An administrator wants to leverage the processor-specific technology that uses a security extension for securing virtual machines (VMs). This will allow user-level code to define private regions of memory called enclaves that are protected from external access.
What does the administrator need to configure to enable VMs to use this technology? (Choose the best answer.)
Which feature is a prerequisite for Proactive High Availability (HA)? (Choose the best answer.)
Which two statements are true regarding the use of firmware update packages in vSphere Lifecycle Manager? (Choose two.)
What is a pre-requisite for configuring virtualization-based security (VBS)? (Choose the best answer.)
There are two vSphere clusters in a company environment. One cluster is hosting development workloads and another is hosting production workloads. Both vSphere clusters are managed by the same vCenter Server.
The application team would like to move a new virtual machine from the development to production cluster with no downtime.
Which feature would allow non-disruptive movement between these two clusters? (Choose the best answer.)
An administrator is investigating the reason for a virtual machine restarting. In the vmware.log file, the administrator finds the following error:
What is a likely cause of this virtual machine restart? (Choose the best answer.)