Which three actions would satisfy these requirements?
A customer has requested a vSphere 6.5 deployment design that utilizes vCenter Server and the use of vMware-recommended best practices for securing vCenter Server. Which three actions would satisfy these requirements? (Choose three.)A . Utlizing vSphere CLI and vSphere SDK for Perl scripts.B . Restricting vCerter Server access to only...