Probably B makes sense since if the vCenter VM stays on any host planned for VCF management, there’s a risk of circular dependency and deployment failure. That’s a key design issue to document before building out a new VCF fleet from an existing environment. Not totally sure if configs always force this, but it's the safest choice here. Agree?
Seems like B could actually help too if the hosts are in a LACP-enabled switch environment. Enabling EtherChannel (B) might improve uplink resilience in some setups, right? I think A and B, but I could be missing a deeper vCenter-specific nuance here.
That reads like a requirement to me - "must be encrypted" is what the solution has to deliver, not how it's done (would be a constraint if it said "must use X method"). So C fits best here I think. Open if anyone sees it differently!
I'd actually pick B here, since saying all VMs must be encrypted feels like it sets a design limitation that can't be moved around, making it a constraint. Not totally sure though, could be mixing up the terms.
I see why a lot of people go for E instead of B, since remediation feels proactive and thorough. But I'd pick A, E, D because the drift check plus automatic remediation sounds like it would actually handle config changes every 30 days. Not sure if I'm missing a subtle point with "identify" vs "remediate." Maybe someone can confirm?
Yeah, D and E make sense here because they're both focused on security standards at the logical level. Specifying SHA-2 for certs (D) directly addresses cryptographic policy, and E is about trust management processes between NSX managers. Pretty sure that's what the question wants since A/B/C are more about implementation. Agree?
Yeah it's D and E. Both map directly to policy compliance at the logical design level, like using SHA-2 certs and having a solid cert management process. The rest are more about implementation or sizing, not high-level security standards. Pretty sure on this but let me know if you see it differently.
I see why D and E fit, since they're about security standards at the logical design layer. Using SHA-2 for certs and keeping thumbprints updated both map to compliance requirements. Not 100% confident if B could sneak in but these seem strongest. Disagree?
This is the kind of thing that always gets vague on VMware questions. It's gotta be A since 'best end-user experience' is all about business value, not tech specs or SLAs. Pretty sure that's what they're after even though in real life the line blurs a lot. Agree?
So for this kind of question, do you guys think B could ever be considered a business requirement if the migration is critical to the business operation? Or always technical unless it’s tied to an outcome?