Geekflare is supported by our audience. We may earn affiliate commissions from buying links on this site.
Share on:

40 Scenario Based VMware Interview Questions and Answers

Invicti Web Application Security Scanner – the only solution that delivers automatic verification of vulnerabilities with Proof-Based Scanning™.

VMware is the leader in Virtualization and Cloud Computing technologies and provides solutions in network and desktop virtualization. VMware has changed the tech world from a physical to a software-based virtual world.

Due to the implementation of a virtual environment to consolidate the hardware infrastructure, the demands of subject matter experts are increasing day by day in the market. To manage and maintain an organization’s business, an experienced workforce is required. Professionals are selected via many technical and HR processes to choose the top talent from the market for growing an organization’s business.

Following are some scenario-based interview questions and answers for experienced IT administrators (up to 5 years experience) on data center virtualization technology that may be asked to assess the candidate’s technical and hands-on expertise.

#1. An administrator wants to connect the ESXi host directly from the vSphere Web Client. Which ports are required for this purpose?

Typically vSphere Web Client is used to connect vCenter Server, and VClient is used to connect ESXi hosts. But vSphere Web Client can also be used to connect vCenter Server, but for this purpose, you will need 443 TCP, 902 TCP and UDP, and 903 TCP ports to be opened from Security Profile.

#2. The clock time of an ESXi 6.x host is not correct. What should an administrator do to correct this issue?

To correct the time on the ESXi host, modify the time for the host using the vSphere client and correct the NTP settings in the /etc/ntp.conf file.

#3. An administrator wants to shut down the host using the ESXi host. Which option would be used in the Direct Console User Interface to perform this task?

To shut down the host for Direct Console User Interface (DCUI), an administrator will press F12 Key.

#4. An administrator can access the ESXi host via vCenter Server using vSphere Web Client but cannot directly via VClient. What should he do to access ESXi host directly?

If the ESXi host connected to vSphere Web Client is being accessed and can’t be accessed directly, we should check that Lockdown is not enabled. If it is enabled, we should be disabled. Because if Lockdown is enabled, ESXi hosts can only be accessed via vCenter Server; you cannot directly access any host.

#5. An administrator wants to use the VMware Certificate Authority (VMCA) as an Intermediate Certificate Authority (CA). He already replaces the Root Certificate and Machine Certificates (Intermediate CA). What should he do next?

After replacing the root certificate and machine certificate (intermediate CA), the following two steps are needed to perform.

  • Replace Solution User Certificates (Intermediate CA)
  • Replace the VMware Directory Service certificate.

#6. If Strict Lockdown Mode is enabled on an ESXi host, which action should an administrator perform to allow ESXi Shell or SSH access for users with administrator privileges?

The administrator will add the users to Exception Users and enable the service to allow ESXi Shell or SSH access.

#7. SSO is an essential component of the vCenter Server. Which SSO component issues Security Assertion Markup Language tokens?

VMware Security Token Service component of SSO grants SAML tokens.

#8. What is a valid Identity Source used to configure vCenter Single Sign-On?

OpenLDAP is a valid Identity Source for configuring vCenter SSO.

#9. What happens to the files contained on shared storage When a Content Library is deleted?

When Content Library is deleted, all stored files in the content library will be deleted.

#10. What is the maximum number of vCPUs required for a VM in vSphere 6.0?

Maximum 128 vCPUs can be allocated to a VM vSphere 6.0.

#11. A windows domain user can be logged in to vSphere using vSphere Web Client. What are the requirements to be met for this feature to be available and functional?

An administrator can allow users to log in to vSphere Web Client using Windows session authentication. For this purpose, Install the vSphere Web Client Integration browser plug-in on each computer from where a user will sign in. The users must be signed in to Windows using Active Directory user accounts. And, an administrator must create a valid Identity Source in Single Sign-On for the users’ domain.

#12. An administrator wants to clone a virtual machine using the vSphere Client. Which explains why the Clone option is missing?

To clone a VM can be performed from vCenter Server either you connected via vSphere Web Client or VClient. If you are directly connected to an ESXi host, you cannot perform cloning of a VM.

#13. What will happen if the .nvram file is deleted accidentally from a VM?

.nvram file is used to store the BIOS state of a VM. If it is deleted for some reason, then, .nvram file will be created again when the virtual machine is powered on.

#14. An administrator wants to connect the vSphere 5.5 Client to ESXi 6.x host. What will occur?

If the administrator tries to connect the vSphere 5.5 Client to ESXi 6.x host, the operation will prompt the administrator to run a script to upgrade the vSphere Client.

#15. Which one of the secondary Private VLANs (PVLANs) types can send packets to Isolated PVLAN?

A promiscuous type of PVLAN can communicate and send packets to an Isolated PVLAN.

#16. What sample roles are provided by default when vCenter is installed?

When vCenter is installed, Virtual machine user and Network Administrator roles are provided.

#17. What will happen when all paths down (APD) event occurs for the software FCoE storage?

If all paths down events occur, Spanning Tree Protocol is enabled on the network ports.

#18. What methods are available for upgrade a host from ESXi 5.x to ESXi 6.x?

vSphere Update Manager (VUM), esxcli command-line tool, and vSphere Auto Deploy can be used to upgrade.

#19. What administrator should do before upgrading virtual machine hardware?

Before upgrading a VM hardware, we should create a backup or snapshot of the VM, upgrade VMware Tools to the latest version, and verify that the VM is stored VMFS or NFS datastore.

#20. vCenter Server up-gradation fails at the vCenter Single Sign-On installation. What should you do to complete the upgrade process?

Before upgrading the vCenter Server, please verify that the VMware Directory service can stop by manually restarting it. If it stopped manually, then you can start the up-gradation process of the vCenter Server.

#21. What prerequisites should be considered before upgrading the vCenter Server Appliance?

In case of up-gradation of vCenter Server Appliance (vCSA) or after fresh installation, Client Integration Plugin (CIP) will be installed in both cases.

#22. After deploying a PSC, vCenter Server is not being installed and shows the following error:

Could not contact Lookup Service. Please check VM_ssoreg.log.

If this error appears, verify that the clocks on the host machines running the PSC, vCenter Server, and the vSphere Web Client are synchronized. And also, ensure that there is no firewall blocking port 7444 between the PSC and vCenter Server.

#23. An administrator installed Windows Server 2008 and wants to install vCenter Server on it but failed when installing on a Windows virtual machine?

vCenter Server installation requires 64bit Windows OS to install. If you try to install it on Windows Server 2008, it will not be installed, and installation will be failed. vCenter Server will be installed in Windows Server 2008 R2 or higher Windows OS.

#24. What is the minimum Virtual Hardware version required for vFlash Read Cache?

vFlash Read Cache was first in vSphere 5.5, and the minimum Virtual Hardware version for vSphere 5.5 is version 10.

#25. ESXi host is added in vCenter Server but not responding in vSphere Web Client. If this issue occurs due to a firewall, which port should be opened?

If the administrator sees no response of added ESXi 6.x host in vCenter Server, the issue is caused by network firewall blocking traffic. Then he should check that port 902 (UDP) is not blocked by a firewall. If it happens, enable the port from Security Profile by using vSphere Web Client by selecting said ESXi host in vCenter Server.

#26. Suppose a VM is unexpectedly powered off. Which VM logs files should be considered to troubleshoot the issue?

If it happens, an administrator should check vmware.log and hostd.log log files to troubleshoot the issue.

#27. Why a VM appeared as an orphaned VM?

If a VM appears in an orphaned state, this could cause a VMware High Availability host failure has occurred. And the virtual machine was unregistered directly on the ESXi host.

#28. While upgrading an ESXi 5.5 host to ESXi 6.x, the following error appears: MEMORY_SIZE

What does this require to do?

It indicates insufficient memory on the ESXi host to complete the upgrade process of an ESXi host from ESXi 5.5 to ESXi 6.x.

#29. To remove a host from a vSphere Distributed Switch (vDS), the following error message is observed:

The resource ’10’ is in use

Before removing vDS, it is ensured that VMkernel network adapters on the vDS are not in use. If any of the resources of vDS is being used, then above mentioned error message with resource ID will appear.

#30. An administrator wants to monitor network traffic and capture network traffic for a VM but cannot see the expected traffic in the packet capture tool. What should he do to resolve the problem?

If an administrator needs to capture network traffic for a VM, he should Enable Promiscuous Mode on the relevant port group. Then you can capture the network traffic by using any networking traffic capturing tool.

#31. A vSAN Cluster is created with six nodes along with the fault domain, and three of them moved into the fault domain. A one-member node of the fault domain fails. What will happen with the remaining two nodes exist in the fault domain?

When a member node of the fault domain fails, the remaining two fault domain members will be treated as failed.

#32. At which level is a vSAN Fault Domain configured?

A fault domain is configured at the vSAN Cluster level, and nodes will be added to this domain. If any member node fails due to any reason, the remaining members of the fault domain will also be considered as fail.

#33. It is observed that a VM storage activity on an ESXi 6.x host is negatively affecting a VM storage activity on another host that is accessing the same VMFS Datastore. Which action would mitigate the issue?

To control the storage activity of a VM from affecting another VM’s storage activity, Storage IO Control (SIOC) should be enabled. Storage I/O Control provides much-needed control of storage I/O and should be used to ensure that the performance of your critical VMs is not affected by VMs from other hosts when there is contention for I/O resources.

#34. While upgrading an ESXi host from 5.5to 6.0, the administrator runs the following command:

esxcli software vib list --rebooting-image

What will be shown by this command?

This command will show all active VIBs (vSphere Installation Bundle). VIB is a collection of files like tarball or zip packaged into a single archive to facilitate distribution.

#35. To troubleshoot a CPU performance issues of a VM, which counters will be used to demonstrate CPU contention?

To test the performance of an ESXi host in the form of memory, CPU, and network utilization, the ESXTOP tool is used. It is an excellent tool available for VMware administrators to troubleshoot performance issues. For configuring ESXTOP, you’ll need vSphere Client, and putty and SSH sessions should be enabled. For CPU performance testing, %RDY, %MLMTD, and %CSTP counters are used.

#36. An administrator tries to run esxtop by enabling SSH and using putty to troubleshoot CPU performance issues, but no output is displayed. How to resolve this issue?

To display output in ESXTOP, press f and place an asterisk next to each field that should be displayed.

#37. An administrator wants to monitor VMs on a host using vCenter Server and send notifications when memory usage crosses 80%. What should an administrator do in the vCenter Server to accomplish this?

To monitor VM’s memory usage that reaches 80%, a vCenter Server alarm will be created to monitor VM’s memory usage and set an action to email the notification.

#38. An administrator created a DRS cluster, and it became unbalanced. What are likely causes to become unbalanced?

DRS cluster can become unbalanced when Affinity rules are preventing VMs from being moved. And a device is mounted to a VM prevents vMotion from one host to another.

#39. An IT administrator configured two vCenter Servers within a PSC and needs to grant a user privilege that can access all environments. What is the access level required to access all the environments?

To access multiple vCenter Servers within a PSC, requires Global Permission to access all environments.

#40. An administrator created 10 ESXi 6.x hosts via Auto Deploy for a new Test/Dev cluster, and all hosts are configured to obtain their IP address via DHCP. Which DCUI option should the administrator use to renew the DHCP lease for the hosts?

The “Reset Management Network” of the Direct Console User Interface (DCUI) option is used to renew the DHCP lease for the hosts.

I hope you have enjoyed reading this post. You may also like to explore more VMWare Interview Questions and Answers.

Thanks to our Sponsors
More great readings on Cloud Computing
Power Your Business
Some of the tools and services to help your business grow.
  • Invicti uses the Proof-Based Scanning™ to automatically verify the identified vulnerabilities and generate actionable results within just hours.
    Try Invicti
  • Web scraping, residential proxy, proxy manager, web unlocker, search engine crawler, and all you need to collect web data.
    Try Brightdata
  • Semrush is an all-in-one digital marketing solution with more than 50 tools in SEO, social media, and content marketing.
    Try Semrush
  • Intruder is an online vulnerability scanner that finds cyber security weaknesses in your infrastructure, to avoid costly data breaches.
    Try Intruder