VMware Related Exams
3V0-21.21 Exam
During a requirements gathering workshop, the customer provides the following requirement:
How should this non-functional security requirement be documented?
A customer requires the use of data encryption to ensure data is not accessible when a drive is removed from the primary storage platform. However, there is also a requirement to use deduplication and compression against all workloads in order to conserve space.
Which solution meets the customer requirements?
An architect has 50 ESXi hosts to deploy and DHCP servers are not allowed on any network. Which automated host deployment method should the architect use?