VMware Certified Professional - Data Center Virtualization (VCP-DCV) Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the VMware Certified Professional - Data Center Virtualization exam with our quiz. Use flashcards and multiple-choice questions to review key concepts. Start mastering the exam content today!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which steps should be taken to mitigate security risks of a shared root account on ESXi hosts?

  1. Remove the root user account entirely.

  2. Set a complex password for the root account.

  3. Use ESXi Active Directory for user roles.

  4. Both B and C

The correct answer is: Both B and C

Mitigating security risks associated with a shared root account on ESXi hosts primarily revolves around using best practices for account management and password security. Utilizing a complex password for the root account is essential because it enhances the security perimeter by making unauthorized access considerably more difficult. A complex password typically consists of a mix of upper and lower-case letters, numbers, and special characters, minimizing the risk of brute force attacks. Using ESXi Active Directory for user roles further strengthens security by integrating ESXi host management with your existing Active Directory infrastructure. By managing user access through Active Directory, administrators can assign granular permissions based on specific user roles rather than relying on a shared root account. This approach allows for more precise control over who can access the system and what actions they can perform. Combining these two methods—setting a complex password for the root account and utilizing ESXi Active Directory—creates a more secure environment to mitigate the risks associated with the shared root account. Together, they promote proper user management, reduce the chances of unauthorized access, and make auditing user activities more manageable.