Which two statements are true regarding a new vSphere deployment that is using software FCoE boot from SAN? (Choose two.)

Which two statements are true regarding a new vSphere deployment that is using software FCoE boot from SAN? (Choose two.) 






A. Multi-pathing options must be configured by the vmkernel after boot.
B. The adapter must support iBFT or UEFI.
C. The adapter must support FBFT or FBPT.
D. Multi-pathing options must be configured in the Boot ROM.




Answer: A,C

An administrator has configured multi-pathing using an Fiber Channel array in an active-active configuration. What is the expected behavior of an ESXi host when a failed preferred path becomes available using the Fixed path selection policy for this array type?

An administrator has configured multi-pathing using an Fiber Channel array in an active-active configuration.
What is the expected behavior of an ESXi host when a failed preferred path becomes available using the Fixed path selection policy for this array type? 




A. It automatically reverts to the preferred path.
B. It continues using the current path until it is manually reverted.
C. It resumes load balancing across all available paths.
D. It reverts to the preferred path after the host has been restored and rebooted.







Answer: A

An administrator is creating a new Automated Linked-Clone desktop pool. The administrator has also created a new parent virtual machine and has installed the View Agent. Which additional step must be taken before the desktop is prepared for use in a Linked-Clone pool?

An administrator is creating a new Automated Linked-Clone desktop pool. The administrator has also created a new parent virtual machine and has installed the View Agent.
Which additional step must be taken before the desktop is prepared for use in a Linked-Clone pool?






A. Restart the virtual machine and clone to template.
B. Power off the virtual machine and take a snapshot.
C. Enable provisioning in View Administrator.
D. Enable provisioning in View Composer.







Answer: B

An administrator configures a user with a global entitlement and a global home site, but has not set the scope policy. Which search order will Cloud Pod Architecture use to find a desktop for that user?

An administrator configures a user with a global entitlement and a global home site, but has not set the scope policy.
Which search order will Cloud Pod Architecture use to find a desktop for that user? 







A. Global home site, local pod, local site, other sites
B. Local pod, local site, other sites
C. Local pod, local site, global home site, other sites
D. Global home site, local site, other sites






Answer: A

An administrator has packaged an application with ThinApp but failed to include an important update. What should the administrator do on the capture machine to include the application update in the package?

An administrator has packaged an application with ThinApp but failed to include an important update.
What should the administrator do on the capture machine to include the application update in the package? 






A. Install the update, delete the sandbox, and then use the sbmerge apply command.
B. Delete the sandbox, install the update, and then use the sbmerge apply command.
C. Install the update, delete the sandbox, and then use the appsync command.
D. Delete the sandbox, install the update, and then use the appsync command.






Answer: B

An administrator needs to configure View to support ThinApp applications. Which file location should the administrator choose for the ThinApp repository?

An administrator needs to configure View to support ThinApp applications. Which file location should the administrator choose for the ThinApp repository? 






A. \\10.232.98.55\ThinApps
B. \\filesrv9.domain.local\ThinApps
C. http://websrv7.domain.local/thinapprepo
D. ftp://websrv7.domain.local/thinapprepo







Answer: B

What two prerequisites must be met before View Composer can be installed? (Choose two.)

What two prerequisites must be met before View Composer can be installed? (Choose two.) 







A. No other application on the View Composer server should use Windows SSLv2 libraries.
B. A domain user account with Administrator privileges on the system must be used.
C. No other application on the View Composer server should use OpenSSLv2 libraries.
D. A local user account with Administrator privileges on the system must be used.







Answer: A,B

An application was packaged using ThinApp and access is restricted to an Active Directory group called Customer Services. An administrator needs to remove this restriction. What should the administrator do to remove this restriction with the least effort?

An application was packaged using ThinApp and access is restricted to an Active Directory group called Customer Services. An administrator needs to remove this restriction.
What should the administrator do to remove this restriction with the least effort? 





A. Repackage the application, selecting Everyone from the Setup Capture wizard.
B. Remove the PermittedGroups section from package.ini and execute build.bat.
C. Change PermittedGroups=1 to 0 within package.ini and execute sbmerge.exe.
D. Change PermittedGroups=0 to 1 within package.ini and execute sbmerge.exe.






Answer: B

A View environment consists of a Connection Server named connect-01 and a security server named security-01. An administrator needs to configure RSA SecurID authentication for external users. Internal users must not be prompted for the RSA SecurID token code. What should the administrator do?

A View environment consists of a Connection Server named connect-01 and a security server named security-01.
An administrator needs to configure RSA SecurID authentication for external users. Internal users must not be prompted for the RSA SecurID token code.
What should the administrator do? 






A. Configure 2-factor authentication on the security-01 security server.
B. Configure 2-factor authentication on the connect-01 Connection Server.
C. Add a new Connection Server named connect-02 for internal users. Configure 2-factor authentication on the connect-01 Connection Server.
D. Add a new security server named security-02 for internal users. Configure 2-factor authentication on the security-01 security server.






Answer: C

An administrator is creating a pool of desktops for a group of developers. The administrator needs to provide control to a user from the group to manage the recompose and refresh operations. The user's controls must apply only to the developer pool. What should the administrator do?

An administrator is creating a pool of desktops for a group of developers. The administrator needs to provide control to a user from the group to manage the recompose and refresh operations. The user's controls must apply only to the developer pool.
What should the administrator do? 







A. Create a developer folder, add the developer pool, and assign a user with the Inventory Administrators role to the folder.
B. Create the developer pool and assign the Manage Desktops global privilege to the virtual desktops.
C. Create the developer pool and assign the Inventory Control global privilege to the virtual desktops.
D. Create a developer folder, add the desktops, and assign a user with the Manage Desktops role to the folder.






Answer: A

An administrator is installing RSA SecurID authentication for a View implementation and needs to force the RSA and Active Directory user names to match during authentication. Which option should the administrator select to meet the requirement?

An administrator is installing RSA SecurID authentication for a View implementation and needs to force the RSA and Active Directory user names to match during authentication.
Which option should the administrator select to meet the requirement? 







A. Enforce SecurID and Windows user name matching.
B. Enforce 2-Factor and Windows user name matching.
C. Synchronize SecurID and Windows user name matching.
D. Synchronize 2-Factor and Windows user name matching.





Answer: A

An organization is designing a new vSphere cluster to support a new product implementation. The following challenges have been identified by the vSphere administration team: The organization is willing to upgrade to vSphere Enterprise Plus licensing if it addresses these challenges. Which three features of a version 5.5 vSphere Distributed Switch would address these challenges? (Choose three.)

An organization is designing a new vSphere cluster to support a new product implementation.
The following challenges have been identified by the vSphere administration team:
The organization is willing to upgrade to vSphere Enterprise Plus licensing if it addresses these challenges.
Which three features of a version 5.5 vSphere Distributed Switch would address these challenges? (Choose three.) 








A. LACP in Dynamic Mode
B. Port Mirroring
C. Network vMotion
D. Private VLANs
E. Network I/O Control






Answer: A,B,C

A vSphere administrator needs to add redundancy to an ESXi 5.x management network on a vSphere Standard Switch. Which method should the administrator use to create redundant management networks?

A vSphere administrator needs to add redundancy to an ESXi 5.x management network on a vSphere Standard Switch.
Which method should the administrator use to create redundant management networks? 






A. Configure the management network vSwitch with two active uplinks
B. Configure an additional management portgroup on the same vSwitch
C. Create a second management network on a second vSwitch in the same subnet
D. Create a second management network on the same vSwitch in the same subnet






Answer: A

An administrator has determined that a vSphere Standard Switch is dropping outbound frames from a virtual machine adapter. Upon further investigation, it is determined that the outbound frame is being dropped because the source MAC address differs from the one in the virtual machine configuration file (.vmx). Which security policy should the administrator reconfigure to modify this behavior?

An administrator has determined that a vSphere Standard Switch is dropping outbound frames from a virtual machine adapter. Upon further investigation, it is determined that the outbound frame is being dropped because the source MAC address differs from the one in the virtual machine configuration file (.vmx).
Which security policy should the administrator reconfigure to modify this behavior? 






A. Forged transmit
B. MAC address changes
C. MAC address variation
D. Forged broadcast







Answer: A

An administrator is configuring RADIUS authentication for a View implementation and enters the RADIUS server host name into the View Administrator console. Which additional information must be entered into View Administrator to properly configure RADIUS?

An administrator is configuring RADIUS authentication for a View implementation and enters the RADIUS server host name into the View Administrator console.
Which additional information must be entered into View Administrator to properly configure RADIUS? 






A. Port number, authentication type, and shared secret
B. DNS server, port number, and shared secret
C. Authentication type, shared secret, and public key
D. Public key, authentication type, and shared secret







Answer: A

An administrator needs to replace the default self-signed SSL certificates for all View servers. An internal certification authority (CA) server will be used to issue new SSL certificates. Clients will connect to View virtual desktops using the latest Horizon client on both corporate-owned and staff-owned bring your own device (BYOD) clients. What must the administrator consider to ensure all clients can connect without security warnings or error messages?

An administrator needs to replace the default self-signed SSL certificates for all View servers. An internal certification authority (CA) server will be used to issue new SSL certificates.
Clients will connect to View virtual desktops using the latest Horizon client on both corporate-owned and staff-owned bring your own device (BYOD) clients.
What must the administrator consider to ensure all clients can connect without security warnings or error messages? 







A. Clients must connect to Horizon using the fully qualified domain name (FQDN).
B. All client devices must trust the root CA certificate and any intermediate CA certificates.
C. The new certificate must be added to the certificate revocation list (CRL).
D. All View servers must trust the client SSL certificates for staff-owned BYOD clients.






Answer: B

While backing up users' data, an administrator needs to ensure that users of physical desktops are using the corporate image and application choices. Which VMware component should the administrator choose to meet the requirements?

While backing up users' data, an administrator needs to ensure that users of physical desktops are using the corporate image and application choices.
Which VMware component should the administrator choose to meet the requirements? 







A. VMware Horizon View
B. VMware Workspace
C. VMware ThinApp
D. VMware Mirage








Answer: D

All RDP connections to virtual desktops must use the Horizon Client. Direct RDP connections using alternate clients must be disabled due to security considerations. Which step must be taken to prevent direct RDP connections?

All RDP connections to virtual desktops must use the Horizon Client. Direct RDP connections using alternate clients must be disabled due to security considerations.
Which step must be taken to prevent direct RDP connections? 







A. Select No for the Allow users to choose protocol option and select PCoIP as the default protocol.
B. Apply the AllowDirectRDP GPO to the virtual desktops.
C. Apply the AllowDirectRDP GPO to the Connection Server.
D. Select Yes for the Allow users to choose protocol option and disable RDP access in the global policies.






Answer: B

A View administrator receives reports that users are experiencing degraded performance from their zero clients. After investigating with a network administrator, the administrator notices a lot of network congestion. What should the View administrator ask the network administrator to change?

A View administrator receives reports that users are experiencing degraded performance from their zero clients. After investigating with a network administrator, the administrator notices a lot of network congestion.
What should the View administrator ask the network administrator to change? 








A. Enable Tail-Drop on the routers.
B. Enable WRED on the routers.
C. Enable Network Traffic Analyzer on the Switches.
D. Enable RRED on the routers.







Answer: B

Which GPO settings should be configured to achieve the highest quality for graphics and video with PCoIP desktop connections?

Which GPO settings should be configured to achieve the highest quality for graphics and video with PCoIP desktop connections? 








A. Enable Turn off Build-to-Lossless feature setting.
B. Set Maximum Frame Rate to 15.
C. Disable Turn off Build-to-Lossless feature setting.
D. Set the Configure the PCoIP session bandwidth floor to 1,000Kbps.







Answer: C

An administrator is configuring a group of desktops that will be accessed via the PCoIP display protocol across a WAN link. Which two settings should the administrator apply to minimize bandwidth usage? (Choose two.)

An administrator is configuring a group of desktops that will be accessed via the PCoIP display protocol across a WAN link.
Which two settings should the administrator apply to minimize bandwidth usage? (Choose two.) 






A. Lower the Maximum Frame Rate
B. Raise the Maximum Frame Rate
C. Disable the Turn off Build-to-Lossless feature
D. Enable the Turn off Build-to-Lossless feature







Answer: A,D

An administrator needs to configure Persona Management with a Dedicated Linked Clone Pool. The administrator is aware that users save large files to their user profiles and needs to avoid long load times of the user data. What should the administrator do to enhance performance of Persona Management when loading the user data?

An administrator needs to configure Persona Management with a Dedicated Linked Clone Pool. The administrator is aware that users save large files to their user profiles and needs to avoid long load times of the user data.
What should the administrator do to enhance performance of Persona Management when loading the user data? 






A. Enable the Remove local persona at log off policy.
B. Configure Persistent Disks with Persona Management.
C. Enable View Storage Accelerator.
D. Configure Non-Persistent Disks with Persona Management.







Answer: B

An administrator is creating a shared folder to use as the Profile Repository for Persona Management. Which requirement must be met?

An administrator is creating a shared folder to use as the Profile Repository for Persona Management.
Which requirement must be met? 






A. The shared folder must be in the same Active Directory forest as the users who use the shared folder.
B. The shared folder must be on an FTP server.
C. The shared folder cannot be shared across View Pools.
D. The shared folder must be on a Network Files System (NFS) share.






Answer: A

An administrator needs to provide access to applications for users regardless of whether the users have network access. Which two VMware components should the administrator choose? (Choose two.)

An administrator needs to provide access to applications for users regardless of whether the users have network access.
Which two VMware components should the administrator choose? (Choose two.) 







A. VMware Workspace
B. VMware ThinApp
C. VMware Horizon View
D. VMware Mirage







Answer: B,D

An administrator enables Persona Management for a desktop pool and leaves the universal naming convention (UNC) path blank in the session variable Persona Repository Location. What is the likely outcome?

An administrator enables Persona Management for a desktop pool and leaves the universal naming convention (UNC) path blank in the session variable Persona Repository Location.
What is the likely outcome? 






A. The User Profile will not be created.
B. The User Profile will be created but when users log on again their files will not be available.
C. The User Profile Path in Active Directory will be used.
D. The User Profile Path will default to the local My Documents.






Answer: C

An administrator needs to backup the View LDAP Configuration and View Composer database. What are three ways this can be accomplished? (Choose three.)

An administrator needs to backup the View LDAP Configuration and View Composer database.
What are three ways this can be accomplished? (Choose three.) 






A. Schedule automatic backups by using the View Manager Configuration Backup feature.
B. Initiate a backup immediately by using the Backup Now feature in View Administrator.
C. Use a replicated instance of View Connection Server as the backup.
D. Take a snapshot of the View Connection server.
E. Manually export the View data by using the vdmexport utility.







Answer: A,B,E

A database administrator needs to configure Microsoft SQL Server Express for the View Events Database. Which two steps must the database administrator complete? (Choose two.)

A database administrator needs to configure Microsoft SQL Server Express for the View Events Database.
Which two steps must the database administrator complete? (Choose two.) 






A. Enable Windows Authentication for the user on the database.
B. Enable SQL Server Authentication for the user on the database.
C. Determine the port number that is used to access the database server.
D. Set up the Events database tables.






Answer: B,C

An administrator in a large organization needs to delegate authority to manage a group of desktops to another administrator at a remote site. The desktops have been placed in a folder in View Administrator so that a user can be assigned to manage those desktops only. The remote site administrator must be able to: What is the most restrictive predefined role that can be assigned to meet these requirements?

An administrator in a large organization needs to delegate authority to manage a group of desktops to another administrator at a remote site. The desktops have been placed in a folder in View Administrator so that a user can be assigned to manage those desktops only.
The remote site administrator must be able to:
What is the most restrictive predefined role that can be assigned to meet these requirements? 






A. Administrators
B. Agent Registration Administrators
C. Global Configuration and Policy Administrators
D. Inventory Administrators








Answer: D

A View environment includes a View Connection Server and View Security Server. The View Connection Server has the following configuration: The View Security Server has the following configuration: An administrator needs to set up View to allow external access for users via PCoIP. Which option represents the format in which information must be entered into the PCoIP External URL field in View Administrator?

A View environment includes a View Connection Server and View Security Server.
The View Connection Server has the following configuration:
The View Security Server has the following configuration:
An administrator needs to set up View to allow external access for users via PCoIP.
Which option represents the format in which information must be entered into the PCoIP External URL field in View Administrator? 







A. https://security.company.com:443
B. https://10.10.10.1:4172
C. 10.10.10.1:4172
D. security.company.com:4172






Answer: C

An administrator creates a new pool of dedicated linked-clone desktops. The desktops are powered off every night and need to be powered on each morning at the start of the shift. Users report that it takes too long to login to their desktops. What should the administrator do to decrease the boot time of the linked-clone desktops?

An administrator creates a new pool of dedicated linked-clone desktops. The desktops are powered off every night and need to be powered on each morning at the start of the shift. Users report that it takes too long to login to their desktops.
What should the administrator do to decrease the boot time of the linked-clone desktops? 







A. Add a persistent disk to the desktop.
B. Enable View Storage Accelerator in the Connection Server settings.
C. Enable View Storage Accelerator in the desktop pool settings.
D. Convert the desktops to full clones.






Answer: C

An administrator needs to add Location-Based Printing to five virtual desktops. Which two steps must the administrator take to accomplish this task? (Choose two.)

An administrator needs to add Location-Based Printing to five virtual desktops.
Which two steps must the administrator take to accomplish this task? (Choose two.) 







A. Create a GPO containing the AutoConnect Map Additional Printers for VMware View group policy setting.
B. Create a GPO containing the Enable Printer Location Tracking for VMware View group policy setting.
C. Add the computer names of the desktops using Security Filtering.
D. Add the MAC addresses of the desktops using Security Filtering.








Answer: A,C

An administrator needs to set up an environment that will allow administrators to access virtual desktops as needed and reset the desktop state when users logoff. Additionally, administrators need to be able to manage physical desktops from one interface. Which component should the administrator use to meet the requirements?

An administrator needs to set up an environment that will allow administrators to access virtual desktops as needed and reset the desktop state when users logoff. Additionally, administrators need to be able to manage physical desktops from one interface.
Which component should the administrator use to meet the requirements? 







A. View
B. Mirage
C. ThinApp
D. Desktop







Answer: A

An administrator has installed an instance of View Composer on a standalone server and needs to add a new vCenter Server to the View environment. What should the administrator do to enable the use of View Composer with the new vCenter Server?

An administrator has installed an instance of View Composer on a standalone server and needs to add a new vCenter Server to the View environment.
What should the administrator do to enable the use of View Composer with the new vCenter Server? 






A. Install a new instance of View Composer to use with the new vCenter Server.
B. Configure the new vCenter Server to use the current standalone View Composer server.
C. Create a new organizational unit in Active Directory for linked clone desktops created on the new vCenter Server.
D. Add a user account to the new vCenter Server with permission to use the current standalone View Composer server.







Answer: A

An administrator needs an Active Directory service account to use for Quickprep. The organization's policies do not allow the service account to create new computer accounts in Active Directory. Pre- existing computer accounts must be reused. Which three Active Directory permissions are required for the service account? (Choose three.)

An administrator needs an Active Directory service account to use for Quickprep. The organization's policies do not allow the service account to create new computer accounts in Active Directory. Pre- existing computer accounts must be reused.
Which three Active Directory permissions are required for the service account? (Choose three.) 






A. List Contents
B. Read All Properties
C. Delete Computer Object
D. Reset Password
E. Write All Properties






Answer: A,B,D

An administrator finds that some desktop pools fail to report metrics back to vCenter Operations Manager for Horizon, while other desktops are reporting metrics as expected. Which condition could cause this behavior?

An administrator finds that some desktop pools fail to report metrics back to vCenter Operations Manager for Horizon, while other desktops are reporting metrics as expected.
Which condition could cause this behavior? 






A. The vCenter Operations Manager for Horizon server is not paired with a View Connection server.
B. The vCenter Operations Manager for Horizon adapter is running version 1.0.1.
C. HKLM\SOFTWARE\VMware, Inc.\vCenter Operations Manager\Client is disabled.
D. The vCenter Operations Manager agent is disabled in the virtual desktops.







Answer: D

An administrator is upgrading a vSphere Distributed Switch. The existing switch is version 5.0 and the administrator wants to upgrade to the latest version possible. The environment contains several ESXi 5.1 hosts. Which two options are available to ensure that the upgraded switch will be compatible with these hosts? (Choose two.)

An administrator is upgrading a vSphere Distributed Switch. The existing switch is version 5.0 and the administrator wants to upgrade to the latest version possible. The environment contains several ESXi 5.1 hosts.
Which two options are available to ensure that the upgraded switch will be compatible with these hosts? (Choose two.) 





A. Upgrade the vSphere Distributed Switch to 5.5
B. Upgrade the ESXi 5.1 hosts to version 5.5, then upgrade the vSphere Distributed Switch to 5.5
C. Upgrade the vSphere Distributed Switch to 5.1
D. Upgrade the ESXi host switches to 5.5, then upgrade the vSphere Distributed Switch to 5.5






Answer: B,C

As part of a multisite Single Sign-On (SSO) deployment what two steps are required to ensure that a change to one Single Sign-On instance is propagated to the other instances? (Choose two.)

As part of a multisite Single Sign-On (SSO) deployment what two steps are required to ensure that a change to one Single Sign-On instance is propagated to the other instances? (Choose two.) 






A. Schedule a Replication Task on the primary instance
B. Select the first instance during the installation of subsequent instances
C. During the installation of each instance choose Linked-Mode
D. Enable Synchronize to Active Directory on each instance







Answer: A,C

During the installation of ESXi 5.5, the following error message is reported: Hardware Virtualization is not a feature of the CPU, or is not enabled in the BIOS. Which condition would generate this message?

During the installation of ESXi 5.5, the following error message is reported:
Hardware Virtualization is not a feature of the CPU, or is not enabled in the BIOS.
Which condition would generate this message? 






A. LAHF/SAHA is not enabled in the BIOS.
B. NX/XD is not enabled in the BIOS.
C. SSE3 is not enabled in the BIOS.
D. Hyperthreading is not enabled in the BIOS.





Answer: A

An administrator is configuring the View Connection Broker Agent. The Adapter instance is properly configured within vCenter Operations Manager for Horizon. When the administrator clicks on the Test button to pair the server, the test fails. IP address and name resolution are validated and working for both servers. What should the administrator do to verify connectivity between both servers?

An administrator is configuring the View Connection Broker Agent. The Adapter instance is properly configured within vCenter Operations Manager for Horizon. When the administrator clicks on the Test button to pair the server, the test fails. IP address and name resolution are validated and working for both servers.
What should the administrator do to verify connectivity between both servers? 






A. Verify that a proper Fully-Qualified Domain Name exists for the vCenter Operations for Horizon servers.
B. Verify that the certificate on the vCenter Operations for Horizon server is recognized by the View server.
C. Login with a domain admin instead of a local account on the View server.
D. Verify that the proper port is open between vCenter Operations for Horizon and the View server.






Answer: D

An administrator is setting up a new vSphere environment for application development with health monitoring and capacity management. The administrator has purchased three servers for the initial install. The administrator is not planning to grow the environment and needs to keep costs as low as possible. Which vSphere kit should the administrator use to meet these requirements?

An administrator is setting up a new vSphere environment for application development with health monitoring and capacity management. The administrator has purchased three servers for the initial install. The administrator is not planning to grow the environment and needs to keep costs as low as possible.
Which vSphere kit should the administrator use to meet these requirements? 







A. vSphere Essentials Kit
B. vSphere Essentials Plus Kit
C. vSphere with Operations Management Standard Acceleration Kit
D. vSphere with Operations Management Enterprise Acceleration Kit







Answer: C

A system administrator needs to control the allocation of memory and CPU resources to an organization's Finance team. The vSphere environment is built on a single cluster of ESXi hosts. Which feature can be used to accomplish this task?

A system administrator needs to control the allocation of memory and CPU resources to an organization's Finance team. The vSphere environment is built on a single cluster of ESXi hosts.
Which feature can be used to accomplish this task? 






A. Resource Pool Reservations
B. DRS set to Fully Automated
C. Virtual Machine Shares
D. DRS Virtual Machine Groups








Answer: A

A vCenter Operations Manager environment has been running for a few weeks. The administrator needs to add the vCenter Operations Manager for Horizon instance to connect to the View environment. Where should the administrator go in the vCenter Operations Manager Web UI to achieve this?

A vCenter Operations Manager environment has been running for a few weeks. The administrator needs to add the vCenter Operations Manager for Horizon instance to connect to the View environment.
Where should the administrator go in the vCenter Operations Manager Web UI to achieve this? 






A. Environment > VDI Environment > Adapter Instance
B. Environment > All Objects > Adapter Instance
C. Administration > Solutions > Add Solutions
D. Administration > Global Settings > Add Solutions







Answer: C

What should the administrator do first when configuring vCenter Operations Manager for Horizon to monitor their View deployment?

What should the administrator do first when configuring vCenter Operations Manager for Horizon to monitor their View deployment? 







A. Add Adapter from the View Configuration > Servers page in View
B. Add Adapter from the Custom Dashboard page > Configuration in vCenter Operations Manager
C. Configure the Adapter from the Administration > Solutions page in vCenter Operations Manager
D. Configure the Adapter from the View Configuration > Global Settings page in View






Answer: C

An administrator needs to modify a virtual machine alert to increase the threshold value of the trigger. Once connected to the vCenter Server, the administrator navigates to the virtual machine to make the change. However, the administrator is unable to edit the alarm. What is the reason that this alarm cannot be edited?

An administrator needs to modify a virtual machine alert to increase the threshold value of the trigger. Once connected to the vCenter Server, the administrator navigates to the virtual machine to make the change. However, the administrator is unable to edit the alarm.
What is the reason that this alarm cannot be edited? 





A. The alarm was not defined on this inventory object.
B. The administrator is not the owner of this inventory object.
C. The alarm was not created by the administrator.
D. The alarm has not been acknowledged.







Answer: A

An administrator has a list of users who should not have access to Workspace Portal services. Some users need access to other services using their directory services account. Other users no longer need access to any services on the corporate network. Which two steps should the administrator take to restrict access to Workspace Portal services? (Choose two.)

An administrator has a list of users who should not have access to Workspace Portal services. Some users need access to other services using their directory services account. Other users no longer need access to any services on the corporate network.
Which two steps should the administrator take to restrict access to Workspace Portal services? (Choose two.) 







A. Disable or delete the account in Active Directory for those accounts that no longer need access to Workspace Portal.
B. Disable the Virtual Users feature in the Class of Service (CoS).
C. connector that filter out existing users who no longer need access to Workspace Portal.
D. Disable or delete the account in Active Directory for those accounts that no longer need access to any corporate network services.






Answer: C,D

An administrator has provisioned a web application to a group of users. Users have reported that the application is not visible in the Applications tab when the user launches Workspace Portal. Which steps must the administrator take to ensure the application is entitled properly?

An administrator has provisioned a web application to a group of users. Users have reported that the application is not visible in the Applications tab when the user launches Workspace Portal.
Which steps must the administrator take to ensure the application is entitled properly? 







A. ?Verify that the application is SAML-enabled.?Verify that the application is entitled to a directory service-based Workspace Portal group or user.
B. ?Verify that the application is set to Automatic.?Verify that the application is entitled to a directory service-based Workspace Portal group or user.
C. ?Verify that the application is set to User-Activated.?Verify that the application is entitled to a local Workspace Portal group or user.
D. ?Verify that the Workspace Portal client is installed on the endpoint.?Verify that the application is entitled to a local Workspace Portal group or user.







Answer: B