dvPort group in the dvSwitch.
11. A. The virtual machine will need a virtual machine port group to connect to this network, since only the ESXi host can use the VMkernel port group. The best practice would be to remove this virtual machine port group, once it is no longer in use, to limit potential access to this isolated network.
12. A, D. Route Based On IP Hash requires etherchannel, and standby adapters/uplinks should not be configured when using the Route Based On IP Hash load-balancing policy.
13. C, D. To utilize TSO in a virtual machine, either the VMXNET 2 or VMXNET 3 network adapter is required. The VMware Tools are also required to load the drivers in the guest OS, but the VMware Tools alone will not allow the VM to use TSO.
14. A, C, D. The VMkernel can be used for host-based connections such as vMotion, iSCSI, and Management traffic.
15. D. Use of the dvSwitch requires both vCenter Server and Enterprise Plus licensing.
16. B. A Distributed Virtual Uplink (dvUplink) is used to provide a level of abstraction between the physical network adapters (vmnics) on the ESXi host and the dvSwitch.
17. A. The dvSwitch provides bidirectional virtual machine traffic shaping capability.
18. A, B, C. Using jumbo frames in a virtual machine requires the VMXNET 2 or VMXNET 3 adapter, guest OS configuration changes, and ensuring that all devices on the network segment support jumbo frames.
19. C. With static binding a dvPort is immediately assigned and reserved when the virtual machine is connected to the dvPort.
20. B, C, D. In a dvSwitch, virtual network adapters are used to provide VMkernel connections such as ESXi management traffic, vMotion, FT, iSCSI, and NFS.

Chapter 5: Plan and Configure vSphere Storage

1. B. The Software iSCSI Adapter is not enabled by default.
2. A. eui.5577bd49251ddb52 is an example of a SCSI INQUIRY device identifier.
3. A, B, C. All of these answers are supported configurations, because four NICs are required. However, the single quad-port NIC introduces a single point of failure.
4. B. A VMDK can be no larger than 2TB minus 512 bytes on a VMFS-5 datastore.
5. A, C, D. The three path selection policies included by default in ESXi are Fixed, Most Recently Used, and Round Robin.
6. B. With Mutual CHAP, the target (storage system) authenticates the iSCSI adapter (initiator), and the iSCSI adapter also authenticates the target. This is also known as bidirectional.
7. C. Since the independent hardware iSCSI adapter handles the workload for both the iSCSI processing and the iSCSI traffic, it would place the least amount of additional load on the ESXi host resources.
8. A, B. VSA clusters can exist in two-node and three-node configurations only.
9. B, C. vCenter Server cannot run on a virtual machine hosted by an ESXi host that is part of a VSA cluster. It would have to be run on a different ESXi host or in a physical server.
10. B, C. VMFS datastores can be extended or expanded to increase their size.
11. A, B, C, D. All four are correct and represent the four vCenter Server storage filters.
12. A. VMFS-3 datastores will retain their original block size after an upgrade to VMFS-5.
13. A, B, C, D. All of these statements are true of the VSA.
14. A, B, D. The NFS server's name, the IP address or NFS UUID, the path to the NFS share, and the NFS datastore name to be used in vSphere are all required when adding an NFS datastore.
15. A, C. Blade servers often do not have the slots available for multiple cards, and FCoE can be a good use case here. Network consolidation is another use case for FCoE.
16. C. Once an NFS datastore is unmounted, the Add Storage Wizard can be used to mount it again.
17. C. The independent hardware iSCSI adapter performs the iSCSI processing and the iSCSI networking traffic on one card. These adapters are also known as iSCSI HBAs.
18. B. VMware FT requires Thick Provision Eagerly Zeroed VMDKs. This means a 50GB VMDK will consume 50GB of space both at the VMDK level and at the storage array level.
19. D. The VSA cluster uses NFS, so an iSCSI adapter is not used at all to access the VSA storage resources.
20. D. The Rescan For Datastores option from the context menu that appears on the cluster object would scan all hosts in one operation. This would be the fastest option.

Chapter 6: Create and Deploy Virtual Machines and vApps

1. C. The VMware Converter can be used to change the virtual hardware configuration for virtual machines, including the virtual machine hardware version.
2. B, C. New virtual machines can be configured and deployed with either the vSphere Client or the vSphere Web Client.
3. A. An RDM in Physical Compatibility Mode allows the guest OS to access the raw device directly and is used for SAN-aware applications running in a virtual machine.
4. A, B, C, D. All of these are device drivers included with the VMware Tools.
5. D. The VMware vCenter Converter plug-in is not available in vSphere 5. The VMware vCenter Converter Standalone is the replacement product, and it is a free download.
6. B. Cloning a vApp is accomplished with the vSphere Client.
7. D. The Virtual SCSI bus sharing type allows virtual disks to be shared by virtual machines located on the same ESXi host.
8. B. Both IPv4 DHCP Servers and IPv6 DHCP servers can be specified.
9. D. The VMXNET 3 is a paravirtualized NIC that is used for high performance.
10. A, B, C. Objects that can be added to an existing vApp include virtual machines, resource pools, and other vApps.
11. B, C. The VMware Tools are not required for any virtual machine, but they do offer advanced functionality and management for virtual machines. An automatic VMware Tools upgrade is not interactive and can reboot the guest OS without prompting.
12. B, C. Each virtual machine in the same group is started in the order specified, before the next group in the list begins. Shutdown is performed in reverse order of the start order.
13. C. All changes made to an independent nonpersistent disk are lost at VM power-off or reset.
14. B. Hyper-V virtual machines can be imported with the VMware Converter, but they must be powered off.
15. C, D. DRS requires either the Enterprise or Enterprise Plus edition of vSphere.
16. A, D. Virtual machine hardware version 8 supports a maximum of 32 vCPUs and 1TB of RAM.
17. A, B, C. Virtual disk files can be stored with the virtual machine, or a different datastore or datastore cluster can be specified for them.
18. A, B, C, D. All of these methods can be used to convert a thin disk to a thick disk.
19. A, B. VmwareToolboxCmd.exe can be used to disable periodic time synchronization in Windows, and vmware-toolbox-cmd can be used on Linux, Solaris, and FreeBSD.
20. A, B. The vSphere Client or the vSphere Web Client can be used to obtain virtual machine console access.

Chapter 7: Manage and Administer Virtual Machines and vApps

1. A, B, C, D. All of these options are listed in the context menu when right-clicking a template using the vSphere Client.
2. A. ESXi 5 hosts can have up to 2TB of RAM.
3. B. Creating the VM and cloning it would be the least amount of work. Cloning can be used to avoid repetition of tasks.
4. A. Advanced parameters are added using the Configuration Parameters button in the Advanced/General section of the Options tab in the virtual machine properties. These options can be configured only when the virtual machine is powered off.
5. A. The Disable Acceleration option is used to slow down a virtual machine if there is a problem running or installing software in the virtual machine.
6. A, D. The two types of storage capabilities are system-defined and user-defined.
7. B. vApps are built on an industry-standard format known as the Open Virtualization Format (OVF).
8. B. The option to force the virtual machine to enter the BIOS/EFI setup is one of the few that may be configured while the virtual machine is powered on.
9. A. Templates cannot be powered on, and they must first be converted to virtual machines to be powered on. After converting a template to a VM, the VM can be updated as required, powered off, and then converted to a template again.
10. A, B. Virtual machines that are noncompliant with their VM storage profile can be cold migrated or moved to new datastores via Storage vMotion to make them compliant again.
11. A, B, C, D. Virtual machine security consists of securing the virtual machine, the ESXi host(s) it runs on, the storage and Ethernet networks it uses, the vCenter Server used to manage it, the backup server used to protect it, and likely more. Each environment will be different, but securing virtual machines encompasses a lot of different parts of the infrastructure.
12. A, B, C. Shares, limits, and reservations can all be specified on the Resources tab of the Virtual Machine Properties editor.
13. C. When a virtual machine is converted to a template, its configuration file will have the .vmtx extension.
14. B. Windows Server 2008 R2 supports extending OS volumes, and vSphere supports hot extending disks. Neither of these procedures requires downtime to accomplish.
15. B, C. Setting a power-on delay will provide additional time to access the BIOS setup; even better is the Force BIOS Setup option, which will ensure that the virtual machine boots into the BIOS setup.
16. A, D. Virtual machine swap files (VSWP) and virtual disk files (VMDK) can be moved to locations outside of the virtual machine working location.
17. D. The .vmsd file is a database that stores information and metadata about snapshots for a virtual machine.
18. A, B. vCenter Server and the vSphere Client are both required to create and use clones and templates.
19. A, C. Windows as the guest OS is always a requirement for Wake on LAN, and both the vmxnet and vmxnet 3 virtual adapters are supported.
20. A, D. Virtual appliances and vApps can both be deployed by using the Deploy OVF Template function in the vSphere Client.

Chapter 8: Establish Service Levels with Cluster, Fault Tolerance, and Resource Pools

1. A, B, C. All of these are correct, except the EVC mode setting. EVC mode is not a requirement to use VMware FT.
2. B, C. Storage DRS requires ESXi 5 hosts and all NFS or all VMFS datastores.
3. B. ESXi hosts must be in maintenance mode before they can be removed from a cluster.
4. B, C. It is recommended to have a dedicated 1GbE NIC for fault tolerance logging and to isolate the traffic to secure it.
5. C. The VMware Tools are required for a proper shutdown of the guest OS, so the virtual machine without the VMware Tools would be powered off.
6. A. A VM-Host affinity rule can be created to require VMs in the specified VM group to run on ESXi hosts in the specified host group.
7. C. FT has an overhead of 5 to 20 percent that must be accounted for.
8. B, D. Enabling DRS on a cluster will create a second layer of scheduling architecture to go along with the local scheduler on each ESXi host. This second scheduler is called the global scheduler.
9. B. Selecting the expandable reservation allows a child resource pool to request resources from its parent or ancestors. If there is only a single resource pool or resource pools that are siblings, then the request would go to the root resource pool.
10. B, D. Raising the EVC mode for cluster involves moving from a lower feature set to a greater feature set. Virtual machines can continue to run during this operation.
11. D. If resource pools do not exist in the destination, the Migrate Virtual Machine Wizard will not offer you the option to select a resource pool.
12. B. In the partially automated automation level, vCenter Server will inform of suggested virtual machine migrations and place the virtual machines on ESXi hosts at VM startup.
13. C. When choosing the specify failover hosts admission control policy, no virtual machines can be powered on when they are on the specified failover hosts, unless an HA event has occurred.
14. A, B, D. Resource pools allow shares, reservations, and limits to be configured, and the resource pool name can be changed.
15. A, C, D. The slave host could be failed, isolated, or partitioned.
16. A, B. The vSphere Client is required to enable FT. The power state of the VM is irrelevant, since the VM's virtual disk files are eager zeroed thick provisioned.
17. D. The Fault Tolerance Test Failover option is both noninvasive and fully supported.
18. D. The migration threshold is configured beneath the automation level settings of the DRS cluster. Moving the slider to the far right will set the migration threshold to Aggressive.
19. A, B, C, D. VMware FT can be used in all of these cases, as long as the virtual machine meets the FT requirements.
20. B. VM monitoring works by monitoring VMware Tools heartbeats and I/O activity from the VMware Tools process running in the guest OS and can reset failed and/or unresponsive virtual machines.

Chapter 9: Maintain Service Levels

1. D. Cold migration would require powering off the virtual machine. vMotion cannot be used to change datastores, and Storage vMotion is not a feature with vSphere 5 Standard edition licensing.
2. D. Of the choices presented, only snapshots with RDMs in virtual compatibility mode are supported.
3. A, B, C. The VMware Data Recovery solution consists of the vSphere client plug-in, the backup appliance(s), and the optional File Level Restore client.
4. B. The VMware Tools should be installed first and will require a reboot. The second restart will be when the virtual machine hardware is upgraded, since this requires the virtual machine to be powered off. After the VM is powered up, Windows will find new devices and then require a third and final reboot.
5. A, C. There are two options for the vMotion priority level: Reserve CPU For Optimal vMotion Performance and Perform With Available CPU Resources.
6. B. The swap file location specified on a virtual machine will override swap file settings defined at either the ESXi host or cluster level.
7. A, B, D. vSphere Update Manager can be configured with a direct connection to the Internet to use a shared repository or to import patches.
8. C. Creating a baseline group allows the VMware Tools and virtual machine hardware to be updated in a single vSphere Update Manager remediation operation that can be scheduled.
9. C. When a baseline is edited, the Product value defaults to Any. When this baseline was edited, this value was likely changed from embeddedEsx 5.0.0 to Any.
10. B. Each vCenter Server instance supports up to ten VMware Data Recovery backup appliances, and each appliance is supported for use with up to 100 virtual machines. VMware Data Recovery could be used for this environment. VCB is not supported in vSphere 5, and snapshots are not a backup solution.
11. A. Storage vMotion can be used to migrate a virtual machine that has snapshots, as long as the VM is located on an ESXi 5 host.
12. B, C. Enterprise Plus licensing is required to use host profiles, and ESX/ESXi hosts must be placed in maintenance mode to have a host profile applied.
13. A. Reverting the virtual machine to the current snapshot will restore it to its previous state. The snapshot will still exist, so deleting it in Snapshot Manager using either the Delete or Delete All button will remove the snapshot.
14. A, B, D. Each of these guest operating systems is supported for use with the FLR client. No version of Solaris is supported.
15. C. The proper sequence is create baseline, attach baseline, scan object, and remediate object.
16. A, B. Migrating a powered-off or suspended VM to a new datacenter is supported. vMotion and Storage vMotion cannot be used to migrate VMs to different datacenters.
17. B, C. The requirement for EVC is that all hosts in the cluster must have the same brand of processors.
18. B, C. vSphere Update Manager requires a 64-bit operating system and a 32-bit DSN.
19. A, C, D. NFS servers that do not support the VAAI NAS extensions that enable reserve space will not allow the disk format to be changed, and the option to change virtual disk formats will be grayed out.
20. C. The VMware Data Recovery client plug-in is used with the vSphere Client to connect to a vCenter Server and create backup jobs.

Chapter 10: Perform Basic Troubleshooting

1. C, D. Virtual machines attached to an internal-only virtual switch cannot be migrated with vMotion, and neither can virtual machines that are using an ISO on local storage.
2. D. vSwitches have 120 ports available by default. It is likely that the ports have been exhausted for the vSwitch.
3. A, C. All of the ESXi logs are accessible from /var/run/log in the ESXi Shell or from the vSphere Client's Export System Logs option.
4. A. If the Host Failures The Cluster Tolerates admission control policy is used, there will be a blue Advanced Runtime Info link available. This link is available only when this admission control policy is selected.
5. C. A DAVG/cmd value greater than 20 usually indicates a problem, and the value currently reported is nearly 4 times higher than normal. It is a safe conclusion that there is storage contention in this situation.
6. C, D. A single virtual machine is affected, so checking host-specific or network settings is simply not necessary in this case.
7. C. The Configuration Issues link can be used to view HA status, including warning and error conditions.
8. A, B. All hosts must be licensed and have access to the same shared storage. The VMware Tools are never required for these features.
9. B. If connected to a vCenter Server, then the diagnostic information for the ESXi hosts it manages can also be exported at the same time.
10. C, D. The LAT/rd and LAT/wr metrics are virtual machine specific and used to measure I/O latency.
11. B, C, D. Each of these can lead to a DRS cluster imbalance.
12. B, C, D. Virtual switches, datastores, hosts, and virtual machines can all be viewed in vMotion resource maps, but there is no ability to show connected devices for virtual machines.
13. B. When connected directly to an ESXi host with the vSphere Client, use the Configuration tab to view the Hardware Health Status information.
14. D. Without the T10-based Storage APIs – Array Integration (Thin Provisioning) support, virtual machines will crash if an out-of-space condition occurs.
15. A. DAVG/cmd is the average amount of time in milliseconds a device takes to service a single I/O request.
16. A, B. From the local console, the ESXi Shell or the Configure Management Network feature will show the device name, the MAC address, and the status. The vSphere Client and vSphere Web Client cannot be used if there is no management network connectivity.
17. C. When building a white-box server, as many parts as possible should be verified to be on the VMware HCL.
18. A, B, C, D. Each of these are valid steps in verifying a storage configuration.
19. C. When certain configurations are in use, like Route Based On IP Hash Load Balancing, it will often be necessary to involve the staff responsible for managing the upstream physical network devices.
20. D. When Migration Threshold is set to Conservative, no attempt to load balance will be made by DRS. This will result in the target host load standard deviation being reported as N/A.

Chapter 11: Monitor a vSphere Implementation and Manage vCenter Server Alarms

1. A, B. The ESXi Shell can be used to restart the host agent service. The DCUI Troubleshooting Options menu item can also be used to restart all management agents, including hostd.
2. B. The message of the day can be used to send a message to all users with active sessions. The message of the day will also be sent to any newly logged in users of the vSphere Client.
3. B. The number of entries displayed in the tasks and events lists in the vSphere Client can be adjusted using the Edit ⇒ Client Settings ⇒ Lists tab.
4. D. %RDY or CPU Ready is used to measure the percentage of time a VM was ready to run but was not provided with CPU resources.
5. C. The -d switch is the delay between statistics snapshots, and the -n switch is used to specify the number of iterations. Option C will perform 60 iterations at 2 second intervals, capturing 2 minutes of data.
6. A. Alarms are inherited down the chain of inventory objects, so the only way to solve this problem is to re-create the alarm at the VM object level.
7. D. vCenter Server can be configured to send SNMP traps to up to four receivers.
8. B. %DRPRX indicates that network receive packets are being dropped. This is a likely indicator of a problem.
9. A. The DAVG/cmd metric is the average amount of time in milliseconds a device takes to service a single I/O request. The device includes the vmhba, the storage device, and any devices between.
10. C. Increasing the Active Directory Timeout value will allow more time for the users and groups from Active Directory to populate.
11. B. vSphere HA alarms could likely be the result of a management network communication failure.
12. D. If no virtual machines are protected with VMware FT, the Fault Tolerance view will be unavailable in the Overview charts.
13. A, B, C. Cloning a virtual machine, migrating a virtual machine, and adding a host are all tasks that can be scheduled in vCenter Server. There is no scheduled task to delete virtual machines.
14. A. If the Trigger If All Of The Conditions Are Satisfied option is used, then each trigger type must have the condition met before the trigger will fire. Remember that the more trigger types that are added, the more complex the alarm becomes.
15. A, D. The SMTP settings must include the FQDN or IP address of the SMTP server and the sender account.
16. A, B, C. A vCenter Server alarm consists of three parts: type, trigger, and action.
17. A, B, C. All of the alarm-type monitors have the actions of send a notification email, send a notification trap, and run a command.
18. C. All event entries for a selected object include the child objects. When troubleshooting an HA problem, the Cluster object would include events for all hosts (and virtual machines) in the cluster.
19. A, B. To monitor current swap file usage, SWAP curr is used in resxtop and esxtop, and Memory: Swap Used is used in performance charts of the vSphere Client.
20. C. Verbose logging includes information, error, warning, and verbose log entries.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.223.33.157