Orlando guruchinini
|
|
Título del Test:
![]() Orlando guruchinini Descripción: Orlando guruchinini |



| Comentarios |
|---|
NO HAY REGISTROS |
|
An administrator is tasked with setting up pricing for their VMware vSphere Foundation (VVF) environment. The accounting team has decided to charge users in 't-shirt sizes' for vCPU in the following method: Small (1-2 vCPU) Medium (3-4 vCPU) Large (5-8 vCPU) Which rate method is used for this contiguration?. Base rate storage per GB. Base rate slabs. Base rate CPU per GHz. Base rate CPU per vCPU. The security team has requested that high-sensitivity workloads be protected using Confidential Computing in your VMware vSphere Foundation (VVF) 9.0 environment. These workloads handle regulaled data that must be isolated from the hypervisor and other tenants, even when running on the same ESX host. The vSphere administrator is responsible for ensuring that only trusted hosts are used and that virtual machines are configured with hardware-enforced memory isolation Which two configurations must you implement to support Contidential Computing for these workloads? (Choose two.). Create virtual machines with hardware version 22 and set the Confidential Computing flag. Use TPM 2.0 on the guest OS to generate attestation reports for VM launch. Enable AMD SEV-SNP or Intel TDX support in the host BIOS and confirm compatibility in vSphere. Configure Encrypted vMotion with 'Required' mode for the VM. Enable vsphere Trust Authority and set the Confidential Computing flag. The security team requests the ability to log into VMware vCenter and review datacenter, cluster and network configurations. The following details are provised: The security team is not authorized to make any changes to the environment. Each user must login with unique credentials. What steps should the administrator perform to grant access to the security team?. Share the password for 'administrator@vsphere.local' with the security team. Create a security user, assign the user the Read-Only role, share the credentials with the security team. Create a group for the security team, add the users to the group, and assign the group the Network Administrator role . Create a group for the security team, add the users to the group, and assign the group the Read-Only role. During a recent audit, it was determined that a group of users may have been compromised. These users should not have access to any VMware vCenter resources while an investigation is underway. All the affected users have been placed into a SUSPECT_USERS group. Which step is required to ensure that the suspect users will never have access to resources in vCenter?. Assign the SUSPECT_USERS group the No access role to the vCenter Object and check propagate. Assign the SUSPECT_USERS group the Administrator role to the vCenter Object and uncheck propagate. Disconnect the vCenter from Active Directory. Assign the SUSPECT USERS group the Read-only role to the vCenter Object and check propagate. What are the two methods to add a widget to a VMware Cloud Foundation (VCF) Operations for Logs dashboard? (Choose two.). Clone the widget from an existing dashboard. Create the widget in Explore Logs and click Add to Dashboard. Drag and drop the widget in the dashboard design pane. Import the widget in the dashboard design pane. Open Management Pack Builder and clone the widget. What is the primary purpose of using VMware vSphere Foundation (VVF) Lifecycle Manager for ESX hosts?. To configure network settings for ESX hosts. To monitor the performance of ESX hosts. To create and manage virtual machines. To update and maintain the ESX host lifecycle. An administrator must configure identity access for VMware vSphere Foundation (VVF) to allow admin accounts from the enterprise Active Directory domain corp.local to log in using domain credentials. Security requires authentication to use the default Active Directory protocol, without federation. Add the domain controller certificate to the Trusted Root store in vCenter. Configure Identity Federation using SAML with corp.local. Configure a trusted identity provider using OpenID Connect (OIDC). Add Active Directory over LDAP as an identity source. An administrator is tasked to deploy a new eight-node VMware vSAN Express Storage Architecture (ESA) cluster. What are three minimum requirements to accomplish this? (Choose three.). 10GbE network interfaces. 256GB Memory. 25GbE network interfaces. PCle flash device (NVMe). SAS solid-state disk (SSD). 128GB Memory. |




