Clusters & ensuring high availability, securing vSphere

7 important questions on Clusters & ensuring high availability, securing vSphere

What is vSphere fault tolerance?

When enabling FT, a vMotion and storage copy is initiated. Two distinct copies of memory and each virtual machine disk are kept in sync.

What are the tree high-level methods of backing up VMs?

  • Running a backup agent of some sort in the guest OS.
  • Leveraging vSphere snapshots and the vSphere Storage APIs for Data Protection (more popularly known as VADP).
  • Using array-based snapshot integration.  

What is vSphere replication?

vSphere Replication can copy VMs within the same cluster or to a different cluster. Target and source could be either the same vCenter or a completely different vCenter on the other side of the country! -it replicates vm’s by initial full replications and changed blocks and can set and manage different RPO’s
  • Higher grades + faster learning
  • Never study anything twice
  • 100% sure, 100% understanding
Discover Study Smart

What are the ways of managing users locally?

  1. Users on ESXi hosts are, by default, managed independently per ESXi host
  2. Two ways of managing users locally, using command-line tools or using the vSphere Client.
  3. Creating and modifying groups is not supported on individual ESXi hosts 

What are the ways of configuring and controlling authorization to vSphere?

  • Local Access
    • Direct Console User Interface
      • ESXi offers direct access via the server console through the DCUI.
    • Local Shell (CLI)
      • Enabled by vSphere Client or DCUI. Disabled by default.
  • Network Access
    • Remote Shell (SSH CLI)
      • Enabled by vSphere Client or DCUI. Disabled by default.
    • vSphere Desktop Client
      • Secure admin of ESXi over HTTPS (port 443)  
  • ESXi Firewall
    • By default, the ESXi firewall allows only  incoming and outgoing connections necessary for managing the VMs and the ESXi host.    

What is the VPXuser account?

The vpxuser account is created automatically by vCenter when adding a host to the inventory and is assigned the Administrator role. When logging onto vCenter, you are not logging on to ESXi hosts directly.

The key security-related network security policies you can set in the vSphere virtual networking environment are:

  1. Promiscuous mode
  2. MAC address changes
  3. Forged transmits 

The question on the page originate from the summary of the following study material:

  • A unique study and practice tool
  • Never study anything twice again
  • Get the grades you hope for
  • 100% sure, 100% understanding
Remember faster, study better. Scientifically proven.
Trustpilot Logo