Which two View user management policies are handled by Active Directory?
Which two View user management policies are handled by Active Directory? (Choose two.)
Which three prerequisites are necessary prior to adding the vCenter Server to View?
An administrator is attempting to add a vCenter Server to View Administrator in order to add
View Composer. Which three prerequisites are necessary prior to adding the vCenter
Server to View? (Choose three.)
Which three non-default permissions are required for the new account?
An administrator is creating a new user for use with View Composer and needs to add the
appropriate permissions. Which three non-default permissions are required for the new
account? (Choose three.)
Which two data repository configurations will allow users to monitor events in View Administrator?
A View administrator is configuring the events database. Which two data repository
configurations will allow users to monitor events in View Administrator? (Choose two.)
Which two permissions are required by the Events Database user?
Which two permissions are required by the Events Database user? (Choose two.)
which two objects can a View administrator apply a Tag?
On which two objects can a View administrator apply a Tag? (Choose two.)
Which three settings are configured under Global Settings on the View Connection Server administration page?
Which three settings are configured under Global Settings on the View Connection Server
administration page? (Choose three.)
which three Global settings help ensure the security of a View environment?
When configured, which three Global settings help ensure the security of a View
environment? (Choose three.)
Which three actions should the administrator take to enable these requirements?
A View environment for an enterprise has the following requirements for accessing USB
devices: • All users can use USB devices with their virtual desktops except members of the
finance group, who have sensitive data • There is one administrative assistant in the finance
group that needs to transfer data using a USB device. Which three actions should the
administrator take to enable these requirements? (Choose three.)
Which two actions would restrict external access to this pool?
The Finance Desktop pool has access to sensitive data. Enterprise security standards will
not allow external access to this desktop. The enterprise has replica servers, one of which is
paired with a security server to allow external access to desktops. Which two actions would
restrict external access to this pool? (Choose two.)