Your success in VMware 2V0-631 is our sole target and we develop all our 2V0-631 braindumps in a way that facilitates the attainment of this target. Not only is our 2V0-631 study material the best you can find, it is also the most detailed and the most updated. 2V0-631 Practice Exams for VMware 2V0-631 are written to the highest standards of technical accuracy.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for VMware 2V0-631 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 2V0-631 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/2V0-631-exam-dumps.html

Q41. Which two types of identity stores can be configured for a tenant? (Choose two.) 

A. Active Directory 

B. OpenLDAP 

C. vSphere Single Sign-On (SSO) 

D. Active Directory Lightweight Directory Services 

Answer: A,B 


Q42. Which three are valid infrastructure costs that can be configured by editing Cost Drivers in vRealize Business Standard? (Choose three.) 

A. Operating System Licensing 

B. Storage (per GB) 

C. Network (per switch) 

D. Hardware Maintenance (per month) 

E. Memory (per GB) 

Answer: A,B,D 


Q43. A vRealize Automation administrator installs and configures a new vSphere Endpoint. Where should the administrator add the compute resource in order to use the new vSphere Endpoint? 

A. To a Reservation 

B. To a Fabric Group 

C. To a Blueprint 

D. To a Business Group 

Answer:


Q44. Which three are valid components of a Service Blueprint? (Choose three.) 

A. input parameters 

B. custom resource 

C. provisioning 

D. submission forms 

E. approval policy 

Answer: A,C,D 


Q45. An administrator incorrectly enters password information for the darwin_user account and locks the account. 

What procedure can be used to unlock the account? 

A. From the vSphere Web Client, browse to Administration > Access > SSO Users and Groups > Locked Users, right-click on the darwin_user account and select Unlock. 

B. From the VMRC Console of the Application Services appliance, log in as the root user and enter: faillog -u darwin_user -r 

C. From the Application Services Remote CLI, log in as the root user and enter: passwd -u darwin_user 

D. From the Application Services Web Interface, choose Administration from the drop down list and select Users, right-click on the darwin_user account and select Unlock. 

Answer:


Q46. What step is required to use the default vRealize Orchestrator instance with vRealize Automation? 

A. Install vRealize Orchestrator on the vRealize Automation appliance. 

B. Start the vRealize Orchestrator service on the vRealize Automation appliance. 

C. Deploy the vRealize Orchestrator appliance and attach it to the vRealize Automation instance. 

D. Install the vRealize Orchestrator plugin on the vRealize Automation instance. 

Answer:


Q47. A tenant requests to use their own email server instead of the default email system defined. 

How does the tenant administrator fulfill the tenant request? 

A. Select Override Global in Email Servers menu and add tenant specific email server details. 

B. Select Override Global in Email Server menu and have a buiness group admin add tenant specific email server details. 

C. Select Override Default in Tenant Configuration menu and add tenant specific email server details. 

D. Select Override Default in Tenant Configuration menu and have a business group adminadd tenant specific email server details. 

Answer:


Q48. Which three options will ensure that all machines deployed by the finance business group have the same Distributed Firewall rules? (Choose three.) 

A. Using Service Composer, create a Security Policy named Finance with the firewall rules. 

B. Using Service Composer, create a Security Group named Finance based on machine name and specify the Finance Groups Machine Prefix. 

C. Using Service Composer, assign the Finance Security Policy to the Finance Security Group. 

D. Using the Distributed Firewall, create a Security Policy named Finance with the firewall rules. 

E. Using the Distributed Firewall, create a Security Group named Finance based on machine name and specify the Finance Groups Machine Prefix. 

Answer: A,B,C 


Q49. Which two Network Profiles could an administrator create to ensure every machine can access the external network and is also accessible from the external network? (Choose two.) 

A. NAT Network Profile 

B. Private Network Profile 

C. Routed Network Profile 

D. External Network Profile 

Answer: A,C 


Q50. Which three data sources are supported for use with vRealize Business Standard? (Choose Three.) 

A. MicrosoftAzure 

B. EMC Storage Resource Management 

C. IBM SoftLayer 

D. vCenter Server 

E. vRealize Log Insight 

Answer: A,B,D