Download VMware Certified Advanced Professional 7 -Cloud Management and Automation Design Exam.prep4sure.3V0-732.2019-02-01.1e.23q.vcex

Download Exam

File Info

Exam VMware Certified Advanced Professional 7 - Cloud Management and Automation Design Exam
Number 3V0-732
File Name VMware Certified Advanced Professional 7 -Cloud Management and Automation Design Exam.prep4sure.3V0-732.2019-02-01.1e.23q.vcex
Size 217 Kb
Posted February 01, 2019
Downloads 19

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%


Demo Questions

Question 1
Which two-factor authentication mechanism is supported by vRealize Automation?  

  • A: Mobile SSO (Secure Sign-On) authentication
  • B: AirWatch Cloud Connector authentication
  • C: Certificate-based authentication
  • D: RADIUS (Remote Authentication Dial-In User Service) authentication

Question 2
The tenant administrator for a company’s vRealize Automation deployment is asked to create a profile for a user that should be able to assemble the blueprints that define catalog items for consumers to request from the service catalog.  
Which tenant role should this user be granted?

  • A: Fabric administrator
  • B: Catalog architect
  • C: Blueprint administrator
  • D: Application architect

Question 3
During requirements gathering for an organization’s private cloud on a single machine catalog, the following requirements were identified: 
A user should be able to select a data center location which is mapped to a custom resource by the fabric administrator.  
A Guest VM custom hostname format should be based on the first two letters of the data center location.  
A generated VM custom hostname format should be displayed as a drop-down in the catalog request page using a vRealize Automation (vRA) custom property backed by external vRealize Orchestrator (vRO) action.  
Which design recommendation would best address these requirements?

  • A: Define a custom property “_vrm.DataCenter.Location” with static datacenter values, assign it to the blueprint with the “Show in the request” check box selected 
    and map it as an input to the required vRO action.
  • B: Define a custom property “Vrm.DataCenter.Location” with static datacenter values, assign it to the blueprint with the “Show in the request” check box selected 
    and map it as an input to the required vRO action.
  • C: Enable “Display location on request” in the blueprint’s VM machine type, map the built-in “Vrm.DataCenter.Location” custom property as an input to the 
    required vRO action.  
  • D: No new custom property is required since the fabric administrator has already mapped datacenter locations to the correct compute resources. Map the built-in 
    “_vrm.DataCenter.Location” custom property as an input to the required vRO action.

Question 4
A cloud architect is trying to determine the operational impacts of adding another business group (DevOps) to the company’s existing vRealize Automation (vRA)  deployment. Existing users have reported that response times for login into their vRA infrastructure has spiked recently and it is taking longer than usual. The Active Directory user base, after the addition of DevOps users, could increase to well over 100,000 users and 50 groups.  
What is the VMware-recommended design to address this scenario?

  • A: Add an additional connector to the existing Active Directory.
  • B: Add an additional IaaS proxy agent.  
  • C: Add an additional IaaS DEM server.
  • D: Change the default access policy when adding the additional user base.
  • E: Increase the vRA virtual appliance memory allocation on each machine as per sizing guidelines.

Question 5
A cloud architect is tasked with designing a Guest virtual machine (VM) request form for an organization’s new vRealize Automation (vRA) implementation. Its current PowerCLI VM request tool uses a PowerShell script that retrieves user IDs from Active Directory, which is the same identity source for vRealize Automation.  
The intent of the script is to retrieve and display John Smith when the actual value in Active Directory is JSmith01.  
What is the most secure way to utilize the same script for user’s display name in the vRA request form?   

  • A: Design a schedule vRealize Orchestrator workflow to execute the PowerShell Script and update the vRealize Automation drop-down custom property with static values.
  • B: Design a schedule vRealize Orchestrator (vRO) workflow to execute the PowerShell Script and store values in vRO, then utilize the vRA external drop-down to retrieve these values from vRO.
  • C: Design a display custom property in the vRA ‘Administration/Active Directory Policy’ that maps to the correct organizational unit.
  • D: Create a drop-down custom property with external values that returns a display name using the existing PowerShell script.

Question 6
A company is currently experiencing long infrastructure provisioning times, given that the process to ask, review, approve and deploy their services is manual  with many people involved. It is considering vRealize Automation as a resolution, but it wants to better understand how much resources it is going to need.  
Which three should the architect consider when determining the appropriate vRealize Automation deployment size for this environment? (Choose three.)  


  • A: number of managed machines
  • B: number of concurrent machine provisions
  • C: number of catalog items
  • D: number of blueprints
  • E: number of endpoints

Question 7
An architect has been tasked with designing a vRealize Automation blueprint that includes Linux machines. The design includes a requirement that all newlycreated machines be added to the corporate DNS.  
Which two design specifications will address the needs of this scenario?  


  • A: Use custom properties on each machine within the blueprint that provides the details for adding the machine to the corporate DNS.
  • B: Create an Event Broker subscription that runs an appropriate vRealize Orchestrator workflow during an appropriate machine lifecycle state.
  • C: Add and configure the appropriate XaaS component into the machine blueprint. 
  • D: Create an XaaS blueprint that adds the machine to DNS and then builds the machine.

Question 8
An architect has been tasked with designing a blueprint containing web, application and database machines utilizing NSX for networking.  
Upon provisioning, network traffic must be automatically restricted to allow: 
The web server to communicate only to the application server  
The application server to communicate to both the web and database servers   
The database server to be blocked from communicating to the other servers Which  two methods could the architect use to accomplish this? (Choose two.)

  • A: Assign an appropriate security group to the entitled items or entitled service within the entitlement.
  • B: Add an appropriate security group to the blueprint from within the blueprint properties, under NSX Settings.
  • C: Create or update an appropriate security group within NSX to include the provisioned machines.
  • D: Specify an appropriate security group in the blueprint and assign it to each machine.
  • E: Use an Event Broker subscription to ensure that provisioned machines are receiving the appropriate security group assignment.  

Question 9
IT Services would like to automate the allocation of software applications. The company uses a modern virtual desktop platform with software management  
capabilities, and the platform supports interoperability via a REST API.  
The following requirements have been established for this project: 
Business users will use a self-service portal to request software added to their existing system.  
The requestor may select one or more software applications from a list during the request.  
 The software application list must be up-to-date.  
 The virtual desktop team will provide REST API calls needed to interface with the existing platform.  
Which three of these listed elements are required for this scenario? (Choose three.)

  • A: Customization of XaaS form 
  • B: vRealize Orchestrator workflow with script action
  • C: Resource mapping
  • D: Resource action
  • E: External value definition

Question 10
An architect is tasked with designing a multi-region Software Defined Data Center (SDDC) deployment. The operations team has mandated that the solution enable real-time logging for all automation components. The architect makes a design decision to use a vRealize Log Insight cluster in each region, consisting of a total of three nodes.  
Which three data sources are required to be in scope? (Choose three.)

  • A: vRealize Automation Appliance 
  • B: NSX Manager, NSX Controller instances and NSX Edge instances
  • C: vRealize Operations Manager
  • D: vRealize Orchestrator
  • E: vRealize IaaS Server


You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files