A View administrator is instructed to use a network share to store the user profile repository for a View Persona Management deployment.
What are the two recommended locations for this network share? (Choose two.)
Answer : B,D
View Persona Management has been installed on the virtual machines in a View environment.
How often are changes in the local profile copied to the remote repository by default?
Answer : B
View Persona Management has been installed and enabled on your virtual machines. The administrator wants to manage the View user personas.
Which statement is true?
Answer : D
A View administrator is configuring the events database.
Which two data repository configurations will allow users to monitor events in View
Administrator? (Choose two.)
Answer : A,C
Explanation:
SQL-Server Auth. is used, not Windows Auth.!
What is a prerequisite for configuring an events database?
Answer : C
Which two permissions are required by the Events Database user? (Choose two.)
Answer : A,D
What is the default port number used by the View Composer when setting up the vCenter
Server connection?
Answer : D
On which two objects can a View administrator apply a Tag? (Choose two.)
Answer : B,C
What is the default port used when an administrator configures the external URL for the
PCoIP Secure Gateway?
Answer : C
Which three settings are configured under Global Settings on the View Connection Server administration page? (Choose three.)
Answer : B,C,E
Session Timeout can be used in conjunction with which desktop/pool setting to help conserve ESXi host resources?
Answer : B
When configured, which three Global settings help ensure the security of a View environment? (Choose three.)
Answer : A,C,D
Users have access to company confidential files and applications when using View internally. When users are connected from home, they are redirected to a different pool of desktops that have restricted applications and restricted network access.
Which feature in View enables this functionality?
Answer : D
A View environment for an enterprise has the following requirements for accessing USB devices:
-> All users can use USB devices with their virtual desktops except members of the finance group, who have sensitive data
-> There is one administrative assistant in the finance group that needs to transfer data using a USB device.
Which three actions should the administrator take to enable these requirements? (Choose three.)
Answer : A,B,D
The Finance Desktop pool has access to sensitive data. Enterprise security standards will not allow external access to this desktop. The enterprise has replica servers, one of which is paired with a security server to allow external access to desktops.
Which two actions would restrict external access to this pool? (Choose two.)
Answer : B,C