VMware 2V0-31.19 Professional VMware vRealize Automation 7.6 Online Training
VMware 2V0-31.19 Online Training
The questions for 2V0-31.19 were last updated at Dec 20,2024.
- Exam Code: 2V0-31.19
- Exam Name: Professional VMware vRealize Automation 7.6
- Certification Provider: VMware
- Latest update: Dec 20,2024
During VM provisioning, which Event Broker state would an administrator use to execute a workflow to add CPU to a virtual machine?
- A . MachineProvisioned
- B . Requested
- C . OnCloneMachineComplete
- D . BuildingMachine
What is the role of the Proxy Agent?
- A . Communicate with hypervisor endpoints
- B . Communicate with hypervisor and cloud endpoints
- C . Communicate with cloud endpoints
- D . Communicate with vCenter endpoints
An architect is designing a machine blueprint containing web, application and database servers utilizing NSX-T for networking. Upon provisioning, network traffic must be automatically restricted to allow the web server to communicate only with the application server, the application server to communicate with both the web and database servers, and the database server to be blocked from communicating with the other servers.
Which methods can be used to accomplish this?
- A . Add an appropriate security group to the blueprint from within the Blueprint Properties, under NSX Settings.
- B . Specify an appropriate NSX-T Existing Network and Security (NS) Group in the blueprint and assign it to each machine.
- C . Create or update an appropriate security group within NSX-T to include the provisioned machines.
- D . Assign an appropriate security group to the entitled items or entitled service with the entitlement.
A directory has a complex hierarchy with all objects scattered in different organizational units. Synchronizing all users from it can be time-consuming and not all of them need to be vRealize Automation users. There is a security group that contains all of the users for synchronization. This group contains other groups as members. It also contains the users that require synchronization as direct members.
Which step should the administrator take to ensure that only the necessary users are synchronized to vRealize Automation?
- A . Specify a subdomain for the group.
- B . Disable the search filter for users.
- C . Disable sync for nested group members.
- D . Specify the root of the domain.
What are two use cases for configuring a third-party identity provider for a directory in vRealize Automation? (Choose two.)
- A . Creating a Just-in-Time User Provisioning directory
- B . Configuring SecureID
- C . Using a SAML 2.0 compliant point of authentication, such as Active Directory Federation Services
- D . Configuring RADIUS
- E . Using Smart Card Authentication