Book Image

Mastering VMware vSphere 6.7, - Second Edition

By : Martin Gavanda, Andrea Mauro, Paolo Valsecchi, Karel Novak
Book Image

Mastering VMware vSphere 6.7, - Second Edition

By: Martin Gavanda, Andrea Mauro, Paolo Valsecchi, Karel Novak

Overview of this book

vSphere 6.7 is the latest release of VMware’s industry-leading, virtual cloud platform. It allows organisations to move to hybrid cloud computing by enabling them to run, manage, connect and secure applications in a common operating environment. This up-to-date, 2nd edition provides complete coverage of vSphere 6.7. Complete with step-by-step explanations of essential concepts, practical examples and self-assessment questions, you will begin with an overview of the products, solutions and features of the vSphere 6.7 suite. You’ll learn how to design and plan a virtual infrastructure and look at the workflow and installation of components. You'll gain insight into best practice configuration, management and security. By the end the book you'll be able to build your own VMware vSphere lab that can run even the most demanding of workloads.
Table of Contents (22 chapters)
Free Chapter
1
Section 1: Getting Started
8
Section 2: Managing Resources
13
Section 3: Advanced Topics
18
Section 4: Building Your Lab Environment

Questions

  1. Name at least three security and hardening principles in VMware vSphere.
  2. What is not a valid identity source?

a) Local Single Sign-On Domain
b) OpenLDAP
c) Local OS
d) LDAP (Active Directory)
e) Network Identity Server
f) LDAP (Native)

  1. The password management feature of SSO configuration can be used to effect password policy for active directory users.

a) True
b) False

  1. What is the correct workflow for assigning permissions in VMware vSphere?

a) Assign several permissions and form a role, and assign the role to the vSphere object together with the user or group.
b) Assign several permissions to a user or group on the vSphere object.

  1. Describe the benefits of using two-factor authentication (2FA).
  2. Lockdown mode can be used to disable SSH access to the ESXi hypervisor once managed by the vCenter server:

a) True
b) False

  1. In vSphere 6.x, several adjustments were made...