What are the three configurable security policy exceptions for a virtual switch?
What are the three configurable security policy exceptions for a virtual switch? Select three.
The three elements of the Layer 2 Security policy are:
Layer 2 is the data link layer. The three elements of the Layer 2 Security policy are: (Select all that apply)
What is the maximum amount of Secondary Hosts in an HA Cluster?
What is the maximum amount of Secondary Hosts in an HA Cluster?
Distributed Power Management (DPM) requires which technology to be available on the NIC?
Distributed Power Management (DPM) requires which technology to be available on the NIC?
What are the 3 Host Isolation Reponse options available on an HA Cluster?
What are the 3 Host Isolation Reponse options available on an HA Cluster?
The VMkernel is secured using which of the following techniques (Choose Two)?
The VMkernel is secured using which of the following techniques (Choose Two)?
Which of the following CHAP Authentication mechanisms is available when using software iSCSI, but not Hardware
Which of the following CHAP Authentication mechanisms is available when using software iSCSI, but not Hardware iSCSI?
When you delete a VMFS datastore from an ESX Host, which of the following occurs?
When you delete a VMFS datastore from an ESX Host, which of the following occurs?
The VMKcore is used for storing core dumps for Debugging and Technical Support?
The VMKcore is used for storing core dumps for Debugging and Technical Support?
Which of the following are valid severity levels for host updates in vCenterUpdate Manager?
Which of the following are valid severity levels for host updates in vCenter
Update Manager (Choose Three)?