Showing posts with label VMware. Show all posts
Showing posts with label VMware. Show all posts

Which two statements are true regarding a new vSphere deployment that is using software FCoE boot from SAN? (Choose two.)

Which two statements are true regarding a new vSphere deployment that is using software FCoE boot from SAN? (Choose two.) 






A. Multi-pathing options must be configured by the vmkernel after boot.
B. The adapter must support iBFT or UEFI.
C. The adapter must support FBFT or FBPT.
D. Multi-pathing options must be configured in the Boot ROM.




Answer: A,C

An administrator has configured multi-pathing using an Fiber Channel array in an active-active configuration. What is the expected behavior of an ESXi host when a failed preferred path becomes available using the Fixed path selection policy for this array type?

An administrator has configured multi-pathing using an Fiber Channel array in an active-active configuration.
What is the expected behavior of an ESXi host when a failed preferred path becomes available using the Fixed path selection policy for this array type? 




A. It automatically reverts to the preferred path.
B. It continues using the current path until it is manually reverted.
C. It resumes load balancing across all available paths.
D. It reverts to the preferred path after the host has been restored and rebooted.







Answer: A

An administrator is creating a new Automated Linked-Clone desktop pool. The administrator has also created a new parent virtual machine and has installed the View Agent. Which additional step must be taken before the desktop is prepared for use in a Linked-Clone pool?

An administrator is creating a new Automated Linked-Clone desktop pool. The administrator has also created a new parent virtual machine and has installed the View Agent.
Which additional step must be taken before the desktop is prepared for use in a Linked-Clone pool?






A. Restart the virtual machine and clone to template.
B. Power off the virtual machine and take a snapshot.
C. Enable provisioning in View Administrator.
D. Enable provisioning in View Composer.







Answer: B

An administrator configures a user with a global entitlement and a global home site, but has not set the scope policy. Which search order will Cloud Pod Architecture use to find a desktop for that user?

An administrator configures a user with a global entitlement and a global home site, but has not set the scope policy.
Which search order will Cloud Pod Architecture use to find a desktop for that user? 







A. Global home site, local pod, local site, other sites
B. Local pod, local site, other sites
C. Local pod, local site, global home site, other sites
D. Global home site, local site, other sites






Answer: A

An administrator has packaged an application with ThinApp but failed to include an important update. What should the administrator do on the capture machine to include the application update in the package?

An administrator has packaged an application with ThinApp but failed to include an important update.
What should the administrator do on the capture machine to include the application update in the package? 






A. Install the update, delete the sandbox, and then use the sbmerge apply command.
B. Delete the sandbox, install the update, and then use the sbmerge apply command.
C. Install the update, delete the sandbox, and then use the appsync command.
D. Delete the sandbox, install the update, and then use the appsync command.






Answer: B

An administrator needs to configure View to support ThinApp applications. Which file location should the administrator choose for the ThinApp repository?

An administrator needs to configure View to support ThinApp applications. Which file location should the administrator choose for the ThinApp repository? 






A. \\10.232.98.55\ThinApps
B. \\filesrv9.domain.local\ThinApps
C. http://websrv7.domain.local/thinapprepo
D. ftp://websrv7.domain.local/thinapprepo







Answer: B

What two prerequisites must be met before View Composer can be installed? (Choose two.)

What two prerequisites must be met before View Composer can be installed? (Choose two.) 







A. No other application on the View Composer server should use Windows SSLv2 libraries.
B. A domain user account with Administrator privileges on the system must be used.
C. No other application on the View Composer server should use OpenSSLv2 libraries.
D. A local user account with Administrator privileges on the system must be used.







Answer: A,B

An application was packaged using ThinApp and access is restricted to an Active Directory group called Customer Services. An administrator needs to remove this restriction. What should the administrator do to remove this restriction with the least effort?

An application was packaged using ThinApp and access is restricted to an Active Directory group called Customer Services. An administrator needs to remove this restriction.
What should the administrator do to remove this restriction with the least effort? 





A. Repackage the application, selecting Everyone from the Setup Capture wizard.
B. Remove the PermittedGroups section from package.ini and execute build.bat.
C. Change PermittedGroups=1 to 0 within package.ini and execute sbmerge.exe.
D. Change PermittedGroups=0 to 1 within package.ini and execute sbmerge.exe.






Answer: B

A View environment consists of a Connection Server named connect-01 and a security server named security-01. An administrator needs to configure RSA SecurID authentication for external users. Internal users must not be prompted for the RSA SecurID token code. What should the administrator do?

A View environment consists of a Connection Server named connect-01 and a security server named security-01.
An administrator needs to configure RSA SecurID authentication for external users. Internal users must not be prompted for the RSA SecurID token code.
What should the administrator do? 






A. Configure 2-factor authentication on the security-01 security server.
B. Configure 2-factor authentication on the connect-01 Connection Server.
C. Add a new Connection Server named connect-02 for internal users. Configure 2-factor authentication on the connect-01 Connection Server.
D. Add a new security server named security-02 for internal users. Configure 2-factor authentication on the security-01 security server.






Answer: C

An administrator is creating a pool of desktops for a group of developers. The administrator needs to provide control to a user from the group to manage the recompose and refresh operations. The user's controls must apply only to the developer pool. What should the administrator do?

An administrator is creating a pool of desktops for a group of developers. The administrator needs to provide control to a user from the group to manage the recompose and refresh operations. The user's controls must apply only to the developer pool.
What should the administrator do? 







A. Create a developer folder, add the developer pool, and assign a user with the Inventory Administrators role to the folder.
B. Create the developer pool and assign the Manage Desktops global privilege to the virtual desktops.
C. Create the developer pool and assign the Inventory Control global privilege to the virtual desktops.
D. Create a developer folder, add the desktops, and assign a user with the Manage Desktops role to the folder.






Answer: A

An administrator is installing RSA SecurID authentication for a View implementation and needs to force the RSA and Active Directory user names to match during authentication. Which option should the administrator select to meet the requirement?

An administrator is installing RSA SecurID authentication for a View implementation and needs to force the RSA and Active Directory user names to match during authentication.
Which option should the administrator select to meet the requirement? 







A. Enforce SecurID and Windows user name matching.
B. Enforce 2-Factor and Windows user name matching.
C. Synchronize SecurID and Windows user name matching.
D. Synchronize 2-Factor and Windows user name matching.





Answer: A

An organization is designing a new vSphere cluster to support a new product implementation. The following challenges have been identified by the vSphere administration team: The organization is willing to upgrade to vSphere Enterprise Plus licensing if it addresses these challenges. Which three features of a version 5.5 vSphere Distributed Switch would address these challenges? (Choose three.)

An organization is designing a new vSphere cluster to support a new product implementation.
The following challenges have been identified by the vSphere administration team:
The organization is willing to upgrade to vSphere Enterprise Plus licensing if it addresses these challenges.
Which three features of a version 5.5 vSphere Distributed Switch would address these challenges? (Choose three.) 








A. LACP in Dynamic Mode
B. Port Mirroring
C. Network vMotion
D. Private VLANs
E. Network I/O Control






Answer: A,B,C

A vSphere administrator needs to add redundancy to an ESXi 5.x management network on a vSphere Standard Switch. Which method should the administrator use to create redundant management networks?

A vSphere administrator needs to add redundancy to an ESXi 5.x management network on a vSphere Standard Switch.
Which method should the administrator use to create redundant management networks? 






A. Configure the management network vSwitch with two active uplinks
B. Configure an additional management portgroup on the same vSwitch
C. Create a second management network on a second vSwitch in the same subnet
D. Create a second management network on the same vSwitch in the same subnet






Answer: A

An administrator has determined that a vSphere Standard Switch is dropping outbound frames from a virtual machine adapter. Upon further investigation, it is determined that the outbound frame is being dropped because the source MAC address differs from the one in the virtual machine configuration file (.vmx). Which security policy should the administrator reconfigure to modify this behavior?

An administrator has determined that a vSphere Standard Switch is dropping outbound frames from a virtual machine adapter. Upon further investigation, it is determined that the outbound frame is being dropped because the source MAC address differs from the one in the virtual machine configuration file (.vmx).
Which security policy should the administrator reconfigure to modify this behavior? 






A. Forged transmit
B. MAC address changes
C. MAC address variation
D. Forged broadcast







Answer: A

An administrator is configuring RADIUS authentication for a View implementation and enters the RADIUS server host name into the View Administrator console. Which additional information must be entered into View Administrator to properly configure RADIUS?

An administrator is configuring RADIUS authentication for a View implementation and enters the RADIUS server host name into the View Administrator console.
Which additional information must be entered into View Administrator to properly configure RADIUS? 






A. Port number, authentication type, and shared secret
B. DNS server, port number, and shared secret
C. Authentication type, shared secret, and public key
D. Public key, authentication type, and shared secret







Answer: A

An administrator needs to replace the default self-signed SSL certificates for all View servers. An internal certification authority (CA) server will be used to issue new SSL certificates. Clients will connect to View virtual desktops using the latest Horizon client on both corporate-owned and staff-owned bring your own device (BYOD) clients. What must the administrator consider to ensure all clients can connect without security warnings or error messages?

An administrator needs to replace the default self-signed SSL certificates for all View servers. An internal certification authority (CA) server will be used to issue new SSL certificates.
Clients will connect to View virtual desktops using the latest Horizon client on both corporate-owned and staff-owned bring your own device (BYOD) clients.
What must the administrator consider to ensure all clients can connect without security warnings or error messages? 







A. Clients must connect to Horizon using the fully qualified domain name (FQDN).
B. All client devices must trust the root CA certificate and any intermediate CA certificates.
C. The new certificate must be added to the certificate revocation list (CRL).
D. All View servers must trust the client SSL certificates for staff-owned BYOD clients.






Answer: B

While backing up users' data, an administrator needs to ensure that users of physical desktops are using the corporate image and application choices. Which VMware component should the administrator choose to meet the requirements?

While backing up users' data, an administrator needs to ensure that users of physical desktops are using the corporate image and application choices.
Which VMware component should the administrator choose to meet the requirements? 







A. VMware Horizon View
B. VMware Workspace
C. VMware ThinApp
D. VMware Mirage








Answer: D

All RDP connections to virtual desktops must use the Horizon Client. Direct RDP connections using alternate clients must be disabled due to security considerations. Which step must be taken to prevent direct RDP connections?

All RDP connections to virtual desktops must use the Horizon Client. Direct RDP connections using alternate clients must be disabled due to security considerations.
Which step must be taken to prevent direct RDP connections? 







A. Select No for the Allow users to choose protocol option and select PCoIP as the default protocol.
B. Apply the AllowDirectRDP GPO to the virtual desktops.
C. Apply the AllowDirectRDP GPO to the Connection Server.
D. Select Yes for the Allow users to choose protocol option and disable RDP access in the global policies.






Answer: B

A View administrator receives reports that users are experiencing degraded performance from their zero clients. After investigating with a network administrator, the administrator notices a lot of network congestion. What should the View administrator ask the network administrator to change?

A View administrator receives reports that users are experiencing degraded performance from their zero clients. After investigating with a network administrator, the administrator notices a lot of network congestion.
What should the View administrator ask the network administrator to change? 








A. Enable Tail-Drop on the routers.
B. Enable WRED on the routers.
C. Enable Network Traffic Analyzer on the Switches.
D. Enable RRED on the routers.







Answer: B