After installing vCenter, which two identity sources and users are available by default? (Choose two.)
Correct Answer:
CE
An administrator is elevating the security posture of a vSphere environment after a recent data breach. All VMs will be encrypted as part of this plan.
Which additional component is required for the encryption?
Correct Answer:
C
An administrator has an environment with these conditions and requirements: < >>< > > >
Correct Answer:
B
An administrator is using vSphere Web Client to configure the firewall to allow specific third-party application SSH access to an ESXi Host.
What is the most secure way to configure the firewall rule?
Correct Answer:
A
A vSphere administrator needs to migrate VMs in the same vCenter from New York to California due to impending severe weather.
Which migration should the administrator perform without causing VM downtime?
Correct Answer:
A