Which two actions would restrict external access to this pool?
The Finance Desktop pool has access to sensitive data. Enterprise security standards will not
allow external access to this desktop. The enterprise has replica servers, one of which is paired
with a security server to allow external access to desktops.
Which two actions would restrict external access to this pool? (Choose two.)
which location-based printing parameter will map the specific printer?
A large group of kiosk-based desktops used for self-registration must print to a centrally located
thermal printer. The kiosks are logged on as unique users without a common user group. The
kiosks are in their own unique subnet.
According to VMware best practices, which location-based printing parameter will map the specific
printer?
What is the least permissive View administrator role that would allow the user to do this?
A View administrator needs to assign permissions to allow a desktop administrator to manage a
desktop pool.
What is the least permissive View administrator role that would allow the user to do this?
which three changes can be made?
After a linked clone automated pool has been created, which three changes can be made?
(Choose three.)
What must the administrator do so that the users can access the physical desktop in a View environment?
Multiple users need to be able to access a physical desktop that has specialized software. All data
needed by the users is stored on a network share.
What must the administrator do so that the users can access the physical desktop in a View
environment?
Which action must the desktop administrator take to use PCoIP with a physical desktop in a manual pool?
Which action must the desktop administrator take to use PCoIP with a physical desktop in a
manual pool?
Which configuration option meets the connection requirements?
An administrator must create a Terminal Services pool as an interim solution for users that are to
be migrated to View. There are two Connection Servers in the environment, one of which is paired
with a Security Server to enable users to access their virtual desktops remotely. The Terminal
Servers may not be accessed over the internet.
Which configuration option meets the connection requirements?
Which service or task should be disabled to minimize unneeded OS disk growth on a heavily used linked clone po
Which service or task should be disabled to minimize unneeded OS disk growth on a heavily used
linked clone pool that is refreshed daily using View Composer?
Which step should the administrator take during the ThinApp capture and build process to enable the ThinApp pa
A ThinApp administrator needs to capture an application that leverages .NET 2.0 as a
prerequisite. The enterprise has standardized on .NET 2.0 on the corporate desktop image.
Which step should the administrator take during the ThinApp capture and build process to enable
the ThinApp package to leverage the .NET 2.0 instance installed on the corporate desktop
images?
What should the administrator do to run the installer successfully?
While a View administrator is attempting to install View Composer, an error displays:
28014: Unable to close the firewall
The installation automatically rolls back.
What should the administrator do to run the installer successfully?