READ Free Dumps For VMware- 2V0-622
Question ID 20057 | Which two encryption keys does the host use when encrypting virtual machine files? (Choose two.)
|
Option A | Public Key Infrastructure Encryption Key (PKI)
|
Option B | Master Encryption Key (MEK)
|
Option C | Data Encryption Key (DEK)
|
Option D | Key Encryption Key (KEK)
|
Correct Answer | C,D |
Explanation The ESXi host generates and uses internal keys to encrypt virtual machines and disks. These keys are used as the disk encryption key (DEK) and are XTS-AES 256 keys. â– The key management server (KMS) sends keys to the vCenter Server upon request. These keys are used as the key encryption key (KEK) and are AES-256 keys. vCenter Server stores only the ID of each KEK, but not the key itself. â– ESXi hosts use the KEK to encrypt their internal keys, and store only the encrypted internal keys on disk, but not the KEK itself. When an ESXi host reboots, vCenter Server requests the necessary KEKs by sending the corresponding IDs to the KMS, and upon receipt, make the KEKs available to the ESXi host, which can then decrypt its internal keys as needed.
Question ID 20058 | An administrator wants to upgrade ESXi 5.5 hosts to ESXi 6.5 using Update Manager. When performing a scan for baseline compliance, the host's status is marked
Compliant.
Which has happened?
|
Option A | Host must be version 6.0 in order to upgrade to 6.5.
|
Option B | Host has some third-party software installed.
|
Option C | Host has no upgrade baseline attached.
|
Option D | Host hardware is not supported for upgrade.
|
Correct Answer | C |
Explanation