• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/11

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

11 Cards in this Set

  • Front
  • Back
What are the three default roles which exist in VMware ESX 4?
No Access
Read-Only
Administrator
Yes or No:
Can a guest operating system inside a virtual machine change its own storage access on its VMware ESX host?
No
Which type of certificates are installed on VMware ESX 4 by default?
self-signed certificates are installed by default, but can be replaced with a 3rd-party or trusted certificate.
Which are the firewall ports needed to communicate between the vSphere Client, a vCenter 4 server, and a VMware ESX host?
902
903
443
Which firewall ports are needed to communicate between the Web Access Client, vCenter 4 server, and a VMware ESX 4 host?
443
80
902
903
Yes or No:

In VMware ESX 4, is the default to allow remote root login through SSH?
No
In VMware ESX which commands will specifically show who is still logged on?
w
last
who
What must you do to allow users to use the su command when logged in via SSH?
Place the users who are allowed to use the su command in the wheel group and modifying the /etc/pam.d/su file to turn on using the wheel group.
In Vmware ESX which command allows a normal user to run commands with the privileges of another user?
sudo
Name 4 features of VMware vShield Zones?
Integrated dynamic firewalling for all applications.

Allows Control of network access to sensitive areas of the virtual datacenter such as the DMZ or servers with sensitive data subject to PCI or SOX compliance regulations, efficiently within shared vSphere environments.

Securely bridge, firewall or isolate traffic across logical trust or organizational boundaries within existing vSphere deployments, while still leveraging the flexibility and availability of sharing resource computing pools.

Logging and reporting of allowed and disallowed network activity by application and protocol. Easily configure trust zones using existing VI container objects. Assured and auditable policies throughout VMotion and VM lifecycle events.
Which product line provides higher levels of security than physical servers to all applications?
VMware VMsafe