A. VMware vCenter Manager
B. VMware vSphere with Operations Management
C. VMware vRealize Operations Management Suite
D. VMware vRealize Automation Suite
A. Attack surface
B. Attack factor
C. Attack vector
A. Retry Logic
B. Graceful Degradation
C. Checkpointing
D. Monitoring Application Availability
A. Configuration messaging -Statistics -Status
B. User and role access -Configuration baselines -Services execution
C. Data processing -Asset discovery -Resource abstraction and pooling
D. Asset discovery -Resource abstraction and poolingResource provisioning
A. Ensure secrecy of stored information
B. Ensure data protection against unauthorized alterations
C. Ensure users are responsible for actions executed
D. Ensure timely and reliable access to resources
A. Erasure coding
B. RAID
C. Dynamic disk sparing
D. Cache protection
A. Defining Service Template
B. Assessing Service Requirements
C. Establishing Billing Policy
D. Developing Service Enablement Roadmap
A. Load Balancing
B. NIC Teaming
C. Link Aggregation
D. Erasure Coding
A. File
B. Object
C. Block
A. Solaris Zones and VMware Workstation
B. ESXI and VMware Fusion
C. Oracle Virtual Box and Hyper-V
D. ESXI and Hyper-V