Which of the following methods can be used to secure access to iSCSI storage when using ESX server?
Which of the following methods can be used to secure access to iSCSI storage when using ESX server? (Choose Two.)
Which pre-defined role can assign permissions to users?
Which pre-defined role can assign permissions to users?
What is a valid use case for the No Access role?
What is a valid use case for the No Access role?
Which of the following are not valid permissions for a Datacenter Administrator (Choose Two)?
Which of the following are not valid permissions for a Datacenter Administrator (Choose Two)?
Which of the following is a benefit of ESXi over ESX?
Which of the following is a benefit of ESXi over ESX?
which of the following applies (Choose Two)?
When cloning a role, which of the following applies (Choose Two)?
which Linux based firewall tool?
ESX uses which Linux based firewall tool?
how many days?
The default warning for password expiration on ESX is how many days?
which security settings?
By default ESX4 is installed with which security settings?
Securing an ESX service console is important because:
Securing an ESX service console is important because: