What happens when you apply a session timeout policy in VMware Privileged Access Management?
AIt logs users out immediately.
BIt temporarily suspends active sessions.
CIt prompts for reauthentication after inactivity.
DIt disables password complexity requirements.
Explanation
A session timeout policy prompts for reauthentication to ensure security, while the other options misrepresent session behavior.
Q82
Which service in VMware allows secure delegation of administrative tasks?
AVMware vRealize Automation
BVMware Privileged Access Management
CVMware Cloud Foundation
DVMware NSX
Explanation
VMware Privileged Access Management enables secure delegation of admin tasks; the others focus on different areas of management and orchestration.
Q83
A company needs to provide temporary access to a contractor for specific actions within the virtual environment. What should they implement?
APermanent user credentials
BTemporary access roles
CDefault admin role
DOnline help access
Explanation
Temporary access roles ensure limited and safe access, while permanent credentials and default roles may give excessive permissions.
Q84
You are configuring role-based access in VMware, and a user reports they can still access denied resources. What could be a possible cause?
AUser group policy settings
BRole hierarchy issue
CExpired access token
DIncorrect system time
Explanation
A role hierarchy issue may allow escalated access, while user group settings and token expiration are unlikely causes for continuous access.
Q85
Which service in VMware enables secure access to privileged accounts?
AVMware Privileged Access Management
BVMware Horizon Cloud
CVMware vCenter Server
DVMware Site Recovery Manager
Explanation
VMware Privileged Access Management is designed specifically for secure access to privileged accounts and managing credentials.
Q86
A company needs to enforce password change policies for user accounts. What should they implement?
ASingle Sign-On (SSO) only
BJust view-only access rights
CPassword Protection Policies
DCentralized Logging
Explanation
Password Protection Policies enforce rules for password complexity and change frequencies, enhancing security.
Q87
You are configuring role-based access control. What is the importance of role inheritance?
AForcing users to change passwords
BSimplifying role management
CTo limit every user's access
DAdding additional security layers
Explanation
Role inheritance simplifies management by allowing roles to share permissions without duplication, enhancing organizational efficiency.
Q88
Which service is used for secure, privileged access to VMs?
AVMware Privileged Access Management
BVMware Horizon Cloud
CVMware vSphere License Manager
DVMware Cloud on AWS
Explanation
VMware Privileged Access Management provides secure access; others do not focus on privileged access.
Q89
A company needs enhanced security controls over privileged accounts. What should they implement?
AMulti-Factor Authentication
BLightweight Directory Access Protocol
CStatic Passwords
DSingle Sign-On
Explanation
Multi-Factor Authentication greatly increases security; others do not enhance privileged account control significantly.
Q90
You are configuring a session timeout for a privileged session. What is an appropriate value to minimize risk?
A15 minutes
B1 hour
C24 hours
DNever timeout
Explanation
15 minutes is typically secure; longer timeouts increase risk, while 'Never timeout' is very insecure.