An administrator manually configures a reference ESXi host that meets company security standards for vSphere environments. The administrator now needs to apply all of the security standards to every identically configured host across multiple vSphere clusters within a single VMware vCenter instance.Which four steps would the administrator complete to meet this requirement? (Choose four.)
After a recent unexplained peak in virtual machine (VM) CPU usage, an administrator is asked to monitor the VM performance for a recurrence of the issue.Which two tools can the administrator use? (Choose two.)
An administrator is tasked with configuring vSphere Trust Authority.The administrator has completed the following steps:Set up the workstation -Enabled the Trust Authority AdministratorEnabled the Trust Authority StateCollected information about the ESXi hosts and vCenter to be trustedWhich step does the administrator need to complete next?
Refer to the exhibit.An administrator set up the following configuration:The distributed switch has three ESXi hosts, and each host has two 40 Gbps NICs.The amount of bandwidth reserved for virtual machine (VM) traffic is 6 Gbps.The administrator wants to guarantee that VMs in the Finance distributed port group can access 50 percent of the available reserved bandwidth for VM traffic.Given this scenario, what should the size (in Gbps) of the Finance network resource pool be?
A vSphere environment is experiencing intermittent short bursts of CPU contention, causing brief production outages for some of the virtual machines (VMs). To understand the cause of the issue, the administrator wants to observe near real-time statistics tor all VMs.Which two vSphere reporting tools could the administrator use? (Choose two.)
An administrator is tasked with applying updates to a vSphere cluster running vSAN using vSphere Lifecycle Manager. Downtime to the ESXi hosts must be minimal while the work is completed.The administrator has already completed the following steps and no errors have been returned:Downloaded all applicable software and created a new image.Attached the new image to the cluster and run a compliance check against the image for the cluster.Ran a remediation pre-check for the cluster.Which two series of steps should the administrator perform to start the remediation of the cluster using the new image? (Choose two.)