A. The software iSCSI adapter must be installed as a separate VIB.
B. The software iSCSI adapter is not enabled.
C. The software iSCSI adapter can be viewed only from the DCUI.
D. The software iSCSI adapter must have VMkernel networking set up before it is visible in the Storage Adapters list.
B. The software iSCSI adapter is not enabled by default.
A. eui.5577bd49251ddb52
B. mpx.vmhba2:C0:T0:L0
C.vml.02000600006006016094602800364ce22e3
D. vmhba1:C0:T1:L0
A.Eui.5577bd49251ddb52 is an example of a SCSI INQUIRY device identifier.
3. ESXi 5.5 supports booting from an iSCSI SAN LUN with which of the following adapters? (Choose all that apply). A. Independent iSCSI HBA B. Dependent iSCSI hardware adapter C. Software iSCSI Adapter D. Fibre Channel HBA
A, B and C. ESXi 5.5 supports booting from an iSCSI SAN LUN with a supported iSCSI HBA, asupported dependent iSCSI hardware adapter, and the ESXi software iSCSI adapter.
A. 2 TB minus 512 bytes
B. 62TB
C. 64TB
D. None of these
D. This question cannot be definitively answered, because the version of the ESXi host is not specified. If it was an ESXi 5 or 5.1 host, then 2TB minus 512 bytes is correct. If ESXi 5.5 were used, then 62TB is the correct answer.
A. Fixed (VMware)
B. Dynamic (VMware)
C. Most Recently Used (VMware)
D. Round Robin (VMware)
A, C and D. The three path selection policies included by default in ESXi are Fixed, Most Recently Used, and Round Robin.
A. One-way CHAP
B. Mutual CHAP
C. Thre-way CHAP
D. None of these
B. With Mutual CHAP, the target (storage system) authenticates the iSCSI adapter (initiator), and the iSCSI adapter also authenticates the target. This authentication method is also known as bidirectional.
A. Software iSCSI adapter
B. Dependent hardware iSCSI adapter
C. Independent hardware iSCSI adapter
D. FCoE adapter
C. Since the independent hardware iSCSI adapter handles the workload for both the iSCSI processing and the iSCSI traffic, it would place the least amount of additional load on the ESXi host resources.
A. Unmount the VMFS datastore and then rename it using the vSphere Web Client
B. Rename each VMFS datastore in the vSphere Web Client
C. Enable SSH and configure the firewall for the ESXi host using the vSphere Web Client, connect to it and then rename the VMFS datastore from the command line.
D. Storage vMotion a virtual machine and use the advanced options available there.
B. Renaming a VMFS datastore is a non-disruptive action. Simply renaming the datastore using the vSphere Web Client would be the easiest way to rename these datastores.
A. Provisioning
B. Zoning
C. LUN masking
D. Multipathing
C. LUN masking is a process performed at the SAN storage processors or ESXi host level that makes LUNs hidden from certain hosts.
A. Inflate
B. Extend
C. Expand
D. Zeroed
B and C. VMFS datastores can be extended or expanded to increase their size.
A. VMFS filter
B. RDM filter
C. Same Host and Transports filter
D. Host Rescan filter
A, B, C and D. All four are correct and represent the four vCenter Server storage filters.
A. 8MB
B. 4MB
C. 2MB
D. 1MB
A. VMFS-3 datastores will retain their original block size after an upgrade to VMFS-5.
A. Virtual machines and templates may not reside on the datastore.
B. Mapping files for RDMs on the datastore must be removed.
C. ISOs located on the datastore must be removed from virtual machines.
D. The datastore must not be used for vSphere HA heartbeat.
A, B, C and D. All of these statemtnes are prerequisites for unmounting a VMFS datastore.
A. NFS server name, IP address, or NFS UUID
B. Path to the NFS share
C. NFS server credentials
D. NFS datastore name
A, B and D. The NFS server’s name, the IP address or NFS UUID, the path to the NFS share, and the NFS datastore name to be used in vSphere are all required when adding an NFS datastore.
A. NFS
B. iSCSI
C. VMFS
D. RDM
C and D. A Fibre Channel SAN would allow you to use both VMFS and RDM to present these large volumes to the virtual machine.
A. Reboot the ESXi host.
B. Right-click the inactive datastore and choose the Mount option from the context menu that appears.
C. Use the Add Storage Wizard to mount it.
D. Rescan the ESXi host’s HBAs.
C. Once an NFS datastore is unmounted, the Add Storage Wizard can be used to mount it again.
A. Software iSCSI adapter
B. Dependent hardware iSCSI adapter
C. Independent hardware iSCSI adapter
D. FCoE adapter
C. The independent hardware iSCSI adapter performs the iSCSI processing and the iSCSI networking traffic on one card. These adapters are also known as iSCSI HBAs.
You create a VM with a single 50GB thin-provisioned virtual disk, and your storage array also uses thin provisioning. You later decide to protect this VM with VMware FT. How much space does this VM’s single virtual disk consume on the storage array?
A. Greater than 50GB
B. 50GB
C. Less than 50GB
D. It depends on the amount of data in the VMDK.
B. Vmware FT requires Thick Provision Eagerly Zeroed VMDKs. This means a 50GB VMDK will consume 50GB of space both at the VMDK level and at the storage array level.
A. iBHA
B. iBRP
C. iBDC
D. iBFT
D. iBFT (iSCSI Boot Firmware Table) is used to communicate information about the iSCSI boot device to an ESXi host.
A. In the vSphere Web Client, rescan each individual storage adapter for each ESXi host.
B. Write a script to perform this operation.
C. In the vSphere Web Client, use the Rescan Storage option from the context menu that appears when you right-click on the vCenter Server root object.
D. In the vSphere Client, use the Rescan Storage option from the context menu that appears when you right-click on the cluster object.
D. The Rescan Storage option from the context menu that appears when you right-click on the cluster object would scan all hosts in one operation. This would be the fastest option.