What is the most secure way to utilize the same script for user’s display name in the vRA request form?
A cloud architect is tasked with designing a Guest virtual machine (VM) request form for an organization’s new vRealize Automation (vRA) implementation. Its current PowerCLI VM request tool uses a PowerShell script that retrieves user IDs from Active Directory, which is the same identity source for vRealize Automation. The intent...
Which three of these listed elements are required for this scenario?
IT Services would like to automate the allocation of software applications. The company uses a modern virtual desktop platform with software management capabilities, and the platform supports interoperability via a REST API. The following requirements have been established for this project: Business users will use a self-service portal to...
Which approval policies would satisfy this request?
Development team members would like to deploy multiple software packages within a blueprint. One of these software packages, Tax Processing 1.0, has licensing requirements. Any member of the finance team can authorize the installation per request, but the entire team must be notified. Which approval policies would satisfy this request?...
Which design recommendation would best address these requirements?
During requirements gathering for an organization’s private cloud on a single machine catalog, the following requirements were identified: A user should be able to select a data center location which is mapped to a custom resource by the fabric administrator. A Guest VM custom hostname format should be...
The lead architect for a teaching hospital in Seattle is planning the deployment of a highly-distributed Cloud Management Platform based on VMware vRealize Automation. The design must include log aggregation and analytics for in-depth troubleshooting and analysis when issues arise and ensure a seamless experience for the operations teams
DRAG DROP The lead architect for a teaching hospital in Seattle is planning the deployment of a highly-distributed Cloud Management Platform based on VMware vRealize Automation. The design must include log aggregation and analytics for in-depth troubleshooting and analysis when issues arise and ensure a seamless experience for the operations...
Which tenant role should this user be granted?
The tenant administrator for a company’s vRealize Automation deployment is asked to create a profile for a user that should be able to assemble the blueprints that define catalog items for consumers to request from the service catalog. Which tenant role should this user be granted? A. Fabric administrator B....
platform based on VMware vRealize Automation. The design must ensure that all virtual machines should be setup in a prescribed order
DRAG DROP The architect for a teaching hospital is planning the deployment of a highly-distributed cloud management platform based on VMware vRealize Automation. The design must ensure that all virtual machines should be setup in a prescribed order. vSphere 6.5 will be used as the deployment platform. vSphere...
Which three data sources are required to be in scope?
An architect is tasked with designing a multi-region Software Defined Data Center (SDDC) deployment. The operations team has mandated that the solution enable real-time logging for all automation components. The architect makes a design decision to use a vRealize Log Insight cluster in each region, consisting of a total of...
Which three should the architect consider when determining the appropriate vRealize Automation deployment size for this environment?
A company is currently experiencing long infrastructure provisioning times, given that the process to ask, review, approve and deploy their services is manual with many people involved. It is considering vRealize Automation as a resolution, but it wants to better understand how much resources it is going to need. Which...
Which are three considerations to take into account when designing the fabric groups?
An IaaS Administrator has been tasked with organizing virtualization compute resources and cloud endpoints into fabric groups by type and intent. One or more fabric administrators will manage the resources in each fabric group. Which are three considerations to take into account when designing the fabric groups? (Choose three.)A ....