Which two steps would need to be performed next?

An administrator would like to use the VMware Certificate Authority (VMCA) as an Intermediate Certificate Authority (CA). The first two steps performed are:
Replace the Root Certificate
Replace Machine Certificates (Intermediate CA)

Which two steps would need to be performed next? (Choose two.)

An administrator would like to use the VMware Certificate Authority (VMCA) as an Intermediate Certificate Authority (CA). The first two steps performed are:
Replace the Root Certificate
Replace Machine Certificates (Intermediate CA)

Which two steps would need to be performed next? (Choose two.)

A.
Replace Solution User Certificates (Intermediate CA)

B.
Replace the VMware Directory Service Certificate (Intermediate CA)

C.
Replace the VMware Directory Service Certificate

D.
Replace Solution User Certificates

Explanation:
Explanation/Reference:



Leave a Reply 5

Your email address will not be published. Required fields are marked *


babar

Adi

Adi

A and C are correct.
@babar: even from your link one can easily see that answers A and C are the correct next steps.
Answer B is the last step.

Marcus

Marcus

SOME NEW 2V0-622D EXAM QUESTIONS SHARE:
QUESTION 81
An administrator is trying to vMotion a VM from his datacenter to a recovery site. Which is the maximum allowed RTT (Round-Trip Time) latency between source and destination host?

A. 100 milliseconds
B. 150 milliseconds
C. 15 milliseconds
D. 10 milliseconds

Answer: B
Explanation:
https://pubs.vmware.com/vsphere-60/index.jsp?topic=%2Fcom.vmware.vsphere.vcenterhost.doc%2FGUID-3B41119A-1276-404B-8BFB-A32409052449.html

QUESTION 82
Which is required for configuring iSCSI Software Adapter network port binding?

A. VMkernel of the iSCSI traffic must be load balanced using Route based on IP Hash algorithm.
B. VMkernel of the iSCSI traffic must be load balanced using Route based on Source Virtual Port ID algorithm.
C. VMkernel of the iSCSI traffic must be load balanced using Route based on Source MAC Hash algorithm.
D. VMkernel of the iSCSI traffic must be bound to only one active network adapter.

Answer: D

QUESTION 83
In vSphere Data Protection 6.1, which is the function of a Backup Verification job?

A. None. Backup Verification job is not a feature of vSphere Data Protection
B. It is a manual task
– Power it on
– Verify the guest OS
– Check started applications
C. It is an automatic process
– Restore a virtual machine
– Power it on
– Verify that the guest OS is booted by communicating with the Backup Verification agent
D. It is an automatic process
– Restore a virtual machine
– Power it on
– Verify that the guest OC is booted by detecting the VMware ToolsTM “heartbeats”

Answer: D

QUESTION 84
Which three requirements are needed to apply RAID 5 or RAID 6 erasure coding on a vSAN 6.2 or 6.5 object? (Choose three.)

A. on Disk Format 3.0
B. Hybrid vSAN
C. All Flash vSAN
D. vSAN Advanced License
E. Stretched Cluster Configurations

Answer: ACD

QUESTION 85
An administrator has enabled vSphere Distributed Switch Health Check. The hosts connected to that Distributed Switch all display an alert:
– vSphere Distributed Switch MTU supported status
– The administrator has all of the VMkernel ports MTU sizes set to 1600.
Which action will remedy this problem?

A. Configure the Distributed Switch to MTU 9100.
B. Disconnect and reconnect the physical network cable.
C. Configure the physical switch to MTU 1600.
D. Disable the Distributed Switch MTU.

Answer: A

QUESTION 86
An administrator has noticed that virtual machine VM2 in the vApp shown in the Exhibit is demonstrating poor performance.

Which three changes, if performed separately, would improve the performance of VM2? (Choose three.)

A. Remove the CPU limit on the vApp.
B. Remove the CPU limit on the resource pool.
C. Increase the CPU reservation on virtual machine VM1.
D. Power off virtual machine VM1.
E. Increase the CPU reservation on virtual machine VM2.

Answer: ADE

QUESTION 87
An administrator is creating a new Content Library. It will subscribe to another remote Content Library without authentication enabled. Optimal performance is desired for the configuration.
What two steps should be taken to set up the library? (Choose two.)

A. The Subscription URL should be provided.
B. The library should be published externally.
C. A file system should be used for this library.
D. A datastore should be used for this library.

Answer: AD

Questions from:https://www.vcp550dumps.com/?s=2V0-622D

YOU ALSO CAN FIND OTHER EXAMS NEW QUESTIONS!

VSAN

VSAN

You can replace the VMCA root certificate with a third-party CA-signed certificate that includes VMCA in the certificate chain. Going forward, all certificates that VMCA generates include the full chain. You can replace existing certificates with newly generated certificates.

Procedure
Replace the Root Certificate (Intermediate CA):
The first step in replacing the VMCA certificates with custom certificates is generating a CSR, sending the CSR to be signed. You then add the signed certificate to VMCA as a root certificate.

Replace Machine SSL Certificates (Intermediate CA):
After you have received the signed certificate from the CA and made it the VMCA root certificate, you can replace all machine SSL certificates.

Replace Solution User Certificates (Intermediate CA):
After you replace the machine SSL certificates, you can replace the solution user certificates.

Replace the VMware Directory Service Certificate in Mixed Mode Environments:
During upgrade, your environment might temporarily include both vCenter Single Sign-On version 5.5 and vCenter Single Sign-On version 6.x. For that case, you have to perform additional steps to replace the VMware Directory Service SSL certificate if you replace the SSL certificate of the node on which the vCenter Single Sign-On service is running.