Showing posts with label VMware. Show all posts
Showing posts with label VMware. Show all posts

In which two situations should a VMware customer choose to implement Workspace Portal? (Choose two.)

In which two situations should a VMware customer choose to implement Workspace Portal? (Choose two.) 






A. Corporate IT has a security mandate requiring RSA authentication whenever users access company resources from their personal devices.
B. Executives have mandated that users will be able to work from any location whether they are online or offline.
C. Customer is moving to a BYOD (Bring Your Own Device) business model but they still need to access company applications.
D. Management is searching for a file sharing solution that is hosted internally in order to control data security.






Answer: A,C

The administrator is required to make ThinApp packages available in streaming mode through Workspace Portal. What are the minimum required share and NTFS permissions?

The administrator is required to make ThinApp packages available in streaming mode through Workspace Portal.
What are the minimum required share and NTFS permissions? 






A. SharE.ReadNTFS: Read & Write
B. SharE.ChangeNTFS: Modify
C. SharE.ReadNTFS: Read & Execute
D. SharE.ChangeNTFS: List Folder Contents & Execute







Answer: C

Several users spanning multiple Active Directory groups have been assigned to a special project and need access to a set of applications. An administrator needs to create a group to manage these users in Workspace Portal but does not have access to Active Directory to create a new group there. What should the administrator do?

Several users spanning multiple Active Directory groups have been assigned to a special project and need access to a set of applications.
An administrator needs to create a group to manage these users in Workspace Portal but does not have access to Active Directory to create a new group there.
What should the administrator do? 






A. Edit the Directory Sync rules to create a filter group.
B. Create a new Connector virtual appliance and sync only the selected users.
C. Create a group in Workspace Portal and assign the users to this group.
D. Create a group in the Configurator virtual appliance console and add the users to this group.






Answer: C

An administrator needs to modify the Workspace Portal instance to provide access to a group of users in a different Active Directory Forest. Which two steps must the administrator take to connect to this new forest? (Choose two.)

An administrator needs to modify the Workspace Portal instance to provide access to a group of users in a different Active Directory Forest.
Which two steps must the administrator take to connect to this new forest? (Choose two.) 







A. Set the LDAP port to 389 (non-SSL) or 636 (SSL).
B. Set the global catalog port to 3268 (non-SSL) or 3269 (SSL).
C. Select sAMAccountName as the Active Directory attribute that contains the username.
D. Select userPrincipalName as the Active Directory attribute that contains the username.







Answer: B,D

An administrator needs to create an alarm to monitor when a specific ESXi host in an HA/DRS cluster becomes disconnected from other vSphere components like HA agents or the vCenter server. Which process must the administrator use to accomplish this?

An administrator needs to create an alarm to monitor when a specific ESXi host in an HA/DRS cluster becomes disconnected from other vSphere components like HA agents or the vCenter server.
Which process must the administrator use to accomplish this? 






A. Define a Host type alarm, monitor for the event Cannot connect host, and supply a conditional trigger on Host name equal to a specific label.
B. Define a Cluster type alarm, monitor for the event Cannot connect host, and supply a conditional trigger on Host name equal to a specific label.
C. Define a Cluster type alarm, monitor for the event Host status changed, and supply a specific label for each host.
D. Define a Host type alarm, monitor for the condition Host status changed, and supply a specific label for each host.








Answer: A

After creating an Upload policy for a group of users, an administrator has found a significant increase in storage usage by Mirage. After further investigation, the administrator finds that the increase is a result of users storing personal MP3 libraries on the system. What should the administrator do to prevent these files from being protected while allowing the users to store the files on the system?

After creating an Upload policy for a group of users, an administrator has found a significant increase in storage usage by Mirage. After further investigation, the administrator finds that the increase is a result of users storing personal MP3 libraries on the system.
What should the administrator do to prevent these files from being protected while allowing the users to store the files on the system? 






A. Add a Rule to the User Area for MP3 files in the Upload policy.
B. Create a Collection labeled Exclude MP3s.
C. Add a Rule Exception to the Unprotected Area for MP3 files in the Upload policy.
D. Add a Rule to the Unprotected Area for MP3 files in the Upload policy.






Answer: A

Corporate security policy requires that all user endpoints be encrypted with Full-Disk Encryption. What should the administrator do prior to migrating the user endpoints from Windows XP to Windows 7?

Corporate security policy requires that all user endpoints be encrypted with Full-Disk Encryption.
What should the administrator do prior to migrating the user endpoints from Windows XP to Windows 7? 






A. Deploy the Mirage Encryption Assistance Tools to the endpoint prior to migration.
B. Decrypt the BIOS of the endpoint prior to migration.
C. Decrypt the disk(s) of the endpoint prior to migration.
D. Decrypt the C:\Windows directory of the endpoint prior to migration.







Answer: C

Several users within a corporation installed a team collaboration utility onto their Mirage-managed systems. The systems became erratic, so they uninstalled the application, but the problem remained. An administrator needs to repair the users' systems and ensure they are compliant with the corporate image. All user profile data must remain intact. What should the administrator do?

Several users within a corporation installed a team collaboration utility onto their Mirage-managed systems. The systems became erratic, so they uninstalled the application, but the problem remained.
An administrator needs to repair the users' systems and ensure they are compliant with the corporate image. All user profile data must remain intact.
What should the administrator do? 







A. Revert to Snapshot with Restore System Only option selected.
B. Enforce All Layers with the Preserve user applications option selected.
C. Revert to Snapshot without Restore System Only option selected.
D. Enforce All Layers with the Remove user applications option selected.







Answer: D

An administrator is planning the capture of a reference machine for two departments: Finance and Information Technology. Which two applications should the administrator include in the common base layer? (Choose two.)

An administrator is planning the capture of a reference machine for two departments: Finance and Information Technology.
Which two applications should the administrator include in the common base layer? (Choose two.) 








A. Finance Accounting Application
B. Anti-Virus software
C. Admin Script Editor
D. VPN Software







Answer: B,D

An administrator attempts to apply software updates and patches to a base layer image. However, the reference Centralized Virtual Desktop (CVD) used to create previous base layers no longer exists. What should the administrator do to recover the original reference CVD with the least administrative effort?

An administrator attempts to apply software updates and patches to a base layer image. However, the reference Centralized Virtual Desktop (CVD) used to create previous base layers no longer exists.
What should the administrator do to recover the original reference CVD with the least administrative effort? 






A. Rebuild the image from scratch and re-create the reference CVD.
B. Convert an existing CVD to a reference CVD.
C. Import the reference CVD from backup.
D. Recreate the reference CVD from an existing base layer.







Answer: D

A administrator needs to capture an OS base layer in Mirage. The administrator finds the following information in the Mirage client endpoint: No data is sent from the endpoint. The time between the start of the initialization and the machine returning to idle is less than 10 seconds. Where should the administrator look to resolve the issue?

A administrator needs to capture an OS base layer in Mirage. The administrator finds the following information in the Mirage client endpoint:
No data is sent from the endpoint. The time between the start of the initialization and the machine returning to idle is less than 10 seconds.
Where should the administrator look to resolve the issue? 







A. All CVDs Collection in the Mirage console
B. Mirage server logs
C. Windows Services on the endpoint
D. Upload Policies in the Mirage console







Answer: C

A Mirage Administrator needs to deploy Lotus Notes. Lotus Notes has a configuration file that is placed under the Program Files directory and shared across all users. The base layer must initially provision the file for Lotus Notes to function properly. However, the file is then modified locally to maintain the user configuration. Which step must the Mirage Administrator take to avoid losing user customization?

A Mirage Administrator needs to deploy Lotus Notes. Lotus Notes has a configuration file that is placed under the Program Files directory and shared across all users. The base layer must initially provision the file for Lotus Notes to function properly. However, the file is then modified locally to maintain the user configuration.
Which step must the Mirage Administrator take to avoid losing user customization? 








A. In Layer Rules, add the configuration file path to the Do Not Override By Layer policy.
B. In Layer Rules, add Lotus Notes application to the Do Not Override By Layer policy.
C. In the Base Layers properties, under Program Files tab, add Lotus Notes.
D. In the Base Layers properties, add the configuration file path to the exception list.







Answer: A

An organization has the following desktops:

An organization has the following desktops: 







A. Capture Base Windows 7 64-bit OS layer
B. Deploy Windows 7 32-bit Centralized Virtual Desktop (CVD) to all Windows 7 desktops
C. Create Office 2013 App Layer
D. Perform desktop centralization of all the Windows 7 64-bit desktops






Answer: D

An administrator enables the Block Storage Volume option in order to prevent a storage volume from reaching full capacity. Which two statements describe the volume's functionality once this option is enabled? (Choose two.)

An administrator enables the Block Storage Volume option in order to prevent a storage volume from reaching full capacity.
Which two statements describe the volume's functionality once this option is enabled? (Choose two.)







A. New Centralized Virtual Desktops (CVDs) will not be able to be centralized to the volume.
B. New base layers will be able to be centralized to the volume.
C. Existing Centralized Virtual Desktops (CVDs) and base layers will continue to function as expected.
D. Existing base layers on the volume will not be able to be moved to other volumes.







Answer: A,C

A vSphere administrator determines that more metrics are available for viewing in the realtime view than are available in the daily view for a virtual machine. What is the reason for this discrepancy in the number of available metrics?

A vSphere administrator determines that more metrics are available for viewing in the realtime view than are available in the daily view for a virtual machine.
What is the reason for this discrepancy in the number of available metrics? 






A. The daily view does not contain all of the metrics that the realtime view does.
B. The default vCenter statistics level is being used.
C. A vCenter statistics level of 4 is being used.
D. The daily view presents a different selection of metrics by default than presented by the realtime view.






Answer: B

A potential Branch Reflector has ample disk space to store base layers, application layers, driver libraries, and User State Migration Tool (USMT) files. Which other conditions are required for an endpoint to become a Branch Reflector?

A potential Branch Reflector has ample disk space to store base layers, application layers, driver libraries, and User State Migration Tool (USMT) files.
Which other conditions are required for an endpoint to become a Branch Reflector? 







A. connected to the LAN?TCP port 8001 to support connections from other Mirage endpoints
B. connected to the LAN?TCP port 8001 to support connections from other Mirage endpoints
C. ?Power-saving features disabled?Directly connected to the WAN?TCP port 8000 to support connections from other Mirage endpoints
D. ?Power-saving features enabled?Directly connected to the wireless network?TCP port 8001 to support connections from other Mirage endpoints





Answer: B

An ESXi 5.x host is unable to connect to a vCenter 5.x server. Which commands should an administrator use to restart the management agents on the host?

An ESXi 5.x host is unable to connect to a vCenter 5.x server.
Which commands should an administrator use to restart the management agents on the host? 







A. SSH to the host and execute the commands - /etc/init.d/hostd restart and /etc/init.d/vpxa restart
B. SSH to the host and execute the commands -/etc/init.d/vpxd restart and /etc/init.d/vpxa restart
C. SSH to the host and execute the commands -/etc/init.d/vmware-hostd restart and /etc/init.d/vmware- vpxa restart
D. SSH to the host and execute the commands -/etc/init.d/vmware-hostd restart and /etc/init.d/vpxd restart







Answer: A

While troubleshooting a crash event on an ESXi 5.x host, an administrator determines the log files related to the event are not present. Which action should the administrator take to resolve the logging issue?

While troubleshooting a crash event on an ESXi 5.x host, an administrator determines the log files related to the event are not present.
Which action should the administrator take to resolve the logging issue? 







A. Increase the amount of memory committed to log storage.
B. Increase the statistic data collection level to 4.
C. Change the roll-up type to maximum.
D. Create a persistent scratch location.







Answer: D