What are the different security options to upgrade the hosts with UM ? (choose 3)
A.
Important
B.
Critical
C.
Moderate
D.
security
E.
general
Explanation:
I didn’t know this one, I answered B, D, E, and the answer is here on page 109
http://pubs.vmware.com/vsphere-50/topic/com.vmware.ICbase/PDF/vsphere-update-manager-50-install-administration-guide.pdfSeverity of the update. For hosts, the severity status might be Critical, General, Security,
and so on. For virtual machines, the severity might be Critical, Important, Moderate, and
so on.
the question is “security”, the answers indicated are for “severity”, two different things entirely
The correct answer should be
Important
Moderate
Critical
In Update Manager go to > Base line (tab) > create base line > [look under the criteria section
You will see these options…
Patch Vendor
Severity
Any
Low
Moderate
Important
Critical
Category
Any
Security
Bugfix
Enhancement
Other
Correct answer is B , D , E – Critical , Security and General
See Page 109 – http://pubs.vmware.com/vsphere-50/topic/com.vmware.ICbase/PDF/vsphere-update-manager-50-install-administration-guide.pdf
Severity Severity of the update. For hosts, the severity status might be Critical, General, Security,and so on. For virtual machines, the severity might be Critical, Important, Moderate, and
so on.
http://pubs.vmware.com/vsphere-50/topic/com.vmware.ICbase/PDF/vsphere-update-manager-50-install-administration-guide.pdf
i think the answer from above link is just given the example
i think Zee is right. the answer should be A,B,C.
according to this article,http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2004397
The available host patch severity values for the Security category is
Critical: Vulnerabilities that can be exploited by an unauthenticated remote attacker or vulnerabilities that break guest/host Operating System isolation. The exploitation results in the compromise of confidentiality, integrity, availability user data, or processing resources without user interaction. Exploitation could be leveraged to propagate an Internet worm or execute arbitrary code between virtual machines and the host.
Important: Vulnerabilities whose exploitation results in the compromise of confidentiality, integrity, or availability of user data and processing resources. Such flaws could allow local users to gain privileges, allow authenticated remote users to execute arbitrary code, or allow local or remote users to easily cause a denial of service.
Moderate: Flaws where the ability to exploit is mitigated to a significant degree by configuration or difficulty of exploitation, but in certain deployment scenarios could still lead to some compromise of the confidentiality, integrity, or availability of user data and processing resources. These are the types of vulnerabilities that could have had a critical impact or important impact but are less easily exploited based on a technical evaluation of the flaw, or affect unlikely configurations.
Low: All other issues that have a security impact. Vulnerabilities where exploitation is believed to be extremely difficult, or where successful exploitation would have minimal impact.