Which two steps should the administrator take to restrict access to Workspace Portal services?
An administrator has a list of users who should not have access to Workspace Portal
services. Some users need access to other services using their directory services account.
Other users no longer need access to any services on the corporate network. Which two
steps should the administrator take to restrict access to Workspace Portal services?
(Choose two.)
Which two values will an administrator use to update ThinApp applications that are entitled through Workspace
Which two values will an administrator use to update ThinApp applications that are entitled
through Workspace Portal? (Choose two.)
What is portrayed in this performance chart?
Which feature can be used to accomplish this task?
A system administrator needs to control the allocation of memory and CPU resources to an
organization’s Finance team. The vSphere environment is built on a single cluster of ESXi
hosts. Which feature can be used to accomplish this task?
Which vSphere kit should the administrator use to meet these requirements?
An administrator is setting up a new vSphere environment for application development with
health monitoring and capacity management. The administrator has purchased three
servers for the initial install. The administrator is not planning to grow the environment and
needs to keep costs as low as possible. Which vSphere kit should the administrator use to
meet these requirements?
Which condition would generate this message?
During the installation of ESXi 5.5, the following error message is reported: Hardware
Virtualization is not a feature of the CPU, or is not enabled in the BIOS. Which condition
would generate this message?
what two steps are required to ensure that a change to one Single Sign-On instance is propagated to the other
As part of a multisite Single Sign-On (SSO) deployment what two steps are required to
ensure that a change to one Single Sign-On instance is propagated to the other instances?
(Choose two.)
Which two options are available to ensure that the upgraded switch will be compatible with these hosts?
An administrator is upgrading a vSphere Distributed Switch. The existing switch is version
5.0 and the administrator wants to upgrade to the latest version possible. The environment
contains several ESXi 5.1 hosts. Which two options are available to ensure that the
upgraded switch will be compatible with these hosts? (Choose two.)
What is the most likely cause of the issue?
Refer to the exhibit. — Exhibit — Users in a remote office report that they often get
disconnected from their virtual desktop session or experience intermittent screen freezes.
While troubleshooting this issue, an administrator is analyzing the PCoIP log files, as shown
here: What is the most likely cause of the issue?
Which security policy should the administrator reconfigure to modify this behavior?
An administrator has determined that a vSphere Standard Switch is dropping outbound
frames from a virtual machine adapter. Upon further investigation, it is determined that the
outbound frame is being dropped because the source MAC address differs from the one in
the virtual machine configuration file (.vmx). Which security policy should the administrator
reconfigure to modify this behavior?