VMware
Clarity Technical Specialist
250-609
Validate your skills in Clarity with the 250-609 exam.
195 questions
0 views
Free
Questions 161–170 of 195
A company needs to create a secure cloud environment with strict access controls; what should they implement?
-
A
VMware NSX Distributed Firewall
-
B
VMware vSphere High Availability
-
C
VMware vCenter Server
-
D
VMware vRealize Operations
Explanation
VMware NSX Distributed Firewall enables micro-segmentation, enhancing security with access control.
What happens when a VM on a datastore runs out of space?
-
A
The VM shuts down immediately
-
B
The VM continues to run without issues
-
C
The VM may experience I/O errors
-
D
The VM automatically expands the datastore
Explanation
When a VM runs out of space, it may experience I/O errors but does not shut down automatically or expand the datastore.
Which service provides encryption for data at rest in VMware environments?
-
A
vSAN Encryption
-
B
VMware NSX
-
C
vSphere High Availability
-
D
VMware Cloud Motion
Explanation
vSAN Encryption specifically secures data at rest, unlike the other options.
A company needs to implement a disaster recovery solution. What should they prioritize in VMware Site Recovery Manager?
-
A
Resource optimization
-
B
Recovery Point Objective (RPO)
-
C
Backup frequency
-
D
Application performance
Explanation
RPO is crucial for recovery timeframes, more than the other options.
You are configuring vSphere DRS. What happens when a VM exceeds resource limits set on a cluster?
-
A
VM is powered off
-
B
No resource allocation changes
-
C
VM receives excess resources
-
D
DRS recommends undeploying the VM
Explanation
DRS does not alter allocations when limits are exceeded.
Which service provides centralized management for VMware environments?
-
A
vCenter Server
-
B
vSphere Client
-
C
ESXi Hypervisor
-
D
VMware Tools
Explanation
vCenter Server centralizes management, while others serve different roles.
A company needs to secure its virtual machines. What method ensures data confidentiality?
-
A
Network segmentation
-
B
Encryption at rest
-
C
Resource pooling
-
D
Load balancing
Explanation
Encryption at rest secures data, while others focus on performance or availability.
You are configuring a VM to use a high-availability feature. What happens when a host goes down?
-
A
VM remains running
-
B
VM is migrated automatically
-
C
VM is powered off
-
D
VM is deleted
Explanation
High availability allows automatic VM migration to another host; the other options are incorrect actions.
Which service provides secure access to applications in cloud computing?
-
A
VPN
-
B
Firewalls
-
C
Proxy Servers
-
D
NAS
Explanation
VPN provides encrypted connections to cloud apps, whereas firewalls and proxy servers control access without typically encrypting.
A company needs multi-cloud capabilities. What should they implement?
-
A
Single cloud provider
-
B
Hybrid cloud strategy
-
C
Strict vendor lock-in
-
D
Isolated environments
Explanation
A hybrid cloud strategy allows utilization of multiple cloud platforms for optimal flexibility.