Massive New Year Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

3V0-32.21 Questions and Answers

Question # 4

An online retail company needs its shopping cart application to be highly available.

What three cloud management design decisions would give an optimal shopping experience? (Choose three.)

A.

Create a vRealize Operations metric chart for the application’s CPU usage

B.

Create a vRealize Orchestrator workflow that remediates the issue by updating the CPU

C.

Configure the vRealize Operations alert to run a vRealize Orchestrator workflow when triggered

D.

Create a vRealize Operations alert that is triggered when the application’s CPU usage exceeds a threshold

E.

Create a vRealize Orchestrator workflow that emails an administrator to remediate the issue

F.

Configure the vRealize Operations alert to email an administrator to remediate the issue

Full Access
Question # 5

An architect is designing a vRealize Log Insight cluster for an organization with the following requirements:

The organization has an external load balancer available to provide load balancing for various requirements.

Due to budget constraints the organization need to reuse existing environment as much as possible.

What should the architect choose as the load balancing solution for the vRealize Log Insight cluster?

A.

Use the integrated load balancer

B.

Deploy a new external load balancer

C.

Use the existing external load balancer

D.

Use both integrated and external load balancers

Full Access
Question # 6

A cloud architect is planning to scale out the small deployment of vRealize Automation to address high availability requirements.

When creating an implementation plan, which prerequisite should be documented?

Note:

FQDN: Fully qualified domain name

VIP: Virtual IP address

A.

Request certificate containing VIP FQDN for each Organization for VMware Identity Manager VIP

B.

Request Certificate Authority (CA)-signed certificate containing the VIP FQDN and the FQDN of the VMware Identity Manager nodes

C.

Request Certificate Authority (CA)-signed certificate containing the VIP FQDN and the FQDN of all the cluster nodes

D.

Request certificate containing VIP FQDN for each Organization for vRealize Automation VIP

Full Access
Question # 7

An organization wants to implement a network topology to provide users with a one-way upstream access to the external network.

Which two statements are true for implementing such a network profile type using NSX-T Data Center? (Choose two.)

A.

The external network specified in the “Network Policies” tab will be used to assign an external IP to the VM

B.

A DNAT rule is created o the Tier-1 router to allow the VM to communicate externally

C.

The cloud template must use the “private” network profile type

D.

The external network should be left blank in the “Network Policies” tab

E.

An SNAT rule is created on the Tier-1 router to allow the VM to communicate externally

Full Access
Question # 8

An architect is designing a greenfield VMware vRealize Cloud Management solution. During the requirements gathering workshop with the customer, the future Service Owner made the following comment:

The Maximum Tolerable Downtime (MTD) for the Cloud Management solution is 1 hour.

When creating the design documentation, which design quality should be used to classify the requirements?

A.

Manageability

B.

Availability

C.

Recoverability

D.

Performance

Full Access
Question # 9

An architect is designing a private cloud solution for an organization and has been given the following information:

The organization already has a VMware Workspace ONE Access 3.3.2 cluster with external MSSQL server for their existing virtualized desktop environment.

Due to budget constraints, wherever possible, the architect needs to reuse the existing environment.

What should the architect recommend as an authentication solution for the private cloud?

Note: VMware Identity Manager has been renamed as VMware Workspace ONE Access.

A.

The existing instance can be reused as authentication provider for the private cloud but maintained outside of vRealize Lifecycle Manager.

B.

Import the existing Workspace ONE Access cluster in vRealize Suite Lifecycle Manager but do not reuse it for the authentication purposes.

C.

Deploy a new instance of Workspace ONE Access cluster using vRealize Suite Lifecycle Manager and use it for authentication.

D.

Import the existing Workspace ONE Access cluster in vRealize Suite Lifecycle Manager and reuse it for the authentication purposes.

Full Access
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 23 Jan 2022