VMware 2V0-51.21 Practice Test - Questions Answers, Page 4

List of questions
Question 31

Which two methods are available for authentication to a Unified Access Gateway? (Choose two.)
Question 32

Which three Horizon based resources does Unified Access Gateway provide access to? (Choose three.)
Question 33

Which two required distributions should be installed on a Linux machine that will be used as a multisession host? (Choose two.)
Question 34

A Horizon administrator is tasked with creating a new pool of desktops with hardware-accelerated graphics with vMotion support.
Which graphic acceleration types can the administrator choose to meet the requirement?
Question 35

Which of the following statements are true about Application Profiler?
Question 36

Which can be used to make sure only certain Connection Servers are used for a Global Entitlement?
Question 37

Which three options are required to use an instant-clone pool? (Choose three.)
Question 38

An administrator recently deployed a Horizon pod with external access using Unified Access Gateway (UAG). While trying to launch VDI form an External network, VDI launched with a black screen and then disconnects. The administrator has validated the port requirement and all other required ports are open. Users are able to connect internally using the connection server URL. While reviewing the UAG logs, the administrator found that the Blast connection is hitting the Connection Server instead of VDI IP.
What should the administrator do to resolve the issue?
Question 39

A user reports that they are unable to connect to their desktop from the internet using PCoIP, but they are able to connect via BLAST.
Which could be the cause of the issue?
Question 40

An administrator has been tasked by their organization with determining the type of Horizon deployment to use.
These requirements have been provided to the administrator:
Implement quickly the deployment of Windows and Linux desktops.
Provide hybrid cloud support.
Provide centralized brokering.
Ensure the environment is secure from end-to-end.
Which deployment solution meets the requirements?
Question