Which three Authorization types are valid in vSphere?
Which three Authorization types are valid in vSphere? (Choose three.)
Which three services can be enabled/disabled in the Security Profile for an ESXi host?
Which three services can be enabled/disabled in the Security Profile for an ESXi host? (Choose three.)
Which two steps would need to be performed next?
An administrator would like to use the VMware Certificate Authority (VMCA) as an Intermediate Certificate Authority (CA). The first two steps performed are:
Replace the Root Certificate
Replace Machine Certificates (Intermediate CA)
Which two steps would need to be performed next? (Choose two.)
Which three options are available for ESXi Certificate Replacement?
Which three options are available for ESXi Certificate Replacement? (Choose three.)
Which two statements are true given this configuration?
Lockdown Mode has been enabled on an ESXi 6.x host and users are restricted from logging into the Direct Console User Interface (DCUI).
Which two statements are true given this configuration? (Choose two.)
Which action should an administrator perform to allow ESXi Shell or SSH access for users with administrator pr
Strict Lockdown Mode has been enabled on an ESXi host.
Which action should an administrator perform to allow ESXi Shell or SSH access for users with administrator privileges?
Which two steps should be taken to mitigate security risks associated with this configuration?
A common root user account has been configured for a group of ESXi 6.x hosts.
Which two steps should be taken to mitigate security risks associated with this configuration? (Choose two.)
Which two conditions should be considered when planning this configuration?
An administrator wants to configure an ESXi 6.x host to use Active Directory (AD) to manage users and groups. The AD domain group ESX Admins is planned for
administrative access to the host.
Which two conditions should be considered when planning this configuration? (Choose two.)
Which two advanced features should be disabled for virtual machines that are only hosted on a vSphere system?
Which two advanced features should be disabled for virtual machines that are only hosted on a vSphere system? (Choose two.)
which two settings should an administrator set to false?
To reduce the attack vectors for a virtual machine, which two settings should an administrator set to false? (Choose two.)