An administrator wants to make a centralized Web Management Console available to desktop and mobile users. End users should be able to request applications and virtual desktop resources customized specifically for them.
Which VMware product can offer this functionality?
A. VMware ThinApp
B. VMware Workspace Portal
C. VMware vRealize Automation
D. VMware Mirage
A consultant is designing a Horizon (with View) deployment and has been informed by the client that several departments allow their users lo work from home three days a week Which product or component can help secure the users' access to their virtual desktops?
A. AirWatch Secure Content Locker
B. VMware Workspace Portal
C. View Security Server
D. NSX Manager
Which technique does VMware vRealize Operations for Horizon 6 use to determine the upper and lower range of normal behavior for each metric?
A. Pro-Active Smart Alerts
B. Super Metrics
C. Dynamic Thresholding
D. Self Learning Analytics
How are VMware Horizon 6 storage policies applied to virtual desktops that are located on a Virtual SAN distributed datastore?
A. The policies are automatically and individually applied to non-persistent virtual desktops.
B. The policies are configured using a Virtual SAN custom storage policy.
C. The policies are upon deployment of a virtual desktop from a linked clone.
D. The policies are automatically and individually applied per disk.
A manager is planning next year's budget and is concerned that desktop computers cost too much money for the length of time they are able to be used. The manager wants a solution that is not just simple, but one that will last for years with little required maintenance.
Which type of business challenge is the manager being faced with?
A. Security
B. Management
C. Accessibility
D. Application
An IT manager is looking for a solution to high maintenance and repair costs in their organization. Which solution would help reduce these costs?
A. Horizon (with View) Client
B. vRealize Operations for Horizon
C. Thin Clients
D. VMware Mirage
Which statement represents a Customer Requirement that could be met by implementing a VMware Horizon (with View) deployment?
A. We need to centralize access to common services and provide a uniform, secure, easy to manage image for employee access.
B. We want to reduce the amount of hardware in our datacenter by making more.
C. We are looking for an easy way to recover our user services in the event bf unplanned downtime.
D. We need to centralize our management functionality and be able to quickly and efficiently monitor our datacenter services.
A company wants to purchase several physical servers, which will be deployed as Virtual SAN- enabled FSXi hosts. The company is unsure which disk architect tire types are required to be installed in the server in order to deploy Virtual SAN.
Which two types of physical disks are required to deploy Virtual SAN? (Choose two.)
A. Flash based devices (SSD) for capacity
B. Flash based devices (SSU) for performance
C. Magnetic disks tor capacity
D. SATA disks tor performance
An administrator is attending a planning meeting for a VMware Horizon (with View) deployment and is asked for a definition of end user computing?
How should the administrator respond?
A. End user computing is the process of granting everyone administrator-level access to their virtual desktop.
B. End user computing is maintaining the licenses for each software package used within the environment.
C. End user computing is the process of life cycling everyone's physical desktop every three years.
D. End user computing is the process of providing data access, regardless of the client platform.
An administrator wants to ensure ease of access to company systems for employees, while preventing unauthorized access when VMware Horizon Desktop as a Service (DaaS) has been implemented.
Which two VMware Horizon DaaS features will help the administrator meet corporate requirements? (Choose two.)
A. Brokered access to VMware Workspace.
B. Onsite Security Server.
C. Automatic adoption of existing security police.
D. Integrated two-factor authentication capabilities.