What three steps must be taken when removing a host from a vSAN-enabled cluster? (Choose three.)
What three tools or products can be used for monitoring a vSphere 6.x deployment? (Choose three.)
Which two resource types can be limited on the vApp level? (Choose two.)
Which three virtual hardware configurations will allow snapshots? (Choose three.)
A vSphere administrator is required to apply security hardening policies following the VMware vSphere Hardening Guide recommendations.Which tool enables native compliance reporting for these guidelines?
When specifying a trigger action for an Alarm Definition, what two alarm state changes are available to be triggered on? (Choose two.)