What are the different security options” to upgrade the hosts with UM ?

What are the different security options to upgrade the hosts with UM ? (choose 3)

A.
Important

B.
Critical

C.
Moderate

D.
security

E.
general

Explanation:
I didn’t know this one, I answered B, D, E, and the answer is here on page 109
http://pubs.vmware.com/vsphere-50/topic/com.vmware.ICbase/PDF/vsphere-update-manager-50-install-administration-guide.pdf

Severity of the update. For hosts, the severity status might be Critical, General, Security,
and so on. For virtual machines, the severity might be Critical, Important, Moderate, and
so on.

4 Comments on “What are the different security options” to upgrade the hosts with UM ?

  1. Zee says:

    The correct answer should be

    Important
    Moderate
    Critical

    In Update Manager go to > Base line (tab) > create base line > [look under the criteria section
    You will see these options…

    Patch Vendor
    Severity
    Any
    Low
    Moderate
    Important
    Critical
    Category
    Any
    Security
    Bugfix
    Enhancement
    Other

  2. kopigao says:

    http://pubs.vmware.com/vsphere-50/topic/com.vmware.ICbase/PDF/vsphere-update-manager-50-install-administration-guide.pdf
    i think the answer from above link is just given the example

    i think Zee is right. the answer should be A,B,C.

    according to this article,http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2004397

    The available host patch severity values for the Security category is

    Critical: Vulnerabilities that can be exploited by an unauthenticated remote attacker or vulnerabilities that break guest/host Operating System isolation. The exploitation results in the compromise of confidentiality, integrity, availability user data, or processing resources without user interaction. Exploitation could be leveraged to propagate an Internet worm or execute arbitrary code between virtual machines and the host.

    Important: Vulnerabilities whose exploitation results in the compromise of confidentiality, integrity, or availability of user data and processing resources. Such flaws could allow local users to gain privileges, allow authenticated remote users to execute arbitrary code, or allow local or remote users to easily cause a denial of service.

    Moderate: Flaws where the ability to exploit is mitigated to a significant degree by configuration or difficulty of exploitation, but in certain deployment scenarios could still lead to some compromise of the confidentiality, integrity, or availability of user data and processing resources. These are the types of vulnerabilities that could have had a critical impact or important impact but are less easily exploited based on a technical evaluation of the flaw, or affect unlikely configurations.

    Low: All other issues that have a security impact. Vulnerabilities where exploitation is believed to be extremely difficult, or where successful exploitation would have minimal impact.


Leave a Reply

Your email address will not be published. Required fields are marked *