Wednesday, January 30, 2019

Time for the New 2019 VCP Certifications - VMware Certification Exams

We are now beginning to roll out our new VCPs for 2019. Since it’s a new change in terms of naming and timing, I want to provide more clarification on how it all works and what you can expect.

With the year designator on every certification, it becomes clearer when you earned a certification and how current your expertise is within that certification track. The certification you earn depends on when you complete the requirements. If you meet all the requirements in 2019 (starting on January 16), you’ll earn the 2019 certification. If you finish it in 2020, you’ll earn the 2020 certification, and so on.

For each certification, there are exam requirements. When the certification launches, the most recent exam will still be available since it represents a current solution (although with a different exam code so our system will map it to the new certification). Then, based on product updates, available resources, and the timing of product releases, one or more new exams will be released. Any of the available exams count towards the certification, as they represent current solutions.

For example, the new VCP-DCV 2019 will include the choice of:


  • the current exam based on vSphere 6.5 (with the new exam code)
  • or the new exam based on vSphere 6.7, available on or before January 24


Here are the exam plans for each VCP certification for 2019:



And to ensure we are always certifying on current solutions, we will retire exams as we introduce new versions. The current policy is that we retire exams four months after a new version is released (subject to change).

For those who have earned one of the two previous versions of the certification (see policy here), upgrade paths will be straight-forward. Choose one of:


  • Passing the new exam
  • Passing a smaller Delta exam, when available
  • Other options, which will be added as they are released, with the goal of making it simpler to upgrade



I hope this helps clarify some of the new standards for our annual certification releases. We will also be posting FAQs on our website to help answer other questions as they come up. Post any questions you may have here, and I will answer and/or create a FAQ for it!

Success Secrets: How you can Pass VMware Certification Exams in first attempt 



Thursday, January 17, 2019

Exfiltrating User Data from Mobile Devices – What Cybercriminals Look For


We focus on the techniques used to exploit mobile devices’ vulnerabilities and offer how organizations can potentially prevent these type of attacks.

Outdated OS exploit – the most widely-used attack at the device-level


Researchers discover vulnerabilities in operating systems on a regular basis. When that happens, mobile device operating system manufacturers such as Apple and Google quickly develop and release security patches to be deployed to users through OS updates. Once updated, vulnerabilities detected in previous versions of the operating system are typically publicly disclosed.

In October 2018, the Pradeo Lab observed that 90% of Android devices and 50% of iOS devices used in the workplace (BYOD and COPE) run outdated OS versions. Most mobile users don’t install updates as soon as they are available, potentially causing their mobile device to be more prone to a malicious attack and endangering the data that lives or is processed on the mobile device. Cybercriminals target outdated devices to exploit their disclosed vulnerabilities. This type of attack can lead to system takeover and major data breach as it provides perpetrators with extended rights into the mobile device, enabling them to steal and tamper with data, to perform denial of service, and more.

Setting modification – not as innocuous as we may think


Mobile devices are typically set up to ensure basic protection for users. By default, some functionality, such as the installation of untrusted certificates or the modification of host files, are disabled to ensure that malicious content isn’t accessed. However, in order to extend their rights, some users change their device default settings, thus exposing their data to the threats potentially featured by untrusted websites and applications. This ultimately increases their device’s exposure to Man-In-The-Middle attacks.

Root / Jailbreak exploit – found the most in IT staff


6% of IT employees use a rooted or jailbroken device, compared to only 0.1% in other services. By deeply modifying their smartphones’ OS in order to benefit from extra features, these users expose their devices to malicious and intrusive applications. 75.1% of mobile apps automatically check the root / jailbreak status of devices to execute specific commands. This practice weakens a device’s resistance to attacks and puts personal and corporate data at risk.

Pradeo Security and VMware Workspace ONE – help prevent app, network and device-level attacks


Pradeo Security leverages Artificial Intelligence principles such as machine learning and deep learning to enable its engine with the most precise mobile threat detection. Relying on these capabilities, Pradeo Security Mobile Threat Defense accurately identifies known, unknown and advanced mobile threats operating at the application, the network and the device-level, defending against threats before they do any harm. Once activated through, Pradeo Security provides fast, appropriate and proactive threat management directly from the VMware Unified Endpoint Management (UEM) console.

Success Secrets: How you can Pass VMware Certification Exams in first attempt


Monday, January 7, 2019

VMware Certification Exam BrainDumps - VMware VCE Practice Test


The VMware vSAN 2017 Specialist Paractice Exam


Question 1

Which services for vSAN are provided by NexentaConnect?

A: Encryption and key management
B: Apache and JavaScript
C: NFS and SMB
D: iSCSI and FC

Correct Answer: C

Question 2

The following are the configuration details for a 10-node all-flash vSAN cluster:
All hosts contain one vSAN disk group.
Each disk group has 400GB for the cache tier and 1600GB for the capacity tier.
A host in the cluster is placed into maintenance mode. The maintenance mode option selected is "Ensure data accessibility from other hosts".
How much is the vSAN datastore raw capacity reduced while the host is in maintenance mode?

A: 1600GB
B: 400GB
C: 0GB
D: 2000GB

Correct Answer: A

Question 3

Which are two characteristics of a RAID-5 storage configuration? (Choose two.)

A: Data remain available with the loss to two storage devices.
B: It uses less storage capacity than mirroring with the same level of availability.
C: Data is striped across multiple storage devices.
D: It requires a minimum of five storage devices.

Correct Answer: BC

Question 4

Which three statements are true regarding vSAN networking requirements? (Choose three.)

A: Each host must have minimum bandwidth dedicated to vSAN:
Dedicated 1 Gbps for hybrid configurations.
Dedicated or shared 10 Gbps for all-flash configurations.
B: vSAN supports both IPv4 and IPv6.
C: Each host on the vSAN cluster must have a VMkernel network adapter with vSAN traffic enabled.
D: Each host in a vSAN cluster must use NIC teaming with NetFlow enabled.
E: The vSAN port group must have Promiscuous Mode emabled.

Correct Answer: ABC

Question 5

Which two vSAN configurations require the use of a witness appliance? (Choose two.)

A: two-node configuration
B: all-flash configuration
C: stretched cluster configuration
D: hybrid configuration

Correct Answer: AC

Question 6

When implementing vSAN stretched clusters, bandwidth requirements between the preferred and secondary sites are determined by which factors?

A: Total number of read operations and block size
B: Total number of components and block size
C: Total number of write operations and block size
D: Total number of read operations, total number of write operations and block size

Correct Answer: C

Question 7

Which two statements are true about the vSAN health and performance services? (Choose two.)

A: The vSAN performance service must be enabled before the vSAN health service.
B: The vSAN health service is enabled by default.
C: The vSAN health service is disabled by default.
D: The vSAN performance service is disabled by default.

Correct Answer: BD

Question 8

What are two ways that the storage policies can be allied? (Choose two.)

A: Execute a PowerCLI script
B: Right-click a virtual machine in the vSphere Web Client
C: Run the "esxcli vsan storage tag add" command
D: Select the vSAN datastore and click "Apply Storage Policy"

Correct Answer: AD

Question 9

Which statement is true regarding vSAN and vSphere high availability (HA) interoperability?

A: The vSAN datastore must be configured as the heartbeat datastore for vSphere HA.
B: vSphere HA must be disabled before enabling vSAN.
C: vSphere HA host isolation must be set to disabled.
D: The vSphere HA heartbeat object can only be assigned the default datastore storage policy.

Correct Answer: B

Question 10

What is the maximum supported latency between the preferred and secondary sites in a vSAN stretched cluster configuration?

A: 5 milliseconds round trip time
B: 10 milliseconds round trip time
C: 2.5 milliseconds round trip time
D: 200 milliseconds round trip time

Correct Answer: A


Success Secrets: How you can Pass VMware vSAN Certification Exam in first attempt



VMware Helps Healthcare Organizations Harness Digital Innovations to Improve Delivery of Patient Care

Today at the 2019 HIMSS Conference & Exhibition, VMware (NYSE: VMW) highlighted several customers who are partnering with the compa...