A new Windows operating system machine blueprint is created and is ready to be added to a new service catalog.
Which step must be performed for the catalog item to be visible to business users?
- A . Entitle the blueprint with all appropriate actions.
- B . Publish the blueprint.
- C . Entitle a business user to add the blueprint to the catalog.
- D . Add the catalog item to the business group’s reservation.
A
Explanation:
Reference: https://docs.servicenow.com/bundle/jakarta-it-operations-management/page/product/cloudmanagement-v2/task/catalog-item-from-arm-template.html
A vRealize Orchestrator administrator is tasked with creating a workflow that processes sensitive information that is subject to auditing. All workflow messages must be stored in the vRealize Orchestrator database.
How can the administrator ensure that all log messages generated by the workflow are stored in the database?
- A . Configure a DEBUG level for the vRealize Orchestrator server.
- B . Use System.log() when printing out messages.
- C . Configure SQL plugin to write to the database directly.
- D . Use Server.log() when printing out messages.
A system administrator created a tenant with URL name “fin” for the finance team. The fully qualified domain name (FQDN) of the appliance is vra.rainpole.local.
What is the correct URL to log in to the finance tenant?
- A . https://vra.rainpole.local/vcac/org/fin
- B . https://vra.rainpole.local/org/finance
- C . https://vra.rainpole.local/org/fin
- D . https://vra.rainpole.local/vcac/org/finance
What can be used in custom forms to prevent a user from entering too large a value (such as too much memory for a virtual machine)?
- A . Constraints for a field
- B . Regular expression for a field
- C . Quotas for a field
- D . Limitations for a field
A
Explanation:
Reference: https://docs.vmware.com/en/vRealize-Automation/7.5/com.vmware.vra.prepare.use.doc/GUID-4AF1AB3F-0ABD-4C8B-BE16-23B0E9057EBA.html
An administrator configures a pre-approval event subscription to run vRealize Orchestrator workflow. The workflow does not run when a machine that matches the defined criteria is requested in the service catalog.
What can the administrator do to resolve this issue?
- A . Verify that approvers have executed the approve option.
- B . Verify that the workflow subscription is published.
- C . Verify that approvers belong to specific users and groups.
- D . Verify that the approval policy is associated with the correct resource action.
B
Explanation:
Reference: https://docs.vmware.com/en/vRealize-Automation/7.1/com.vmware.vra.extensibility.doc/GUID10FEBA21-CCFA-4C04-92C8-8AC77D230A49.html
A vRealize Automation user provisions virtual machines (VMs) but complains that the machine prefix for his VMs does not match that of his business group. The vRealize Automation administrator confirms that the blueprint component has the machine prefix set to “Use Group Default.”
Which step should be the administrator take to fix the issue with the incorrect machine prefix?
- A . Assign a new machine prefix to the reservation.
- B . Select the required machine prefix in the business group settings.
- C . Select the required machine prefix in the fabric group.
- D . Assign a new machine prefix to the vSphere endpoint.
Which two types of entities can be a part of a vRealize Orchestrator package? (Choose two.)
- A . Policy templates
- B . Inventory
- C . Configurations
- D . Logs
- E . Scripting elements
AC
Explanation:
Reference: https://docs.vmware.com/en/vRealize-Automation/7.5/vrealize-orchestrator-75-using-pluginsguide.pdf
Which role is required in vRealize Automation to add a vCenter endpoint to vRealize Business for Cloud?
- A . Business group manager
- B . Infrastructure administrator
- C . Business management controller
- D . Business management administrator
D
Explanation:
Reference: https://cloudadvisors.net/vmware-vrealize-7-chapter-7-tenant-implementation/
When using the Generate Form option, what are two items for which custom form tabs are automatically created? (Choose two.)
- A . Each network component defined on a blueprint
- B . Each disk that is associated with each virtual machine that is already defined in the blueprint
- C . Each custom property defined on a blueprint
- D . Each custom property group defined on a blueprint
- E . Each virtual machine component defined on a blueprint
Which three vRealize Automation content types are supported by content lifecycle management in vRealize Suite Lifecycle Manager? (Choose three.)
- A . Resource actions
- B . Endpoints
- C . Reservations
- D . Composite blueprints
- E . Entitlements
- F . Property definitions
ADF
Explanation:
Reference: https://docs.vmware.com/en/VMware-vRealize-Suite-Lifecycle-Manager/2018/com.vmware.vrsuite.lcm.20.doc/GUID-CE092BF8-1B49-40EC-B213-CB5D68E46D1E.html
Which option in a composite blueprint’s settings allows an architect to modify the CPU and memory limits of provisioned virtual machines?
- A . Increase number of instances
- B . Propagate updates to existing deployments
- C . Make available as a component in the design canvas
- D . Make provisioned resources scalable
What is the primary log for the vRealize Automation appliance?
- A . vcac-config.log
- B . catalina.out
- C . catalina.log
- D . vami.log
A
Explanation:
Reference: https://docs.vmware.com/en/vRealize-Automation/6.2/com.vmware.vra.install.doc/GUID0FA3BAB7-4897-4237-8216-F099B8F6A8E9.html
An IaaS Administrator is trying to add a new vCenter endpoint. When the administrator clicks “Test Connection”, the attempt fails with the following error:
What is possible cause for this error?
- A . The service account password is using invalid special characters.
- B . The IaaS administrator entered an incorrect vCenter fully qualified domain name (FQDN) in the vCenter address.
- C . The service account for the vCenter endpoint has not been assigned a role in vCenter.
- D . The service account was entered in user principal name (UPN) format.
D
Explanation:
Reference: https://docs.vmware.com/en/vRealize-Automation/7.5/com.vmware.vra.prepare.use.doc/GUID3051E04E-C809-4E29-A3BF-51053BB2D7BC.html
An administrator configures vRealize Automation for high availability by installing an additional vRealize Automation appliance. When users try to login to vRealize Automation, a message about an invalid license appears.
Upon further investigation, the administrator determines that the vRealize Automation appliance nodes do not correctly resolve to the short host names of the nodes in the cluster.
Which step can the administrator take to test the name resolution issues?
- A . Update the ntp.conf file on the vRealize Automation appliance.
- B . Update the hosts file on the vRealize Automation appliance.
- C . Update the netconfig file on the vRealize Automation appliance.
- D . Update the nsswitch.conf file on the vRealize Automation appliance.
Which step must an administrator complete to reduce the number of blueprints to provision machines from different OVF or OVA files?
- A . Use the datacenter location drop-down.
- B . Create blueprints tied to a reservation policy.
- C . Create a software component.
- D . Use an image value set for a component profile.
D
Explanation:
Reference: https://usermanual.wiki/Pdf/vrealizeautomation74configuration.975498135/help
Which two methods can a vRealize Automation administrator use to delete a vSphere endpoint? (Choose two.)
- A . Delete the endpoint using the vRealize Automation Cloud Client.
- B . Delete the endpoint from the Postgres database.
- C . Use the vRealize Automation REST API to delete the vSphere endpoint.
- D . Run the “delete vSphere endpoint” stored procedure on the IaaS database.
- E . Execute the “Unregister a vCenter Server extension” workflow from vRealize Orchestrator.
AC
Explanation:
Reference: https://docs.vmware.com/en/vRealize-Automation/7.4/com.vmware.vra.prepare.use.doc/GUIDF6AC38B4-48B3-4750-A05D-B0A943031FA9.html
An architect is designing a virtual machine blueprint for the deployment team. Each deployment machine must contain dynamically assigned unique IPs that can be directly reached by the resources on the corporate network.
Which type of networking is required for this blueprint?
- A . NSX-T on-demand NAT network
- B . NSX-T on-demand load balancer
- C . NSX-T on-demand routed network
- D . NSX-T existing network and security (NS) group
Which two metrics providers can be used in vRealize Automation to identify underutilized virtual machines that are strong candidates for deployment reclamation of vSphere virtual machines? (Choose two.)
- A . vRealize Log Insight
- B . vRealize Operations manager endpoint
- C . vRealize Network Insight
- D . vCenter performance metrics
- E . vRealize Automation metrics provider
BE
Explanation:
Reference: https://docs.vmware.com/en/vRealize-Automation/7.6/vrealize-automation-76-foundations-andconcepts.pdf
An administrator is tasked with assembling a composite blueprint using published machines blueprints.
Which three roles can assemble a composite blueprint? (Choose three.)
- A . XaaS architect
- B . Catalog administrator
- C . Infrastructure architect
- D . Application architect
- E . Software architect
- F . Container architect
CDE
Explanation:
Reference: http://www.vrcloud24x7.com/2018/08/vrealize-automation-7x-user-roles.html
A vRealize Automation administrator is installing vRealize Automation using the installation wizard. The administrator cannot see any Windows servers in which to install IaaS components.
Which agent must be installed on the IaaS Windows servers?
- A . Guest Agent
- B . Management Agent
- C . Software Bootstrap Agent
- D . Proxy Agent
B
Explanation:
Reference: http://www.vrcloud24x7.com/2019/01/requirements-and-prerequisites-for.html
During VM provisioning, which Event Broker state would an administrator use to execute a workflow to add CPU to a virtual machine?
- A . MachineProvisioned
- B . Requested
- C . OnCloneMachineComplete
- D . BuildingMachine
A
Explanation:
Reference: https://docs.vmware.com/en/vRealize-Automation/7.5/vrealize-automation-75-extensibility.pdf
What is the role of the Proxy Agent?
- A . Communicate with hypervisor endpoints
- B . Communicate with hypervisor and cloud endpoints
- C . Communicate with cloud endpoints
- D . Communicate with vCenter endpoints
A
Explanation:
Reference: https://docs.vmware.com/en/VMware-Validated-Design/4.2/com.vmware.vvd.sddc-design.doc/GUID-6158120D-C982-4F27-B1D3-4BCB46254FCF.html
An architect is designing a machine blueprint containing web, application and database servers utilizing NSX-T for networking. Upon provisioning, network traffic must be automatically restricted to allow the web server to communicate only with the application server, the application server to communicate with both the web and database servers, and the database server to be blocked from communicating with the other servers.
Which methods can be used to accomplish this?
- A . Add an appropriate security group to the blueprint from within the Blueprint Properties, under NSX Settings.
- B . Specify an appropriate NSX-T Existing Network and Security (NS) Group in the blueprint and assign it to each machine.
- C . Create or update an appropriate security group within NSX-T to include the provisioned machines.
- D . Assign an appropriate security group to the entitled items or entitled service with the entitlement.
A directory has a complex hierarchy with all objects scattered in different organizational units. Synchronizing all users from it can be time-consuming and not all of them need to be vRealize Automation users. There is a security group that contains all of the users for synchronization. This group contains other groups as members. It also contains the users that require synchronization as direct members.
Which step should the administrator take to ensure that only the necessary users are synchronized to vRealize Automation?
- A . Specify a subdomain for the group.
- B . Disable the search filter for users.
- C . Disable sync for nested group members.
- D . Specify the root of the domain.
What are two use cases for configuring a third-party identity provider for a directory in vRealize Automation? (Choose two.)
- A . Creating a Just-in-Time User Provisioning directory
- B . Configuring SecureID
- C . Using a SAML 2.0 compliant point of authentication, such as Active Directory Federation Services
- D . Configuring RADIUS
- E . Using Smart Card Authentication
AC
Explanation:
Reference: https://docs.vmware.com/en/vRealize-Automation/7.4/com.vmware.vra.prepare.use.doc/GUID93F7569C-D228-4386-8B8D-324E110AFAF6.html