What are the different security options” to upgrade the hosts with UM ?

What are the different security options" to upgrade the hosts with UM ? (choose 3)

What are the different security options to upgrade the hosts with UM ? (choose 3)

A.
Important

B.
Critical

C.
Moderate

D.
security

E.
general

Explanation:
I didn’t know this one, I answered B, D, E, and the answer is here on page 109
http://pubs.vmware.com/vsphere-50/topic/com.vmware.ICbase/PDF/vsphere-update-manager-50-install-administration-guide.pdf

Severity of the update. For hosts, the severity status might be Critical, General, Security,
and so on. For virtual machines, the severity might be Critical, Important, Moderate, and
so on.



Leave a Reply 4

Your email address will not be published. Required fields are marked *


Ed Davis

Ed Davis

the question is “security”, the answers indicated are for “severity”, two different things entirely

Zee

Zee

The correct answer should be

Important
Moderate
Critical

In Update Manager go to > Base line (tab) > create base line > [look under the criteria section
You will see these options…

Patch Vendor
Severity
Any
Low
Moderate
Important
Critical
Category
Any
Security
Bugfix
Enhancement
Other

kopigao

kopigao

http://pubs.vmware.com/vsphere-50/topic/com.vmware.ICbase/PDF/vsphere-update-manager-50-install-administration-guide.pdf
i think the answer from above link is just given the example

i think Zee is right. the answer should be A,B,C.

according to this article,http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2004397

The available host patch severity values for the Security category is

Critical: Vulnerabilities that can be exploited by an unauthenticated remote attacker or vulnerabilities that break guest/host Operating System isolation. The exploitation results in the compromise of confidentiality, integrity, availability user data, or processing resources without user interaction. Exploitation could be leveraged to propagate an Internet worm or execute arbitrary code between virtual machines and the host.

Important: Vulnerabilities whose exploitation results in the compromise of confidentiality, integrity, or availability of user data and processing resources. Such flaws could allow local users to gain privileges, allow authenticated remote users to execute arbitrary code, or allow local or remote users to easily cause a denial of service.

Moderate: Flaws where the ability to exploit is mitigated to a significant degree by configuration or difficulty of exploitation, but in certain deployment scenarios could still lead to some compromise of the confidentiality, integrity, or availability of user data and processing resources. These are the types of vulnerabilities that could have had a critical impact or important impact but are less easily exploited based on a technical evaluation of the flaw, or affect unlikely configurations.

Low: All other issues that have a security impact. Vulnerabilities where exploitation is believed to be extremely difficult, or where successful exploitation would have minimal impact.