Back again!! This time we are going to go over the relatively new VSAN. Now VMWare Virtual SAN originally came out in 5.5 U1, but has been radically overhauled for 6.0 (massive jump from VSAN 1.0 -6 J ) So what are we going to go over and have to know for the...
Read More ⟶
Wait, wait wait…. Where did objective 2.2 go? I know… I didn't include it since I have already gone over in previous objectives all the questions asked on it. So moving on to Storage.
So we are going to cover the following objective points.
Identify...
Read More ⟶
After the last objective this one should be a piece of cake. There are only 4 bullet points that we need to cover for this objective. They are:
Identify Network I/O Control Requirements
Identify Network I/O Control Capabilities
Enable / Disable Network I/O...
Read More ⟶
Wrapping up this objective we are going to cover the following:
Configure LACP on Uplink Port Groups
Describe vDS Security Policies / Settings
Configure dvPort group blocking policies
Configure Load Balancing and failover...
Read More ⟶
Welcome once again. We are going to go over the following points under this objective.
Identify vSphere Distributed Switch capabilities
Create / Delete a vSphere Distributed Switch
Add / Remove ESXi hosts from a vSphere Distributed Switch
Add / Configure /...
Read More ⟶
Under this objective we have the following topics to cover
Configure / Manage Active Directory Authentication
Configure / Manage Platform Services Controller (PSC)
Configure / Manage VMware Certificate Authority (VMCA)
Enable / Disable Single Sign-On...
Read More ⟶
And here are the following topics underneath this objective:
Enable / Configure / Disable services in the ESXi Firewall
Enable Lockdown Mode
Configure Network Security Policies
Add an ESXi host to a directory service
Apply permissions to ESXi hosts using...
Read More ⟶
Objective 1.1: Configure and Administer Role-Based Access Control
Ok so starting off with the first objective here. Underneath are the following topics:
Identify common vCenter Server privileges and roles
Describe how permissions are applied and inherited in...
Read More ⟶