The vSphere administrator attempts to connect to an ESXi host via an SSH client and receives the following security alert:
The vSphere administrator needs to determine whether the RSA key fingerprint shown in the security alert is the fingerprint of the intended ESXi host.
Which tool should the vSphere administrator use?
A company has decided to implement Virtual SAN within their vSphere 6.x environment.
The Virtual SAN cluster will be composed of three ESXi 6.x hosts that are on the Virtual SAN Ready Node list.
Each ESXi host includes:
The company will pilot a Virtual SAN cluster utilizing VMware best practices while maximizing storage capacity. The Virtual SAN cluster will use Manual Mode.
Which two Disk Group configurations would meet the stated configuration requirements? (Choose two.)
An administrator deploys vCenter Server using the embedded Platform Services Controller.
After testing the deployment for a couple of months, it is determined that the environment would be better served with an external Platform Services Controller.
What should the administrator do to meet this new requirement?
After selecting an object in vRealize Operations, how can a user compare the badge values of related child objects?