Showing posts with label VMware. Show all posts
Showing posts with label VMware. Show all posts

What is a valid use case for the No Access role?

What is a valid use case for the No Access role? 






A. An administrator wants to prevent a user from launching the vSphere Client
B. An administrator wants to allow only the status of an object to be viewed, but provide no other access
C. An administrator wants to revoke permissions on an object that would otherwise be propagated
D. An administrator wants to allow the state and details of an object to be viewed, but provide no other access






Answer: C

By default, if you remove a user from an Active Directory domain who is currently logged in to vCenter Server, which of the following actions is taken?

By default, if you remove a user from an Active Directory domain who is currently logged in to vCenter Server, which of the following actions is taken? 






A. The user can remain logged in indefinitely, but once they log out they cannot log back in
B. The user can remain logged in for up to 24 hours
C. The user is logged out of vCenter Server and cannot log back in
D. The user is given a warning they are about to be logged out and given a 1 hour grace period







Answer: B

Assuming a user or a group is assigned a single vCenter Server role, if the role is then removed, which of the following occurs?

Assuming a user or a group is assigned a single vCenter Server role, if the role is then removed, which of the following occurs? 




A. Users or groups are automatically assigned the Read Only role until an administrator can manually assign a new role
B. Users or groups retain the permissions associated with the removed role until they are manually assigned a new role
C. Users or groups assigned the removed role no longer have any permissions in vCenter
D. A role assigned to existing users or groups cannot be removed until all users or groups are removed from the role





Answer: C

When an existing role that has been assigned to users is removed from vCenter Server, which of the following can occur (Choose Two)?

When an existing role that has been assigned to users is removed from vCenter Server, which of the following can occur (Choose Two)? 




A. Users or groups retain the removed role until they are manually assigned a new role
B. Users or groups can be reassigned to any available role
C. Users or groups that had privileges may no longer have any permissions in vCenter
D. Users or groups are automatically assigned to the next most restrictive role available







Answer: B,C

Securing an ESX service console is important because?

Securing an ESX service console is important because? 







A. Service Console actions can affect all VMs on an ESX host
B. Service Console permissions are applied to users when logging in to a host via vCenter
C. VMs run in the service console
D. VMs depend on the patch level of the service console






Answer: A

When cloning a role, which of the following applies (Choose Two)?

When cloning a role, which of the following applies (Choose Two)? 






A. The cloned role is applied to the same users and groups as the original role
B. The cloned role is not applied to the same users or groups as the original role
C. The cloned role can be edited during the cloning process to adjust the privileges in the role
D. The cloned role contains all of the same privileges as the original role






Answer: B,D

An administrator is configuring vCenter Server to support e-mail notification. Which of the following parameters must be configured in the vCenter Server settings (Choose Two)?

An administrator is configuring vCenter Server to support e-mail notification. Which of the following parameters must be configured in the vCenter Server settings (Choose Two)? 




A. Sender e-mail address
B. SNMP address information
C. SMTP server information
D. Receiver e-mail address








Answer: A,C

An administrator wants to restrict the ability of selected administrators to install plug-ins in their vSphere Client applications. Which of the following would accomplish this?

An administrator wants to restrict the ability of selected administrators to install plug-ins in their vSphere Client applications. Which of the following would accomplish this? 







A. Right-Click on the plug-in under Manage Plug-ins and choose Disable
B. Remove the plug-in or plug-ins from the vCenter Server
C. Modify permissions for the administrators and remove the Register Extension privilege
D. Modify the extensions.xml file and remove the unwanted plug-ins







Answer: C

An administrator needs to verify the functionality of virtual machines created in several different formats prior to converting them to ESX/ESXi. Using VMware Player, which of the following virtual machines can be run directly on an administrator desktop (Choose Two)?

An administrator needs to verify the functionality of virtual machines created in several different formats prior to converting them to ESX/ESXi. Using VMware Player, which of the following virtual machines can be run directly on an administrator desktop (Choose Two)? 







A. Norton Ghost 10
B. Acronis True Image
C. Microsoft Virtual Server/Virtual PC
D. VMware Fusion







Answer: C,D