[Free] Download New Latest (January 2016) VMware VCPD610 Real Exam 131-140

Ensurepass

QUESTION 131

An administrator is planning the capture of a reference machine for two departments: Finance and Information Technology. Which two applications should the administrator include in the common base layer? (Choose two.)

 

A.

Finance Accounting Application

B.

Anti-Virus software

C.

Admin Script Editor

D.

VPN Software

 

Correct Answer: BD

 

 

QUESTION 132

Several users within a corporation installed a team collaboration utility onto their Mirage-managed systems. The systems became erratic, so they uninstalled the application, but the problem remained. An administrator needs to repair the users’ systems and ensure they are compliant with the corporate image. All user profile data must remain intact. What should the administrator do?

 

A.

Revert to Snapshot with Restore System Only option selected.

B.

Enforce All Layers with the Preserve user applications option selected.

C.

Revert to Snapshot without Restore System Only option selected.

D.

Enforce All Layers with the Remove user applications option selected.

 

Correct Answer: D

 

 

 

 

 

QUESTION 133

Corporate security policy requires that all user endpoints be encrypted with Full-Disk Encryption. What should the administrator do prior to migrating the user endpoints from Windows XP to Windows 7?

 

A.

Deploy the Mirage Encryption Assistance Tools to the endpoint prior to migration.

B.

Decrypt the BIOS of the endpoint prior to migration.

C.

Decrypt the disk(s) of the endpoint prior to migration.

D.

Decrypt the C:Windows directory of the endpoint prior to migration.

 

Correct Answer: C

 

 

QUESTION 134

After creating an Upload policy for a group of users, an administrator has found a significant increase in storage usage by Mirage. After further investigation, the administrator finds that the increase is a result of users storing personal MP3 libraries on the system. What should the administrator do to prevent these files from being protected while allowing the users to store the files on the system?

 

A.

Add a Rule to the User Area for MP3 files in the Upload policy.

B.

Create a Collection labeled Exclude MP3s.

C.

Add a Rule Exception to the Unprotected Area for MP3 files in the Upload policy.

D.

Add a Rule to the Unprotected Area for MP3 files in the Upload policy.

 

Correct Answer: A

 

 

QUESTION 135

Which t
wo user authentication methods are natively supported by Workspace Portal? (Choose two.)

 

A.

Kerberos

B.

RSA SecurID

C.

RADIUS

D.

Smart cards

 

Correct Answer: AB

 

 

QUESTION 136

An administrator needs to modify the Workspace Portal instance to provide access to a group of users in a different Active Directory Forest. Which two steps must the administrator take to connect to this new forest? (Choose two.)

 

A.

Set the LDAP port to 389 (non-SSL) or 636 (SSL).

B.

Set the global catalog port to 3268 (non-SSL) or 3269 (SSL).

C.

Select sAMAccountName as the Active Directory attribute that contains the username.

D.

Select userPrincipalName as the Active Directory attribute that contains the username.

 

Correct Answer: BD

 

 

QUESTION 137

Several users spanning multiple Active Directory groups have been assigned to a special project and need access to a set of applications. An administrator needs to create a group to manage these users in Workspace Portal but does not have access to Active Directory to create a new group there. What should the administrator do?

 

A.

Edit the Directory Sync rules to create a filter group.

B.

Create a new Connector virtual appliance and sync only the selected users.

C.

Create a group in Workspace Portal and assign the users to this group.

D.

Create a group in the Configurator virtual appliance console and add the users to this group.

 

Correct Answer: C

 

 

QUESTION 138

The administrator is required to make ThinApp packages available in streaming mode through Workspace Portal. What are the minimum required share and NTFS permissions?

 

A.

Share.Read

NTFS: Read & Write

B.

Share.Change

NTFS: Modify

C.

Share.Read

NTFS: Read & Execute

D.

Share.Change

NTFS: List Folder Contents & Execute

 

Correct Answer: C

 

 

QUESTION 139

In which two situations should a VMware customer choose to implement Workspace Portal? (Choose two.)

 

A.

Corporate IT has a security mandate requiring RSA authentication whenever users access company resources from their personal devices.

B.

Executives have mandated that users will be able to work from any location whether they are online or offline.

C.

Customer is moving to a BYOD (Bring Your Own Device) business model but they still need to access company applications.

D.

Management is searching for a file sharing solution that is hosted internally in order to control data security.

 

Correct Answer: AC

 

 

QUESTION 140

An administrator has provisioned a web application to a group of users. Users have reported that the application is not visible in the Applications tab when the user launches Workspace Portal. Which steps must the administrator take to ensure the application is entitled properly?

 

A.

Verify that the application is SAML-enabled.

Verify that the application is entitled to a directory service-based Workspace Portal group or user.

B.

Verify that the application is set to Automatic.

Verify that the application is entitled to a directory service-based Workspace Portal group or user.

C.

Verify that the application is set to User-Activated.

Verify that the application is entitled to a local Workspace Portal group or user.

D.

Verify that the Workspace Portal client is installed on the endpoint.

Verify that the application is entitled to a local Workspace Portal group or user.

 

Correct Answer: B

 

Free VCE & PDF File for VMware VCPD610 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …