• Online, Self-Paced
Course Description

In this challenge, you will manage datastores by using tags and storage policies. First, you will create categories and tags, and then you will assign them to virtual machines. Next, you will assign tags to datastores, and then you will create a storage policy to manage the placement of your virtual machines. Finally, you will ensure that your virtual machine storage complies with your storage policy. Note: Once you begin the challenge, you will not be able to pause, save, or exit and then return to your challenge. Please ensure that you have set aside enough time to complete the challenge before you start.

Learning Objectives

In this challenge, you will manage datastores by using tags and storage policies. First, you will create categories and tags, and then you will assign them to virtual machines. Next, you will assign tags to datastores, and then you will create a storage policy to manage the placement of your virtual machines. Finally, you will ensure that your virtual machine storage complies with your storage policy. Note: Once you begin the challenge, you will not be able to pause, save, or exit and then return to your challenge. Please ensure that you have set aside enough time to complete the challenge before you start.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.