VMware 2V0-31.19 Exam Practice Questions (P. 5)
- Full Access (75 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
During VM provisioning, which Event Broker state would an administrator use to execute a workflow to add CPU to a virtual machine?
- AMachineProvisioned
- BRequested
- COnCloneMachineComplete
- DBuildingMachine
Correct Answer:
D
Reference:
https://docs.vmware.com/en/vRealize-Automation/7.5/vrealize-automation-75-extensibility.pdf
D
Reference:
https://docs.vmware.com/en/vRealize-Automation/7.5/vrealize-automation-75-extensibility.pdf
send
light_mode
delete
Question #22
What is the role of the Proxy Agent?
- ACommunicate with hypervisor endpoints
- BCommunicate with hypervisor and cloud endpoints
- CCommunicate with cloud endpoints
- DCommunicate with vCenter endpoints
Correct Answer:
C
Reference:
https://docs.vmware.com/en/VMware-Validated-Design/4.2/com.vmware.vvd.sddc-design.doc/GUID-6158120D-C982-4F27-B1D3-
4BCB46254FCF.html
C
Reference:
https://docs.vmware.com/en/VMware-Validated-Design/4.2/com.vmware.vvd.sddc-design.doc/GUID-6158120D-C982-4F27-B1D3-
4BCB46254FCF.html
send
light_mode
delete
Question #23
An architect is designing a machine blueprint containing web, application and database servers utilizing NSX-T for networking. Upon provisioning, network traffic must be automatically restricted to allow the web server to communicate only with the application server, the application server to communicate with both the web and database servers, and the database server to be blocked from communicating with the other servers.
Which methods can be used to accomplish this?
Which methods can be used to accomplish this?
- AAdd an appropriate security group to the blueprint from within the Blueprint Properties, under NSX Settings.
- BSpecify an appropriate NSX-T Existing Network and Security (NS) Group in the blueprint and assign it to each machine.
- CCreate or update an appropriate security group within NSX-T to include the provisioned machines.
- DAssign an appropriate security group to the entitled items or entitled service with the entitlement.
Correct Answer:
C
C
send
light_mode
delete
Question #24
A directory has a complex hierarchy with all objects scattered in different organizational units. Synchronizing all users from it can be time-consuming and not all of them need to be vRealize Automation users. There is a security group that contains all of the users for synchronization. This group contains other groups as members. It also contains the users that require synchronization as direct members.
Which step should the administrator take to ensure that only the necessary users are synchronized to vRealize Automation?
Which step should the administrator take to ensure that only the necessary users are synchronized to vRealize Automation?
- ASpecify a subdomain for the group.
- BDisable the search filter for users.
- CDisable sync for nested group members.
- DSpecify the root of the domain.
Correct Answer:
C
C
send
light_mode
delete
Question #25
What are two use cases for configuring a third-party identity provider for a directory in vRealize Automation? (Choose two.)
- ACreating a Just-in-Time User Provisioning directory
- BConfiguring SecureID
- CUsing a SAML 2.0 compliant point of authentication, such as Active Directory Federation Services
- DConfiguring RADIUS
- EUsing Smart Card Authentication
Correct Answer:
AC
Reference:
https://docs.vmware.com/en/vRealize-Automation/7.4/com.vmware.vra.prepare.use.doc/GUID-93F7569C-D228-4386-8B8D-324E110AFAF6.html
AC
Reference:
https://docs.vmware.com/en/vRealize-Automation/7.4/com.vmware.vra.prepare.use.doc/GUID-93F7569C-D228-4386-8B8D-324E110AFAF6.html
send
light_mode
delete
All Pages