Download VMware Certified Advanced Professional 7 -Cloud Management and Automation Design Exam.PrepDumps.3V0-732.2020-08-25.1e.41q.vcex

Download Exam

File Info

Exam VMware Certified Advanced Professional 7 - Cloud Management and Automation Design Exam
Number 3V0-732
File Name VMware Certified Advanced Professional 7 -Cloud Management and Automation Design Exam.PrepDumps.3V0-732.2020-08-25.1e.41q.vcex
Size 896 Kb
Posted August 25, 2020
Downloads 4

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%


Demo Questions

Question 1
An architect is tasked with designing a backup strategy for vRealize Orchestrator as part of an upcoming production rollout of a Cloud Management Platform. 
Which are two valid backup design recommendations? (Choose two.)

  • A: If vRealize Orchestration is embedded within the vRealize Automation appliance, perform its backup along with Manager Services for vRealize Automation.
  • B: Perform backup of vRealize Orchestrator virtual machines in the order of the startup priority.
  • C: If vRealize Orchestrator is a standalone component, perform its backup before backing up vRealize Automation components in no particular order.
  • D: Perform file-level backup of the Orchestrator database only after a successful full virtual machine backup.

Question 2
The architect for a vRealize Automation project has a customer who wants the ability to do ‘Backup as a Service’ capabilities through day two operations. This is to allow end users to do on-demand backup and restores of their vRealize Automation workload machines without the need to open a ticket with Support. 
To which two infrastructure qualities does this technical requirement map? (Choose two.)

  • A: Recoverability
  • B: Security
  • C: Manageability
  • D: Availability
  • E: Performance

Question 3
Which two-factor authentication mechanism is supported by vRealize Automation?

  • A: Mobile SSO (Secure Sign-On) authentication
  • B: AirWatch Cloud Connector authentication
  • C: Certificate-based authentication
  • D: RADIUS (Remote Authentication Dial-In User Service) authentication

Question 4
The tenant administrator for a company’s vRealize Automation deployment is asked to create a profile for a user that should be able to assemble the blueprints that define catalog items for consumers to request from the service catalog. Which tenant role should this user be granted?

  • A: Fabric administrator
  • B: Catalog architect
  • C: Blueprint administrator
  • D: Application architect

Question 5
A company is currently experiencing long infrastructure provisioning times, given that the process to ask,review, approve and deploy their services is manual with many people involved. It is considering vRealize Automation as a resolution, but it wants to better understand how much resources it is going to need. 
Which three should the architect consider when determining the appropriate vRealize Automation deployment size for this environment? (Choose three.)

  • A: number of managed machines
  • B: number of concurrent machine provisions
  • C: number of catalog items
  • D: number of blueprints
  • E: number of endpoints

Question 6
A cloud architect is tasked with providing a design for integration with a third-party system. 
The following requirements have been identified:
When a user requests a virtual machine, vRealize Automation should pass the user selected application name with its key to the third-party system. 
The application list could be updated weekly following the architecture approval meeting. It currently has 250 items. 
Impacts to the vRealize Automation virtual machine request screen’s performance should be minimized. 
What would be the best solution to meet these requirements?

  • A: Create a vRO action to return application values as “Array\String” by reading from the third-party system dynamically, Create a display drop-down custom property with external values and map it to the vRO action.
  • B: Design a schedule vRealize Orchestrator (vRO) workflow to read values from the third-party system and store in vRO, Create a vRO action to return application values stored in vRO as “Properties”, Create a Display drop-down custom property with external values and map it to the vRO action.
  • C: Create a Display drop-down custom property with external values and provide AJAX call information to the third-party system.
  • D: Design a schedule vRO workflow to read values from the third-party and store in vRO, Create a vRO action to return application values stored in vRO as “Array\String”, Create a Display drop-down custom property with external values and map it to the vRO action.

Question 7
An IaaS Administrator has been tasked with organizing virtualization compute resources and cloud endpoints into fabric groups by type and intent. One or more fabric administrators will manage the resources in each fabric group. 
Which are three considerations to take into account when designing the fabric groups? (Choose three.)

  • A: Fabric administrators are responsible for creating reservations on the compute resources in their fabric groups to allocate fabric to specific business groups.
  • B: Fabric administrators monitor the resource use for their group(s) and often are approvers for catalog requests.
  • C: Fabric administrators may submit requests on behalf of other users. These users could be a member of more than one group and have different roles in different groups.
  • D: The IaaS administrator must grant the role of fabric administrator to the appropriate users.
  • E: Fabric groups will be created in a specific tenant, but their resources could be made available to users who belong to business groups in all tenants.

Question 8
Development team members would like to deploy multiple software packages within a blueprint. One of these software packages, Tax Processing 1.0, has licensing requirements. Any member of the finance team can authorize the installation per request, but the entire team must be notified. 
Which approval policies would satisfy this request?

  • A:
  • B:
  • C:
  • D:

Question 9
An architect has been tasked with designing a vRealize Automation blueprint that includes Linux machines. 
The design includes a requirement that all newly-created machines be added to the corporate DNS. 
Which two design specifications will address the needs of this scenario?

  • A: Use custom properties on each machine within the blueprint that provides the details for adding the machine to the corporate DNS.
  • B: Create an Event Broker subscription that runs an appropriate vRealize Orchestrator workflow during an appropriate machine lifecycle state.
  • C: Add and configure the appropriate XaaS component into the machine blueprint.
  • D: Create an XaaS blueprint that adds the machine to DNS and then builds the machine.

Question 10
An architect has been tasked with designing a blueprint containing web, application and database machines utilizing NSX for networking. 
Upon provisioning, network traffic must be automatically restricted to allow:
The web server to communicate only to the application server 
The application server to communicate to both the web and database servers 
The database server to be blocked from communicating to the other servers 
Which two methods could the architect use to accomplish this? (Choose two.)

  • A: Assign an appropriate security group to the entitled items or entitled service within the entitlement.
  • B: Add an appropriate security group to the blueprint from within the blueprint properties, under NSX Settings.
  • C: Create or update an appropriate security group within NSX to include the provisioned machines.
  • D: Specify an appropriate security group in the blueprint and assign it to each machine.
  • E: Use an Event Broker subscription to ensure that provisioned machines are receiving the appropriate security group assignment.


You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files