While upgrading five hosts in a vSphere cluster, the maintenance window ends. The customer does not allow you to extend the window, so now the cluster is running the hosts at different build levels. There are two hosts at the new build version, and three hosts at the previous build version. There are 11 virtual machines protected by VMware Fault Tolerance in the cluster. You now see the following error No suitable host can be found to place the Fault Tolerance Secondary VM for virtual machine SalesVM.
What is the cause of this error?
Which three configurable settings are available directly through the DCUI? (Choose three.)
A vApp has been deployed with the wrong IP address information and must be updated. You have logged into the virtual machine, and updated the static IP address from the console, validating connectivity. After a system reboot, users are no longer able to connect to the system.
What is the problem?
Which three disk formats would be used on an NFS data store? (Choose three.)
During Vblock System 320 testing, one of your ESXi 5.1 servers has lost connectivity with vCenter.
Which log file would first be used to troubleshoot this problem?
Your vSphere environment has two virtual machines configured to use the same VLAN and subnet. The hosts in the cluster are set up to use one DV switch. You want to ensure that the VMs communicate properly on the network and with each other regardless which host they use.
Which action will accomplish this task?
A single ESXi host becomes disconnected from vCenter and will not reconnect. When troubleshooting, you remove the host from vCenter and it will not rejoin. You contact Support and are asked to upload the vm-support bundle from the host for review. The host does not have connectivity to a shared data store, but you can SSH into the host.
Which procedure would you use to generate and retrieve the vm-support bundle?
Click the Exhibit button.
Referring to the exhibit, which two actions would allow powering on the virtual machine? (Choose two.)
During the deployment of a Vblock System 320, the customer stresses the importance of network security and states that they would like to have a VM scan and capture all packets on the virtual switch to which it is connected.
Which security policy should you set?