Which two steps should be taken to mitigate security risks associated with this configuration?
A common root user account has been configured for a group of ESXi 6.x hosts. Which two steps should be taken to mitigate security risks associated with this configuration? (Choose two.) A. Remove the root user account from the ESXi…