A、 Replace the VMware Certificate Authority (VMCA) certificate with a self-signed certificate generated from the
B、 Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.
C、 Replace the machine SSL certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
D、 Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.
E、 Replace the solution user certificates wife custom certificates generated from the Enterprise CA.
F、 Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
G、
H、
I、
J、
答案:BDE
解析:解析: Option B, D and E are correct because they allow the administrator to replace the machine SSL certificates,the VMware Certificate Authority (VMCA) certificate and the solution user certificates with custom certificates generated from the Enterprise CA, which will ensure that all certificates are trusted by the Enterprise CA and minimize the ongoing management overhead of replacing certificates. Option A is incorrect because replacing the VMCA certificate with a self-signed certificate generated from the VMCA will not ensure that the certificate is trusted by the Enterprise CA. Option C is incorrect because replacing the machine SSL certificates with trusted certificates generated from the VMCA will not ensure that the certificates are trusted by the Enterprise CA. Option F is incorrect because replacing the solution user certificates with trusted certificates generated from the VMCA will not ensure that the certificates are trusted by the Enterprise CA. 选项B、D和E是正确的,因为它们允许管理员用企业CA生成的自定义证书替换机器SSL证书、VMware证书颁发机构(VMCA)证书和解决方案用户证书,这将确保企业CA信任所有证书,并将替换证书的持续管理开销降至最低。选项A不正确,因为用从VMCA生成的自签名证书替换VMCA证书不能确保该证书受到企业CA的信任。选项C是不正确的,因为用从VMCA生成的可信证书替换机器SSL证书不能确保证书被企业CA信任。选项F是不正确的,因为用从VMCA生成的可信证书替换解决方案用户证书不能确保证书被企业CA信任。
A、 Replace the VMware Certificate Authority (VMCA) certificate with a self-signed certificate generated from the
B、 Replace the machine SSL certificates with custom certificates generated from the Enterprise CA.
C、 Replace the machine SSL certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
D、 Replace the VMware Certificate Authority (VMCA) certificate with a custom certificate generated from the Enterprise CA.
E、 Replace the solution user certificates wife custom certificates generated from the Enterprise CA.
F、 Replace the solution user certificates with trusted certificates generated from the VMware Certificate Authority (VMCA).
G、
H、
I、
J、
答案:BDE
解析:解析: Option B, D and E are correct because they allow the administrator to replace the machine SSL certificates,the VMware Certificate Authority (VMCA) certificate and the solution user certificates with custom certificates generated from the Enterprise CA, which will ensure that all certificates are trusted by the Enterprise CA and minimize the ongoing management overhead of replacing certificates. Option A is incorrect because replacing the VMCA certificate with a self-signed certificate generated from the VMCA will not ensure that the certificate is trusted by the Enterprise CA. Option C is incorrect because replacing the machine SSL certificates with trusted certificates generated from the VMCA will not ensure that the certificates are trusted by the Enterprise CA. Option F is incorrect because replacing the solution user certificates with trusted certificates generated from the VMCA will not ensure that the certificates are trusted by the Enterprise CA. 选项B、D和E是正确的,因为它们允许管理员用企业CA生成的自定义证书替换机器SSL证书、VMware证书颁发机构(VMCA)证书和解决方案用户证书,这将确保企业CA信任所有证书,并将替换证书的持续管理开销降至最低。选项A不正确,因为用从VMCA生成的自签名证书替换VMCA证书不能确保该证书受到企业CA的信任。选项C是不正确的,因为用从VMCA生成的可信证书替换机器SSL证书不能确保证书被企业CA信任。选项F是不正确的,因为用从VMCA生成的可信证书替换解决方案用户证书不能确保证书被企业CA信任。
A. Create a new published content library In each secondary site
B. Configure the New York subscribed content library to download content immediately.
C. Configure the Tokyo subscribed content library to download content immediately
D. Configure the Tokyo subscribed content library to download content when needed
E. Create a new published content library at the primary site
F. Configure the New York subscribed content library to download content when needed.
G. Create a new subscribed content library in each secondary site
H.
I.
J.
解析:解析: The administrator should take these four steps to configure the content library solution before adding a VM template: Create a new published content library at the primary site, which allows the administrator to share the VM template with other sites.Configure the New York subscribed content library to download content immediately, which ensures that the new VM template is downloaded from the primary site as soon as possible. Configure the Tokyo subscribed content library to download content when needed, which saves disk space at the secondary site by downloading only the metadata of the VM template until it is deployed. Create a new subscribed content library in each secondary site, which allows the administrator to subscribe to the published content library at the primary site and synchronize the VM template.在添加VM模板之前,管理员应该采取以下四个步骤来配置内容库解决方案:在主站点创建新的已发布内容库,这允许管理员与其他站点共享VM模板。将纽约订阅的内容库配置为立即下载内容,这可确保尽快从主站点下载新的虚拟机模板。将Tokyo subscribed content library配置为在需要时下载内容,这通过在部署之前仅下载虚拟机模板的元数据来节省辅助站点的磁盘空间。在每个辅助站点中创建一个新的订阅内容库,这允许管理员订阅主站点上发布的内容库,并同步虚拟机模板。
A. Forged transmits set to reject
B. MAC address changes set to accept
C. Promiscuous mode set to reject
D. Promiscuous mode set to accept
解析:解析:The security policy that must be configured at the port group level to allow all traffic to be forwarded regardless of the destination is promiscuous mode set to accept, which allows receiving all traffic on a virtual switch port.必须在端口组级别配置安全策略,以允许转发所有流量,而不管目的地是哪里,将混杂模式设置为接受,这允许在虚拟交换机端口上接收所有流量。
A. Assign a custom memory share value to the resource pool containing the Production VMs.
B. Assign a memory reservation value to the resource pool containing the Production VMs.
C. Create a parent resource pool for the Production VMs
D. Create a sibling resource pool for each of the Production and Test VMs.
E. Create a child resource pool for the Test VMs.
F.
G.
H.
I.
J.
解析:
A. Create a DNS CNAME record for the vCenter Server (vcsaOl corp.local)
B. Create a DNS CNAME record for the ESXi Host server (esx01 corp.local).
C. Create a reverse DNS A record for the vCenter Server (vcsa0l).
D. Create a reverse DNS A record for the ESXi Host server (esx01 )
E. Create a forward DNS A record for the vCenter Server (vcsa0l ).
F.
G.
H.
I.
J.
解析:解析:The administrator must create a forward DNS A record for the vCenter Server (vcsa01), which maps the FQDN of the vCenter Server to its IP address. The administrator must also create a reverse DNS A record for the ESXi Host server (esx01), which maps the IP address of the ESXi Host to its FQDN. These DNS records are required for name resolution and certificate validation during the deployment of the vCenter Server Appliance.
A. Datastore
B. Data center
C. Datastore cluster
D. Virtual machine
解析:解析: To create a custom alarm to notify when thin provisioning reaches a certain capacity threshold, the administrator must define this alarm at the datastore level, as it is related to datastore usage要创建自定义警报以在精简资源调配达到特定容量阈值时发出通知,管理员必须在数据存储区级别定义此警报,因为它与数据存储区使用情况相关
A. Configure VMware Cloud Disaster Recovery (VCDR) and combine it with array-based storage replication
B. Configure VMware a Site Recovery Manager and combine it with vSphere Replication
C. Configure a subscribed content library on the secondary site.
D. Configure VMware Site Recovery Manager and combine it with array-based storage replication
E.
F.
G.
H.
I.
J.
解析:
A. Extract the host profile from the reference host
B. Export the host profile from vCenter.
C. Import host customization on the reference host.
D. Attach the host profile to each cluster that requires the secure configuration.
E. Check the compliance of each host against the host profile.
F. Reset host customization on the reference host.
G. 在引用主机上重置主机定制。
H.
I.
J.
解析:解析: To apply the security standards from a reference host to other hosts across multiple clusters, the administrator needs to extract a host profile from the reference host, which captures its configuration settings; attach the host profile to each cluster that requires the same configuration; check the compliance of each host against the host profile, which compares their settings; and remediate all non-compliant hosts, which applies the configuration settings from the host profile.为了将来自参考主机的安全标准应用到跨多个集群的其他主机,管理员需要从参考主机提取主机配置文件,该主机配置文件捕获其配置设置;将主机配置文件附加到需要相同配置的每个群集;对照主机配置文件检查每台主机的合规性,主机配置文件会比较它们的设置;并修复所有不符合的主机,这将应用主机配置文件中的配置设置。
A. VMware vCenter
B. Standalone Velero and Restic
C. NSX-T Manager
D. vSphere Host Client
E. Velero Plugin for vSphere
F.
G.
H.
I.
J.
解析:
A. vCenter Identity Provider Federation with Active Directory Federation Services as the identity provider
B. vCenter Single Sign-On with Active Directory over LDAP as the identity source
C. vCenter Single Sign-On with Active Directory (Windows Integrated Authentication) as the identity source
D. vCenter Identity Provider Federation with Active Directory over LDAP as the identity provider
E.
F.
G.
H.
I.
J.
解析:解析: „ In vCenter Server Identity Provider Federation, vCenter Server uses the OpenID Connect (OIDC) protocol to receive an identity token that authenticates the user with vCenter Server.“ Integrated Windows Authentication is deprecated since vSphere 7.0在vCenter Server身份提供商联盟中,vCenter Server使用OpenID连接(OIDC)协议接收身份令牌,该令牌通过vCenter Server对用户进行身份验证。“从vSphere 7.0开始,集成Windows身份验证已被弃用
A. vSphere Virtual Machine Encryption
B. vSphere Visualization-Based Security
C. Virtual Intel Software Guard Extensions (vSGX)
D. Virtual Trusted Platform Module (vTPM)
E.
F.
G.
H.
I.
J.
解析: