Practice Free 3V0-32.23 Exam Online Questions
The security team at a company wants to allow architects to leverage existing and on-demand security components for their vSphere environment.
What are the minimum infrastructure components and/or extensibility add-ons required to achieve this goal?
- A . One vSphere and one NSX endpoint, plus the NSX plug-in for the vSphere Web Client.
- B . One vSphere, one vRealize Orchestrator and one NSX endpoint.
- C . One vSphere and one NSX endpoint, plus the ReST API plug-in for vRealize Orchestrator.
- D . One vSphere and one vRealize Orchestrator endpoint, plus the NSX plug-in for vRealize Orchestrator.
The security team at a company wants to allow architects to leverage existing and on-demand security components for their vSphere environment.
What are the minimum infrastructure components and/or extensibility add-ons required to achieve this goal?
- A . One vSphere and one NSX endpoint, plus the NSX plug-in for the vSphere Web Client.
- B . One vSphere, one vRealize Orchestrator and one NSX endpoint.
- C . One vSphere and one NSX endpoint, plus the ReST API plug-in for vRealize Orchestrator.
- D . One vSphere and one vRealize Orchestrator endpoint, plus the NSX plug-in for vRealize Orchestrator.
A bank has requested assistance with developing a backup design for its vRealize Automation platform. They would like system backups to be crash-consistent in the event of an outage.
What are three guidelines that should be followed when planning these backups? (Choose three.)
- A . Minimize the number of active transactions before beginning a backup. Plan a regular backup for when the system is least active.
- B . For non-virtual workloads, back up installation directories as required.
- C . When backing up the complete system, back up all instances of the vRealize Automation appliance and databases as close to each other as possible, preferably within seconds.
- D . Create a backup of instances of the vRealize Automation appliance and the IaaS components when updating certificates.
- E . When backing up the complete system, back up all instances of the vRealize Automation appliance one at a time to preserve availability.
An architect is designing a private cloud solution for an organization and has been given the following information:
– The organization already has a VMware Workspace ONE Access 3.3.2 cluster with external MSSQL server for their existing virtualized desktop environment.
– Due to budget constraints, wherever possible, the architect needs to reuse the existing environment.
What should the architect recommend as an authentication solution for the private cloud? Note: VMware Identity Manager has been renamed as VMware Workspace ONE Access.
- A . The existing instance can be reused as authentication provider for the private cloud but maintained outside of vRealize Lifecycle Manager.
- B . Import the existing Workspace ONE Access cluster in vRealize Suite Lifecycle Manager but do not reuse it for the authentication purposes.
- C . Deploy a new instance of Workspace ONE Access cluster using vRealize Suite Lifecycle Manager and use it for authentication.
- D . Import the existing Workspace ONE Access cluster in vRealize Suite Lifecycle Manager and reuse it for the authentication purposes.
Which component of the vRealize Suite provides a unified management platform for physical, virtual, and cloud environments?
- A . vRealize Operations Manager
- B . vRealize Orchestrator
- C . vRealize Automation
- D . vRealize Log Insight
The operations team is onboarding new interns in Active Directory. The interns need to work in the company’s vRealize Operations environment while maintaining corporate security compliance. The intern Active Directory group should only have PowerUser role to a specific vCenter cluster and ReadOnly for all other objects.
Which option would meet the requirements?
- A . Create new Active Directory accounts and import the intern user accounts. Create a new role for the interns and assign appropriate permissions on objects.
- B . Add the interns to a new vRealize Operations Active Directory Group. Import the Active Directory group and grant access to relevant objects and all actions for the specific vCenter cluster.
- C . Add the interns to the existing vRealize Operations administrators Active Directory group and grant access to relevant objects and all actions for the specific vCenter cluster.
- D . Create a new Active Directory group for interns. Synchronize intern Group, create a new role for the interns and assign appropriate permissions on objects.
An architect has been tasked with designing a vRealize Automation blueprint for the development team that satisfies the following requirements:
– Must include Web, Application and Web Servers
– Must be deployed to a public cloud
– Software must be installed during provisioning
– Web Servers CPU be scalable to a maximum of four
– Web Servers in excess of two must require manager approval
Which blueprint and approval components would satisfy these requirements?
- A . – Three Azure machine components
– Software to be installed using the ‘VirtualMachine.SoftwareN.ScriptPath’ custom property
– Web machine CPU allowance set between 1 and 4
– An approval policy for CPU’s greater than 2 using the approval policy type ‘Service Catalog – Catalog Item Request – Virtual Machine’ - B . – Three Amazon machine components
– Software to be installed using the ‘VirtualMachine.SoftwareN.ScriptPath’ custom property
– Web machine CPU allowance set between 1 and 4
– An approval policy for CPU’s greater than 2 using the approval policy type ‘Service Catalog -Catalog Item Request – Virtual Machine’ - C . – Three Azure machine components
– Software components for each machine#
– Web machine CPU allowance set between 1 and 4
– An approval policy for CPU’s greater than 2 using the approval policy type ‘Service Catalog – Catalog Item Request – Cloud Machine’ - D . – Three Amazon machine components
– Software components for each machine
– Web machine CPU allowance set between 1 and 4
– An approval policy for CPU’s greater than 2 using the approval policy type ‘Service Catalog – Catalog Item Request – Cloud Machine’
An architect has been tasked with designing a vRealize Automation blueprint for the development team that satisfies the following requirements:
– Must include Web, Application and Web Servers
– Must be deployed to a public cloud
– Software must be installed during provisioning
– Web Servers CPU be scalable to a maximum of four
– Web Servers in excess of two must require manager approval
Which blueprint and approval components would satisfy these requirements?
- A . – Three Azure machine components
– Software to be installed using the ‘VirtualMachine.SoftwareN.ScriptPath’ custom property
– Web machine CPU allowance set between 1 and 4
– An approval policy for CPU’s greater than 2 using the approval policy type ‘Service Catalog – Catalog Item Request – Virtual Machine’ - B . – Three Amazon machine components
– Software to be installed using the ‘VirtualMachine.SoftwareN.ScriptPath’ custom property
– Web machine CPU allowance set between 1 and 4
– An approval policy for CPU’s greater than 2 using the approval policy type ‘Service Catalog -Catalog Item Request – Virtual Machine’ - C . – Three Azure machine components
– Software components for each machine#
– Web machine CPU allowance set between 1 and 4
– An approval policy for CPU’s greater than 2 using the approval policy type ‘Service Catalog – Catalog Item Request – Cloud Machine’ - D . – Three Amazon machine components
– Software components for each machine
– Web machine CPU allowance set between 1 and 4
– An approval policy for CPU’s greater than 2 using the approval policy type ‘Service Catalog – Catalog Item Request – Cloud Machine’
Which VMware product is designed to optimize the performance and capacity of virtualized environments by analyzing and managing the infrastructure?
- A . vRealize Automation
- B . vRealize Operations Manager
- C . vRealize Log Insight
- D . vRealize Orchestrator
Which of the following is an example of an availability concern in system design?
- A . Encrypting sensitive data during transmission.
- B . Ensuring the system can handle a sudden surge in user traffic.
- C . Implementing regular data backups to prevent data loss.
- D . Applying role-based access controls for user authentication.