A company's IT security policy requires that all network traffic must be secure, and no web browser certificate error warnings should be accepted by end users.
An administrator is tasked with configuring Objects so that it uses a certificate from an internal Certificate Authority (CA).
How should the administrator configure Objects to meet the security policy?
In a healthy shared cluster, what behaviour is expected of the FSVMs when a host fails?
An administrator has deployed a new Files cluster within a Windows environment.
After some days, the Files environment is not able to synchronize users with the Active Directory server anymore. The administrator observes a large time difference between the Files environment and the Active Directory server that is responsible for the behavior.How should the administrator prevent the Files environment and the AD Server from having such a time difference in future?
An administrator installed a new Log Analyzer which collects data from physical endpoints Data collected needs to be accessible and editable for three years after which the data must be deleted to optimize storage consumption Which setting should the administrator apply to meet these requirements?
The solution must meet the following criteria:
* Data is available even if one of the CVMs is down * There will be 5 Exchange databases, one per VM
* Must support a lot of random write activity
* Guest OS re-configuration must not be needed in case of CVM outages
* Must be possible to replicate all Exchange VMs and data to a DR data center Which product and configuration meets the requirements?