Which two steps should be taken to mitigate security risks associated with this configuration?
A common root user account has been configured for a group of ESXi 6.x hosts. Which two steps should be taken to mitigate security risks associated with this configuration? (Choose two.)A . Remove the...