What can the administrator do to resolve this issue?

An administrator configures a pre-approval event subscription to run vRealize Orchestrator workflow. The workflow does not run when a machine that matches the defined criteria is requested in the service catalog. What can the administrator do to resolve this issue?A . Verify that approvers have executed the approve option.B ....

October 29, 2019No CommentsREAD MORE +

What can be used in custom forms to prevent a user from entering too large a value (such as too much memory for a virtual machine)?

What can be used in custom forms to prevent a user from entering too large a value (such as too much memory for a virtual machine)?A . Constraints for a fieldB . Regular expression for a fieldC . Quotas for a fieldD . Limitations for a fieldView AnswerAnswer: A

October 28, 2019No CommentsREAD MORE +

Which type of networking is required for this blueprint?

An architect is designing a virtual machine blueprint for the deployment team. Each deployment machine must contain dynamically assigned unique IPs that can be directly reached by the resources on the corporate network. Which type of networking is required for this blueprint?A . NSX-T on-demand NAT networkB . NSX-T on-demand...

October 27, 2019No CommentsREAD MORE +

Which methods can be used to accomplish this?

An architect is designing a machine blueprint containing web, application and database servers utilizing NSX-T for networking. Upon provisioning, network traffic must be automatically restricted to allow the web server to communicate only with the application server, the application server to communicate with both the web and database servers, and...

October 26, 2019No CommentsREAD MORE +

What are two use cases for configuring a third-party identity provider for a directory in vRealize Automation? (Choose two.)

What are two use cases for configuring a third-party identity provider for a directory in vRealize Automation? (Choose two.)A . Creating a Just-in-Time User Provisioning directoryB . Configuring SecureIDC . Using a SAML 2.0 compliant point of authentication, such as Active Directory Federation ServicesD . Configuring RADIUSE . Using Smart...

October 26, 2019No CommentsREAD MORE +

What is the role of the Proxy Agent?

What is the role of the Proxy Agent?A . Communicate with hypervisor endpointsB . Communicate with hypervisor and cloud endpointsC . Communicate with cloud endpointsD . Communicate with vCenter endpointsView AnswerAnswer: C

October 26, 2019No CommentsREAD MORE +

Which two metrics providers can be used in vRealize Automation to identify underutilized virtual machines that are strong candidates for deployment reclamation of vSphere virtual machines? (Choose two.)

Which two metrics providers can be used in vRealize Automation to identify underutilized virtual machines that are strong candidates for deployment reclamation of vSphere virtual machines? (Choose two.)A . vRealize Log InsightB . vRealize Operations manager endpointC . vRealize Network InsightD . vCenter performance metricsE . vRealize Automation metrics providerView...

October 26, 2019No CommentsREAD MORE +

What is the correct URL to log in to the finance tenant?

A system administrator created a tenant with URL name “fin” for the finance team. The fully qualified domain name (FQDN) of the appliance is vra.rainpole.local. What is the correct URL to log in to the finance tenant?A . https://vra.rainpole.local/vcac/org/finB . https://vra.rainpole.local/org/financeC . https://vra.rainpole.local/org/finD . https://vra.rainpole.local/vcac/org/financeView AnswerAnswer: D

October 25, 2019No CommentsREAD MORE +

What is the correct URL to log in to the default tenant?

What is the correct URL to log in to the default tenant?A . https://vRA_FQDN/orgB . https://vRA_FQDN/org/vcacC . https://vRA_FQDN/vcacD . https://vRA_FQDN/vcac/orgView AnswerAnswer: D

October 25, 2019No CommentsREAD MORE +

Which option in a composite blueprint’s settings allows an architect to modify the CPU and memory limits of provisioned virtual machines?

Which option in a composite blueprint’s settings allows an architect to modify the CPU and memory limits of provisioned virtual machines?A . Increase number of instancesB . Propagate updates to existing deploymentsC . Make available as a component in the design canvasD . Make provisioned resources scalableView AnswerAnswer: D

October 24, 2019No CommentsREAD MORE +