An administrator has been instructed to secure existing virtual machines in vCenter Server.
Which two actions should the administrator take to secure these virtual machines? (Choose two.)
Disable native remote management services
Restrict Remote Console access
Use Independent Non-Persistent virtual disks
Prevent use of Independent Non-Persistent virtual disks
WEB-1.pdf (page 11, see the tables)