1.
Which two-factor authentication mechanism is supported by vRealize Automation?
2.
The tenant administrator for a company's vRealize Automation deployment is asked to create a profile for a user that should be able to assemble the blueprints that define catalog items for consumers to request from the service catalog. Which tenant role should this user be granted?
3.
During requirements gathering for an organization's private cloud on a single machine catalog, the following requirements were identified:
A user should be able to select a data center location which is mapped to a custom resource by the fabric administrator.
A Guest VM custom hostname format should be based on the first two letters of the data center location.
A generated VM custom hostname format should be displayed as a drop-down in the catalog request page using a vRealize Automation (vRA) custom property backed by external vRealize Orchestrator (vRO) action.
Which design recommendation would best address these requirements?
4.
A cloud architect is trying to determine the operational impacts of adding another business group (DevOps) to the company's existing vRealize Automation (vRA) deployment. Existing users have reported that response times for login into their vRA infrastructure has spiked recently and it is taking longer than usual. The Active Directory user base, after the addition of DevOps users, could increase to well over 100,000 users and 50 groups. What is the VMware-recommended design to address this scenario?
5.
A cloud architect is tasked with designing a Guest virtual machine (VM) request form for an organization's new vRealize Automation (vRA) implementation. Its current PowerCLI VM request tool uses a PowerShell script that retrieves user IDs from Active Directory, which is the same identity source for vRealize Automation. The intent of the script is to retrieve and display John Smith when the actual value in Active Directory is JSmith01. What is the most secure way to utilize the same script for user's display name in the vRA request form?
6.
An architect has been tasked with designing a vRealize Automation blueprint that includes Linux machines. The design includes a requirement that all newly- created machines be added to the corporate DNS. Which two design specifications will address the needs of this scenario?
7.
An emerging software start-up company is growing rapidly. The Engineering department is looking to quickly scale its testing environment into the cloud. The vRealize Automation architect has been tasked with recommending the appropriate user role for a newly-formed integration team to integrate VMware vCloud Air into the Engineering Tenant. What is the minimum user role that must be granted to the integration team?
8.
The development team has decided to move its 12-node application into its vRealize Automation environment. There are several teams of developers all working on the same application, so the traffic needs to be separated from the other teams. Since the application has no dependencies outside of itself, what could be done to address the needs of this scenario?
9.
The architect for a vRealize Automation project has met with the IT team and identified the following requirements:
1. Fine grained logging and monitoring of all events
2. VMs have to be available within 5 minutes of request
3. Utilize built-in functionality
4. HIPAA Compliance
5. API calls to vRA and NSX
6. Custom Portal
To which infrastructure quality would the 'VMs have to be available within 5 minutes of request' requirement map?
10.
An architect has been asked to design a machine blueprint for the development team. The machine(s) of each deployment must contain dynamically-assigned unique IP's that could be reached by the resources on the corporate network. Which type of network should the architect recommend for this blueprint?