Which three vSphere features are still supported for Windows-based virtual machines when enabling vSphere’s virtualization-based security feature? (Choose three.)
An administrator wants to create virtual machine (VM) templates and store them in a content library. The administrator would like to use the content library to manage different versions of these templates so that reverting to an earlier version is an option.How should the administrator create these templates?
An administrator is tasked with configuring certificates for a VMware software-defined data center (SDDC) based on the following requirements:All certificates should use certificates trusted by the Enterprise Certificate Authority (CA).The solution should minimize the ongoing management overhead of replacing certificates.Which three actions should the administrator take to ensure that the solution meets corporate policy? (Choose three.)
An administrator is tasked with moving an application and guest operating system (OS) running on top of a physical server to a software-defined data center (SDDC) in a remote secure location.The following constraints apply:The remote secure location has no network connectivity to the outside world.The business owner is not concerned if all changes in the application make it to the SDDC in the secure location.The application’s data is hosted in a database with a high number of transactions.What could the administrator do to create an image of the guest OS and application that can be moved to this remote data center?
An administrator is tasked with configuring an appropriate Single Sign-On (SSO) solution for VMware vCenter based on the following criteria:The solution should support the creation of Enhanced Link Mode groups.All user accounts are stored within a single Active Directory domain and the solution must support only this Active Directory domain as the identity source.All user account password and account lockout policies must be managed within the Active Directory domain.The solution should support token-based authentication.Which SSO solution should the administrator choose based on the criteria?
An administrator is tasked with applying updates to a vSphere cluster running vSAN using vSphere Lifecycle Manager. Downtime to the ESXi hosts must be minimal while the work is completed.The administrator has already completed the following steps and no errors have been returned:Downloaded all applicable software and created a new image.Attached the new image to the cluster and run a compliance check against the image for the cluster.Ran a remediation pre-check for the cluster.Which two series of steps should the administrator perform to start the remediation of the cluster using the new image? (Choose two.)