An administrator needs to identify where the VM encryption settings are stored. Which file stores the encryption setting?
An administrator runs vSphere Infrastructure in the following configuration:
The administrator wants to use host profiles to manage the hosts.
Where should the administrator attach the host profile?
A customer suspects someone or something is changing the MAC address of a virtual machine. Which security policy should the customer modify to obtain more information?