What are three supported Database Servers for VMware View Composer in a VMware View 5 environment? (Choose three.)

What are three supported Database Servers for VMware View Composer in a VMware View 5 environment? (Choose three.) 





A. Microsoft SQL Server 2005 Express with vCenter Server 4.1 U1
B. Microsoft SQL Server 2005 Express with vCenter Server 5.0
C. Microsoft SQL Server 2005 SP3 Standard with vCenter Server 5.0
D. Microsoft SQL Server 2008 R2 Express with vCenter 4.0 U3
E. Microsoft SQL Server 2008 R2 Express with vCenter Server 5.0





Answer: A,C,E

Which two platforms are supported by VMware View Composer in a VMware View 5 environment? (Choose two.)

Which two platforms are supported by VMware View Composer in a VMware View 5 environment? (Choose two.) 







A. VMware vCenter 4.0 Update 3 running on Windows Server 2008 R2
B. VMware vCenter 4.1 Update 1 running on Windows XP Pro 64-bit
C. VMware vCenter 4.1 Update 1 running on Windows Server 2003 64-bit
D. VMware vCenter 5.0 running on Windows Server 2008 R2






Answer: A,D

The View Composer Database stores information about which three components and connections? (Choose three.)

The View Composer Database stores information about which three components and connections? (Choose three.) 







A. Active Directory Connections
B. View Connection Broker Connections
C. Replicas created by the View Composer
D. Disposable data disk created by View Composer
E. Linked-clone desktops deployed by View Composer







Answer: A,C,E

A group of virtual machines has been deployed using thin disks because of limited storage space availability. The storage team has expressed concern about extensive use of this type of provisioning. At which level can the administrator set an alarm to notify the storage team?

A group of virtual machines has been deployed using thin disks because of limited storage space availability. The storage team has expressed concern about extensive use of this type of provisioning.
At which level can the administrator set an alarm to notify the storage team? 







A. Datastore
B. Virtual Machine
C. Host
D. Resource Pool







Answer: A

An administrator is performing maintenance on a storage array used by a ESXi host. The administrator wants to disable alarm actions for the host while the maintenance is taking place. What procedure will accomplish this task?

An administrator is performing maintenance on a storage array used by a ESXi host. The administrator wants to disable alarm actions for the host while the maintenance is taking place.
What procedure will accomplish this task? 







A. Right-click and disable each alarm.
B. Right-click the DRS cluster and select Alarm and Disable Alarm Actions.
C. Right-click the ESXi host and select Alarm and Disable Alarm Actions.
D. Go to the Alarms tab for the Datacenter containing the DRS cluster. Locate the storage- related alarms. Right-click and disable each alarm.







Answer: C

A user has permissions to create and manage alarms and tasks for a group of virtual machines. What happens if an administrator modifies permissions for the user so that they can no longer manage alarms?

A user has permissions to create and manage alarms and tasks for a group of virtual machines.
What happens if an administrator modifies permissions for the user so that they can no longer manage alarms? 





A. The user can no longer create alarms, but can modify or delete the existing alarms.
B. The user can create alarms but can no longer modify or delete alarms.
C. The user can no longer create, modify or delete alarms.
D. The Alarms tab is dimmed in the vSphere Client and no alarm-related actions may be taken by the user.






Answer: B

An organization has an automated desktop pool. During logon at the beginning of a shift, most users are complaining that it is taking too long for the desktop to appear. All desktops will eventually log on if given enough time. Which change will improve the connection times at the beginning of a shift?

An organization has an automated desktop pool. During logon at the beginning of a shift, most users are complaining that it is taking too long for the desktop to appear. All desktops will eventually log on if given enough time.
Which change will improve the connection times at the beginning of a shift? 






A. Number of desktops - minimum
B. Number of spare, powered-on desktops
C. Number of concurrent power operations
D. Number of desktops - maximum








Answer: B

A View administrator is creating a linked clone pool of desktops that delete or refresh after logoff. Which storage overcommit level should be used to maximize use of the datastore while retaining a reserve?

A View administrator is creating a linked clone pool of desktops that delete or refresh after logoff.
Which storage overcommit level should be used to maximize use of the datastore while retaining a reserve? 





A. Conservative
B. Aggressive
C. None
D. Moderate






Answer: D

A View administrator needs to limit the disk space growth of the virtual machines in a linked clone desktop pool due to Windows temporary files and system page file. Which initial pool setting will help limit disk space growth?

A View administrator needs to limit the disk space growth of the virtual machines in a linked clone desktop pool due to Windows temporary files and system page file.
Which initial pool setting will help limit disk space growth? 







A. Make the system disk a persistent disk
B. Enable disposable file redirection
C. Enable paging file redirection
D. Configure a RAM disk







Answer: B

An administrator must create a Terminal Services pool as an interim solution for users that are to be migrated to View. There are two Connection Servers in the environment, one of which is paired with a Security Server to enable users to access their virtual desktops remotely. The Terminal Servers may not be accessed over the internet. Which configuration option meets the connection requirements?

An administrator must create a Terminal Services pool as an interim solution for users that are to be migrated to View. There are two Connection Servers in the environment, one of which is paired with a Security Server to enable users to access their virtual desktops remotely. The Terminal Servers may not be accessed over the internet.
Which configuration option meets the connection requirements? 






A. Set the tag on the pool to match the tag on the internal connection server.
B. Set the pool to allow users to select either PCoIP or RDP as the display protocol.
C. Disable access to the pool on the security server.
D. Enable the Windows firewall on Terminal Server.







Answer: A

View Persona Management has been installed and enabled on your virtual machines. The administrator wants to manage the View user personas. Which statement is true?

View Persona Management has been installed and enabled on your virtual machines. The administrator wants to manage the View user personas.
Which statement is true? 








A. The administrator can manage View user personas by logging into the remote repository.
B. The administrator can manage View user personas within the Folder view of the View Administrator.
C. The administrator cannot manage View user personas by adding the ADM Template file to Active Directory.
D. The administrator cannot manage View user personas by using the Windows roaming profiles functions.







Answer: D

View Persona Management has been installed on the virtual machines in a View environment. How often are changes in the local profile copied to the remote repository by default?

View Persona Management has been installed on the virtual machines in a View environment.
How often are changes in the local profile copied to the remote repository by default? 






A. Every 5 minutes
B. Every 10 minutes
C. During login and every 10 minutes after login
D. An interval must be specified by the administrator








Answer: B

A database administrator has reported periodic poor performance on a particular virtual machine. The virtual machine administrator has noticed a significant drop in performance when utilized memory exceeds 1GB. What does this indicate and what could be checked next?

A database administrator has reported periodic poor performance on a particular virtual machine. The virtual machine administrator has noticed a significant drop in performance when utilized memory exceeds 1GB.
What does this indicate and what could be checked next? 






A. The application problems are definitely due to a non-memory-related problem. CPU affinity settings should be checked for this virtual machine.
B. The application problems are definitely due to a non-memory-related problem. CPU utilization should be checked next, using Windows Task Manager.
C. The virtual machine might not have physical memory available. Compression and swap activity on the ESXi host should be checked next.
D. The virtual machine might not have physical memory available. Ensure the memory limit on the VM is set to 0 MB.







Answer: C

Users have reported performance issues with an application running on a Windows VM. Performance analysis shows high CPU activity on the ESXi host but low CPU activity on the Windows VM. A high value in which overview graph and counter on the virtual machine's Performance tab would confirm the results of the performance analysis?

Users have reported performance issues with an application running on a Windows VM. Performance analysis shows high CPU activity on the ESXi host but low CPU activity on the Windows VM.
A high value in which overview graph and counter on the virtual machine's Performance tab would confirm the results of the performance analysis? 






A. CPU (%) / Wait
B. CPU Usage (Mhz) / Wait
C. CPU Usage (Mhz) / Ready
D. CPU (%) / Ready






Answer: D

A company has converted several physical machines to virtual machines but are seeing significant performance issues on the converted machines. The host is configured with sufficient memory and storage does not appear to be a bottleneck. Which metric can be checked to determine if CPU contention exists on an ESXi 5.x host?

A company has converted several physical machines to virtual machines but are seeing significant performance issues on the converted machines. The host is configured with sufficient memory and storage does not appear to be a bottleneck.
Which metric can be checked to determine if CPU contention exists on an ESXi 5.x host? 







A. %RUN
B. %WAIT
C. %USED
D. %RDY






Answer: D

vCenter Server is running in a virtual machine that is part of a vSphere DRS cluster. The vCenter Server virtual machine has been tested and can successfully migrate with vMotion between all ESXi hosts in the cluster. DRS is configured for partial automation. What happens if an ESXi host that is running the vCenter Server virtual machine experiences a power outage?

vCenter Server is running in a virtual machine that is part of a vSphere DRS cluster. The vCenter Server virtual machine has been tested and can successfully migrate with vMotion between all ESXi hosts in the cluster. DRS is configured for partial automation.
What happens if an ESXi host that is running the vCenter Server virtual machine experiences a power outage? 








A. All DRS cluster operations will be unavailable until the failed ESXi host is brought back online.
B. vCenter Server will remain offline, but all virtual machines on the remaining hosts will continue without interruption.
C. This situation cannot occur, because vCenter Server cannot be installed on a virtual machine in a vSphere DRS cluster.
D. vSphere will restart the vCenter Server virtual machine on another host.







Answer: B

A View deployment consists of ThinApp applications as well as other types of applications. The administrator wants to configure the user profiles to include the ThinApp sandbox folders. Which action will meet this requirement?

A View deployment consists of ThinApp applications as well as other types of applications. The administrator wants to configure the user profiles to include the ThinApp sandbox folders.
Which action will meet this requirement? 










A. Enable the Folders to background download group policy settings and add the user's files.
B. Enable the Folders to background download group policy settings and add the ThinApp sandbox folders.
C. Enable the Files and folders to preload group policy settings and add the ThinApp sandbox folders during the login.
D. Enable the Roam Local Settings folders to preload group policy settings and add the ThinApp sandbox folders







Answer: B

View Persona Management has been installed and enabled on your virtual machines in your environment. What is recommended for Persona Management backup?

View Persona Management has been installed and enabled on your virtual machines in your environment.
What is recommended for Persona Management backup? 






A. Snapshot the Desktop and then backup the profile.
B. Set the Persona Management software to enable before backing up.
C. Enable the Persona Management plugin in the vStorage APIs for Data Protection.
D. Do not use backup software products like MozyPro or Windows Volume backup services.






Answer: D

In a View environment, users access both View and physical desktops. Users access their View desktops with View Persona Management and their standard desktops with Windows roaming profiles. What is the recommended configuration?

In a View environment, users access both View and physical desktops. Users access their View desktops with View Persona Management and their standard desktops with Windows roaming profiles.
What is the recommended configuration? 






A. Disable profile sharing in the persona management folder.
B. Enable profile sharing in the persona management folder.
C. Use different profiles for the two desktop types.
D. Use the same profile for the two desktop types.








Answer: C

Which steps must a View administrator perform to configure View Persona Management with View desktops?

Which steps must a View administrator perform to configure View Persona Management with View desktops? 







A. Install the View Agent with the View Persona Management setup option on the replica.
B. Install the View Agent with the View Persona Management setup option on the vCenter Server systems.
C. Install the View Agent with the View Persona Management setup option on the virtual machine that is used as a parent or template.
D. Install the View Agent on the virtual machine and enable the View Persona Management option on first boot.







Answer: C

A ThinApp administrator needs to capture an application that leverages .NET 2.0 as a prerequisite. The enterprise has standardized on .NET 2.0 on the corporate desktop image. Which step should the administrator take during the ThinApp capture and build process to enable the ThinApp package to leverage the .NET 2.0 instance installed on the corporate desktop images?

A ThinApp administrator needs to capture an application that leverages .NET 2.0 as a prerequisite. The enterprise has standardized on .NET 2.0 on the corporate desktop image.
Which step should the administrator take during the ThinApp capture and build process to enable the ThinApp package to leverage the .NET 2.0 instance installed on the corporate desktop images? 







A. install .NET 2.0 as part of the ThinApp capture process
B. install .NET 2.0 as an upgrade patch to a completed ThinApp application
C. install .NET 2.0 as part of the capture workstation before starting the ThinApp capture process
D. install .NET 2.0 outside the capture process on the client workstations






Answer: C

A ThinApp administrator needs to capture an application that leverages ODBC connections. Which step should the administrator take during the ThinApp capture and build process to enable this functionality inside the ThinApp package?

A ThinApp administrator needs to capture an application that leverages ODBC connections.
Which step should the administrator take during the ThinApp capture and build process to enable this functionality inside the ThinApp package? 







A. configure the ODBC connections before starting the capture process
B. configure the ODBC connections during the capture process
C. configure the ODBC connections as an upgrade patch to a completed ThinApp application
D. configure the ODBC connections outside the capture process on the client workstations








Answer: B

A system administrator has an existing ThinApp package that needs to be integrated with View 5.0 for deployment. When rebuilding the corresponding ThinApp package, which line does the system administrator need to add to the package.ini file to enable full deployment of the application to view users?

A system administrator has an existing ThinApp package that needs to be integrated with View 5.0 for deployment.
When rebuilding the corresponding ThinApp package, which line does the system administrator need to add to the package.ini file to enable full deployment of the application to view users? 








A. MSIStreaming=1
B. ThinAppStreaming=1
C. MSIStreaming=0
D. ThinAppStreaming=0







Answer: C

A system administrator has an existing ThinApp package that needs to be integrated with View for deployment. When rebuilding the corresponding ThinApp package, which line does the system administrator need to add to the package.ini file to enable application streaming?

A system administrator has an existing ThinApp package that needs to be integrated with View for deployment.
When rebuilding the corresponding ThinApp package, which line does the system administrator need to add to the package.ini file to enable application streaming? 







A. ThinAppStreaming=0
B. MSIStreaming=1
C. MSIStreaming=0
D. ThinAppStreaming=1







Answer: B

A View environment requires a thin client to automatically connect to a kiosk mode desktop without a password. How can the administrator accomplish this?

A View environment requires a thin client to automatically connect to a kiosk mode desktop without a password.
How can the administrator accomplish this? 







A. configure the assigned desktop in Unsecured mode
B. add the thin client MAC address to the Kiosk folder on the View Connection Server
C. disable password checking from the View Administrator
D. set an automatically-generated password for the client account







Answer: D

An administrator creates a kiosk mode desktop. The client device is unable to connect to the desktop. Which action should the administrator take to resolve this issue?

An administrator creates a kiosk mode desktop. The client device is unable to connect to the desktop.
Which action should the administrator take to resolve this issue? 







A. activate kiosk mode for each View Connection Server
B. add the cm- or Custom- prefix to the AD account for the client device
C. enable kiosk mode on the desktop through View Administrator
D. create AD accounts for all users authorized to use the desktop






Answer: B

A newly created View Composer base image is unavailable for checkout in a local mode-enabled linked clone desktop pool. Which task must be performed on the base image so that it is available for checkout?

A newly created View Composer base image is unavailable for checkout in a local mode-enabled linked clone desktop pool. 

Which task must be performed on the base image so that it is available for checkout? 








A. convert the View Composer base image to a template in vCenter Server
B. publish the View Composer base image as a package in the Transfer Server repository
C. copy the View Composer base image to a Transfer Server via vCenter Server
D. publish the View Composer base image as a full virtual machine









Answer: B

A View administrator needs to reduce the size of local mode desktop downloads. Which connection server setting should be enabled?

A View administrator needs to reduce the size of local mode desktop downloads.
Which connection server setting should be enabled? 








A. use linked clones for local mode operations
B. use network optimization for local mode operations
C. use deduplication for local mode operations
D. use compression for local mode operations





Answer: D

An IT company requires its field employees to use their View desktops in local mode only. The View administrator sets the Local Mode policy for the Field Employee pool to Allow, but notices that some users are not exclusively using local mode. Which additional step should the administrator perform to ensure that field agents use local mode only?

An IT company requires its field employees to use their View desktops in local mode only. The View administrator sets the Local Mode policy for the Field Employee pool to Allow, but notices that some users are not exclusively using local mode.
Which additional step should the administrator perform to ensure that field agents use local mode only? 







A. set the Remote Mode View policy for the Field Agent pool to Deny
B. set the Local Mode policy for the Field Agent pool to Local Only
C. set the View Transfer Server to Local Only
D. ensure the users perform a rollback of the local View desktop to reset its state








Answer: A

A large group of kiosk-based desktops used for self-registration must print to a centrally located thermal printer. The kiosks are logged on as unique users without a common user group. The kiosks are in their own unique subnet. According to VMware best practices, which location-based printing parameter will map the specific printer?

A large group of kiosk-based desktops used for self-registration must print to a centrally located thermal printer. The kiosks are logged on as unique users without a common user group. The kiosks are in their own unique subnet.
According to VMware best practices, which location-based printing parameter will map the specific printer? 







A. Select Computer Name and specify the computer names of the kiosk desktops.
B. Select IP Range and specify the IP range of all the kiosk desktops.
C. Select User and specify the user IDs of the kiosk users.
D. Select MAC Address and specify the MAC addresses of the kiosk desktops.









Answer: B

A View administrator enables GPO settings for location-based printing, but users are still unable to print to a local printer. Which step did the administrator likely neglect to perform in addition to enabling GPO settings?

A View administrator enables GPO settings for location-based printing, but users are still unable to print to a local printer.
Which step did the administrator likely neglect to perform in addition to enabling GPO settings? 







A. Enable ThinPrint in the View Agent of the desktops that will use location-based printing.
B. Run the AutoConnect Location-based Printing for VMware View setup wizard on the domain computer being used to configure the GPO.
C. Register the TPVMGPoACmap.dll on the domain computer being used to configure the GPO.
D. Enable VirtualPrint in the View Agent of the desktops that will use location-based printing.








Answer: C

Users have been given access to several different desktop pools, and they need a specific printer mapped to any desktop to which they connect. How should the View administrator ensure that each user always receives the specific mapped printer?

Users have been given access to several different desktop pools, and they need a specific printer mapped to any desktop to which they connect.
How should the View administrator ensure that each user always receives the specific mapped printer? 







A. Select User/User Group and specify the user ID of the specific user.
B. Select MAC Address and specify the MAC addresses of the desktops to which the user connects.
C. Select Client Name and specify the client names of the desktops to which the user connects.
D. Select IP Range and specify the IP range of all the desktop pools to which the user has access.









Answer: A

A desktop technician is responsible for visiting physical desktops and adding the View Agent so that they can be connected remotely via View. Another View administrator handles entitlements separately after the computer has been added. What is the minimum privilege required to allow the technician to perform this task?

A desktop technician is responsible for visiting physical desktops and adding the View Agent so that they can be connected remotely via View. Another View administrator handles entitlements separately after the computer has been added.
What is the minimum privilege required to allow the technician to perform this task? 







A. Direct Interaction
B. Manage Desktops
C. Manage Physical Devices
D. Register Agent








Answer: D

A desktop administrator has been assigned the task of managing a single automated desktop pool for a small branch of a larger organization. This pool has been placed in a folder specifically for this location. In View Administrator, which built-in role should this administrator be assigned to manage this folder?

A desktop administrator has been assigned the task of managing a single automated desktop pool for a small branch of a larger organization. This pool has been placed in a folder specifically for this location.
In View Administrator, which built-in role should this administrator be assigned to manage this folder? 








A. Administrator
B. Desktop Administrator
C. Folder Administrator
D. Inventory Administrator







Answer: D

A View administrator needs to assign permissions to allow a desktop administrator to manage a desktop pool. What is the least permissive View administrator role that would allow the user to do this?

A View administrator needs to assign permissions to allow a desktop administrator to manage a desktop pool.
What is the least permissive View administrator role that would allow the user to do this? 








A. Global Configuration and Policy Administrators
B. Inventory Administrators
C. Desktop Pool Administrators
D. Administrators







Answer: B

A View administrator adds a user account for a newly-hired desktop administrator. The desktop administrator is unable to restart a View desktop. Where should the View administrator go to set the necessary permissions to solve this issue?

A View administrator adds a user account for a newly-hired desktop administrator. The desktop administrator is unable to restart a View desktop. Where should the View administrator go to set the necessary permissions to solve this issue? 








A. Active Directory Users and Groups
B. View Administrator
C. Active Directory Remote Desktop Users Group
D. View Security Server









Answer: B

Adobe Flash Throttling has been set to Aggressive, and Flash Quality has been set to Low in order to manage bandwidth. A user complains about the quality of Flash objects. Which action can be taken to improve the quality of Flash objects without changing the Throttling and Quality settings?

Adobe Flash Throttling has been set to Aggressive, and Flash Quality has been set to Low in order to manage bandwidth. A user complains about the quality of Flash objects.
Which action can be taken to improve the quality of Flash objects without changing the Throttling and Quality settings? 







A. instruct the user to move the mouse cursor into the Flash content while it is playing
B. enable Force Offscreen Composition in Internet Explorer advanced settings
C. enable hardware acceleration on the display properties
D. lower the color quality to Medium (16-bit) on the display properties







Answer: A

A View administrator is planning for four users to access View desktops across a T1 WAN circuit. Flash content will be used inside of browser sessions by all four users. What should the administrator do to ensure that the View desktops use the least bandwidth possible for Adobe Flash content in a browser?

A View administrator is planning for four users to access View desktops across a T1 WAN circuit. Flash content will be used inside of browser sessions by all four users.
What should the administrator do to ensure that the View desktops use the least bandwidth possible for Adobe Flash content in a browser? 







A. use the Client Configuration ADM template to apply a GPO to enable Flash Cache
B. use the PCoIP ADM template to set the PCoIP Maximum Frame rate to 20 or less
C. set Flash Quality to Low and Flash Throttling to High in View Administrator
D. use the PCoIP ADM template to set PCoIP Imaging Maximum Initial Image Quality to 50 or less








Answer: C

A View administrator must identify any changes that need to take place in the corporate firewall to allow local mode desktops to be checked out from outside the firewall. What is the minimum requirement to enable this functionality?

A View administrator must identify any changes that need to take place in the corporate firewall to allow local mode desktops to be checked out from outside the firewall.
What is the minimum requirement to enable this functionality? 








A. TCP 443 and UDP 4172 are open to the View Transfer Server.
B. TCP 443 and UDP 4172 are open to the View Connection Server.
C. TCP 80 and TCP 443 are open to the View Transfer Server.
D. TCP 80 and TCP 443 are open to the View Connection Server.






Answer: C

What should an administrator do to ensure that communications between a View Security Server and its associated connection server is encrypted?

What should an administrator do to ensure that communications between a View Security Server and its associated connection server is encrypted? 







A. Configure an IPSec tunnel between the servers.
B. Enable certificate checking on each server.
C. Install a firewall between the servers.
D. Select the same encryption level on each server.







Answer: A

A company wants to increase disk capacity for their vSphere environment. Management mandates that: 1. vMotion must work in this environment. 2. The existing LAN infrastructure must be used. Which storage option best meets the company objectives?

A company wants to increase disk capacity for their vSphere environment. Management mandates that:
1. vMotion must work in this environment.
2. The existing LAN infrastructure must be used.
Which storage option best meets the company objectives? 







A. iSCSI
B. Fibre Channel
C. SATA
D. NFS







Answer: D

An administrator is informed that there will be a storage maintenance window and that failovers may occur. What is the expected length of time that a Windows 2008 virtual machine storage I/O will pause during a path failover?

An administrator is informed that there will be a storage maintenance window and that failovers may occur.
What is the expected length of time that a Windows 2008 virtual machine storage I/O will pause during a path failover? 






A. 0 to 30 seconds
B. 90 to 120 seconds
C. 60 to 90 seconds
D. 30 to 60 seconds







Answer: D

A company opens a new remote office with five PCoIP-enabled thin clients. The administrator configures the clients to connect to the View Security Server installed at Headquarters. Which setting must the administrator configure on the View Security Server to make sure PCoIP is routed to the internal network?

A company opens a new remote office with five PCoIP-enabled thin clients. The administrator configures the clients to connect to the View Security Server installed at Headquarters.
Which setting must the administrator configure on the View Security Server to make sure PCoIP is routed to the internal network? 






A. PCoIP External URL
B. PCoIP Gateway URL
C. PCoIP Gateway Address
D. External URL






Answer: A

A company has a security certificate regenerated with a new password. The administrator reinstalls the new certificate. What must the administrator do to be sure the View Security Server uses the new certificate password?

A company has a security certificate regenerated with a new password. The administrator reinstalls the new certificate.
What must the administrator do to be sure the View Security Server uses the new certificate password? 








A. Edit the entry password_new=yes in the certificate.properties file.
B. Edit the entry keypass=new_password in the locked.properties file.
C. Reflect the new password in Active Directory Certificate Server properties.
D. Restart the Certificate Server service to enable use of the new password.







Answer: B