An administrator needs to configure VMs in an in-guest cluster running on a vSphere
environment. This configuration is for a critical database workload in a demilitarized zone.
The company's Risk Management department requires that data traffic not be exposed to
other types of traffic. What should the administrator do to comply with the Risk Management department's
requirements?
Currently there are no comments in this discussion, be the first to comment!