The security team requests the ability to log into VMware vCenter and review datacenter, cluster and network configurations. The following details are provided:
The security team is not authorized to make any changes to the environment.
Each user must login with unique credentials.
What steps should the administrator perform to grant access to the security team?
An administrator is tasked with creating a custom VMware Cloud Foundation (VCF) Operations Web Certificate.
What are three requirements to which the certificate must conform to be used with VCF Operations? (Choose three.)
An administrator creates a cluster by joining a Medium sized VMware Cloud Foundation (VCF) Operations for Logs node to an existing Medium sized single-node deployment.
The secondary node of the cluster fails, degrading the functionality of VCF Operations for Logs.
What action should the administrator take to create a healthy active cluster?
In VMware Cloud Foundation (VCF) Operations for Logs, where does an administrator visualize the value range of a field?
An administrator is tasked with setting up pricing for their VMware vSphere Foundation (VVF) environment. The accounting team has decided to charge users in 't-shirt sizes' for vCPU in the following method:
Small (1-2 vCPU)
Medium (3-4 vCPU)
Large (5-8 vCPU)
Which rate method is used for this configuration?
What is the primary purpose of using VMware vSphere Foundation (VVF) Lifecycle Manager for ESX hosts?
An administrator is tasked with developing an automated, repeatable process to:
Connect to the corporate Active Directory and create a Windows computer object in a defined Organizational Unit.
Connect to the target vCenter and create a Windows VM from a template.
Power on the VM and join it to the corporate domain.
Which VMware vSphere Foundation (VVF) component is best suited for this task?
The security team has requested that high-sensitivity workloads be protected using Confidential Computing in your VMware vSphere Foundation (VVF) 9.0 environment. These workloads handle regulated data that must be isolated from the hypervisor and other tenants, even when running on the same ESX host.
The vSphere administrator is responsible for ensuring that only trusted hosts are used and that virtual machines are configured with hardware-enforced memory isolation.
Which two configurations must you implement to support Confidential Computing for these workloads? (Choose two.)