In which two situations should a VMware customer choose to implement Workspace Portal? (Choose two.)

In which two situations should a VMware customer choose to implement Workspace Portal? (Choose two.) 






A. Corporate IT has a security mandate requiring RSA authentication whenever users access company resources from their personal devices.
B. Executives have mandated that users will be able to work from any location whether they are online or offline.
C. Customer is moving to a BYOD (Bring Your Own Device) business model but they still need to access company applications.
D. Management is searching for a file sharing solution that is hosted internally in order to control data security.






Answer: A,C

The administrator is required to make ThinApp packages available in streaming mode through Workspace Portal. What are the minimum required share and NTFS permissions?

The administrator is required to make ThinApp packages available in streaming mode through Workspace Portal.
What are the minimum required share and NTFS permissions? 






A. SharE.ReadNTFS: Read & Write
B. SharE.ChangeNTFS: Modify
C. SharE.ReadNTFS: Read & Execute
D. SharE.ChangeNTFS: List Folder Contents & Execute







Answer: C

Several users spanning multiple Active Directory groups have been assigned to a special project and need access to a set of applications. An administrator needs to create a group to manage these users in Workspace Portal but does not have access to Active Directory to create a new group there. What should the administrator do?

Several users spanning multiple Active Directory groups have been assigned to a special project and need access to a set of applications.
An administrator needs to create a group to manage these users in Workspace Portal but does not have access to Active Directory to create a new group there.
What should the administrator do? 






A. Edit the Directory Sync rules to create a filter group.
B. Create a new Connector virtual appliance and sync only the selected users.
C. Create a group in Workspace Portal and assign the users to this group.
D. Create a group in the Configurator virtual appliance console and add the users to this group.






Answer: C

An administrator needs to modify the Workspace Portal instance to provide access to a group of users in a different Active Directory Forest. Which two steps must the administrator take to connect to this new forest? (Choose two.)

An administrator needs to modify the Workspace Portal instance to provide access to a group of users in a different Active Directory Forest.
Which two steps must the administrator take to connect to this new forest? (Choose two.) 







A. Set the LDAP port to 389 (non-SSL) or 636 (SSL).
B. Set the global catalog port to 3268 (non-SSL) or 3269 (SSL).
C. Select sAMAccountName as the Active Directory attribute that contains the username.
D. Select userPrincipalName as the Active Directory attribute that contains the username.







Answer: B,D

An administrator needs to create an alarm to monitor when a specific ESXi host in an HA/DRS cluster becomes disconnected from other vSphere components like HA agents or the vCenter server. Which process must the administrator use to accomplish this?

An administrator needs to create an alarm to monitor when a specific ESXi host in an HA/DRS cluster becomes disconnected from other vSphere components like HA agents or the vCenter server.
Which process must the administrator use to accomplish this? 






A. Define a Host type alarm, monitor for the event Cannot connect host, and supply a conditional trigger on Host name equal to a specific label.
B. Define a Cluster type alarm, monitor for the event Cannot connect host, and supply a conditional trigger on Host name equal to a specific label.
C. Define a Cluster type alarm, monitor for the event Host status changed, and supply a specific label for each host.
D. Define a Host type alarm, monitor for the condition Host status changed, and supply a specific label for each host.








Answer: A

After creating an Upload policy for a group of users, an administrator has found a significant increase in storage usage by Mirage. After further investigation, the administrator finds that the increase is a result of users storing personal MP3 libraries on the system. What should the administrator do to prevent these files from being protected while allowing the users to store the files on the system?

After creating an Upload policy for a group of users, an administrator has found a significant increase in storage usage by Mirage. After further investigation, the administrator finds that the increase is a result of users storing personal MP3 libraries on the system.
What should the administrator do to prevent these files from being protected while allowing the users to store the files on the system? 






A. Add a Rule to the User Area for MP3 files in the Upload policy.
B. Create a Collection labeled Exclude MP3s.
C. Add a Rule Exception to the Unprotected Area for MP3 files in the Upload policy.
D. Add a Rule to the Unprotected Area for MP3 files in the Upload policy.






Answer: A

Corporate security policy requires that all user endpoints be encrypted with Full-Disk Encryption. What should the administrator do prior to migrating the user endpoints from Windows XP to Windows 7?

Corporate security policy requires that all user endpoints be encrypted with Full-Disk Encryption.
What should the administrator do prior to migrating the user endpoints from Windows XP to Windows 7? 






A. Deploy the Mirage Encryption Assistance Tools to the endpoint prior to migration.
B. Decrypt the BIOS of the endpoint prior to migration.
C. Decrypt the disk(s) of the endpoint prior to migration.
D. Decrypt the C:\Windows directory of the endpoint prior to migration.







Answer: C

Several users within a corporation installed a team collaboration utility onto their Mirage-managed systems. The systems became erratic, so they uninstalled the application, but the problem remained. An administrator needs to repair the users' systems and ensure they are compliant with the corporate image. All user profile data must remain intact. What should the administrator do?

Several users within a corporation installed a team collaboration utility onto their Mirage-managed systems. The systems became erratic, so they uninstalled the application, but the problem remained.
An administrator needs to repair the users' systems and ensure they are compliant with the corporate image. All user profile data must remain intact.
What should the administrator do? 







A. Revert to Snapshot with Restore System Only option selected.
B. Enforce All Layers with the Preserve user applications option selected.
C. Revert to Snapshot without Restore System Only option selected.
D. Enforce All Layers with the Remove user applications option selected.







Answer: D

An administrator is planning the capture of a reference machine for two departments: Finance and Information Technology. Which two applications should the administrator include in the common base layer? (Choose two.)

An administrator is planning the capture of a reference machine for two departments: Finance and Information Technology.
Which two applications should the administrator include in the common base layer? (Choose two.) 








A. Finance Accounting Application
B. Anti-Virus software
C. Admin Script Editor
D. VPN Software







Answer: B,D

An administrator attempts to apply software updates and patches to a base layer image. However, the reference Centralized Virtual Desktop (CVD) used to create previous base layers no longer exists. What should the administrator do to recover the original reference CVD with the least administrative effort?

An administrator attempts to apply software updates and patches to a base layer image. However, the reference Centralized Virtual Desktop (CVD) used to create previous base layers no longer exists.
What should the administrator do to recover the original reference CVD with the least administrative effort? 






A. Rebuild the image from scratch and re-create the reference CVD.
B. Convert an existing CVD to a reference CVD.
C. Import the reference CVD from backup.
D. Recreate the reference CVD from an existing base layer.







Answer: D

A administrator needs to capture an OS base layer in Mirage. The administrator finds the following information in the Mirage client endpoint: No data is sent from the endpoint. The time between the start of the initialization and the machine returning to idle is less than 10 seconds. Where should the administrator look to resolve the issue?

A administrator needs to capture an OS base layer in Mirage. The administrator finds the following information in the Mirage client endpoint:
No data is sent from the endpoint. The time between the start of the initialization and the machine returning to idle is less than 10 seconds.
Where should the administrator look to resolve the issue? 







A. All CVDs Collection in the Mirage console
B. Mirage server logs
C. Windows Services on the endpoint
D. Upload Policies in the Mirage console







Answer: C

A Mirage Administrator needs to deploy Lotus Notes. Lotus Notes has a configuration file that is placed under the Program Files directory and shared across all users. The base layer must initially provision the file for Lotus Notes to function properly. However, the file is then modified locally to maintain the user configuration. Which step must the Mirage Administrator take to avoid losing user customization?

A Mirage Administrator needs to deploy Lotus Notes. Lotus Notes has a configuration file that is placed under the Program Files directory and shared across all users. The base layer must initially provision the file for Lotus Notes to function properly. However, the file is then modified locally to maintain the user configuration.
Which step must the Mirage Administrator take to avoid losing user customization? 








A. In Layer Rules, add the configuration file path to the Do Not Override By Layer policy.
B. In Layer Rules, add Lotus Notes application to the Do Not Override By Layer policy.
C. In the Base Layers properties, under Program Files tab, add Lotus Notes.
D. In the Base Layers properties, add the configuration file path to the exception list.







Answer: A

An organization has the following desktops:

An organization has the following desktops: 







A. Capture Base Windows 7 64-bit OS layer
B. Deploy Windows 7 32-bit Centralized Virtual Desktop (CVD) to all Windows 7 desktops
C. Create Office 2013 App Layer
D. Perform desktop centralization of all the Windows 7 64-bit desktops






Answer: D

An administrator enables the Block Storage Volume option in order to prevent a storage volume from reaching full capacity. Which two statements describe the volume's functionality once this option is enabled? (Choose two.)

An administrator enables the Block Storage Volume option in order to prevent a storage volume from reaching full capacity.
Which two statements describe the volume's functionality once this option is enabled? (Choose two.)







A. New Centralized Virtual Desktops (CVDs) will not be able to be centralized to the volume.
B. New base layers will be able to be centralized to the volume.
C. Existing Centralized Virtual Desktops (CVDs) and base layers will continue to function as expected.
D. Existing base layers on the volume will not be able to be moved to other volumes.







Answer: A,C

A vSphere administrator determines that more metrics are available for viewing in the realtime view than are available in the daily view for a virtual machine. What is the reason for this discrepancy in the number of available metrics?

A vSphere administrator determines that more metrics are available for viewing in the realtime view than are available in the daily view for a virtual machine.
What is the reason for this discrepancy in the number of available metrics? 






A. The daily view does not contain all of the metrics that the realtime view does.
B. The default vCenter statistics level is being used.
C. A vCenter statistics level of 4 is being used.
D. The daily view presents a different selection of metrics by default than presented by the realtime view.






Answer: B

A potential Branch Reflector has ample disk space to store base layers, application layers, driver libraries, and User State Migration Tool (USMT) files. Which other conditions are required for an endpoint to become a Branch Reflector?

A potential Branch Reflector has ample disk space to store base layers, application layers, driver libraries, and User State Migration Tool (USMT) files.
Which other conditions are required for an endpoint to become a Branch Reflector? 







A. connected to the LAN?TCP port 8001 to support connections from other Mirage endpoints
B. connected to the LAN?TCP port 8001 to support connections from other Mirage endpoints
C. ?Power-saving features disabled?Directly connected to the WAN?TCP port 8000 to support connections from other Mirage endpoints
D. ?Power-saving features enabled?Directly connected to the wireless network?TCP port 8001 to support connections from other Mirage endpoints





Answer: B

An ESXi 5.x host is unable to connect to a vCenter 5.x server. Which commands should an administrator use to restart the management agents on the host?

An ESXi 5.x host is unable to connect to a vCenter 5.x server.
Which commands should an administrator use to restart the management agents on the host? 







A. SSH to the host and execute the commands - /etc/init.d/hostd restart and /etc/init.d/vpxa restart
B. SSH to the host and execute the commands -/etc/init.d/vpxd restart and /etc/init.d/vpxa restart
C. SSH to the host and execute the commands -/etc/init.d/vmware-hostd restart and /etc/init.d/vmware- vpxa restart
D. SSH to the host and execute the commands -/etc/init.d/vmware-hostd restart and /etc/init.d/vpxd restart







Answer: A

While troubleshooting a crash event on an ESXi 5.x host, an administrator determines the log files related to the event are not present. Which action should the administrator take to resolve the logging issue?

While troubleshooting a crash event on an ESXi 5.x host, an administrator determines the log files related to the event are not present.
Which action should the administrator take to resolve the logging issue? 







A. Increase the amount of memory committed to log storage.
B. Increase the statistic data collection level to 4.
C. Change the roll-up type to maximum.
D. Create a persistent scratch location.







Answer: D

An administrator is attempting to use Update Manager to patch a cluster of ESXi 5.x hosts. The administrator needs to stage the patches for a scheduled update after hours. When verifying the hosts after the scheduled upgrade, the administrator determines that one of the hosts was not remediated and patches are not staged. The host is using PXE as its boot method. What condition would cause this behavior?

An administrator is attempting to use Update Manager to patch a cluster of ESXi 5.x hosts. The administrator needs to stage the patches for a scheduled update after hours. When verifying the hosts after the scheduled upgrade, the administrator determines that one of the hosts was not remediated and patches are not staged. The host is using PXE as its boot method.
What condition would cause this behavior? 





A. The host was rebooted prior to the scheduled remediation.
B. Remediating PXE-booted hosts using Update Manager is unsupported.
C. The user account used does NOT have the Remediate Hosts privilege.
D. The RAMdisk on the host has insufficient capacity.







Answer: A

An administrator must determine which Update Manager procedures can be performed using the vSphere Web Client, and which must be completed using the Windows vSphere client. Which two tasks require the use of the Windows vSphere client? (Choose two.)

An administrator must determine which Update Manager procedures can be performed using the vSphere Web Client, and which must be completed using the Windows vSphere client.
Which two tasks require the use of the Windows vSphere client? (Choose two.) 






A. Attach and detach baselines to inventory objects
B. Scan inventory objects for compliance
C. Create a baseline for an inventory object
D. Stage a baseline for remediation








Answer: C,D

A vSphere administrator needs to enable Distributed Resource Scheduling (DRS) in an existing vSphere environment. Which procedure should the administrator perform to accomplish this task?

A vSphere administrator needs to enable Distributed Resource Scheduling (DRS) in an existing vSphere environment.
Which procedure should the administrator perform to accomplish this task? 







A. Select the datacenter and create a DRS cluster. Add the six remaining hosts to this cluster, then enable DRS. Edit the DRS settings and change the automation level to Partial.
B. Select the existing HA cluster. Add the six remaining hosts to the cluster. Enable DRS, then edit the settings and change the automation level to Manual.
C. Select the datacenter and create a DRS cluster. Add the six remaining hosts to this cluster, then enable DRS. Edit the DRS settings and change the automation level to Manual.
D. Select the existing HA cluster. Add the six remaining hosts to the cluster. Enable DRS, then edit the settings and change the automation level to Partial.





Answer: D

An administrator removes a virtual machine from a resource pool and places it in the DRS root resource pool. Users report the performance of the application running on the virtual machine has improved. The virtual machine relocation was the only change that occurred. What explains the change in application performance?

An administrator removes a virtual machine from a resource pool and places it in the DRS root resource pool. Users report the performance of the application running on the virtual machine has improved. The virtual machine relocation was the only change that occurred.
What explains the change in application performance? 







A. The memory, storage, and/or CPU settings of the original resource pool restricted access to resources for the virtual machine.
B. The configured memory, storage, and/or CPU shares on the root resource pool are higher than the original resource pool.
C. The memory, storage, and/or CPU settings on the root resource pool restricted access to resources for the virtual machine
D. The configured memory storage and/or CPU reservations on the root resource pool are higher than the original resource pool.






Answer: A

A system administrator has an application installed on a physical machine that is licensed to the MAC address of the physical NIC. This system needs to be virtualized. What two methods could an administrator use to ensure the license will function in the virtual machine? (Choose two.)

A system administrator has an application installed on a physical machine that is licensed to the MAC address of the physical NIC. This system needs to be virtualized.
What two methods could an administrator use to ensure the license will function in the virtual machine? (Choose two.) 







A. Manually set the MAC address for the vNIC in the guest OS
B. Install the NIC from the physical server into the ESXi host
C. Manually set the MAC address for the vNIC using the Web Client
D. Configure the physical server's MAC address in the virtual switch







Answer: A,C

A vSphere administrator needs the ability to adjust the amount of guaranteed physical CPU and Memory resources to a virtual machine without incurring application downtime. Which actions must the administrator perform?

A vSphere administrator needs the ability to adjust the amount of guaranteed physical CPU and Memory resources to a virtual machine without incurring application downtime.
Which actions must the administrator perform? 







A. Enable CPU hotplug and Memory hotplug on the virtual machine.
B. Adjust the number of CPUs and the Memory Configuration for the virtual machine.
C. Adjust the CPU reservation slider and click the Reserve all Guest Memory checkbox.
D. Adjust the CPU and Memory reservation sliders on the virtual machine.







Answer: D

Which two tools should an administrator use to monitor PCoIP session statistics when troubleshooting PCoIP performance issues with a user's virtual desktop? (Choose two.)

Which two tools should an administrator use to monitor PCoIP session statistics when troubleshooting PCoIP performance issues with a user's virtual desktop? (Choose two.) 






A. Windows Performance Monitor
B. vCenter Monitoring and Performance
C. ESXTOP
D. vCenter Operations Manager for Horizon







Answer: A,D

Users on the local area network (LAN) are reporting poor performance and failed PCoIP connections when accessing their virtual desktops. What is a likely cause of this issue?

Users on the local area network (LAN) are reporting poor performance and failed PCoIP connections when accessing their virtual desktops.
What is a likely cause of this issue? 






A. vCenter Server is offline
B. PCoIP encryption level
C. MMR is disabled
D. Out of order packets






Answer: D

An administrator needs to view Windows 7 Virtual Desktops from the vSphere Console while a user has a PCoIP session to the Virtual Desktop. When the administrator opens a vSphere Console to a Virtual Desktop, the Console screen is black. The administrator enables the Session Variable Enable access to a PCoIP session from a vSphere console. However, a black screen still appears when the administrator opens in the vSphere Console to the Virtual Desktops. What is preventing the Virtual Desktop from showing in the vSphere Console?

An administrator needs to view Windows 7 Virtual Desktops from the vSphere Console while a user has a PCoIP session to the Virtual Desktop.
When the administrator opens a vSphere Console to a Virtual Desktop, the Console screen is black. The administrator enables the Session Variable Enable access to a PCoIP session from a vSphere console. However, a black screen still appears when the administrator opens in the vSphere Console to the Virtual Desktops.
What is preventing the Virtual Desktop from showing in the vSphere Console? 







A. The Virtual Desktop Hardware Version is 9.
B. The Virtual Desktop Hardware Version is 7.
C. The Virtual Desktop Hardware Version is 8.
D. The Virtual Desktop Hardware Version is 10.








Answer: B

An administrator identifies PCoIP packet fragmentation on the network. The following items have been discovered: What should the administrator do?

An administrator identifies PCoIP packet fragmentation on the network. The following items have been discovered:
What should the administrator do? 







A. Set router buffers to tail drop.
B. Set router buffers to Weighted Random Early Detection (WRED).
C. Set PCoIP MTU to 1500
D. Set PCoIP MTU to 1100







Answer: D

Users report poor performance over a wide area network. Ten users share a 5Mbps link for this site. The administrator suspects a PCoIP configuration issue. The administrator finds the following PCoIP configuration settings: Which setting is likely causing the performance issue?

Users report poor performance over a wide area network. Ten users share a 5Mbps link for this site. The administrator suspects a PCoIP configuration issue. The administrator finds the following PCoIP configuration settings:
Which setting is likely causing the performance issue?
 







A. Turn off Build-to-Lossless feature = Enabled
B. PCoIP Session Bandwidth Floor = 1000
C. Maximum Frame Rate = 24
D. PCoIP Client Image Cache Size Policy = 250






Answer: B

An administrator has set the default display protocol for a desktop to PCoIP to support 1080p quality video on the LAN. Group Policy Object (GPO) settings are applied to the virtual desktops to enforce the following settings: Which configuration option is responsible for users reporting that video playback is choppy?

An administrator has set the default display protocol for a desktop to PCoIP to support 1080p quality video on the LAN. Group Policy Object (GPO) settings are applied to the virtual desktops to enforce the following settings:
Which configuration option is responsible for users reporting that video playback is choppy? 






A. PCoIP session bandwidth floor
B. Enable Build to Lossless
C. Minimum Initial Image Quality
D. PCoIP Maximum Frame Rate






Answer: D

A vSphere administrator is unable to vMotion a virtual machine between two hosts. An error message indicates that the USB device is not accessible on the target host. What is causing this issue?

A vSphere administrator is unable to vMotion a virtual machine between two hosts. An error message indicates that the USB device is not accessible on the target host.
What is causing this issue? 






A. The USB device was not enabled for vMotion when it was added to the virtual machine.
B. ESXi does not support vMotion with a USB device attached to the virtual machine.
C. The VMkernel port for vMotion is not enabled for USB traffic.
D. The virtual machine has the wrong USB controller installed.







Answer: A

An administrator has deployed a View security server, with PCoIP as the only allowed protocol. External users can successfully authenticate, and are presented with an available desktop pool. However, the users are unable to connect to the virtual desktop. Which View configuration must be performed?

An administrator has deployed a View security server, with PCoIP as the only allowed protocol. External users can successfully authenticate, and are presented with an available desktop pool. However, the users are unable to connect to the virtual desktop.
Which View configuration must be performed? 






A. Enable HTTP(S) Secure Tunnel
B. Enable PCoIP Secure Gateway
C. Enable Blast Secure Gateway
D. Enable Provisioning






Answer: B

An end user is unable to access a View desktop after returning from a meeting. The user connects through a PCoIP zero client. The desktop administrator investigates the issue and notices display overlap entries in the pcoip_server logs. What is preventing the client from connecting?

An end user is unable to access a View desktop after returning from a meeting. The user connects through a PCoIP zero client. The desktop administrator investigates the issue and notices display overlap entries in the pcoip_server logs.
What is preventing the client from connecting? 






A. Power Saving Mode is enabled on the View desktop.
B. The auto_logoff option has been configured in the vdm_client.adm template.
C. There is a mismatch between client and desktop screen resolutions.
D. The framerate is set too high for the client configuration.






Answer: A

Users at a branch office are experiencing poor virtual desktop performance. The branch office has ten users and a 2Mbps link to the datacenter. Some of the users frequently access video content, but the performance issues began occurring after a recent Group Policy Object (GPO) change. The performance issues do not occur when the same users connect from the main office, which has a 10Mbps link to the data center. Which PCoIP GPO change is most likely the cause of the performance issues?

Users at a branch office are experiencing poor virtual desktop performance. The branch office has ten users and a 2Mbps link to the datacenter.
Some of the users frequently access video content, but the performance issues began occurring after a recent Group Policy Object (GPO) change. The performance issues do not occur when the same users connect from the main office, which has a 10Mbps link to the data center.
Which PCoIP GPO change is most likely the cause of the performance issues? 







A. Turn off Build-to-Lossless = Enabled
B. PCoIP session audio bandwidth limit = 100kbps
C. PCoIP client image cache size = 260MB
D. Maximum PCoIP session bandwidth = 4Mbps






Answer: D

An organization has a View deployment with a Dedicated Full Clone Pool of Windows 7 desktops. Users connect to the desktops using a Zero Client with firmware 4.1.2. Periodically, the desktops display a black screen after inactivity or after they go to sleep mode. The View Connection Manager indicates the desktops are Connected. An administrator finds the following PCoIP log messages: LVL:0 RC:0 SERVER==> WindowPro C. Detected WM_DISPLAYCHANGE event (1900x1200) and LVL:2 R C. 0 IMG_FRONTEND:DisplayDevice[0] states - DISPLAY_DEVICE_ATTACHED_TO_DESKTOP DISPLAY_DEVICE_ACTIVE What should the administrator do to resolve the issue?

An organization has a View deployment with a Dedicated Full Clone Pool of Windows 7 desktops. Users connect to the desktops using a Zero Client with firmware 4.1.2. Periodically, the desktops display a black screen after inactivity or after they go to sleep mode. The View Connection Manager indicates the desktops are Connected.
An administrator finds the following PCoIP log messages:
<Date, Time> LVL:0 RC:0 SERVER==> WindowPro
C. Detected WM_DISPLAYCHANGE event (1900x1200)
and
<Date,Time>LVL:2 R
C. 0 IMG_FRONTEND:DisplayDevice[0] states - DISPLAY_DEVICE_ATTACHED_TO_DESKTOP DISPLAY_DEVICE_ACTIVE
What should the administrator do to resolve the issue? 






A. Configure the virtual desktop power management option Turn Off Display to Never.
B. Configure the virtual desktop power management option Sleep to Never.
C. Configure the virtual desktop power management option Turn Off Hard Disk to Never.
D. Configure the virtual desktop power management option PCI Express Link State Power Management to Off.






Answer: A

An administrator deployed a linked-clone pool with virtual desktops running Windows XP for a branch office. The Active Directory server supporting the office is a Windows Server 2008 Read Only Domain Controller (RODC). The administrator makes the following changes to Sysprep: When the administrator attempts to provision the desktops using View Composer, the following error message is displayed: View Composer agent initialization state error (18): Failed to join the domain (waited 565 seconds) What should the administrator do to provision the virtual desktops?

An administrator deployed a linked-clone pool with virtual desktops running Windows XP for a branch office. The Active Directory server supporting the office is a Windows Server 2008 Read Only Domain Controller (RODC). The administrator makes the following changes to Sysprep:
When the administrator attempts to provision the desktops using View Composer, the following error message is displayed:
View Composer agent initialization state error (18): Failed to join the domain (waited 565 seconds)
What should the administrator do to provision the virtual desktops? 







A. Configure the desktop pool to use Quickprep instead of Sysprep to provision the Linked Clones.
B. Log in to the parent virtual machine and apply the RODC compatibility update for XP. Take a new snapshot and recompose the pool.
C. Configure the virtual desktops to synchronize time from another domain controller that is available on the network.
D. Log in to the parent virtual machine and reinstall the View Agent. Take a new snapshot and recompose the pool.








Answer: B

While deploying a View desktop pool, an administrator determines that the virtual desktops remain at a status of Customizing. In the debug-timestamp.txt log file of the View Agent, the administrator finds the error message: Debug - Unable to connect to JMS Server.com.vmware.vdi.agent.messageserver.Jmsmanager.a(SourceFile:238) javax.jms.JMSException:Unable to create a connection to:[ServerEntry, hostname, port=4001] What should the administrator do to troubleshoot the connection problem?

While deploying a View desktop pool, an administrator determines that the virtual desktops remain at a status of Customizing.
In the debug-timestamp.txt log file of the View Agent, the administrator finds the error message:
Debug - Unable to connect to JMS
Server.com.vmware.vdi.agent.messageserver.Jmsmanager.a(SourceFile:238) javax.jms.JMSException:Unable to create a connection to:[ServerEntry, hostname, port=4001]
What should the administrator do to troubleshoot the connection problem? 








A. Verify that the View Composer Guest Agent Server service is set Started on the virtual desktops.
B. Verify that the View Agent can communicate with the View Connection Server over port 4001.
C. Verify that the View Connection Server can resolve the DNS name of the vCenter Server.
D. Verify that the View Security Server can establish a connection using the AJP13 protocol over port 4001.






Answer: B

An administrator receives reports from users connected to View PCoIP sessions of slow desktop responsiveness and blurry images. Additionally, some users report being randomly disconnected from their sessions. Which two solutions should the administrator implement to resolve the issues? (Choose two.)

An administrator receives reports from users connected to View PCoIP sessions of slow desktop responsiveness and blurry images. Additionally, some users report being randomly disconnected from their sessions.
Which two solutions should the administrator implement to resolve the issues? (Choose two.) 







A. Increase priority of PCoIP traffic.
B. Enable the Turn Off Build-to-Lossless GPO Setting.
C. Disable Spanning Tree on the switches.
D. Add additional vNICs to the virtual desktops.







Answer: A,B

A system administrator is unable to clone a Windows 2008 server while connected directly to an ESXi host through the vSphere Client. Which two methods can be used to complete this task? (Choose two.)

A system administrator is unable to clone a Windows 2008 server while connected directly to an ESXi host through the vSphere Client.
Which two methods can be used to complete this task? (Choose two.) 






A. Connect to vCenter Server and retry the operation.
B. Use VMware Converter to perform the operation.
C. Connect to the host using the Web Client and retry the operation.
D. Use VMware Configuration Manager to perform the operation.







Answer: A,B

An administrator needs to install a legacy application to a Dedicated Full Clone Pool inside of View. A ThinApp package is successfully created and assigned to the pool. The ThinApp application status on the virtual desktops remains at Pending. Rebooting a desktop fails to resolve the issue. Which two steps should the administrator take to determine the cause of the problem? (Choose two.)

An administrator needs to install a legacy application to a Dedicated Full Clone Pool inside of View. A ThinApp package is successfully created and assigned to the pool. The ThinApp application status on the virtual desktops remains at Pending. Rebooting a desktop fails to resolve the issue.
Which two steps should the administrator take to determine the cause of the problem? (Choose two.) 







A. Verify that the folder or share containing the ThinApp packages has the appropriate permissions set.
B. Verify that the application package is an executable (.exe).
C. Verify that the application was not already installed on the virtual desktop.
D. Verify that there is enough disk space on the virtual desktop.







Answer: C,D

An organization has deployed a View environment. Users need to connect USB devices to their View sessions: Users report that USB devices are not connecting to the View sessions when they are plugged in to the thin clients. What are two reasons that could cause this behavior? (Choose two.)

An organization has deployed a View environment. Users need to connect USB devices to their View sessions:
Users report that USB devices are not connecting to the View sessions when they are plugged in to the thin clients.
What are two reasons that could cause this behavior? (Choose two.) 






A. TCP port 9427 is closed on the firewall.
B. TCP port 32111 is closed on the firewall.
C. Windows Mobile Device Center is preventing USB redirection.
D. USB redirection drivers on the guest virtual machine are missing or disabled.







Answer: B,D

During the process of pairing a View security server, the administrator aborts the operation and attempts to run the pairing process again. The security server status displayed in the View Administrator dashboard is Down, and remote users recieve the following message when attempting to connect: The View Connection Server authentication failed. No gateway is available to provide a secure connection to a desktop. Contact your network Administrator. What should the administrator do to resolve the issue?

During the process of pairing a View security server, the administrator aborts the operation and attempts to run the pairing process again. The security server status displayed in the View Administrator dashboard is Down, and remote users recieve the following message when attempting to connect:
The View Connection Server authentication failed. No gateway is available to provide a secure connection to a desktop. Contact your network Administrator.
What should the administrator do to resolve the issue? 







A. In the View Connection Server instance click More Commands>Specify a Security Server Pairing Password then enter a new password and install the security server again.
B. Run vdmadmin -S security_server_name and then install the security server again.
C. In the View Connection Server instance click More Commands>Specify a Security Server Pairing Passwords then enter a password and restart the View Connection Server service.
D. Run vdmadmin -S security_server_name and restart the View Connection Server service.






Answer: A

An administrator is deploying a pool of virtual desktops and receives the following message when testing a desktop connectionfrom a View Client machine : The Desktop Currently Has No Desktop Sources Available. The administrator has confirmed that: After logging in to the vCenter Server, what should the administrator ensure to troubleshoot the issue?

An administrator is deploying a pool of virtual desktops and receives the following message when testing a desktop connectionfrom a View Client machine :
The Desktop Currently Has No Desktop Sources Available.
The administrator has confirmed that:
After logging in to the vCenter Server, what should the administrator ensure to troubleshoot the issue? 






A. The virtual desktops are powered on.
B. There are no Memory reservations.
C. There are no CPU reservations.
D. The View Composer service is running.






Answer: A

An administrator is entitling virtual desktops to users in the company. All Engineers, Executives, and selected members of the Marketing group will require access. The administrator builds the correct master image and configures an automated pool to use that image. What should the administrator do to complete the deployment?

An administrator is entitling virtual desktops to users in the company. All Engineers, Executives, and selected members of the Marketing group will require access. The administrator builds the correct master image and configures an automated pool to use that image.
What should the administrator do to complete the deployment? 







A. Entitle Marketing, Engineers, and Executives AD groups to the pool.
B. Entitle Engineers and Executives AD groups and individual Marketing accounts to the pool.
C. Create and entitle a new AD group titled ViewUsers; put the Marketing and Executives users into that group.
D. Entitle Marketing to the pool, create another pool, and entitle Engineers to that pool.






Answer: B

An administrator is configuring Kiosk mode in View. The administrator completes the following tasks: When the clients are tested they do not automatically log in after connecting to the Connection Server. What is causing this issue?

An administrator is configuring Kiosk mode in View. The administrator completes the following tasks:
When the clients are tested they do not automatically log in after connecting to the Connection Server.
What is causing this issue? 






A. The Kiosk mode user account was not added to the Connection Server to which the client is connecting.
B. The Connection Server to which the client is connecting has not been enabled for Kiosk mode clients.
C. The Kiosk mode user account was created in the wrong Organizational Unit.
D. The View Client machine has not been enabled for Kiosk mode using the client registry settings.






Answer: B

An administrator is adding a new desktop pool for a business unit that has recently started using Virtual Desktops. A new Organizational Unit (OU) has been created beside the original OU. During provisioning of this new pool, the administrator receives an error message stating that creation of the computer accounts failed. The same View Composer domain account is being used for the existing pool and the new pool. The existing View Composer domain account is still functioning correctly for the original desktop pool. What is causing the failure to create the computer accounts?

An administrator is adding a new desktop pool for a business unit that has recently started using Virtual Desktops. A new Organizational Unit (OU) has been created beside the original OU.
During provisioning of this new pool, the administrator receives an error message stating that creation of the computer accounts failed. The same View Composer domain account is being used for the existing pool and the new pool. The existing View Composer domain account is still functioning correctly for the original desktop pool.
What is causing the failure to create the computer accounts? 






A. The Parent virtual machine being used for the pool has not been enabled for use in the new OU.
B. The new OU does not have the correct View-specific GPO settings applied.
C. The existing domain account is being used by the original OU and is locked for use on the new OU.
D. The new OU does not have the correct permissions applied for the View Composer domain account.







Answer: D

An administrator is performing the post-installation configuration of Workspace Portal. While running the setup wizard, the administrator receives an error message. The error message appears during configuration of the Directory settings and indicates that the user account cannot be found. The administrator has confirmed the following: What is causing the error?

An administrator is performing the post-installation configuration of Workspace Portal. While running the setup wizard, the administrator receives an error message. The error message appears during configuration of the Directory settings and indicates that the user account cannot be found.
The administrator has confirmed the following:
What is causing the error? 







A. The user account is located below the Base DN.
B. The user account has not been entered into the Global Catalog.
C. The user account is located above the Base DN.
D. The user account name is too long.







Answer: C

A system administrator is deploying a Windows virtual machine from a template and needs the IP address to be customized automatically. How should the administrator configure the IP address?

A system administrator is deploying a Windows virtual machine from a template and needs the IP address to be customized automatically.
How should the administrator configure the IP address? 







A. Use the Microsoft Sysprep Tool.
B. Specify the IP address using the Deploy Virtual Machine wizard.
C. Use the VMware Quickprep Tool.
D. Manually configure IP addresses after the deployment has completed.






Answer: A