Which two are valid Identity Sources when configuring v…
Which two are valid Identity Sources when configuring vCenter Single Sign-On? (Choose two.)
Which VMware Single Sign-On component issues Security A…
Which VMware Single Sign-On component issues Security Assertion Markup Language (SAML) tokens?
Which time measurement is used for the value?
An administrator is configuring the clock tolerance for the Single Sign-On token configuration policy and wants to define the time skew tolerance between a client
and the domain controller clock.
Which time measurement is used for the value?
Which Platform Service Controller Password Policy deter…
Which Platform Service Controller Password Policy determines the number of days a password can exist before the user must change it?
Which group in the vsphere.local domain will have admin…
Which group in the vsphere.local domain will have administrator privileges for the VMware Certificate Authority (VMCA)?
Which two statements would explain why users cannot log…
When attempting to log in with the vSphere Web Client, users have reported the error:
Incorrect Username/Password
The administrator has configured the Platform Services Controller Identity Source as:
Type. Active Directory as an LDAP Server
Domain: vmware.com
Alias: VMWARE
Default Domain: Yes
Which two statements would explain why users cannot login to the vSphere Web Client? (Choose two.)
Which three options are available for replacing vCenter…
Which three options are available for replacing vCenter Server Security Certificates? (Choose three.)
Which two statements are correct regarding vSphere cert…
Which two statements are correct regarding vSphere certificates? (Choose two.)
which advanced parameter should be applied to the virtu…
An administrator has recently audited the environment and found numerous virtual machines with sensitive data written to the configuration files.
To prevent this in the future, which advanced parameter should be applied to the virtual machines?
Which two actions should the administrator take to secu…
An administrator has been instructed to secure existing virtual machines in vCenter Server.
Which two actions should the administrator take to secure these virtual machines? (Choose two.)