Vous êtes sur la page 1sur 124

VCPD610

VMware Certified Professional Desktop

Version 6.0

QUESTION NO: 1
An administrator needs to set up an environment that will allow administrators to access virtual
desktops as needed and reset the desktop state when users logoff. Additionally, administrators
need to be able to manage physical desktops from one interface.

Which component should the administrator use to meet the requirements?

A. View
B. Mirage
C. ThinApp
D. Desktop

Answer: A

QUESTION NO: 2
An administrator needs to provide access to applications for users regardless of whether the users
have network access.

Which two VMware components should the administrator choose? (Choose two.)

A. VMware Workspace
B. VMware ThinApp
C. VMware Horizon View
D. VMware Mirage

Answer: B, D

QUESTION NO: 3
While backing up users' data, an administrator needs to ensure that users of physical desktops are
using the corporate image and application choices.

Which VMware component should the administrator choose to meet the requirements?

A. VMware Horizon View


B. VMware Workspace
C. VMware ThinApp
D. VMware Mirage

Answer: D

QUESTION NO: 4
What two prerequisites must be met before View Composer can be installed? (Choose two.)

A. No other application on the View Composer server should use Windows SSLv2 libraries.
B. A domain user account with Administrator privileges on the system must be used.
C. No other application on the View Composer server should use OpenSSLv2 libraries.
D. A local user account with Administrator privileges on the system must be used.

Answer: A, B

QUESTION NO: 5
An administrator needs to install View Composer. The current environment uses a vCenter
Server appliance and four ESXi hosts.

Which two steps should the administrator take to complete the installation? (Choose two.)

A. Log in using a domain user account with local Administrator privileges.


B. Install the View Composer server on the vCenter server.
C. Log in using Administrator@vsphere.local.
D. Install the View Composer server on a standalone Windows server.

Answer: A, D

QUESTION NO: 6
Which prerequisite must an administrator verify before installing a View Connection server?

A. Internet Information Services (IIS)


B. Dynamic IP address
C. Apache Web Server
D. Static IP address

Answer: D

QUESTION NO: 7
Which server is the source for Active Directory Lightweight Directory Service (AD LDS)
information during the installation of a Replica Server?

A. Security server
B. Connection server
C. vCenter Server
D. Domain Controller

Answer: B

QUESTION NO: 8
An administrator is installing View Connection server and stops at the Authorize a View
Administrators account step.

Which user or group is the default suggestion at this stage?

A. The Domain Admins group


B. The local user performing the install
C. The local Administrators group
D. The domain user performing the install

Answer: D
QUESTION NO: 9
An administrator needs to install a View security server without establishing a tunneled
connection to a View Connection Server.

Which step should be taken in the View Administrator console to accomplish this?

A. Deselect the Use IPSec for Security Server Connections check box
B. Select the Use IPSec for Security Server Connections check box
C. Deselect the Disable Tunnel for Security Server Connections check box
D. Select the Disable Tunnel for Security Server Connections check box

Answer: A

QUESTION NO: 10
What must an administrator remove to prepare for a View security server upgrade?

A. The Firewall rules


B. The IPSec rules
C. The Connection Server from the View environment
D. The security server from the View environment

Answer: B

QUESTION NO: 11
An administrator is managing a recent implementation of Windows Server 2008 R2 Remote
Desktop Session Hosts (RDSH) that are being used for Horizon RDS desktop pools. Users report
that the Aero styled theme is not present.

Which step must the administrator take to enable the Aero styled theme on the RDS hosts?

A. Configure vDGA for the Remote Desktop Session Host (RDSH) virtual machine.
B. Configure the GPO setting Force a specific visual style file or force Windows classic.
C. Run the Windows Experience Index (WEI) on the Remote Desktop Session Host (RDSH).
D. Upgrade the Remote Desktop Session Hosts (RDSH) to Windows Server 2012 R2.

Answer: B
QUESTION NO: 12
An administrator has installed View and needs to configure the PCoIP settings via a Group
Policy Object (GPO).

What should the administrator do first?

A. Create a GPO and apply the required policy settings.


B. Add pcoip.adm to the Administrative Templates on a View Connection server.
C. Link the GPO to the Organizational Unit (OU) that contains the virtual desktops.
D. Add pcoip.adm to the Administrative Templates on an Active Directory server.

Answer: D

QUESTION NO: 13
An administrator needs to provide access to a View virtual desktop for users in Domain A and
Domain B.

How should the administrator configure the domains and the View implementation?

A. Install a View Connection Server in a resource domain and create a one-way trust to both
Domain A and Domain B.
B. Install a View Connection Server in Domain A and create a one-way trust to Domain B.
C. Install a View Connection Server in Domain A and create a two-way trust between Domain A
and Domain B.
D. Install a View Connection Server in a resource domain and create a two-way transitive trust
between Domain A and Domain B.

Answer: C

QUESTION NO: 14
An administrator is granted access to a vCenter Server with a custom Active Directory user
account. The user account should have the required permissions for full management of the View
environment. However, when the administrator attempts to enable View Storage Accelerator,
permission is denied.

Which View privilege within vCenter Server needs to be configured?


A. Storage Views > View
B. Global > Act as vCenter Server
C. Host.Configuration > Advanced settings
D. Virtual Machine.Configuration > Modify device settings

Answer: B

QUESTION NO: 15
A View administrator needs to ensure that an environment is ready to use Smart Cards. The
cards use certificates generated by a third-party Certificate Authority (CA). The administrator
has verified that each certificate contains a UPN.

What must the administrator do to complete the preparation of the environment?

A. Import the root and intermediate CA certificates into the Trusted Root Certification
Authorities group policy in Active Directory.
B. Import the root and intermediate CA certificates into the Trusted Root Certification
Authorities store on the View Connection server.
C. Import the root and intermediate CA certificates into each user's Smart Card.
D. Enable Smart Card Authentication in the authentication settings in View Administrator.

Answer: A

QUESTION NO: 16
A VMware administrator determines that a low priority virtual machine is negatively affecting
the disk I/O performance of a higher priority virtual machine. The virtual machines are hosted on
the same datastore presented to the same ESXi host.

Which configuration option should the VMware administrator use to resolve this issue?

A. Increase the disk share value for the high priority VM.
B. Migrate the low priority VM to another ESXi host.
C. Create a Storage Profile for each priority level.
D. Enable vSphere APIs for Array Integration (VAAI).

Answer: A
QUESTION NO: 17
A VMware administrator needs to simplify the placement of virtual machines. The administrator
also needs to balance I/O load and space utilization automatically.

Which combination of features should the administrator use to achieve this?

A. Create a Datastore Cluster and enable Storage DRS on the cluster


B. Create a Datastore Cluster and enable Storage I/O Control on each datastore
C. Enable Storage DRS and Storage I/O Control on each datastore
D. Enable Storage I/O Control on each datastore and configure Storage vMotion

Answer: A

QUESTION NO: 18
When deploying two sibling resource pools (RP1 and RP2), an administrator needs to make all
resources in RP1 available to virtual machines in RP2.

Which configuration should the administrator use to meet this requirement?

A. Set the Reservation of RP2 to 0


B. Set the Reservation of RP1 to 0
C. Set the Limit of RP1 to Unlimited
D. Set the Limit of RP2 to Unlimited

Answer: B

QUESTION NO: 19
An administrator needs to deploy multiple copies of a virtual machine. A snapshot was taken
after development tools were installed to the VM. After the snapshot, a coding package was
added to the system. The snapshot will be used as the baseline configuration for new VMs.

Which steps should the administrator take to deploy the new VMs?

A. Select the snapshot and use Clone to Virtual Machine


B. Select the virtual machine and use Clone to Template
C. Select Revert to Latest Snapshot and use Clone to Virtual Machine
D. Select the virtual machine and use Clone to Virtual Machine
Answer: C

QUESTION NO: 20
The bandwidth between two sites is too slow to transfer large virtual machine files. The
administrator needs to export a virtual machine to OVF to reduce the size of the transfer. When
the administrator attempts to initiate the Export OVF Template feature, the selection is grayed
out.

What is the likely reason that the administrator is unable to select this option?

A. The virtual machine is in a powered on state.


B. There is not enough disk space on the destination for the OVF.
C. The administrator's account does not have the correct privileges.
D. The virtual machine is not compatible with the OVF format.

Answer: A

QUESTION NO: 21
An administrator needs to create and provision new virtual machines from a master image that
can not be edited or powered on.

Which type of resource is most appropriate for the administrator to perform the task?

A. Full Clone
B. Linked Clone
C. Template
D. Snapshot

Answer: C

QUESTION NO: 22
An administrator needs to configure a Linux virtual machine template to support guest
customization. The administrator has installed VMware Tools.

Which additional component is necessary to enable Linux guest OS customization?


A. Perl
B. Bash
C. Python
D. Sysprep

Answer: A

QUESTION NO: 23
A system administrator is deploying a Windows virtual machine from a template and needs the
IP address to be customized automatically.

How should the administrator configure the IP address?

A. Use the Microsoft Sysprep Tool.


B. Specify the IP address using the Deploy Virtual Machine wizard.
C. Use the VMware Quickprep Tool.
D. Manually configure IP addresses after the deployment has completed.

Answer: A

QUESTION NO: 24
From which two sources can an OVF template be deployed using the vSphere Client? (Choose
two.)

A. a local file
B. a local file on a VMFS datastore
C. an HTTP URL
D. an FTP URL

Answer: A, C

QUESTION NO: 25
A system administrator is unable to clone a Windows 2008 server while connected directly to an
ESXi host through the vSphere Client.

Which two methods can be used to complete this task? (Choose two.)
A. Connect to vCenter Server and retry the operation.
B. Use VMware Converter to perform the operation.
C. Connect to the host using the Web Client and retry the operation.
D. Use VMware Configuration Manager to perform the operation.

Answer: A, B

QUESTION NO: 26
A vSphere administrator is unable to vMotion a virtual machine between two hosts. An error
message indicates that the USB device is not accessible on the target host.

What is causing this issue?

A. The USB device was not enabled for vMotion when it was added to the virtual machine.
B. ESXi does not support vMotion with a USB device attached to the virtual machine.
C. The VMkernel port for vMotion is not enabled for USB traffic.
D. The virtual machine has the wrong USB controller installed.

Answer: A

QUESTION NO: 37
A vSphere administrator needs the ability to adjust the amount of guaranteed physical CPU and
Memory resources to a virtual machine without incurring application downtime.

Which actions must the administrator perform?

A. Enable CPU hotplug and Memory hotplug on the virtual machine.


B. Adjust the number of CPUs and the Memory Configuration for the virtual machine.
C. Adjust the CPU reservation slider and click the Reserve all Guest Memory checkbox.
D. Adjust the CPU and Memory reservation sliders on the virtual machine.

Answer: D

QUESTION NO: 28
A system administrator has an application installed on a physical machine that is licensed to the
MAC address of the physical NIC. This system needs to be virtualized.
What two methods could an administrator use to ensure the license will function in the virtual
machine? (Choose two.)

A. Manually set the MAC address for the vNIC in the guest OS
B. Install the NIC from the physical server into the ESXi host
C. Manually set the MAC address for the vNIC using the Web Client
D. Configure the physical server's MAC address in the virtual switch

Answer: A, C

QUESTION NO: 29
An administrator removes a virtual machine from a resource pool and places it in the DRS root
resource pool. Users report the performance of the application running on the virtual machine
has improved. The virtual machine relocation was the only change that occurred.

What explains the change in application performance?

A. The memory, storage, and/or CPU settings of the original resource pool restricted access to
resources for the virtual machine.
B. The configured memory, storage, and/or CPU shares on the root resource pool are higher than
the original resource pool.
C. The memory, storage, and/or CPU settings on the root resource pool restricted access to
resources for the virtual machine
D. The configured memory storage and/or CPU reservations on the root resource pool are higher
than the original resource pool.

Answer: A

QUESTION NO: 30
A vSphere administrator needs to enable Distributed Resource Scheduling (DRS) in an existing
vSphere environment.
The environment contains a High Availability (HA) cluster with eight ESXi hosts.
Six ESXi hosts are not in a cluster.
DRS should be used on as many hosts as possible.
Initial placement of virtual machines should be automatically performed.
Migration recommendations should be provided, but not performed without
approval.
Which procedure should the administrator perform to accomplish this task?

A. Select the datacenter and create a DRS cluster. Add the six remaining hosts to this cluster,
then enable DRS. Edit the DRS settings and change the automation level to Partial.
B. Select the existing HA cluster. Add the six remaining hosts to the cluster. Enable DRS, then
edit the settings and change the automation level to Manual.
C. Select the datacenter and create a DRS cluster. Add the six remaining hosts to this cluster,
then enable DRS. Edit the DRS settings and change the automation level to Manual.
D. Select the existing HA cluster. Add the six remaining hosts to the cluster. Enable DRS, then
edit the settings and change the automation level to Partial.

Answer: D

QUESTION NO: 31
An administrator must determine which Update Manager procedures can be performed using the
vSphere Web Client, and which must be completed using the Windows vSphere client.

Which two tasks require the use of the Windows vSphere client? (Choose two.)

A. Attach and detach baselines to inventory objects


B. Scan inventory objects for compliance
C. Create a baseline for an inventory object
D. Stage a baseline for remediation

Answer: C, D

QUESTION NO: 32
An administrator is attempting to use Update Manager to patch a cluster of ESXi 5.x hosts. The
administrator needs to stage the patches for a scheduled update after hours. When verifying the
hosts after the scheduled upgrade, the administrator determines that one of the hosts was not
remediated and patches are not staged. The host is using PXE as its boot method.

What condition would cause this behavior?

A. The host was rebooted prior to the scheduled remediation.


B. Remediating PXE-booted hosts using Update Manager is unsupported.
C. The user account used does NOT have the Remediate Hosts privilege.
D. The RAMdisk on the host has insufficient capacity.
Answer: A

QUESTION NO: 33
While troubleshooting a crash event on an ESXi 5.x host, an administrator determines the log
files related to the event are not present.

Which action should the administrator take to resolve the logging issue?

A. Increase the amount of memory committed to log storage.


B. Increase the statistic data collection level to 4.
C. Change the roll-up type to maximum.
D. Create a persistent scratch location.

Answer: D

QUESTION NO: 34
An ESXi 5.x host is unable to connect to a vCenter 5.x server.

Which commands should an administrator use to restart the management agents on the host?

A. SSH to the host and execute the commands - /etc/init.d/hostd restart and /etc/init.d/vpxa
restart
B. SSH to the host and execute the commands -/etc/init.d/vpxd restart and /etc/init.d/vpxa restart
C. SSH to the host and execute the commands -/etc/init.d/vmware-hostd restart and
/etc/init.d/vmware-vpxa restart
D. SSH to the host and execute the commands -/etc/init.d/vmware-hostd restart and
/etc/init.d/vpxd restart

Answer: A

QUESTION NO: 35
A vSphere administrator determines that more metrics are available for viewing in the realtime
view than are available in the daily view for a virtual machine.

What is the reason for this discrepancy in the number of available metrics?
A. The daily view does not contain all of the metrics that the realtime view does.
B. The default vCenter statistics level is being used.
C. A vCenter statistics level of 4 is being used.
D. The daily view presents a different selection of metrics by default than presented by the
realtime view.

Answer: B

QUESTION NO: 36
An administrator needs to create an alarm to monitor when a specific ESXi host in an HA/DRS
cluster becomes disconnected from other vSphere components like HA agents or the vCenter
server.

Which process must the administrator use to accomplish this?

A. Define a Host type alarm, monitor for the event Cannot connect host, and supply a conditional
trigger on Host name equal to a specific label.
B. Define a Cluster type alarm, monitor for the event Cannot connect host, and supply a
conditional trigger on Host name equal to a specific label.
C. Define a Cluster type alarm, monitor for the event Host status changed, and supply a specific
label for each host.
D. Define a Host type alarm, monitor for the condition Host status changed, and supply a
specific label for each host.

Answer: A

QUESTION NO: 37
An administrator needs to modify a virtual machine alert to increase the threshold value of the
trigger. Once connected to the vCenter Server, the administrator navigates to the virtual machine
to make the change. However, the administrator is unable to edit the alarm.

What is the reason that this alarm cannot be edited?

A. The alarm was not defined on this inventory object.


B. The administrator is not the owner of this inventory object.
C. The alarm was not created by the administrator.
D. The alarm has not been acknowledged.
Answer: A

QUESTION NO: 38
What should the administrator do first when configuring vCenter Operations Manager for
Horizon to monitor their View deployment?

A. Add Adapter from the View Configuration > Servers page in View
B. Add Adapter from the Custom Dashboard page > Configuration in vCenter Operations
Manager
C. Configure the Adapter from the Administration > Solutions page in vCenter Operations
Manager
D. Configure the Adapter from the View Configuration > Global Settings page in View

Answer: C

QUESTION NO: 39
A vCenter Operations Manager environment has been running for a few weeks. The
administrator needs to add the vCenter Operations Manager for Horizon instance to connect to
the View environment.

Where should the administrator go in the vCenter Operations Manager Web UI to achieve this?

A. Environment > VDI Environment > Adapter Instance


B. Environment > All Objects > Adapter Instance
C. Administration > Solutions > Add Solutions
D. Administration > Global Settings > Add Solutions

Answer: C

QUESTION NO: 40
An administrator is configuring the View Connection Broker Agent. The Adapter instance is
properly configured within vCenter Operations Manager for Horizon. When the administrator
clicks on the Test button to pair the server, the test fails. IP address and name resolution are
validated and working for both servers.

What should the administrator do to verify connectivity between both servers?


A. Verify that a proper Fully-Qualified Domain Name exists for the vCenter Operations for
Horizon servers.
B. Verify that the certificate on the vCenter Operations for Horizon server is recognized by the
View server.
C. Login with a domain admin instead of a local account on the View server.
D. Verify that the proper port is open between vCenter Operations for Horizon and the View
server.

Answer: D

QUESTION NO: 41
An administrator finds that some desktop pools fail to report metrics back to vCenter Operations
Manager for Horizon, while other desktops are reporting metrics as expected.

Which condition could cause this behavior?

A. The vCenter Operations Manager for Horizon server is not paired with a View Connection
server.
B. The vCenter Operations Manager for Horizon adapter is running version 1.0.1.
C. HKLM\SOFTWARE\VMware, Inc.\vCenter Operations Manager\Client is disabled.
D. The vCenter Operations Manager agent is disabled in the virtual desktops.

Answer: D

QUESTION NO: 42
An administrator needs an Active Directory service account to use for Quickprep. The
organization's policies do not allow the service account to create new computer accounts in
Active Directory. Pre-existing computer accounts must be reused.

Which three Active Directory permissions are required for the service account? (Choose three.)

A. List Contents
B. Read All Properties
C. Delete Computer Object
D. Reset Password
E. Write All Properties

Answer: A, B, D
QUESTION NO: 43
An administrator has installed an instance of View Composer on a standalone server and needs
to add a new vCenter Server to the View environment.

What should the administrator do to enable the use of View Composer with the new vCenter
Server?

A. Install a new instance of View Composer to use with the new vCenter Server.
B. Configure the new vCenter Server to use the current standalone View Composer server.
C. Create a new organizational unit in Active Directory for linked clone desktops created on the
new vCenter Server.
D. Add a user account to the new vCenter Server with permission to use the current standalone
View Composer server.

Answer: A

QUESTION NO: 44
At a minimum, which three Datastore permissions must be added to a vCenter Server role to
work with View Composer? (Choose three.)

A. Allocate Space
B. Update Virtual Machine Files
C. Browse Datastore
D. Low Level File Operations
E. Remove File

Answer: A, C, D

QUESTION NO: 45
An administrator needs to add Location-Based Printing to five virtual desktops.

Which two steps must the administrator take to accomplish this task? (Choose two.)

A. Create a GPO containing the AutoConnect Map Additional Printers for VMware View group
policy setting.
B. Create a GPO containing the Enable Printer Location Tracking for VMware View group
policy setting.
C. Add the computer names of the desktops using Security Filtering.
D. Add the MAC addresses of the desktops using Security Filtering.

Answer: A, C

QUESTION NO: 46
An administrator creates a new pool of dedicated linked-clone desktops. The desktops are
powered off every night and need to be powered on each morning at the start of the shift. Users
report that it takes too long to login to their desktops.

What should the administrator do to decrease the boot time of the linked-clone desktops?

A. Add a persistent disk to the desktop.


B. Enable View Storage Accelerator in the Connection Server settings.
C. Enable View Storage Accelerator in the desktop pool settings.
D. Convert the desktops to full clones.

Answer: C

QUESTION NO: 47
A View environment includes a View Connection Server and View Security Server.

The View Connection Server has the following configuration:


DNS Name: view.company.com
IP Address: 192.168.1.1

The View Security Server has the following configuration:


DNS Name: security.company.com
IP Address: 10.10.10.1

An administrator needs to set up View to allow external access for users via PCoIP.

Which option represents the format in which information must be entered into the PCoIP
External URL field in View Administrator?

A. https://security.company.com:443
B. https://10.10.10.1:4172
C. 10.10.10.1:4172
D. security.company.com:4172

Answer: C

QUESTION NO: 48
An administrator in a large organization needs to delegate authority to manage a group of
desktops to another administrator at a remote site. The desktops have been placed in a folder in
View Administrator so that a user can be assigned to manage those desktops only.

The remote site administrator must be able to:


Perform all desktop, session, and pool-related operations
Manage persistent disks
Resync, Refresh, and Rebalance linked-clone pools and change the default pool
image

What is the most restrictive predefined role that can be assigned to meet these requirements?

A. Administrators
B. Agent Registration Administrators
C. Global Configuration and Policy Administrators
D. Inventory Administrators

Answer: D

QUESTION NO: 49
A database administrator needs to configure Microsoft SQL Server Express for the View Events
Database.

Which two steps must the database administrator complete? (Choose two.)

A. Enable Windows Authentication for the user on the database.


B. Enable SQL Server Authentication for the user on the database.
C. Determine the port number that is used to access the database server.
D. Set up the Events database tables.

Answer: B, C
QUESTION NO: 50
An administrator needs to backup the View LDAP Configuration and View Composer database.

What are three ways this can be accomplished? (Choose three.)

A. Schedule automatic backups by using the View Manager Configuration Backup feature.
B. Initiate a backup immediately by using the Backup Now feature in View Administrator.
C. Use a replicated instance of View Connection Server as the backup.
D. Take a snapshot of the View Connection server.
E. Manually export the View data by using the vdmexport utility.

Answer: A, B, E

QUESTION NO: 51
An administrator enables Persona Management for a desktop pool and leaves the universal
naming convention (UNC) path blank in the session variable Persona Repository Location.

What is the likely outcome?

A. The User Profile will not be created.


B. The User Profile will be created but when users log on again their files will not be available.
C. The User Profile Path in Active Directory will be used.
D. The User Profile Path will default to the local My Documents.

Answer: C

QUESTION NO: 52
An administrator is creating a shared folder to use as the Profile Repository for Persona
Management.

Which requirement must be met?

A. The shared folder must be in the same Active Directory forest as the users who use the shared
folder.
B. The shared folder must be on an FTP server.
C. The shared folder cannot be shared across View Pools.
D. The shared folder must be on a Network Files System (NFS) share.

Answer: A

QUESTION NO: 53
An administrator needs to configure Persona Management with a Dedicated Linked Clone Pool.
The administrator is aware that users save large files to their user profiles and needs to avoid
long load times of the user data.

What should the administrator do to enhance performance of Persona Management when loading
the user data?

A. Enable the Remove local persona at log off policy.


B. Configure Persistent Disks with Persona Management.
C. Enable View Storage Accelerator.
D. Configure Non-Persistent Disks with Persona Management.

Answer: B

QUESTION NO: 54
An administrator is configuring a group of desktops that will be accessed via the PCoIP display
protocol across a WAN link.

Which two settings should the administrator apply to minimize bandwidth usage? (Choose two.)

A. Lower the Maximum Frame Rate


B. Raise the Maximum Frame Rate
C. Disable the Turn off Build-to-Lossless feature
D. Enable the Turn off Build-to-Lossless feature

Answer: A, D

QUESTION NO: 55
Which setting will allow a remote desktop session to be monitored by an administrator?

A. Enable Access to a PCoIP session from a vSphere console


B. Enable session shadowing of a PCoIP session from a vSphere console
C. AllowDirectRDP
D. AllowSingleSignon

Answer: A

QUESTION NO: 56
Which GPO settings should be configured to achieve the highest quality for graphics and video
with PCoIP desktop connections?

A. Enable Turn off Build-to-Lossless feature setting.


B. Set Maximum Frame Rate to 15.
C. Disable Turn off Build-to-Lossless feature setting.
D. Set the Configure the PCoIP session bandwidth floor to 1,000Kbps.

Answer: C

QUESTION NO: 57
Which two settings are required to prevent RDP access to a group of View desktops? (Choose
two.)

A. Disable AllowDirectRDP.
B. Enable AllowDirectRDP.
C. Select the Pool Settings tab and select PCoIP as the default display protocol.
D. Select the Pool Settings tab and disable RDP as a possible display protocol.

Answer: A, C

QUESTION NO: 58
A View administrator receives reports that users are experiencing degraded performance from
their zero clients. After investigating with a network administrator, the administrator notices a lot
of network congestion.

What should the View administrator ask the network administrator to change?

A. Enable Tail-Drop on the routers.


B. Enable WRED on the routers.
C. Enable Network Traffic Analyzer on the Switches.
D. Enable RRED on the routers.

Answer: B

QUESTION NO: 59
All RDP connections to virtual desktops must use the Horizon Client. Direct RDP connections
using alternate clients must be disabled due to security considerations.

Which step must be taken to prevent direct RDP connections?

A. Select No for the Allow users to choose protocol option and select PCoIP as the default
protocol.
B. Apply the AllowDirectRDP GPO to the virtual desktops.
C. Apply the AllowDirectRDP GPO to the Connection Server.
D. Select Yes for the Allow users to choose protocol option and disable RDP access in the global
policies.

Answer: B

QUESTION NO: 60
An administrator needs to replace the default self-signed SSL certificates for all View servers.
An internal certification authority (CA) server will be used to issue new SSL certificates.

Clients will connect to View virtual desktops using the latest Horizon client on both corporate-
owned and staff-owned bring your own device (BYOD) clients.

What must the administrator consider to ensure all clients can connect without security warnings
or error messages?

A. Clients must connect to Horizon using the fully qualified domain name (FQDN).
B. All client devices must trust the root CA certificate and any intermediate CA certificates.
C. The new certificate must be added to the certificate revocation list (CRL).
D. All View servers must trust the client SSL certificates for staff-owned BYOD clients.

Answer: B

QUESTION NO: 61
An administrator is configuring RADIUS authentication for a View implementation and enters
the RADIUS server host name into the View Administrator console.

Which additional information must be entered into View Administrator to properly configure
RADIUS?

A. Port number, authentication type, and shared secret


B. DNS server, port number, and shared secret
C. Authentication type, shared secret, and public key
D. Public key, authentication type, and shared secret

Answer: A

QUESTION NO: 62
An administrator is installing RSA SecurID authentication for a View implementation and needs
to force the RSA and Active Directory user names to match during authentication.

Which option should the administrator select to meet the requirement?

A. Enforce SecurID and Windows user name matching.


B. Enforce 2-Factor and Windows user name matching.
C. Synchronize SecurID and Windows user name matching.
D. Synchronize 2-Factor and Windows user name matching.

Answer: A

QUESTION NO: 63
An administrator is creating a pool of desktops for a group of developers. The administrator
needs to provide control to a user from the group to manage the recompose and refresh
operations. The user's controls must apply only to the developer pool.

What should the administrator do?

A. Create a developer folder, add the developer pool, and assign a user with the Inventory
Administrators role to the folder.
B. Create the developer pool and assign the Manage Desktops global privilege to the virtual
desktops.
C. Create the developer pool and assign the Inventory Control global privilege to the virtual
desktops.
D. Create a developer folder, add the desktops, and assign a user with the Manage Desktops role
to the folder.

Answer: A

QUESTION NO: 64
A View environment consists of a Connection Server named connect-01 and a security server
named security-01.

An administrator needs to configure RSA SecurID authentication for external users. Internal
users must not be prompted for the RSA SecurID token code.

What should the administrator do?

A. Configure 2-factor authentication on the security-01 security server.


B. Configure 2-factor authentication on the connect-01 Connection Server.
C. Add a new Connection Server named connect-02 for internal users. Configure 2-factor
authentication on the connect-01 Connection Server.
D. Add a new security server named security-02 for internal users. Configure 2-factor
authentication on the security-01 security server.

Answer: C

QUESTION NO: 65
An application was packaged using ThinApp and access is restricted to an Active Directory
group called Customer Services. An administrator needs to remove this restriction.

What should the administrator do to remove this restriction with the least effort?

A. Repackage the application, selecting Everyone from the Setup Capture wizard.
B. Remove the PermittedGroups section from package.ini and execute build.bat.
C. Change PermittedGroups=1 to 0 within package.ini and execute sbmerge.exe.
D. Change PermittedGroups=0 to 1 within package.ini and execute sbmerge.exe.

Answer: B
QUESTION NO: 66
An administrator needs to configure View to support ThinApp applications. Which file location
should the administrator choose for the ThinApp repository?

A. \\10.232.98.55\ThinApps
B. \\filesrv9.domain.local\ThinApps
C. http://websrv7.domain.local/thinapprepo
D. ftp://websrv7.domain.local/thinapprepo

Answer: B

QUESTION NO: 67
An administrator has packaged an application with ThinApp but failed to include an important
update.

What should the administrator do on the capture machine to include the application update in the
package?

A. Install the update, delete the sandbox, and then use the sbmerge apply command.
B. Delete the sandbox, install the update, and then use the sbmerge apply command.
C. Install the update, delete the sandbox, and then use the appsync command.
D. Delete the sandbox, install the update, and then use the appsync command.

Answer: B

QUESTION NO: 68
An administrator configures a user with a global entitlement and a global home site, but has not
set the scope policy.

Which search order will Cloud Pod Architecture use to find a desktop for that user?

A. Global home site, local pod, local site, other sites


B. Local pod, local site, other sites
C. Local pod, local site, global home site, other sites
D. Global home site, local site, other sites

Answer: A
QUESTION NO: 69
An administrator is creating a new Automated Linked-Clone desktop pool. The administrator has
also created a new parent virtual machine and has installed the View Agent.

Which additional step must be taken before the desktop is prepared for use in a Linked-Clone
pool?

A. Restart the virtual machine and clone to template.


B. Power off the virtual machine and take a snapshot.
C. Enable provisioning in View Administrator.
D. Enable provisioning in View Composer.

Answer: B

QUESTION NO: 70
An administrator is planning a new pool for a group of users.

The pool requirements are:


User data must be portable between desktops.
User-installed applications must persist between sessions.
SE Sparse disk will be used to reclaim storage capacity.
Linked-clones will be used to conserve storage capacity.
Desktops will be refreshed on log off.

The administrator plans to use View Composer persistent disks to support the requirements for
this pool.

Which requirement will prevent the use of View Composer persistent disks?

A. User data must be portable between desktops.


B. User-installed applications must persist between sessions.
C. SE Sparse disk will be used to reclaim storage capacity.
D. Linked-clones will be used to conserve storage capacity.

Answer: B
QUESTION NO: 71
An administrator is attempting to configure a new linked-clone pool to use software 3D
rendering and notices that the 3D Renderer option is unavailable.

The pool settings are as follows:


Default display protocol is set to PCoIP.
Allow users to choose protocol is set to Yes.
Max resolution of any one monitor is set to 1920 x 1200.
Max number of monitors is set to 2.

Which setting change should the administrator make to allow the 3D Renderer to be enabled?

A. Change the Default display protocol setting to RDP.


B. Change the Allow users to choose protocol setting to No.
C. Change the Max resolution of any one monitor setting to 2560 x 1600.
D. Change the Max number of monitors setting to 1.

Answer: B

QUESTION NO: 72
What are three reasons to choose linked clone virtual machines instead of full clones? (Choose
three.)

A. Linked clones reduce the amount of free storage space required for virtual desktops.
B. Linked clones provision faster than full clones.
C. Linked clones reduce the storage IOPS compared to full clones.
D. Linked clones can be reconfigured in large batches by using recompose operations.
E. Linked clones can be used for a broader variety of user types and use cases than full clones.

Answer: A, B, D

QUESTION NO: 73
An administrator is deploying View. An independent consultant has been hired to study the
administrator's company to categorize users into use cases.

The administrator has been building the pools for the environment and is creating a pool for the
following use case:
Number of users: 1500
Applications: User installed and standard company apps
Devices: USB storage devices
Data Storage: both file server & temporary working data stored in C:\RawData

Which two use case requirements make linked clones a poor choice for this pool? (Choose two.)

A. Number of users: 1500


B. Applications: User installed and standard company applications
C. Devices: USB storage devices
D. Data Storage: both file server & temporary working data stored in C:\RawData

Answer: B, D

QUESTION NO: 74
Users of a linked clone pool report strange behavior in an internally developed application. This
application is a client-server application with a proprietary back end data storage solution.

The application functioned properly during a small proof of concept test, but after going live in
production with about 35 users, the users report random disconnects.

The administrator examines the logs on the server side of this application and sees the following
message:

Event ID 3499: No more than 32 connections are allowed from the same computer SID.
Connection is terminated.

Which change should the administrator make to the pool to resolve the issue?

A. Use a QuickPrep Post-synchronization script to set the Windows hostname to match the
virtual machine name.
B. Select the radio button for Use a customization specification (Sysprep).
C. Select the option to Allow reuse of pre-existing computer accounts.
D. Set the QuickPrep Power-off script parameters to release the computer IP address before
shutdown.

Answer: B

QUESTION NO: 75
An administrator is migrating from vSphere 4.x to vSphere 5.5 and has purchased new ESXi
hosts with NVIDIA GRID-based graphics hardware.

Which two steps should the administrator take to allow virtual desktops to take advantage of the
new graphics hardware? (Choose two.)

A. Use the vSphere Client to upgrade the virtual machine hardware to version 10.
B. Use the vSphere Web Client to upgrade the virtual machine hardware to version 10.
C. In the pool settings area, set Allow Users to Choose Protocol to Yes.
D. In the pool settings area set Allow Users to Choose Protocol to No.

Answer: B, D

QUESTION NO: 76
An administrator is planning a Floating Linked-Clone desktop pool using local solid state drives.
A stateless configuration is suitable for this group of users.

Local solid state drive capacity is limited. The administrator plans to use the storage tiering
capabilities of View Composer to place the Linked-Clones on shared storage and place only the
Replica on local disk.

Why will the administrator be prevented from using this configuration?

A. Storage tiering is supported only when using Full Clone desktops.


B. Replica and Linked-Clone disks must reside on the same datastore when using local disks.
C. Replica disks must always reside on shared storage for Linked-Clone pools.
D. Storage tiering is supported only for Dedicated Assignment Linked-Clone desktops.

Answer: B

QUESTION NO: 77
An administrator experiences a system failure on the vCenter Server during a Linked-Clone
recompose operation.

Which two methods should the administrator use to resolve the unsuccessful recompose
operation? (Choose two.)

A. Select a new snapshot and then recompose once more.


B. Delete the failed snapshot and then recompose once more.
C. Delete the failed snapshot, create a new snapshot, and then recompose once more.
D. Select the snapshot that was used in the last successful recomposition and then recompose
once more.

Answer: A, D

QUESTION NO: 78
An administrator needs to create a full clone desktop pool and reduce storage costs by using the
SEsparse disk feature. However, this option is not displayed in the Add Pool wizard.

What is the likely reason that the administrator is prevented from enabling this option?

A. SEsparse disks can be used only with linked-clone desktop pools.


B. SEsparse disks are not supported with NFS storage.
C. SEsparse disks are not supported by the storage vendor.
D. SEsparse disks must be configured using PowerCLI.

Answer: A

QUESTION NO: 79
An administrator is required to convert a user desktop to a full clone without losing data. Which
method will fail to convert the user's desktop to a full clone?

A. Using the Clone to a Virtual Machine option in vCenter Server


B. Using a storage migration in vCenter Server
C. Using vmkfstools -i to convert the linked-clone VMDK to a full clone and attaching the disk
to a new virtual machine
D. Using vmksfstools -M to migrate the linked-clone VMDK to a full clone and attaching the
disk to a new virtual machine

Answer: D

QUESTION NO: 80
An administrator is attempting to create a Windows 8 full clone desktop pool. The View Agent
has been installed and a snapshot has been taken. However, the virtual machine is not listed
during the Add Pool wizard.
What is the likely cause of the issue?

A. Windows 8 desktops are not supported with full clones desktop pools.
B. Full clones desktop pools require virtual machine templates and not snapshots.
C. The Add Pool wizard must be refreshed to list new snapshots.
D. View Composer linked clones as selected instead of full virtual machines.

Answer: B

QUESTION NO: 81
An administrator is creating a View full clone desktop pool and needs to enable the 3D
Rendering feature. However, the option to select the 3D Renderer is unavailable.

What should the administrator do to enable this feature to be selected?

A. Set the default display protocol to RDP.


B. Install the latest View Feature Pack.
C. Enable the 3D Rendering option on the ESXi hosts.
D. Set Allow users to choose protocol to No.

Answer: D

QUESTION NO: 82
An administrator is configuring a new desktop pool for a group of users. Which condition
requires the administrator to use full clones instead of linked clones?

A. Virtual SAN must be used for virtual disk storage.


B. Users need to install their own applications.
C. Desktops must run Windows Server 2012 R2.
D. User data must be persistent across sessions.

Answer: B

QUESTION NO: 83
An organization has deployed View to the majority of its workforce. The organization also uses
blade PCs for some users who need RDP access to high-powered workstations. The
administrator needs to manage access to both environments through View.

Which configuration steps should the administrator complete to enable access through View?

A. Install the View Agent in each system and create a terminal services pool using the physical
PCs as desktop sources.
B. Install the View Agent in each system and create a manual pool using the physical PCs as
desktop sources.
C. Create a manual pool and enter the IP address of each physical desktop source.
D. Create a terminal services pool and enter the IP address of each physical desktop source.

Answer: B

QUESTION NO: 84
An administrator needs to create a new pool of desktops to support a team of eight design
engineers. Virtual Dedicated Graphics Acceleration (vDGA) will be used to provide hardware
GPU resources. Four physical GPUs are available for direct mapping to virtual machines.

Which type of pool should the administrator create?

A. Dedicated Assignment Automated Linked-Clone Pool


B. Floating Assignment Automated Full-Clone Pool
C. Floating Assignment Manual Pool
D. Dedicated Assignment Manual Pool

Answer: C

QUESTION NO: 85
An administrator is configuring a Group Policy Object (GPO) for an Organizational Unit (OU)
that contains virtual Windows 7 desktops. The administrator needs several user settings to apply
only to users accessing desktops in this OU.

After configuring the GPO, the administrator notices that the group policy user settings are not
being applied.

Why are the user settings not being applied?


A. The Loopback processing GPO setting was not enabled on the Computers OU.
B. The OU does not contain both User and Computer objects.
C. The Windows 7 desktops were not restarted after GPO was configured.
D. The user settings must also be applied to the default Users OU.

Answer: A

QUESTION NO: 86
An administrator needs to reduce the amount of shared storage space consumed by a linked clone
desktop pool.

Which two actions will accomplish this task? (Choose two.)

A. Use local storage on the ESXi hosts to store the virtual machine swapfile.
B. Use local storage on the ESXi hosts to store the disposable disk.
C. Create a 100% memory reservation for the parent virtual machine.
D. Create a 100% swapfile reservation for the parent virtual machine.

Answer: A, C

QUESTION NO: 87
An administrator is planning to implement Persona Management to provide user persistence for
the floating linked-clone desktop users. The current master image is optimized to comply with all
recommendations in the Optimization Guide for Windows 7 and Windows 8 Virtual Desktops in
Horizon with View.

Which two services must be enabled to support Persona Management? (Choose two.)

A. Microsoft Software Shadow Copy Provider


B. Volume Shadow Copy Service
C. Background Intelligent Transfer Service
D. Group Policy Client

Answer: A, B

QUESTION NO: 88
An administrator created a desktop pool for a set of users who need to review media files. The
users report stuttering video while viewing media files.

The administrator finds that Multimedia Redirection (MMR) is not processing the video. The
administrator confirms that the MMR feature was selected during installation and that the MMR
policy for the pool is set to Allow.

Which step must the administrator take to resolve this issue?

A. Enable MMR in the desktop pool settings.


B. Enable MMR in the Global Settings of the View Administrator.
C. Install a 3D GPU in the ESXi host and reinstall the View Agent.
D. Install Windows Media Player and reinstall the View Agent.

Answer: D

QUESTION NO: 89
An administrator needs to prevent users from removing critical components, such as the SCSI
adapter from their virtual desktops.

Which setting must be configured as part of the master image to meet this requirement?

A. In the VMX file, set devices.hotplug = "false".


B. In the VMX file, set devices.removable = "false".
C. In the Windows Guest OS, set HKLM\CurrentControlSet\Control\Class\Removable = 0.
D. In the Windows Guest OS, set HKLM\CurrentControlSet\Control\DeviceClass\Removable =
0.

Answer: A

QUESTION NO: 90
An administrator is planning a View deployment using a non-vShield Endpoint-integrated
antivirus solution.

What is a valid recommendation for deploying antivirus in View?

A. Host intrusion prevention should be disabled.


B. Linked clone desktops should use a common SPN.
C. Quickprep must be used for OS customization.
D. Non-vShield integrated solutions must use dedicated desktops.

Answer: A

QUESTION NO: 91
An administrator needs to customize a single virtual machine from a manual desktop pool. The
user must not be able to login to the desktop while the administrator is performing the
customization.

Which procedure should the administrator follow?

A. 1. Select the desktop pool in View Administrator


2. Select Enter Maintenance Mode
3. Perform the customization
4. Exit maintenance mode

B. 1. Select the desktop pool in View Administrator


2. Select Disable Provisioning
3. Perform the customization
4. Enable provisioning

C. 1. Select the virtual machine from the desktop pool inventory tab in View Administrator
2. Select Unassign User
3. Perform the customization
4. Reassign the user

D. 1. Select the virtual machine from the desktop pool inventory tab in View Administrator
2. Select Enter Maintenance Mode
3. Perform the customization
4. Exit maintenance mode

Answer: D

QUESTION NO: 92
An administrator is preparing a virtual machine guest OS for a View pool deployment. A
security policy requires that non-VMware View Clients must not be able to connect directly to
virtual desktops using RDP.
Which configuration option should the administrator choose to meet the requirement?

A. Set Allow users to choose protocol to No


B. Set Default display protocol to PCoIP
C. Set AllowDirectRDP to Disabled
D. Set Default display protocol to RDP

Answer: C

QUESTION NO: 93
An administrator is running a View Infrastructure with Linked Clones running on ESXi 5.x.
Users should not be able to eject devices such as CD-ROMs from the virtual desktops.

What should the administrator do on the vSphere Client to prevent users from ejecting devices?

A. Right click on the parent image, and then in Edit Settings-->Options, disable Hot Add.
B. Modify the parent image .vmx file, and set devices.hotplug to False.
C. Modify the parent image .nvram file, and set devices.hotplug to False.
D. Right click on the parent image and then in Edit Settings-->Hardware, disable Hot Plug.

Answer: B

QUESTION NO: 94
An administrator adds an RDS server to a farm to increase capacity for a group of users being
added to the environment. After the administrator adds the server, users report intermittent errors
when connecting to the application.

What is causing these errors?

A. The application pool has not been modified to include the new server.
B. The RDSH role has not been enabled on the server.
C. The application has not been installed on the newly added RDS server.
D. The newly added RDS server is a physical server.

Answer: C
QUESTION NO: 95
Which two actions will allow the administrator to deliver two applications that have conflicting
Java requirements? (Choose two.)

A. Package the application with ThinApp.


B. Create two separate RDS farms to host the applications.
C. Install the older version of Java and then upgrade to the latest required version.
D. Create a Mirage application layer for each application and add both layers to each server in
the RDS farm.

Answer: A, B

QUESTION NO: 96
An administrator is attempting to create a manual application pool using a ThinApp package.
The pool appears in the inventory, but the application status is unavailable. All other applications
are functioning normally.

What is causing the unavailable status?

A. An incorrect path is specified for the application.


B. The View Agent service on the RDS host is unreachable.
C. The ThinApp package must be recreated with the RDS option enabled.
D. ThinApp packages cannot be used for manual application pools.

Answer: A

QUESTION NO: 97
An administrator creates a post-customization script to install and configure IT utilities after a
linked-clone is deployed. The administrator runs the script, but it does not complete successfully.
The log shows that the script stopped running approximately halfway through.

What should the administrator do to ensure that the script completes successfully?

A. Ensure cscript is enabled in VMware Tools.


B. Increase the timeout limit for the post-customization script.
C. Check and sync the time on the desktop with Active Directory.
D. Add the ExecScriptTimeout option to the script.
Answer: B

QUESTION NO: 98
An administrator increases the number of virtual desktops in a desktop pool and finds that the
provisioning task fails with an error. The error indicates that an Active Directory object already
exists with the name of the virtual machine being created.

After reviewing the error, the administrator checks the inventory of the pool and finds that there
are two virtual machines with the same name in the inventory list.

What is causing the issue?

A. The naming pattern configured for the pool has been modified since the pool was created.
B. The Computer Account in Active Directory was moved out of the Organization Unit in which
it was created.
C. An existing virtual machine with the same name was moved out of the desktop pool folder in
vCenter Server.
D. The Allow re-use of pre-existing computer accounts setting is selected in the pool settings.

Answer: C

QUESTION NO: 99
An administrator creates a Windows 7 parent virtual machine for a linked-clone pool but finds
that some of the virtual machines fail to customize. The administrator has confirmed that the
View Agent is installed with the correct components. The virtual machines are configured with
the following hardware specifications:
1 vCPU
4GB RAM
VMXNET3 NIC
64MB Video RAM

What is causing the problem?

A. The Receive Side Scaling (RSS) setting for the VMXNET3 driver is set to 2.
B. Parent virtual machines for a linked-clone pool require a minimum of 2 vCPUs.
C. The parent virtual machine does not have enough video RAM configured.
D. The Microsoft Windows 7 patch for the VMXNET3 driver has not been installed.
Answer: D

QUESTION NO: 100


Refer to the exhibit.

A new employee with username of jsmith is replacing a former employee with username jdoe.
The pool is using dedicated assignment and has all desktops provisioned up front.

User jsmith receives the following message:

There are no desktop sources available right now. Please try again later.

An administrator views the information displayed in the exhibit shown:


Based on the information provided, what are two ways to solve the problem? (Choose two.)

A. Increase the number of virtual machines in the pool.


B. Delete and rebuild the virtual machines in the pool.
C. Unassign jdoe from HR03 and Assign jsmith to HR03.
D. Verify that user jsmith has RDP permissions to the desktops.

Answer: A, C

QUESTION NO: 101


An administrator is performing the post-installation configuration of Workspace Portal. While
running the setup wizard, the administrator receives an error message. The error message appears
during configuration of the Directory settings and indicates that the user account cannot be
found.

The administrator has confirmed the following:


The user account exists in Active Directory.
The user account has all of the required attributes.

What is causing the error?

A. The user account is located below the Base DN.


B. The user account has not been entered into the Global Catalog.
C. The user account is located above the Base DN.
D. The user account name is too long.

Answer: C

QUESTION NO: 102


An administrator is adding a new desktop pool for a business unit that has recently started using
Virtual Desktops. A new Organizational Unit (OU) has been created beside the original OU.

During provisioning of this new pool, the administrator receives an error message stating that
creation of the computer accounts failed. The same View Composer domain account is being
used for the existing pool and the new pool. The existing View Composer domain account is still
functioning correctly for the original desktop pool.

What is causing the failure to create the computer accounts?

A. The Parent virtual machine being used for the pool has not been enabled for use in the new
OU.
B. The new OU does not have the correct View-specific GPO settings applied.
C. The existing domain account is being used by the original OU and is locked for use on the
new OU.
D. The new OU does not have the correct permissions applied for the View Composer domain
account.

Answer: D

QUESTION NO: 103


An administrator is configuring Kiosk mode in View. The administrator completes the following
tasks:
Verifies that clients on the Windows machines that are being used can connect
with a normal username and password.
Creates accounts with appropriate Active Directory attributes for the machines
that will operate as kiosks.

When the clients are tested they do not automatically log in after connecting to the Connection
Server.
What is causing this issue?

A. The Kiosk mode user account was not added to the Connection Server to which the client is
connecting.
B. The Connection Server to which the client is connecting has not been enabled for Kiosk mode
clients.
C. The Kiosk mode user account was created in the wrong Organizational Unit.
D. The View Client machine has not been enabled for Kiosk mode using the client registry
settings.

Answer: B

QUESTION NO: 104


An administrator is entitling virtual desktops to users in the company. All Engineers,
Executives, and selected members of the Marketing group will require access. The administrator
builds the correct master image and configures an automated pool to use that image.

What should the administrator do to complete the deployment?

A. Entitle Marketing, Engineers, and Executives AD groups to the pool.


B. Entitle Engineers and Executives AD groups and individual Marketing accounts to the pool.
C. Create and entitle a new AD group titled ViewUsers; put the Marketing and Executives users
into that group.
D. Entitle Marketing to the pool, create another pool, and entitle Engineers to that pool.

Answer: B

QUESTION NO: 105


An administrator is deploying a pool of virtual desktops and receives the following message
when testing a desktop connectionfrom a View Client machine :

The Desktop Currently Has No Desktop Sources Available.

The administrator has confirmed that:


The desktops are built and are visible in the View Administrator console.
The desktops display a Agent Unreachable status in the View Administrator.
After logging in to the vCenter Server, what should the administrator ensure to troubleshoot the
issue?

A. The virtual desktops are powered on.


B. There are no Memory reservations.
C. There are no CPU reservations.
D. The View Composer service is running.

Answer: A

QUESTION NO: 106


During the process of pairing a View security server, the administrator aborts the operation and
attempts to run the pairing process again. The security server status displayed in the View
Administrator dashboard is Down, and remote users recieve the following message when
attempting to connect:

The View Connection Server authentication failed. No gateway is available to provide a secure
connection to a desktop. Contact your network Administrator.

What should the administrator do to resolve the issue?

A. In the View Connection Server instance click More Commands>Specify a Security Server
Pairing Password then enter a new password and install the security server again.
B. Run vdmadmin -S security_server_name and then install the security server again.
C. In the View Connection Server instance click More Commands>Specify a Security Server
Pairing Passwords then enter a password and restart the View Connection Server service.
D. Run vdmadmin -S security_server_name and restart the View Connection Server service.

Answer: A

QUESTION NO: 107


An organization has deployed a View environment. Users need to connect USB devices to their
View sessions:
All client endpoints are Windows 7 thin clients.
A firewall is in place through which all network traffic flows.
All Windows patches are up to date on guest virtual machines and endpoints.
Users report that USB devices are not connecting to the View sessions when they are plugged in
to the thin clients.

What are two reasons that could cause this behavior? (Choose two.)

A. TCP port 9427 is closed on the firewall.


B. TCP port 32111 is closed on the firewall.
C. Windows Mobile Device Center is preventing USB redirection.
D. USB redirection drivers on the guest virtual machine are missing or disabled.

Answer: B, D

QUESTION NO: 108


An administrator needs to install a legacy application to a Dedicated Full Clone Pool inside of
View. A ThinApp package is successfully created and assigned to the pool. The ThinApp
application status on the virtual desktops remains at Pending. Rebooting a desktop fails to
resolve the issue.

Which two steps should the administrator take to determine the cause of the problem? (Choose
two.)

A. Verify that the folder or share containing the ThinApp packages has the appropriate
permissions set.
B. Verify that the application package is an executable (.exe).
C. Verify that the application was not already installed on the virtual desktop.
D. Verify that there is enough disk space on the virtual desktop.

Answer: C, D

QUESTION NO: 109


An administrator receives reports from users connected to View PCoIP sessions of slow desktop
responsiveness and blurry images. Additionally, some users report being randomly disconnected
from their sessions.

The administrator determines the following:


Network Latency is 100ms.
PCoIP Packet Loss is more than 5%.
Which two solutions should the administrator implement to resolve the issues? (Choose two.)

A. Increase priority of PCoIP traffic.


B. Enable the Turn Off Build-to-Lossless GPO Setting.
C. Disable Spanning Tree on the switches.
D. Add additional vNICs to the virtual desktops.

Answer: A, B

QUESTION NO: 110


While deploying a View desktop pool, an administrator determines that the virtual desktops
remain at a status of Customizing.

In the debug-timestamp.txt log file of the View Agent, the administrator finds the error message:

Debug - Unable to connect to JMS


Server.com.vmware.vdi.agent.messageserver.Jmsmanager.a(SourceFile:238)
javax.jms.JMSException:Unable to create a connection to:[ServerEntry, hostname, port=4001]

What should the administrator do to troubleshoot the connection problem?

A. Verify that the View Composer Guest Agent Server service is set Started on the virtual
desktops.
B. Verify that the View Agent can communicate with the View Connection Server over port
4001.
C. Verify that the View Connection Server can resolve the DNS name of the vCenter Server.
D. Verify that the View Security Server can establish a connection using the AJP13 protocol
over port 4001.

Answer: B

QUESTION NO: 111


An administrator deployed a linked-clone pool with virtual desktops running Windows XP for a
branch office. The Active Directory server supporting the office is a Windows Server 2008 Read
Only Domain Controller (RODC). The administrator makes the following changes to Sysprep:
Join the Domain
Use the Virtual Machine name for the NetBIOS name
When the administrator attempts to provision the desktops using View Composer, the following
error message is displayed:

View Composer agent initialization state error (18): Failed to join the domain (waited 565
seconds)

What should the administrator do to provision the virtual desktops?

A. Configure the desktop pool to use Quickprep instead of Sysprep to provision the Linked
Clones.
B. Log in to the parent virtual machine and apply the RODC compatibility update for XP. Take a
new snapshot and recompose the pool.
C. Configure the virtual desktops to synchronize time from another domain controller that is
available on the network.
D. Log in to the parent virtual machine and reinstall the View Agent. Take a new snapshot and
recompose the pool.

Answer: B

QUESTION NO: 112


An organization has a View deployment with a Dedicated Full Clone Pool of Windows 7
desktops. Users connect to the desktops using a Zero Client with firmware 4.1.2. Periodically,
the desktops display a black screen after inactivity or after they go to sleep mode. The View
Connection Manager indicates the desktops are Connected.

An administrator finds the following PCoIP log messages:

<Date, Time> LVL:0 RC:0 SERVER==> WindowProC. Detected WM_DISPLAYCHANGE


event (1900x1200)

and

<Date,Time>LVL:2 RC. 0 IMG_FRONTEND:DisplayDevice[0] states -


DISPLAY_DEVICE_ATTACHED_TO_DESKTOP DISPLAY_DEVICE_ACTIVE

What should the administrator do to resolve the issue?

A. Configure the virtual desktop power management option Turn Off Display to Never.
B. Configure the virtual desktop power management option Sleep to Never.
C. Configure the virtual desktop power management option Turn Off Hard Disk to Never.
D. Configure the virtual desktop power management option PCI Express Link State Power
Management to Off.

Answer: A

QUESTION NO: 113


Users at a branch office are experiencing poor virtual desktop performance. The branch office
has ten users and a 2Mbps link to the datacenter.

Some of the users frequently access video content, but the performance issues began occurring
after a recent Group Policy Object (GPO) change. The performance issues do not occur when the
same users connect from the main office, which has a 10Mbps link to the data center.

Which PCoIP GPO change is most likely the cause of the performance issues?

A. Turn off Build-to-Lossless = Enabled


B. PCoIP session audio bandwidth limit = 100kbps
C. PCoIP client image cache size = 260MB
D. Maximum PCoIP session bandwidth = 4Mbps

Answer: D

QUESTION NO: 114


An end user is unable to access a View desktop after returning from a meeting. The user
connects through a PCoIP zero client. The desktop administrator investigates the issue and
notices display overlap entries in the pcoip_server logs.

What is preventing the client from connecting?

A. Power Saving Mode is enabled on the View desktop.


B. The auto_logoff option has been configured in the vdm_client.adm template.
C. There is a mismatch between client and desktop screen resolutions.
D. The framerate is set too high for the client configuration.

Answer: A
QUESTION NO: 115
An administrator has deployed a View security server, with PCoIP as the only allowed protocol.
External users can successfully authenticate, and are presented with an available desktop pool.
However, the users are unable to connect to the virtual desktop.

Which View configuration must be performed?

A. Enable HTTP(S) Secure Tunnel


B. Enable PCoIP Secure Gateway
C. Enable Blast Secure Gateway
D. Enable Provisioning

Answer: B

QUESTION NO: 116


An administrator has set the default display protocol for a desktop to PCoIP to support 1080p
quality video on the LAN. Group Policy Object (GPO) settings are applied to the virtual
desktops to enforce the following settings:
PCoIP session bandwidth floor = 0
Enable Buld to Lossless = Enabled
PCoIP Maximum Frame Rate = 20
Minimum Initial Image Quality = 90

Which configuration option is responsible for users reporting that video playback is choppy?

A. PCoIP session bandwidth floor


B. Enable Build to Lossless
C. Minimum Initial Image Quality
D. PCoIP Maximum Frame Rate

Answer: D

QUESTION NO: 117


Users report poor performance over a wide area network. Ten users share a 5Mbps link for this
site.
The administrator suspects a PCoIP configuration issue. The administrator finds the following
PCoIP configuration settings:
Turn off Build-to-Lossless feature = Enabled
PCoIP Session Bandwidth Floor = 1000
Maximum Frame Rate = 24
PCoIP Client Image Cache Size Policy = 250

Which setting is likely causing the performance issue?

A. Turn off Build-to-Lossless feature = Enabled


B. PCoIP Session Bandwidth Floor = 1000
C. Maximum Frame Rate = 24
D. PCoIP Client Image Cache Size Policy = 250

Answer: B

QUESTION NO: 118


An administrator identifies PCoIP packet fragmentation on the network. The following items
have been discovered:
Network Path Maximum Transmission Unit (MTU) is 1200
PCoIP Traffic has Quality of Service (QoS)

What should the administrator do?

A. Set router buffers to tail drop.


B. Set router buffers to Weighted Random Early Detection (WRED).
C. Set PCoIP MTU to 1500
D. Set PCoIP MTU to 1100

Answer: D

QUESTION NO: 119


An administrator needs to view Windows 7 Virtual Desktops from the vSphere Console while a
user has a PCoIP session to the Virtual Desktop.

When the administrator opens a vSphere Console to a Virtual Desktop, the Console screen is
black. The administrator enables the Session Variable Enable access to a PCoIP session from a
vSphere console. However, a black screen still appears when the administrator opens in the
vSphere Console to the Virtual Desktops.

What is preventing the Virtual Desktop from showing in the vSphere Console?
A. The Virtual Desktop Hardware Version is 9.
B. The Virtual Desktop Hardware Version is 7.
C. The Virtual Desktop Hardware Version is 8.
D. The Virtual Desktop Hardware Version is 10.

Answer: B

QUESTION NO: 120


Users on the local area network (LAN) are reporting poor performance and failed PCoIP
connections when accessing their virtual desktops.

What is a likely cause of this issue?

A. vCenter Server is offline


B. PCoIP encryption level
C. MMR is disabled
D. Out of order packets

Answer: D

QUESTION NO: 121


Which two tools should an administrator use to monitor PCoIP session statistics when
troubleshooting PCoIP performance issues with a user's virtual desktop? (Choose two.)

A. Windows Performance Monitor


B. vCenter Monitoring and Performance
C. ESXTOP
D. vCenter Operations Manager for Horizon

Answer: A, D

QUESTION NO: 122


Refer to the Exhibit.
An organization has deployed a View environment containing 200 virtual desktops. Users report
that the virtual desktops are not performing well during certain times of the day.

An administrator analyzes a performance chart for the View infrastructure, as shown. The
administrator needs to resolve the problem without affecting the users' productivity.

What step can the administrator take to improve performance with the least amount of impact on
the users?

A. In the View Administrator console, create additional pools and move some desktops to the
new pool.
B. In the View Administrator console, enable the Storage Optimization option Select separate
datastores for replica and OS disk.
C. In the View Administrator console, add additional Datastores to the View cluster.
D. In the View Administrator console, enable View Storage Accelerator.

Answer: D

QUESTION NO: 123


Refer to the exhibit.
An administrator recently updated a linked-clone desktop pool with optimizations to improve
performance. After the desktop pool is recomposed, users are unable to connect to their client
printers.

Which Windows service is causing the client printers to fail to connect to virtual desktops?

A. Desktop Window Manager Session Manager


B. VMware USB Arbitration Service
C. TP AutoConnect Service
D. Windows Firewall

Answer: C

QUESTION NO: 124


A potential Branch Reflector has ample disk space to store base layers, application layers, driver
libraries, and User State Migration Tool (USMT) files.

Which other conditions are required for an endpoint to become a Branch Reflector?
A. Power-saving features enabled
Directly connected to the LAN
TCP port 8001 to support connections from other Mirage endpoints

B. Power-saving features disabled


Directly connected to the LAN
TCP port 8001 to support connections from other Mirage endpoints

C. Power-saving features disabled


Directly connected to the WAN
TCP port 8000 to support connections from other Mirage endpoints

D. Power-saving features enabled


Directly connected to the wireless network
TCP port 8001 to support connections from other Mirage endpoints

Answer: B

QUESTION NO: 125


An administrator enables the Block Storage Volume option in order to prevent a storage volume
from reaching full capacity.

Which two statements describe the volume's functionality once this option is enabled? (Choose
two.)

A. New Centralized Virtual Desktops (CVDs) will not be able to be centralized to the volume.
B. New base layers will be able to be centralized to the volume.
C. Existing Centralized Virtual Desktops (CVDs) and base layers will continue to function as
expected.
D. Existing base layers on the volume will not be able to be moved to other volumes.

Answer: A, C

QUESTION NO: 126


Which two commands will allow export and import of the Minimal Restore Set? (Choose two.)

A. addMinimalSet C:\minimalset.xml
B. exportMinimalSet C:\minimalset.xml
C. getMinimalSet C:\minimalset.xml
D. removeMinimalSet C:\minimalset.xml

Answer: A, C

QUESTION NO: 127


An organization has the following desktops:
100 Windows XP SP3 physical desktops
25 Windows 7 32-bit desktops
25 Windows 7 64-bit desktops

The organization has mandated that all existing desktops are backed up and then migrated to
Windows 7. An administrator has already performed the following tasks:
Configured User State Migration Tool (USMT)
Performed desktop centralization of all the Windows XP SP3 desktops
Performed desktop centralization of all the Windows 7 32-bit desktops
Captured Base Windows 7 32-bit OS layer
Created Office 2010 App Layer

What must the administrator do next to fulfill the stated requirements?

A. Capture Base Windows 7 64-bit OS layer


B. Deploy Windows 7 32-bit Centralized Virtual Desktop (CVD) to all Windows 7 desktops
C. Create Office 2013 App Layer
D. Perform desktop centralization of all the Windows 7 64-bit desktops

Answer: D

QUESTION NO: 128


A Mirage Administrator needs to deploy Lotus Notes. Lotus Notes has a configuration file that is
placed under the Program Files directory and shared across all users.

The base layer must initially provision the file for Lotus Notes to function properly. However,
the file is then modified locally to maintain the user configuration.

Which step must the Mirage Administrator take to avoid losing user customization?
A. In Layer Rules, add the configuration file path to the Do Not Override By Layer policy.
B. In Layer Rules, add Lotus Notes application to the Do Not Override By Layer policy.
C. In the Base Layers properties, under Program Files tab, add Lotus Notes.
D. In the Base Layers properties, add the configuration file path to the exception list.

Answer: A

QUESTION NO: 129


A administrator needs to capture an OS base layer in Mirage. The administrator finds the
following information in the Mirage client endpoint:
Upload initialization started (0%)
Machine Idle

No data is sent from the endpoint. The time between the start of the initialization and the
machine returning to idle is less than 10 seconds.

Where should the administrator look to resolve the issue?

A. All CVDs Collection in the Mirage console


B. Mirage server logs
C. Windows Services on the endpoint
D. Upload Policies in the Mirage console

Answer: C

QUESTION NO: 130


An administrator attempts to apply software updates and patches to a base layer image. However,
the reference Centralized Virtual Desktop (CVD) used to create previous base layers no longer
exists.

What should the administrator do to recover the original reference CVD with the least
administrative effort?

A. Rebuild the image from scratch and re-create the reference CVD.
B. Convert an existing CVD to a reference CVD.
C. Import the reference CVD from backup.
D. Recreate the reference CVD from an existing base layer.
Answer: D

QUESTION NO: 131


An administrator is planning the capture of a reference machine for two departments: Finance
and Information Technology.

Which two applications should the administrator include in the common base layer? (Choose
two.)

A. Finance Accounting Application


B. Anti-Virus software
C. Admin Script Editor
D. VPN Software

Answer: B, D

QUESTION NO: 132


Several users within a corporation installed a team collaboration utility onto their Mirage-
managed systems. The systems became erratic, so they uninstalled the application, but the
problem remained.

An administrator needs to repair the users' systems and ensure they are compliant with the
corporate image. All user profile data must remain intact.

What should the administrator do?

A. Revert to Snapshot with Restore System Only option selected.


B. Enforce All Layers with the Preserve user applications option selected.
C. Revert to Snapshot without Restore System Only option selected.
D. Enforce All Layers with the Remove user applications option selected.

Answer: D

QUESTION NO: 133


Corporate security policy requires that all user endpoints be encrypted with Full-Disk
Encryption.
What should the administrator do prior to migrating the user endpoints from Windows XP to
Windows 7?

A. Deploy the Mirage Encryption Assistance Tools to the endpoint prior to migration.
B. Decrypt the BIOS of the endpoint prior to migration.
C. Decrypt the disk(s) of the endpoint prior to migration.
D. Decrypt the C:\Windows directory of the endpoint prior to migration.

Answer: C

QUESTION NO: 134


After creating an Upload policy for a group of users, an administrator has found a significant
increase in storage usage by Mirage. After further investigation, the administrator finds that the
increase is a result of users storing personal MP3 libraries on the system.

What should the administrator do to prevent these files from being protected while allowing the
users to store the files on the system?

A. Add a Rule to the User Area for MP3 files in the Upload policy.
B. Create a Collection labeled Exclude MP3s.
C. Add a Rule Exception to the Unprotected Area for MP3 files in the Upload policy.
D. Add a Rule to the Unprotected Area for MP3 files in the Upload policy.

Answer: A

QUESTION NO: 135


Which two user authentication methods are natively supported by Workspace Portal? (Choose
two.)

A. Kerberos
B. RSA SecurID
C. RADIUS
D. Smart cards

Answer: A, B

QUESTION NO: 136


An administrator needs to modify the Workspace Portal instance to provide access to a group of
users in a different Active Directory Forest.

Which two steps must the administrator take to connect to this new forest? (Choose two.)

A. Set the LDAP port to 389 (non-SSL) or 636 (SSL).


B. Set the global catalog port to 3268 (non-SSL) or 3269 (SSL).
C. Select sAMAccountName as the Active Directory attribute that contains the username.
D. Select userPrincipalName as the Active Directory attribute that contains the username.

Answer: B, D

QUESTION NO: 137


Several users spanning multiple Active Directory groups have been assigned to a special project
and need access to a set of applications.
An administrator needs to create a group to manage these users in Workspace Portal but does not
have access to Active Directory to create a new group there.

What should the administrator do?

A. Edit the Directory Sync rules to create a filter group.


B. Create a new Connector virtual appliance and sync only the selected users.
C. Create a group in Workspace Portal and assign the users to this group.
D. Create a group in the Configurator virtual appliance console and add the users to this group.

Answer: C

QUESTION NO: 138


The administrator is required to make ThinApp packages available in streaming mode through
Workspace Portal.

What are the minimum required share and NTFS permissions?

A. SharE. Read
NTFS: Read & Write
B. SharE. Change
NTFS: Modify
C. SharE. Read
NTFS: Read & Execute
D. SharE. Change
NTFS: List Folder Contents & Execute

Answer: C

QUESTION NO: 139


In which two situations should a VMware customer choose to implement Workspace Portal?
(Choose two.)

A. Corporate IT has a security mandate requiring RSA authentication whenever users access
company resources from their personal devices.
B. Executives have mandated that users will be able to work from any location whether they are
online or offline.
C. Customer is moving to a BYOD (Bring Your Own Device) business model but they still need
to access company applications.
D. Management is searching for a file sharing solution that is hosted internally in order to control
data security.

Answer: A, C

QUESTION NO: 140


An administrator has provisioned a web application to a group of users. Users have reported that
the application is not visible in the Applications tab when the user launches Workspace Portal.

Which steps must the administrator take to ensure the application is entitled properly?

A. Verify that the application is SAML-enabled.


Verify that the application is entitled to a directory service-based Workspace Portal group or
user.

B. Verify that the application is set to Automatic.


Verify that the application is entitled to a directory service-based Workspace Portal group or
user.

C. Verify that the application is set to User-Activated.


Verify that the application is entitled to a local Workspace Portal group or user.
D. Verify that the Workspace Portal client is installed on the endpoint.
Verify that the application is entitled to a local Workspace Portal group or user.

Answer: B

QUESTION NO: 141


An administrator has a list of users who should not have access to Workspace Portal services.
Some users need access to other services using their directory services account. Other users no
longer need access to any services on the corporate network.

Which two steps should the administrator take to restrict access to Workspace Portal services?
(Choose two.)

A. Disable or delete the account in Active Directory for those accounts that no longer need
access to Workspace Portal.
B. Disable the Virtual Users feature in the Class of Service (CoS).
C. Create filters with the Workspace Portal connector that filter out existing users who no longer
need access to Workspace Portal.
D. Disable or delete the account in Active Directory for those accounts that no longer need
access to any corporate network services.

Answer: C, D

QUESTION NO: 142


Which two values will an administrator use to update ThinApp applications that are entitled
through Workspace Portal? (Choose two.)

A. AppID
B. VersionID
C. InventoryName
D. SandboxName

Answer: A, B

QUESTION NO: 143


Refer to the exhibit.
What is portrayed in this performance chart?

A. The ESXi host running the VM has Transparent Page Sharing enabled.
B. The virtual machine's memory share value is set too high.
C. The virtual machine is memory constrained.
D. The ESXi host running the VM is low on memory.

Answer: D

QUESTION NO: 144


A system administrator needs to control the allocation of memory and CPU resources to an
organization's Finance team. The vSphere environment is built on a single cluster of ESXi hosts.

Which feature can be used to accomplish this task?

A. Resource Pool Reservations


B. DRS set to Fully Automated
C. Virtual Machine Shares
D. DRS Virtual Machine Groups

Answer: A

QUESTION NO: 145


An administrator is setting up a new vSphere environment for application development with
health monitoring and capacity management. The administrator has purchased three servers for
the initial install. The administrator is not planning to grow the environment and needs to keep
costs as low as possible.

Which vSphere kit should the administrator use to meet these requirements?

A. vSphere Essentials Kit


B. vSphere Essentials Plus Kit
C. vSphere with Operations Management Standard Acceleration Kit
D. vSphere with Operations Management Enterprise Acceleration Kit

Answer: C

QUESTION NO: 146


During the installation of ESXi 5.5, the following error message is reported:

Hardware Virtualization is not a feature of the CPU, or is not enabled in the BIOS.

Which condition would generate this message?

A. LAHF/SAHF is not enabled in the BIOS.


B. NX/XD is not enabled in the BIOS.
C. SSE3 is not enabled in the BIOS.
D. Hyperthreading is not enabled in the BIOS.

Answer: A

QUESTION NO: 147


As part of a multisite Single Sign-On (SSO) deployment what two steps are required to ensure
that a change to one Single Sign-On instance is propagated to the other instances? (Choose two.)

A. Schedule a Replication Task on the primary instance


B. Select the first instance during the installation of subsequent instances
C. During the installation of each instance choose Linked-Mode
D. Enable Synchronize to Active Directory on each instance

Answer: A, C
QUESTION NO: 148
An administrator is upgrading a vSphere Distributed Switch. The existing switch is version 5.0
and the administrator wants to upgrade to the latest version possible. The environment contains
several ESXi 5.1 hosts.

Which two options are available to ensure that the upgraded switch will be compatible with these
hosts? (Choose two.)

A. Upgrade the vSphere Distributed Switch to 5.5


B. Upgrade the ESXi 5.1 hosts to version 5.5, then upgrade the vSphere Distributed Switch to
5.5
C. Upgrade the vSphere Distributed Switch to 5.1
D. Upgrade the ESXi host switches to 5.5, then upgrade the vSphere Distributed Switch to 5.5

Answer: B, C

QUESTION NO: 149


Refer to the exhibit.

-- Exhibit --

Users in a remote office report that they often get disconnected from their virtual desktop session
or experience intermittent screen freezes.

While troubleshooting this issue, an administrator is analyzing the PCoIP log files, as shown
here:
What is the most likely cause of the issue?

A. High latency
B. Unsupported client device
C. Disabled client display
D. Too many connections

Answer: A

QUESTION NO: 150


An administrator has determined that a vSphere Standard Switch is dropping outbound frames
from a virtual machine adapter. Upon further investigation, it is determined that the outbound
frame is being dropped because the source MAC address differs from the one in the virtual
machine configuration file (.vmx).

Which security policy should the administrator reconfigure to modify this behavior?

A. Forged transmit
B. MAC address changes
C. MAC address variation
D. Forged broadcast

Answer: A

QUESTION NO: 151


A vSphere administrator needs to add redundancy to an ESXi 5.x management network on a
vSphere Standard Switch.

Which method should the administrator use to create redundant management networks?
A. Configure the management network vSwitch with two active uplinks
B. Configure an additional management portgroup on the same vSwitch
C. Create a second management network on a second vSwitch in the same subnet
D. Create a second management network on the same vSwitch in the same subnet

Answer: A

QUESTION NO: 152


An organization is designing a new vSphere cluster to support a new product implementation.

The following challenges have been identified by the vSphere administration team:
The organization has the vSphere Enterprise License.
The network team needs to gather virtual machine network statistics over a long
period of time.
The network team needs the ability to quickly assess virtual machine traffic in the
event of an attack.
The network team has previously had problems implementing manual
etherchannel configurations on their physical switches, resulting in production
outages.
The new cluster's initial size is 15 hosts.

The organization is willing to upgrade to vSphere Enterprise Plus licensing if it addresses these
challenges.

Which three features of a version 5.5 vSphere Distributed Switch would address these
challenges? (Choose three.)

A. LACP in Dynamic Mode


B. Port Mirroring
C. Network vMotion
D. Private VLANs
E. Network I/O Control

Answer: A, B, C

QUESTION NO: 153


Refer to the exhibit.
Users accessing the WinXP virtual machine shown in the exhibit report intermittent connectivity
to the corporate network.

The configuration is as follows:


This virtual machine runs in a DRS/HA cluster of two ESXi hosts.
The VCP_DCV_Example vSphere Distributed Switch was recently created.
The WinXP virtual machine was recently migrated from another vSphere
Distributed Switch.
The WinXP virtual machine was able to connect prior to migration to this switch.
No changes to the VCP_DCV_Example switch have been made since creation.

Which step should the administrator take to resolve the WinXP virtual machine's intermittent
connectivity to the corporate network?

A. Add the ESXi host to the switch where the virtual machine is currently running
B. Disable Port Blocking on the VCP_DCV_Example switch
C. Disable Port Blocking on the Production port group
D. Enable Network I/O Control on the switch to better balance I/O

Answer: A

QUESTION NO: 154


Refer to the exhibit.
Which two statements below could explain why the vSphere Client is reporting N/A for
hyperthreading? (Choose two.)

A. The physical CPUs in the host do not support hyperthreading.


B. Hyperthreading is disabled in the host's BIOS.
C. The physical CPUs in the host are not multi-core.
D. The number of CPUs meets or exceeds the maximum without hyperthreading.

Answer: A, B

QUESTION NO: 155


An administrator has configured multi-pathing using an Fiber Channel array in an active-active
configuration.

What is the expected behavior of an ESXi host when a failed preferred path becomes available
using the Fixed path selection policy for this array type?

A. It automatically reverts to the preferred path.


B. It continues using the current path until it is manually reverted.
C. It resumes load balancing across all available paths.
D. It reverts to the preferred path after the host has been restored and rebooted.

Answer: A

QUESTION NO: 156


Which two statements are true regarding a new vSphere deployment that is using software FCoE
boot from SAN? (Choose two.)

A. Multi-pathing options must be configured by the vmkernel after boot.


B. The adapter must support iBFT or UEFI.
C. The adapter must support FBFT or FBPT.
D. Multi-pathing options must be configured in the Boot ROM.

Answer: A, C

QUESTION NO: 157


A virtual machine has the following configuration:
Thin provisioned virtual disks
The VMFS datastore on which it resides is on a thin provisioned LUN.
The storage array is VAAI-enabled.

What is the behavior of the virtual machine when it encounters an out-of-space condition?

A. It is suspended.
B. It is gracefully shut down.
C. It is powered off.
D. It is converted to space-efficient sparse.

Answer: A

QUESTION NO: 158


Refer to the exhibit.
A vSphere administrator observes a problem with the Virtual SAN Cluster Setting as shown:

Which action should the administrator take on the vmkernel portgroup on all hosts used by
Virtual SAN cluster to resolve this problem?

A. Select the Virtual SAN traffic option


B. Increase the MTU value
C. Change the DNS server address
D. Increase the Port Speed

Answer: A

QUESTION NO: 159


An administrator needs to unmount a datastore that is also used for HA storage heartbeats.

What is the least disruptive method for an administrator to perform this activity on a slave HA
host?

A. On the Datastore Heartbeating tab, unmount the datastore normally and confirm a new
datastore has been selected.
B. On the Datastore Heartbeating tab, specify an alternate datastore, then unmount the datastore
normally.
C. Disable HA datastore heartbeats, then unmount the datastore.
D. Reduce the number of heartbeat datastores, then remove the datastore from the heartbeat list.

Answer: B

QUESTION NO: 160


A customer needs to select an appropriate Path Selection Policy (PSP) for their storage array.
There is no requirement for a preferred path. The policy should not select a new path unless the
current one fails.

Which PSP meets the requirement?

A. Fixed
B. Round Robin
C. Most Recently Used
D. Asymmetric Logical Unit Access

Answer: C

QUESTION NO: 161


A customer needs a datastore to be seen across multiple vSphere clusters with applications inside
of the virtual machines that must detect the physical characteristics of the storage device.

Which type of virtual disk meets this requirement?

A. A virtual disk on a VMFS datastore


B. A raw device mapped disk in virtual compatibility mode
C. A raw device mapped disk in physical compatibility mode
D. A virtual disk on an NFS datastore

Answer: C

QUESTION NO: 162


Refer to the exhibit.
An administrator has successfully deployed vCenter Operations for Horizon. The administrator
logs into the custom dashboard, finds a list of active users on the View Users tab, and clicks on
one of them.

The Health tree widget does not update, as shown in the exhibit.

What has been changed in vCenter Operations for Horizon configuration to result in the
dashboard issue?

A. Interaction between the Active User Sessions widget and the Health tree widget was removed.
B. Reporting in the Health tree widget was changed from on to off.
C. Interaction between the Metric Sparkline widget and the Health tree widget was removed.
D. Reporting in the Active User Sessions widget was changed from on to off.

Answer: A

QUESTION NO: 163


Refer to the exhibit.
Based on the exhibit, which two paths are used for PCoIP traffic? (Choose two.)

A. Path A
B. Path B
C. Path C
D. Path D

Answer: A, C
QUESTION NO: 164
Refer to the exhibit.

NYC_User1 is entitled to the AMER1 global entitlement and has a global home site of NYC.
AMER1 includes VDI1, VDI2, and VDI5 and has a scope of Any.

Based on the exhibit, when NYC_User1 logs into LA2, the Cloud Pod Architecture feature will
allocate a desktop from which pool?

A. VDI1
B. VDI1 or VDI3
C. VDI2 or VDI4
D. VDI5

Answer: B

QUESTION NO: 165


Refer to the exhibit.
A vSphere administrator created a Virtual SAN and a relevant virtual machine Storage Policy.
The administrator is unable to select this virtual machine Storage Policy when creating a new
virtual machine.

Based on the exhibit, why is the administrator unable to select this virtual machine Storage
Policy?

A. The administrator did not enable the virtual machine Storage Policy per compute resource.
B. The ESXi Host license does not support virtual machine Storage Policies.
C. The vCenter Server license does not support virtual machine Storage Policies.
D. The administrator did not create a storage policy for the datastore selected for the virtual
machine.

Answer: A

QUESTION NO: 166


An administrator decides to implement a Fixed multipathing policy for an ESXi host with four
available paths to one VMFS datastore.

After the policy has been enabled for the datastore, how many paths will have an active status by
default?

A. 4
B. 3
C. 1
D. 2

Answer: A
QUESTION NO: 167
When designing a storage infrastructure to support ESXi 5 hosts what limit will be reached first?

A. Maximum number of NFS datastores


B. Maximum number of iSCSI LUNs
C. Maximum number of paths to an iSCSI RDM
D. Maximum number of iSCSI paths on a host

Answer: C

QUESTION NO: 168


An administrator is configuring an ESXi host with two dual-port Fibre Channel (FC) HBAs. The
FC storage array has four active storage processor ports. Zoning is configured on both fabrics,
with ESXi HBA ports and the array ports in the same zone. There are two LUNs with VMFS
datastores configured.

Using Round Robin multipathing, what is the maximum number of paths that can be used to
send data to the VMFS datastores at any given time?

A. 2
B. 3
C. 1
D. 4

Answer: A

QUESTION NO: 169


A virtual machine needs to add a 4TB disk. The storage administrator has already created and
presented a 4TB LUN to the ESXi host. A 500GB VMFS5 datastore already exists on the host.

What is the next step a vSphere administrator would take to successfully provision the data disk?

A. Create a virtual compatibility mode RDM mapping to the 4TB LUN.


B. Create a physical compatibility mode RDM mapping to the 4TB LUN.
C. Expand the VMFS volume to 4TB. Create a physical compatibility mode RDM mapping to
the 4TB LUN.
D. Expand the VMFS volume to 4TB. Create a virtual compatibility mode RDM mapping to the
4TB LUN.

Answer: B

QUESTION NO: 170


When planning for an upgrade from ESX4 to ESXi5 what will be the effect of upgrading a 1TB
VMFS3 datastore with a 2MB block size to VMFS5?

A. Thick virtual disks can be expanded to a maximum of 2TB.


B. Thick virtual disks can be expanded to a maximum of 512GB.
C. Thin virtual disks can be expanded to a maximum of 512GB.
D. Thin virtual disks can be expanded to a maximum of 2TB.

Answer: D

QUESTION NO: 171


-- Exhibit --
-- Exhibit --

Click the Exhibit button.

Based on the exhibit, what is the appropriate action to set a preferred path?

A. Paths cannot be set to preferred on this array.


B. Right-click the path you want to prefer and then select Preferred.
C. Right-click the path you want to prefer then select Active.
D. Double-click the new path you wish to prefer. The other existing paths will be set to standby.

Answer: A

QUESTION NO: 172


-- Exhibit --
-- Exhibit --

Click the Exhibit button.

Based on the exhibit, what is the reason that two of the paths are marked as standby?

A. The other two paths were set to active.


B. That is a characteristic of the storage array used.
C. The active paths were set to preferred.
D. The storage adapers need to be rescanned before those paths will be set to active.

Answer: B

QUESTION NO: 173


What is one requirement when adding an extent to a VMFS datastore?
A. A new unused NFS mount
B. An RDM with sufficient space available
C. An unused iSCSI or FCP LUN
D. Free space on the LUN holding the VMFS datastore

Answer: C

QUESTION NO: 174


Which virtual disk types are supported on an network attached storage appliance using NFS with
hardware acceleration disabled?

A. Flat disk
B. Raw Device Mappings
C. Thick Provision Lazy Zeroed
D. Thin Provision

Answer: D

QUESTION NO: 175


What is the recommended maximum memory value that is displayed when configuring a virtual
machine based upon?

A. The amount of memory in the ESXi host


B. The threshold needed for the ESXi host to satisfy a reservation value
C. The maximum value the guest operating system supports
D. The maximum recommended by the OS manufacturer.

Answer: A

QUESTION NO: 176


An administrator is creating a virtual machine that will be running Windows 2008 Enterprise
(64-bit). The application to be installed in the virtual machine requires eight vCPUs to run
effectively. During installation, the only available options are one, two, three, or four vCPUs.

What condition explains the available vCPU selections?

A. The virtual machine hardware version is 8.


B. The guest operating system for the virtual machine is 64-bit.
C. The ESXi host has two non hyperthreaded dual-core CPUs.
D. The ESXi host has two hyperthreaded dual-core CPUs.

Answer: C

QUESTION NO: 177


Windows virtual machines use a page file and Linux virtual machines use a swap partition for
virtual memory.

When you are determining the appropriate size for these, which file is affected?

A. The .vmx file


B. The .vswp file
C. The service console swap partition
D. The virtual disk size

Answer: D

QUESTION NO: 178


How is the page file for a Windows guest operating system or the swap partition for a Linux
guest operating system created?

A. By the ESXi host


B. By the guest operating system
C. By the vCenter server
D. By the vCenter cluster

Answer: B

QUESTION NO: 179


What is the size of a virtual machine .vswp file?

A. The virtual machine .vswp file is equal to twice the amount of available memory configured
for the virtual machine when it was created.
B. The virtual machine .vswp file is equal to the amount of virtual memory (virtual machine
available memory, plus virtual machine overhead) configured for the virtual machine when it
was created.
C. The virtual machine .vswp file is set to the amount of memory allocated minus any memory
reservation.
D. The virtual machine .vswp file is equal to the amount of available memory in the ESXi server.

Answer: C

QUESTION NO: 180


Which network driver is not supported with virtual machine hardware version 8?

A. vmxnet 3
B. Enhanced vmxnet
C. vmxnet 2
D. E1000

Answer: C

QUESTION NO: 181


-- Exhibit --
-- Exhibit --

Click the Exhibit button.

An administrator has implemented a new vSphere 5 environment and is deploying their first
Windows 2008 R2 template. When running the Deploy Template wizard, the error shown in the
exhibit appears.

What can be done to correct the problem?

A. Select the correct guest OS setting for the virtual machine.


B. Windows 2003 x64 cannot be customized.
C. Download and install the Microsoft Sysprep tool into the virtual machine to be customized.
D. Download the Microsoft Sysprep tool to the appropriate vCenter Server directory.

Answer: A

QUESTION NO: 182


-- Exhibit --

-- Exhibit --

Click the Exhibit button.

ACME Logging Inc. has been using the vSphere Web Client to deploy templates to a five-node
vSphere 5 cluster. After deploying a new template, the resulting virtual machine is not able to
connect to the Development network to which it was assigned. When deploying another
template, the message in the exhibit is shown.

Based on this information, what is the likely problem?

A. The interface on esxi2 that is assigned to the virtual switch is down.


B. The interface on esxi2 that is assigned to the virtual switch is configured incorrectly.
C. The Production virtual switch is internal only.
D. The Production virtual switch is a vDS.

Answer: C

QUESTION NO: 183


Why is converting a virtual machine to a template significantly faster than creating a clone of the
virtual machine?

A. Making a clone creates a linked-mode virtual disk.


B. Making a clone creates a full copy of the VMDK file.
C. Making a clone only creates a copy of the .vmx file.
D. The template conversion has low priority on the system CPU.

Answer: B

QUESTION NO: 184


When deploying an OVF template, what file format will the resulting virtual disk be?

A. OVF
B. VMDK
C. VMX
D. VSWP

Answer: B

QUESTION NO: 185


What virtual machine action listed below can be performed on a template?

A. Power on
B. Clone
C. Edit Settings
D. Migrate

Answer: B
QUESTION NO: 186
An administrator has configured a virtual machine using the Emulate IDE mode for the DVD
drive. Using the vSphere Client from a remote PC, an administrator wants to connect to a virtual
machine and burn a DVD, but is getting error messages in the disk burning application.

What must the administrator do to fix this issue?

A. The administrator must use the host DVD drive.


B. A DVD cannot be burned from within a virtual machine.
C. The administrator must change the DVD mode to pass through IDE.
D. The administrator must click the writer checkbox in the DVD settings.

Answer: C

QUESTION NO: 187


During peak operating hours, an administrator finds that a business-critical application running
in a virtual machine is not performing as well as during normal hours.

Which memory management method can be used to guarantee that the application performs well
at all times?

A. Set a reservation equal to the average memory utilization of the virtual machine running the
application.
B. Set the share level to high for the virtual machine running the application and set the share
level for all other virtual machines to low.
C. Check the "Reserve all guest memory" checkbox.
D. Set a reservation equal to the installed memory of the ESXi host running the application.

Answer: C

QUESTION NO: 188


Which memory conservation technique collaborates with the server to reclaim pages that are
redundant in a virtual machine or virtual machines?

A. Memory Balloon Driver


B. Transparent Page Sharing
C. Redundant Memory Driver
D. VMkernel Swap
Answer: A

QUESTION NO: 189


An administrator notices that when a virtual machine is placed into a resource pool, a warning
indicates that the virtual machine will receive a very large percentage of the total shares for
memory.

Which action can be taken to resolve this problem?

A. Increase the memory resource allocation to the resource pool.


B. Increase the share value for the resource pool.
C. Change the shares setting from custom to high, medium, or low for the virtual machine.
D. Decrease the memory allocation for the virtual machine.

Answer: C

QUESTION NO: 190


A new ESXi host is set up with two virtual machines. A memory limit is applied so that users
will have predictable performance as virtual machines are added to the host.

What is the effect of applying a memory limit to these virtual machines?

A. No physical memory will be granted above the limit, but VSWP can be used.
B. No physical memory will be granted above the limit, unless expandableVM shares are set to
high.
C. Physical memory will be granted above the limit under normal conditions. Disk pages will be
used if contention occurs.
D. Physical memory will be granted above the limit under normal conditions, unless physical
memory runs out.

Answer: A

QUESTION NO: 191


What type of failure is VMware Fault Tolerance designed to protect against?

A. A failure on the ESXi host running the primary virtual machine


B. A failure on an application within the primary virtual machine
C. Loss of storage connectivity to the primary virtual machine
D. An operating system failure on the primary virtual machine

Answer: A

QUESTION NO: 192


What is true about the HA agent on host ESXi 5 servers?

A. HA agent logs and entries use the prefix "aam"


B. HA agents are set to start by default
C. HA agents can store configuration information locally
D. vSphere client cannot determine which HA agent is "master"

Answer: C

QUESTION NO: 193


While building a VMware View environment one of the design requirements is keeping vCenter
and View Composer always available.

Which solution can be utilized to achieve this?

A. vCenter Server Heartbeat


B. vSphere HA
C. vSphere FT
D. Host Based Replication

Answer: A

QUESTION NO: 194


A vSphere environment is created with two virtual machines, VM23 and VM43. Each virtual
machine has an instance of the front-end web application for the company's manufacturing
management database. A physical load-balancer is configured for the application.

Which type of DRS rule should be implemented for VM23 and VM43?

A. Separate Virtual Machines


B. Virtual Machines to Hosts
C. Host DRS Groups
D. Keep Virtual Machines Together

Answer: A

QUESTION NO: 195


An administrator is configuring a stretched HA cluster. The administrator wishes to restrict the
failover of VMs to certain hosts within a given site.

Which additional vSphere feature satisfies this requirement?

A. vSphere Distributed Switch


B. Distributed Resource Scheduler
C. Datastore Clusters
D. Host Folders

Answer: B

QUESTION NO: 196


An administrator is configuring a vSphere HA cluster for three ESXi hosts and their resident
virtual machines. The cluster will be configured to support a single host failure. Resource
reservations must be enforced during a failover event.

Assuming default settings, how does HA determine the current failover capacity?

A. Calculating the largest possible CPU and Memory guarantee for any running virtual machine
in the cluster, then calculating how many virtual machines of that size can be started on the
largest host and reserving space in the cluster accordingly.
B. Averaging the largest possible CPU and Memory guarantee for any running virtual machine
in the cluster, then calculating how many virtual machines of that size can be started on the
largest host and reserving space in the cluster accordingly.
C. Calculating the largest possible CPU and Memory guarantee for any virtual machine in the
cluster, then calculating how many virtual machines of that size can be started on the largest host
and reserving space in the cluster accordingly.
D. Averaging the largest possible CPU and Memory guarantee for any virtual machine in the
cluster, then calculating how many virtual machines of that size can be started on the largest host
and reserving space in the cluster accordingly.
Answer: A

QUESTION NO: 197


A network administrator has discovered a failure that has affected connectivity on the
management network cutting the cluster in half. As a result, each half of the ESXi 5.x hosts in a
vSphere HA cluster is able to communicate with each other but not the other half. The cluster
was configured with default settings.

What happens as a result of the failure?

A. The VMs will be powered off on slave hosts in the cluster.


B. All VMs and hosts in the cluster are unaffected.
C. The VMs are unaffected, a second master will be elected.
D. The VMs will be powered down on all hosts in the cluster.

Answer: C

QUESTION NO: 198


In a vSphere HA cluster, what is the maximum number of point-to-point communication links to
the slaves does each master maintain?

A. 32
B. 64
C. 512
D. 1024

Answer: A

QUESTION NO: 199


An administrator wants to configure a DRS Migration Threshold that allows automated
migration only when a host is placed into maintenance or to satisfy cluster contraints.

What setting should be utilized?

A. Priority 2
B. Priority 4
C. The most conservative setting
D. The default setting

Answer: C

QUESTION NO: 200


Which option could be used for vSphere HA heartbeats?

A. iSCSI LUN used for booting the master ESXi host


B. iSCSI LUN backing an RDM connected over 10GB Ethernet
C. NFS datastore shared with the all hosts, sync, no_root_squash and read only options
D. FCP LUN on an 8GB active/active array backing a VMFS5 datastore

Answer: D

Topic 3, Volume C

QUESTION NO: 201


An administrator is configuring a stretched HA configuration and has HA errors on all of the
hosts at the remote site.

What can be done to ensure virtual machines at one site can be restarted at the remote site?

A. Ensure any firewalls between the hosts are allowing port 8182
B. Create separate HA clusters at each site and enable Stretch Cluster on each
C. Ensure the latency between the sites is less than 5 milliseconds
D. Ensure each site has no more than 4 primary hosts

Answer: A

QUESTION NO: 202


What happens to the total number of shares available to the children of a resource pool if a
virtual machine is powered off inside the resource pool?

A. Remains the same


B. Decreases
C. Increases
D. Remains the same if a custom share value was configured. Increases if a high, medium, or
low value was configured

Answer: B

QUESTION NO: 203


What do changes made to resources reserved by a resource pool affect in the resource hierarchy?

A. Child pools
B. Host pools
C. Sibling and parent pools
D. Root resource pools

Answer: C

QUESTION NO: 204


-- Exhibit --

-- Exhibit --

Click the Exhibit button.


Several virtual machines residing in the Production pool are exhibiting poor performance, and a
critical virtual machine in the pool appears hung. What step can be taken to increase the
performance of the critical virtual machine?

A. Increase the CPU limit on the critical virtual machine.


B. Increase the CPU shares on the critical virtual machine.
C. Increase the CPU reservations on the resource pool.
D. Increase the CPU limit on the resource pool.

Answer: D

QUESTION NO: 205


An administrator is enabling Enhanced vMotion Compatibility in a DRS cluster. The
administrator wants only hosts with the newest Intel processors added to the cluster.

Which setting satisfies this requirement?

A. The baseline with the most CPUs listed


B. The baseline with the fewest CPUs listed
C. Any baseline that lists "Future Intel processors"
D. Create a new baseline and add only the latest processor family

Answer: D

QUESTION NO: 206


Users are experiencing performance issues when updating their database hosted on a virtual
machine. The administrator determines that disk I/O is high across one of the HBAs on the ESXi
host containing the virtual machine.

Which action will most likely correct the issue without significantly impacting other users or
datastores?

A. Manually configure the disk multipathing policy to Round Robin for the datastore
B. Migrate the virtual machine to an NFS datastore using Storage vMotion
C. Use Storage vMotion to migrate the virtual machine to a new VMFS5 datastore
D. Map additional LUNs to the ESXi host and extend the datastores

Answer: A
QUESTION NO: 207
How can virtual machines be moved between datacenters?

A. High-Availability failover
B. Cold migration
C. vMotion migration
D. Storage vMotion migration

Answer: B

QUESTION NO: 208


What function does Enhanced vMotion Compatibility provide?

A. The ability to enable Fault Tolerance on virtual machines that are not members of a cluster.
B. The ability to use vMotion to migrate virtual machines between ESXi hosts with different
CPU vendors.
C. The ability to replace manual CPU identification masks with an automated process managed
by the cluster.
D. The ability to use vMotion to migrate virtual machines between hosts with identical CPUs but
different vSphere versions.

Answer: C

QUESTION NO: 209


-- Exhibit --
-- Exhibit --

Click the Exhibit button.

Which change will eliminate the symptom in the performance chart shown in the exhibit?

A. Set CPU shares to High


B. Set CPU affinity for the virtual machine
C. Migrate the VM to a host that is less utilized
D. Add a CPU to the virtual machine

Answer: C

QUESTION NO: 210


-- Exhibit --
-- Exhibit --

Click the Exhibit button.

ACME Catering Services is using esxtop to troubleshoot a performance problem with one of
their ESXi hosts. Host disconnections from vCenter Server as well as sluggish performance
when performing tasks on the host have been observed.

Based on the output in the exhibit, how many vCPU's have been assigned to FileServer01?

A. 1
B. 2
C. 4
D. 8

Answer: D

QUESTION NO: 211


An administrator wants to monitor the health status of an ESXi host. However, when the
administrator clicks the Hardware Status tab the following error is displayed:

This program cannot display the webpage

What might cause this problem?

A. The VMware VirtualCenter Management Webservices Service is not started.


B. The required plug-in is not enabled.
C. The VMware ESXi Management Webservices Service is not started.
D. The name of the vCenter Server system could not be resolved.
Answer: A

QUESTION NO: 212


-- Exhibit --

-- Exhibit --

Click the Exhibit button.

An administrator has received reports of poor network performance with a virtual machine.

Which task will improve the network performance of this virtual machine?

A. Adjust shares for the virtual NIC on the virtual machine.


B. Traffic-shape this virtual machine.
C. Move the virtual machine to another virtual switch.
D. Add a CPU to the virtual machine.

Answer: C

QUESTION NO: 213


A vSphere 5 implementation consists of a fully automated DRS cluster with two ESXi 5.x hosts
with the following vSphere Standard Switch configuration:

1. Switch A. three vmnics, one port group named sFTP-PG


2. Switch B. two vmnics, one port group named Web-PG
3. All vmnics are trunked to the same physical switch.

DRS has been configured with an anti-affinity rule for all virtual machines in the Web-PG so that
no more than half of the virtual machines run on any given host. The virtual machines on
WebPG are experiencing significant network latency. The network team has determined that a
performance bottleneck is occurring at the ESXi host level.

Which solution will require the least amount of administrative work and the least amount of
service interruption?

A. Migrate Web-PG to Switch A and sFTP-PG to Switch B on each host


B. Move a vmnic from Switch A to Switch B on each host
C. Convert the three Switch Bs to a single vSphere Distributed Switch
D. Use vMotion to redistribute some of the VMs in Web-PG to a different ESXi host

Answer: B

QUESTION NO: 214


An administrator is setting up vMotion in a vSphere environment. A migration is run to test the
configuration, but fails.

What could the administrator do to resolve the issue?

A. Ensure the VMkernel port group is configured for Management Traffic.


B. Enable VMkernel port group for the vSphere cluster.
C. Ensure the VMotion enabled adaptors are configured for the same subnet.
D. Use a vDS instead of a standard switch.

Answer: C

QUESTION NO: 215


An administrator is unable to connect a vSphere Client to an ESXi host.
Which option can be selected from the direct console to restore connectivity without disrupting
running virtual machines?

A. Restore the Standard Switch from the ESXi host.


B. Restart the Management Agents from the vSphere client.
C. Restart the Management Agent from the ESXi host.
D. Disable the Management Network from the vSphere client.

Answer: C

QUESTION NO: 216


An administrator is updating a program running on a virtual machine. The update file has been
downloaded as an .iso file and placed on a shared NFS datastore. An attempt to mount the .iso
file to the virtual machine fails, but subsequent testing shows that the .iso file can be mounted to
a virtual machine running on another ESXi host.

Which step can be taken to enable access to the .iso file for the affected virtual machine?

A. Reboot all ESXi hosts in the cluster where the affected virtual machine is running.
B. Refresh all datastores on the ESXi host running the affected VM.
C. Rescan all datastores on the ESXi host running the affected VM.
D. Unmount the volume from the ESXi host running the affected VM, and then re-add as a new
datastore.

Answer: B

QUESTION NO: 217


An administrator is responsible for enabling file access for desktop users. Many users have
complained that they cannot access their files. An alert in the vSphere Client states that the
storage connectivity alarm for all hosts has been triggered. The storage screen indicates that
everything is connected, but the triggered alert has not been acknowledged.

Which action will correct the user access problem?

A. Rescan the storage on the file-sharing virtual machine on which the users are seeing the
problem.
B. Reconnect the storage containing the user files to all hosts in the cluster, then Refresh
datastores on all hosts in the cluster.
C. Tell each user to reboot their computer.
D. Reconnect the storage containing the user files to all hosts in the cluster, then Rescan
datastores on all hosts in the cluster.

Answer: D

QUESTION NO: 218


-- Exhibit --

-- Exhibit --

Click the Exhibit button.

What does the graph in the exhibit indicate?

A. The average amount of read and write latency from the ESXi host to the SAN.
B. The average amount of read and write latency from the guest operating system to the virtual
machine virtual disk file.
C. The average amount of read and write latency from the ESXi host to the datastore.
D. The average amount of read and write latency from the cluster to the datastore.

Answer: C

QUESTION NO: 219


-- Exhibit --

-- Exhibit --

Click the Exhibit button.

Which statement is true about the network performance of the virtual machine in the exhibit?

A. The virtual machine can send at the maximum of 10Mbps.


B. The virtual machine can send traffic as fast as the underlying virtual switch allows.
C. Virtual switch autonegotiation settings must to be adjusted to improve performance.
D. The underlying physical NIC is configured for 10Mbps.

Answer: B

QUESTION NO: 220


An administrator is informed that there will be a storage maintenance window and that failovers
may occur.
What is the expected length of time that a Windows 2008 virtual machine storage I/O will pause
during a path failover?

A. 0 to 30 seconds
B. 90 to 120 seconds
C. 60 to 90 seconds
D. 30 to 60 seconds

Answer: D

QUESTION NO: 221


A company wants to increase disk capacity for their vSphere environment. Management
mandates that:
1. vMotion must work in this environment.
2. The existing LAN infrastructure must be used.

Which storage option best meets the company objectives?

A. iSCSI
B. Fibre Channel
C. SATA
D. NFS

Answer: D

QUESTION NO: 222


Which of these factors indicates a high likelihood that the performance of a virtual machine disk
is being constrained by disk I/O?

A. A large number of commands issued


B. A high device latency value
C. A high disk used value
D. A large number of kilobytes read and written

Answer: B
QUESTION NO: 223
-- Exhibit --

-- Exhibit --

Click the Exhibit button.

An administrator is configuring vMotion in their environment. As part of the implementation, an


administrator is examining resource mapping for virtual machines.

What is a likely cause of the error shown in the exhibit?

A. vMotion has been disabled because the are no other hosts in the cluster with vMotion enabled.
B. vMotion has not been enabled on the Production port group.
C. The administrator has not created a Management network.
D. vMotion has not been enabled on a VMkernel port group.

Answer: C

QUESTION NO: 224


-- Exhibit --
-- Exhibit --

Click the Exhibit button.

An administrator has deployed a two-node cluster with HA and DRS enabled. DRS has been
configured for fully automated mode. The management and vMotion interfaces have been
configured on separate physical networks. Initial DRS testing on this cluster reveals that virtual
machines are not being migrated despite great disparity in resource use between the ESX hosts in
the cluster. The exhibit shows the error and the network configuration for one of the hosts.

Which task would successfully resolve this problem?

A. Add a vmnic to the VMkernel port


B. Configure DRS Migration Threshold to Aggressive
C. Connect the network cable to the correct physical network
D. Migrate vitual machines manually using VMotion

Answer: C
QUESTION NO: 225
-- Exhibit --

-- Exhibit --

Click the Exhibit button.

Users are having difficulty accessing a Web server since a new Web application was configured
in a virtual machine running on sc-titanium03.vmeduc.com. The web server has been assigned 1
vCPU. The vSphere Client reports the error shown in the exhibit. DRS is set to fully automated
mode, but the problem has not resolved.

Which action can resolve the issue?

A. Set a CPU reservation for the web server VM.


B. Manually move the Virtual Machine using high priority VMotion.
C. Configure DRS Migration Threshold to Aggressive.
D. Set CPU affinity for the virtual machine.

Answer: A
QUESTION NO: 226
vCenter Server is running in a virtual machine that is part of a vSphere DRS cluster. The vCenter
Server virtual machine has been tested and can successfully migrate with vMotion between all
ESXi hosts in the cluster. DRS is configured for partial automation.

What happens if an ESXi host that is running the vCenter Server virtual machine experiences a
power outage?

A. All DRS cluster operations will be unavailable until the failed ESXi host is brought back
online.
B. vCenter Server will remain offline, but all virtual machines on the remaining hosts will
continue without interruption.
C. This situation cannot occur, because vCenter Server cannot be installed on a virtual machine
in a vSphere DRS cluster.
D. vSphere will restart the vCenter Server virtual machine on another host.

Answer: B

QUESTION NO: 227


A company has converted several physical machines to virtual machines but are seeing
significant performance issues on the converted machines. The host is configured with sufficient
memory and storage does not appear to be a bottleneck.

Which metric can be checked to determine if CPU contention exists on an ESXi 5.x host?

A. %RUN
B. %WAIT
C. %USED
D. %RDY

Answer: D

QUESTION NO: 228


What number of IOPS should be used with Storage I/O Control to limit disk throughput to
roughly 10 MBps if the guest application writes 64KB blocks?
A. 320
B. 160
C. 240
D. 64

Answer: B

QUESTION NO: 229


Users have reported performance issues with an application running on a Windows VM.
Performance analysis shows high CPU activity on the ESXi host but low CPU activity on the
Windows VM.

A high value in which overview graph and counter on the virtual machine's Performance tab
would confirm the results of the performance analysis?

A. CPU (%) / Wait


B. CPU Usage (Mhz) / Wait
C. CPU Usage (Mhz) / Ready
D. CPU (%) / Ready

Answer: D

QUESTION NO: 230


A database administrator has reported periodic poor performance on a particular virtual machine.
The virtual machine administrator has noticed a significant drop in performance when utilized
memory exceeds 1GB.

What does this indicate and what could be checked next?

A. The application problems are definitely due to a non-memory-related problem. CPU affinity
settings should be checked for this virtual machine.
B. The application problems are definitely due to a non-memory-related problem. CPU
utilization should be checked next, using Windows Task Manager.
C. The virtual machine might not have physical memory available. Compression and swap
activity on the ESXi host should be checked next.
D. The virtual machine might not have physical memory available. Ensure the memory limit on
the VM is set to 0 MB.
Answer: C

QUESTION NO: 231


-- Exhibit --

-- Exhibit --

Click the Exhibit button.

An administrator is seeing a warning on one of their hosts. The warning in the Triggered Alarms
panel appears to come from a custom configured host alarm. The administrator has not seen any
actions taken for this alarm even though the actions are configured in the alarm definition. The
configured actions are shown in the exhibit.

What change can the administrator make to correct the problem?

A. Configure the Alarm Frequency to repeat more often.


B. Add an action for when the alarm changes from yellow to red.
C. Add an action for when the alarm changes from green to yellow.
D. Configure the alarm yellow to red action to repeat for all three actions configured.
Answer: C

QUESTION NO: 232


A user has permissions to create and manage alarms and tasks for a group of virtual machines.

What happens if an administrator modifies permissions for the user so that they can no longer
manage alarms?

A. The user can no longer create alarms, but can modify or delete the existing alarms.
B. The user can create alarms but can no longer modify or delete alarms.
C. The user can no longer create, modify or delete alarms.
D. The Alarms tab is dimmed in the vSphere Client and no alarm-related actions may be taken
by the user.

Answer: B

QUESTION NO: 233


An administrator is performing maintenance on a storage array used by a ESXi host. The
administrator wants to disable alarm actions for the host while the maintenance is taking place.

What procedure will accomplish this task?

A. Go to the Alarms tab for each ESXi host in the DRS cluster. Locate storage-related alarms.
Right-click and disable each alarm.
B. Right-click the DRS cluster and select Alarm and Disable Alarm Actions.
C. Right-click the ESXi host and select Alarm and Disable Alarm Actions.
D. Go to the Alarms tab for the Datacenter containing the DRS cluster. Locate the storage-
related alarms. Right-click and disable each alarm.

Answer: C

QUESTION NO: 234


A group of virtual machines has been deployed using thin disks because of limited storage space
availability. The storage team has expressed concern about extensive use of this type of
provisioning.
At which level can the administrator set an alarm to notify the storage team?

A. Datastore
B. Virtual Machine
C. Host
D. Resource Pool

Answer: A

QUESTION NO: 235


Which two steps are part of the View Composer installation process? (Choose two.)

A. select the Enable View Composer checkbox in the View Administrator


B. install the View Composer on the vCenter Server system
C. register View Composer service on the Windows system
D. configure ODBC connection to the View Composer database

Answer: B, D

QUESTION NO: 236


The View Composer Database stores information about which three components and
connections? (Choose three.)

A. Active Directory Connections


B. View Connection Broker Connections
C. Replicas created by the View Composer
D. Disposable data disk created by View Composer
E. Linked-clone desktops deployed by View Composer

Answer: A, C, E

QUESTION NO: 237


Which two platforms are supported by VMware View Composer in a VMware View 5
environment? (Choose two.)

A. VMware vCenter 4.0 Update 3 running on Windows Server 2008 R2


B. VMware vCenter 4.1 Update 1 running on Windows XP Pro 64-bit
C. VMware vCenter 4.1 Update 1 running on Windows Server 2003 64-bit
D. VMware vCenter 5.0 running on Windows Server 2008 R2

Answer: A, D

QUESTION NO: 238


What are three supported Database Servers for VMware View Composer in a VMware View 5
environment? (Choose three.)

A. Microsoft SQL Server 2005 Express with vCenter Server 4.1 U1


B. Microsoft SQL Server 2005 Express with vCenter Server 5.0
C. Microsoft SQL Server 2005 SP3 Standard with vCenter Server 5.0
D. Microsoft SQL Server 2008 R2 Express with vCenter 4.0 U3
E. Microsoft SQL Server 2008 R2 Express with vCenter Server 5.0

Answer: A, C, E

QUESTION NO: 239


What are three required permissions that need to be assigned to the View Composer user
account? (Choose three.)

A. Create User Accounts


B. Create Computer Objects
C. Delete Group Accounts
D. Delete Computer Objects
E. Write All Properties

Answer: B, D, E

QUESTION NO: 240


Which two operating systems are supported for the View Connection Server? (Choose two.)

A. Windows Server 2003 R2 64-bit Standard or Enterprise


B. Windows Server 2003 R2 32-bit Standard or Enterprise
C. Windows Server 2008 R2 32-bit Standard or Enterprise
D. Windows Server 2008 R2 64-bit Standard or Enterprise
Answer: B, D

QUESTION NO: 241


Which two ports must be opened in the firewall to enable communication between a Security
Server and a Connection Server? (Choose two.)

A. 4001
B. 8443
C. 3389
D. 8009

Answer: A, D

QUESTION NO: 242


Which two ports must be opened in the firewall to enable communication between a View
Connection Server and the vCenter Server running View Composer? (Choose two.)

A. 18443
B. 443
C. 389
D. 4172

Answer: A, B

QUESTION NO: 243


An administrator is preparing to install a View Connection Server 5.x for the first time.

Which two server prerequisites are required for a proper installation on Windows Server 2003?
(Choose two.)

A. Configure a SSL certificate for use with the Connection Server.


B. Configure a static IP address on the server.
C. Configure a domain administrator account for installation.
D. Configure the firewall with the appropriate open ports.

Answer: B, D
QUESTION NO: 244
Which three Windows Firewall ports are automatically opened for proper installation of View
Connection Server on Windows 2008? (Choose three.)

A. TCP 4001 in
B. TCP 8009 in
C. TCP 9008 in
D. TCP 32111 in
E. UDP 4172 out

Answer: A, B, E

QUESTION NO: 245


Which two operating systems are supported for a View Transfer Server installation? (Choose
two.)

A. Windows Server 2008 32-bit


B. Windows Server 2003 R2 SP2 32-bit
C. Windows Server 2003 SP2 64-bit
D. Windows Server 2008 R2 64-bit

Answer: B, D

QUESTION NO: 246


Which three items must be configured prior to installing a View Security Server? (Choose three.)

A. Connection Server
B. Security Server External URL
C. Security Server Firewall Exceptions
D. Security Server Pairing Password
E. Security Server Static IP address

Answer: A, C, D

QUESTION NO: 247


An administrator is installing a View Security Server on a Windows Server 2003 R2 system.
Which three Windows Firewall ports must be pre-configured prior to installation to enable
remote access? (Choose three.)

A. 443
B. 3389
C. 4001
D. 4172
E. 8009

Answer: A, B, D

QUESTION NO: 248


An administrator has installed the View Security Server and needs to verify all the services have
started after the installation is complete.

Which three services should be started? (Choose three.)

A. VMware Message Bus Component


B. VMware View Framework Component
C. VMware View Security Gateway Component
D. VMware View Security Script
E. VMware View Security Server

Answer: B, C, E

QUESTION NO: 249


An organization requires a higher level of security for desktops that cannot be achieved with
passwords alone. A certificate has been procured from a Certificate Authority, and smart cards
have been purchased for the users.

Which three tasks must the desktop administrator perform to prepare Active Directory (AD)?
(Choose three.)

A. add the user principal names to the Trusted Root Certification Authorities group
B. add the root certificate to the Enterprise NTAuth store in AD
C. add the root certificate to the Trusted Root Hierarchy in AD
D. add user principal names to the AD accounts of users
E. add the root certificate to the Trusted Root Certification Authorities group policy in AD

Answer: B, D, E

QUESTION NO: 250


The domain administrator account permissions are limited to one user in an organization. An
account for View Composer is needed with the proper permissions. The user needs Write All
Properties, Create Computer Objects, and Delete Computer Objects.

Which three additional permissions are required? (Choose three.)

A. Delete Contents
B. Read Permissions
C. Create All Properties
D. List Contents
E. Read All Properties

Answer: B, D, E

QUESTION NO: 251


Which two View user management policies are handled by Active Directory? (Choose two.)

A. Manually disconnecting user sessions


B. Restricting access to specific Connection Servers
C. Restricting permitted hours to log in
D. Setting password expiration dates

Answer: C, D

QUESTION NO: 252


An administrator is attempting to add a vCenter Server to View Administrator in order to add
View Composer.

Which three prerequisites are necessary prior to adding the vCenter Server to View? (Choose
three.)

A. Configure the View Pairing Password.


B. Install an SSL certificate on vCenter Server.
C. Install the View Connection Server product key.
D. Configure a vCenter Server user with correct permissions.
E. Configure a View Composer user with correct permissions.

Answer: B, C, D

QUESTION NO: 253


An administrator is creating a new user for use with View Composer and needs to add the
appropriate permissions.

Which three non-default permissions are required for the new account? (Choose three.)

A. Write All Properties


B. Read All Properties
C. Create All Child Objects
D. Delete Computer Objects
E. Create Computer Objects

Answer: A, D, E

QUESTION NO: 254


A View administrator is configuring the events database.

Which two data repository configurations will allow users to monitor events in View
Administrator? (Choose two.)

A. Oracle with SQL authentication


B. Microsoft SQL Server with Integrated Windows authentication
C. Microsoft SQL Server with SQL authentication
D. Oracle with Integrated Windows authentication

Answer: A, C

QUESTION NO: 255


Which two permissions are required by the Events Database user? (Choose two.)
A. Create Tables
B. Delete Views
C. Modify Tables
D. Read Views

Answer: A, D

QUESTION NO: 256


On which two objects can a View administrator apply a Tag? (Choose two.)

A. Connection Servers
B. Desktop Pools
C. Persistent Desktop
D. Security Servers

Answer: B, C

QUESTION NO: 257


Which three settings are configured under Global Settings on the View Connection Server
administration page? (Choose three.)

A. USB access
B. Session Timeout
C. Pre-login message
D. PCoIP hardware acceleration
E. Re-authenticate secure tunnel connections after network interruption

Answer: B, C, E

QUESTION NO: 258


When configured, which three Global settings help ensure the security of a View environment?
(Choose three.)

A. Require SSL for client connections and View Administrator


B. Security Server Timeout
C. Session Timeout
D. Reauthenticate Secure VPN connections after network interruption
E. Require Security Server for client connections and View Administrator

Answer: A, C, D

QUESTION NO: 259


A View environment for an enterprise has the following requirements for accessing USB
devices:
All users can use USB devices with their virtual desktops except members of the finance group,
who have sensitive data
There is one administrative assistant in the finance group that needs to transfer data using a
USB device.

Which three actions should the administrator take to enable these requirements? (Choose three.)

A. set the View USB Access policy to Allow on the Global level
B. set the View USB Access policy to Deny for the Finance Desktop pool
C. set the View USB Access GPO for the View Agent on the Finance group desktops to deny
USB access
D. set the View USB Access policy to Allow for the Administrative Assistant
E. set the View USB Access GPO for the View Agent for the administrative assistant user
desktop to allow USB access

Answer: A, B, D

QUESTION NO: 260


The Finance Desktop pool has access to sensitive data. Enterprise security standards will not
allow external access to this desktop. The enterprise has replica servers, one of which is paired
with a security server to allow external access to desktops.

Which two actions would restrict external access to this pool? (Choose two.)

A. assign the tag named Finance to the security server


B. set a tag named Finance on the internal facing connection servers
C. assign the tag named Finance to the Finance Desktop pool
D. set a tag named Finance on the external facing connection servers

Answer: B, C
QUESTION NO: 261
Which two parameters must be configured to allow connections to a View environment using
both PCoIP and RDP display protocols? (Choose two.)

A. External URL
B. RDP External URL
C. PCoIP External URL
D. External Gateway URL

Answer: A, C

QUESTION NO: 262


Which two properties must be set in the locked.properties file to enable a Security Server to use a
third-party SSL certificate? (Choose two.)

A. keyfile
B. keypass
C. keystore
D. keytype

Answer: A, B

QUESTION NO: 263


Which two configuration settings can reduce bandwidth utilized by View transfer servers?
(Choose two.)

A. Use PCoIP for Local Mode operations.


B. Use compression for Local Mode operations.
C. Use de-duplication for Local Mode operations.
D. Use content-based read cache for Local Mode operations.

Answer: B, C

QUESTION NO: 264


A Local Mode operation has failed.
Which three services should an administrator verify are running on a Transfer Server? (Choose
three.)

A. VMware View Transfer Server


B. VMware View COM+ Component
C. VMware View Framework Component
D. VMware View Transfer Server Control Service
E. VMware View Transfer Server Replication Service

Answer: A, C, D

QUESTION NO: 265


A View administrator needs to be able to place constraints on the total bandwidth that is
consumed by PCoIP in their environment.

Which two steps would allow the administrator to accomplish this? (Choose two.)

A. enable the QOS limit setting in the properties of the View Security Server on the View
Connection Server
B. modify the PCoIP bandwidth global setting on the VMware Connection Server
C. use the Active Directory Group Policy setting Configure the maximum PCoIP session
bandwidth and apply it to the OU created for the desktops
D. place virtual desktops in their own Active Directory OU

Answer: C, D

QUESTION NO: 266


Several View users report that their View experience is acceptable when working locally, but
their desktops perform poorly when they work remotely. The users have a workload that
requires use of 60% text and 40% graphics.

Which two settings will improve the remote desktop performance for these users? (Choose two.)

A. decrease the Minimum Image Quality setting in the registry to 35


B. increase the Maximum Initial Image Quality setting in the registry from the PCoIP default to
95
C. decrease the Maximum Initial Image Quality setting in the registry to 65
D. increase the Minimum Image Quality setting in the registry to 65
Answer: A, C

QUESTION NO: 267


Which two settings can reduce bandwidth used by the PCoIP protocol? (Choose two.)

A. Disable build to lossless


B. Enable PCoIP image optimization
C. Decrease PCoIP server buffer size
D. Decrease PCoIP audio bandwidth limit

Answer: A, D

QUESTION NO: 268


Which three settings control PCoIP image quality? (Choose three.)

A. Maximum frame rate


B. Minimum image quality
C. Minimum image bandwidth
D. Maximum image buffer size
E. Maximum initial image quality

Answer: A, B, E

QUESTION NO: 269


A View administrator is preparing to configure an installation for smart card authentication.

Which two tasks must the View administrator coordinate with the Active Directory administrator
and the local Certificate Authority administrator? (Choose two.)

A. adding users to the Remote Users group policy in Active Directory


B. adding a root certificate from the Certificate Authority to the Trusted Root Certification
Authorities group policy in Active Directory
C. issuing a root certificate from the Certificate Authority to install on all the client machines
that will host the View Client
D. adding user principal names to the Active Directory accounts of smart card users
Answer: B, D

QUESTION NO: 270


Users wish to connect to View using PCoIP through their corporate VPN.

Which two configuration steps enable this remote access solution to work? (Choose two.)

A. configure maintenance mode for the security server so it will not interfere with the VPN
B. configure the external URL to resolve the proper host name and port
C. configure the VPN to allow 4172 UDP traffic to the View Connection Server
D. configure the remote access flag for the pool to which the users are entitled

Answer: B, C

QUESTION NO: 271


An administrator installing the View environment is informed that RSA SecurID authentication
is required for secure connections.

Which two considerations should be taken into account when configuring the View
environment? (Choose two.)

A. Individual View Connection Servers in the same environment can use different user
authentication methods.
B. RSA SecurID requires installation of software on the View Connection Server host and
modification of View Connection Server settings.
C. RSA SecurID authentication is only available on Windows-based View clients.
D. RSA SecurID enables the single-sign-on (SSO) feature.

Answer: A, B

QUESTION NO: 272


What are three location detection settings that can be used to configure location based printing?
(Choose three.)

A. Client IP address
B. Client system name
C. Printer IP port
D. Printer name
E. User name

Answer: A, B, E

QUESTION NO: 273


A View administrator has received a request for a View desktop configured for kiosk mode.

Which three steps must a View administrator perform to accomplish this task? (Choose three.)

A. enable kiosk mode authentication from the Kiosk Mode tab under the View Administration
Console
B. configure Active Directory to accept the kiosk mode accounts
C. enable authentication of clients in kiosk mode from the View desktops
D. configure kiosk mode service on the View desktop
E. configure the View Accounts to be used with kiosk mode from the View Administration
Console

Answer: B, C, E

QUESTION NO: 274


What are the two default character strings that identify accounts as kiosk mode clients? (Choose
two.)

A. cm-
B. custom-
C. km-
D. kiosk-

Answer: A, B

QUESTION NO: 275


What are two requirements for creating a Kiosk Mode user in Active Directory? (Choose two.)

A. The name must be less than 21 characters long.


B. The name must match a local user on the Connection Server.
C. The name must reference the MAC address of the client device.
D. The name must start with a recognized prefix string.

Answer: A, D

Vous aimerez peut-être aussi