VMware

Clarity Technical Specialist

250-609

Validate your skills in Clarity with the 250-609 exam.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 161–170 of 195

Q161

A company needs to create a secure cloud environment with strict access controls; what should they implement?

  • A VMware NSX Distributed Firewall
  • B VMware vSphere High Availability
  • C VMware vCenter Server
  • D VMware vRealize Operations
Explanation VMware NSX Distributed Firewall enables micro-segmentation, enhancing security with access control.
Q162

What happens when a VM on a datastore runs out of space?

  • A The VM shuts down immediately
  • B The VM continues to run without issues
  • C The VM may experience I/O errors
  • D The VM automatically expands the datastore
Explanation When a VM runs out of space, it may experience I/O errors but does not shut down automatically or expand the datastore.
Q163

Which service provides encryption for data at rest in VMware environments?

  • A vSAN Encryption
  • B VMware NSX
  • C vSphere High Availability
  • D VMware Cloud Motion
Explanation vSAN Encryption specifically secures data at rest, unlike the other options.
Q164

A company needs to implement a disaster recovery solution. What should they prioritize in VMware Site Recovery Manager?

  • A Resource optimization
  • B Recovery Point Objective (RPO)
  • C Backup frequency
  • D Application performance
Explanation RPO is crucial for recovery timeframes, more than the other options.
Q165

You are configuring vSphere DRS. What happens when a VM exceeds resource limits set on a cluster?

  • A VM is powered off
  • B No resource allocation changes
  • C VM receives excess resources
  • D DRS recommends undeploying the VM
Explanation DRS does not alter allocations when limits are exceeded.
Q166

Which service provides centralized management for VMware environments?

  • A vCenter Server
  • B vSphere Client
  • C ESXi Hypervisor
  • D VMware Tools
Explanation vCenter Server centralizes management, while others serve different roles.
Q167

A company needs to secure its virtual machines. What method ensures data confidentiality?

  • A Network segmentation
  • B Encryption at rest
  • C Resource pooling
  • D Load balancing
Explanation Encryption at rest secures data, while others focus on performance or availability.
Q168

You are configuring a VM to use a high-availability feature. What happens when a host goes down?

  • A VM remains running
  • B VM is migrated automatically
  • C VM is powered off
  • D VM is deleted
Explanation High availability allows automatic VM migration to another host; the other options are incorrect actions.
Q169

Which service provides secure access to applications in cloud computing?

  • A VPN
  • B Firewalls
  • C Proxy Servers
  • D NAS
Explanation VPN provides encrypted connections to cloud apps, whereas firewalls and proxy servers control access without typically encrypting.
Q170

A company needs multi-cloud capabilities. What should they implement?

  • A Single cloud provider
  • B Hybrid cloud strategy
  • C Strict vendor lock-in
  • D Isolated environments
Explanation A hybrid cloud strategy allows utilization of multiple cloud platforms for optimal flexibility.