Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the VMware VCAP-Storage 3V0-23.25 Questions and answers with Dumpstech

Exam 3V0-23.25 Premium Access

View all detail and faqs for the 3V0-23.25 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

A six-node vSAN ESA cluster contains multiple Virtual Machines (VMs), and a vSAN storage policy with the rule “Failures to tolerate” set to “1 failure - RAID-5 (Erasure Coding)” is assigned. A vSAN administrator has changed the rule in the assigned policy to “2 failures - RAID-6 (Erasure Coding).”

What is the result of this change?

Options:

A.

No changes occur until the policy is reapplied.

B.

The policy change is rejected immediately.

C.

The updated policy is serially applied to the Virtual Machines.

D.

The changes are queued for 60 minutes.

Questions # 12:

An administrator has been presented with the following requirements from an application owner:

• The application is distributed across multiple data centers.

• The application currently uses NFSv4.1 for mounting data volumes.

• The application requires Kerberos encryption.

Drag and drop the three correct options from the Options list on the left and place them into the Required Options on the right to properly configure the storage solution to meet the requirements in any order. (Choose three.)

Question # 12

Options:

Questions # 13:

A customer attaches an external Fibre Channel (FC) VMFS datastore to a VMware Cloud Foundation (VCF) workload domain for backup staging. The administrator must confirm that the datastore is visible to all hosts, and that path and device health alarms will trigger should a fabric link or path fail.

Which action should the administrator take to verify this?

Options:

A.

Run esxcli vsan storage list on each host to view VMFS datastore path status.

B.

In vCenter verify the external VMFS datastore connectivity, paths and multipath health.

C.

Execute storage.monitor.getStatus via VCF SDK to receive a consolidated health summary of all VMFS, vSAN and NFS datastores.

D.

Use esxcli fc adapter list followed by vmkfstools --inspectpaths to validate health for the VMFS LUN.

Questions # 14:

A multinational corporation is deploying a VMware Cloud Foundation (VCF) Workload Domain cluster to host tier-1 business applications with the following requirements:

• Deliver high performance to all workloads.

• Integration with automated VM placement.

• Reuse of existing infrastructure including multiple Fibre Channel (FC) arrays partitioned by business unit.

• The storage architecture must avoid vSAN.

• Meet organizational separation requirements.

Which two deployment approaches meet these requirements? (Choose two.)

Options:

A.

Configure dedicated VMFS datastores on assigned FC arrays as principal storage.

B.

Configure dedicated VMFS datastores on assigned FC arrays as supplemental storage.

C.

Configure a shared VMFS datastore on an assigned FC array as principal storage.

D.

Configure shared VMFS datastores on an assigned FC array as supplemental storage.

E.

Configure shared VMFS datastores on an assigned FC array as principal storage.

Questions # 15:

A storage administrator is being presented with the following VMware Cloud Foundation (VCF) architectural details:

• The applications data will require 2.5 PB of capacity.

• The production applications will be hosting archival solutions and gateways.

• There will be some applications deployed for the purpose of testing and development.

What is the optimal principal storage that the administrator can recommend?

Options:

A.

vSAN ESA Storage Clusters

B.

vSAN ESA

C.

vSAN OSA - All Flash

D.

vSAN OSA - Hybrid

Questions # 16:

An administrator is presented with the following scenario:

• 20 TB of additional storage is being requested by a VM application owner.

• The application has high CPU/Memory requirements that can only be satisfied by the current cluster the application runs in.

• The application has high IOPS and bandwidth requirements to run properly.

• The existing vSAN cluster only has 10 TB of unused capacity.

• The hosts in the cluster have no additional NVMe slots left.

• The administrator does not have permission to purchase additional hosts or re-assign hosts from other vSAN clusters.

• Other vSAN clusters exist in the environment that can satisfy the requirement.

Which vSAN feature should be used to fulfill this scenario?

Options:

A.

vSAN HCI Mesh

B.

vSAN Data Protection

C.

vSAN File Services

D.

vSAN Stretched Clusters

Questions # 17:

An administrator is monitoring a vSAN ESA backed workload domain that is dedicated for running AI inferencing. When the administrator navigates to the Storage Performance dashboard in VMware Cloud Foundation Operations, the performance dashboard shows:

• High backend write latency ( > 8 ms)

• Low read latency ( < 1 ms)

• Normal network throughput

• Disk Group Health = Green

Based on the readings above, what would be the explanation?

Options:

A.

This is caused due to transient commit-queue delays, since the workload is exhibiting random-writes saturating ESA’s write buffer.

B.

A wrongly sized read cache tier is throttling the write buffer, thus forcing the reads to trespass to the capacity tier.

C.

The workload’s small-block writes are compressed inline, lowering backend throughput and increasing cache misses.

D.

A vSAN network congestion event on the vSAN TCP port 2233 is throttling mirror acknowledgements.

Questions # 18:

An administrator attempts to enable vSAN Data-at-Rest Encryption on a cluster but receives the following error message:

“Key provider < vSphere Native Key Provider > is not available on host.”

The administrator configured the vSphere Native Key Provider (NKP) using the default settings.

What should the administrator validate before enabling vSAN Data-at-Rest Encryption?

Options:

A.

Each ESX host has a Trusted Platform Module (TPM) 2.0 device installed.

B.

Crypto Safe Mode has been enabled on all ESX hosts.

C.

A backup of the vSphere Native Key Provider has been created from the vSphere Client.

D.

Secure Boot has been disabled on all ESX hosts.

Questions # 19:

An administrator is tasked with setting up immutable snapshots for recovery in case of a cyber-attack.

Which two limitations apply when configuring immutable snapshots? (Choose two.)

Options:

A.

The Virtual Machine cannot be part of multiple protection groups.

B.

The protection group cannot have more than 7 snapshot schedules.

C.

Virtual machine hardware cannot be changed on VM having immutable snapshots.

D.

Virtual Machine hardware must be at least version 10.

E.

The protection group cannot be both replicated and immutable.

Questions # 20:

An administrator reports that after rebooting one host in a vSAN cluster configured with Data-at-Rest Encryption using an external Key Management Server (KMS), the host shows all vSAN disk groups as unmounted.

The KMS is online and reachable from all hosts.

In vCenter, the host displays the following event:

“Failed to retrieve encryption key from KMS.”

Key ID:

All other hosts in the cluster remain healthy and show “Encryption: Enabled.”

Why did the encryption key retrieval fail for this host?

Options:

A.

The host’s trust relationship or certificate with the KMS is invalid or missing.

B.

The cluster requires a Deep Rekey operation to restore access to the encrypted disks.

C.

The vCenter Server has not been restarted to refresh the encryption key cache.

D.

The TPM on the host failed to unlock the data encryption keys.

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions