An administrator configures a pre-approval event subscription to run vRealize Orchestrator workflow. The workflow does not run when a machine that matches the defined criteria is requested in the service catalog.
What can the administrator do to resolve this issue?
A. Verify that approvers have executed the approve option.
B. Verify that the workflow subscription is published.
C. Verify that approvers belong to specific users and groups.
D. Verify that the approval policy is associated with the correct resource action.
Which two methods can a vRealize Automation administrator use to delete a vSphere endpoint? (Choose two.)
A. Delete the endpoint using the vRealize Automation Cloud Client.
B. Delete the endpoint from the Postgres database.
C. Use the vRealize Automation REST API to delete the vSphere endpoint.
D. Run the "delete vSphere endpoint" stored procedure on the IaaS database.
E. Execute the "Unregister a vCenter Server extension" workflow from vRealize Orchestrator.
During VM provisioning, which Event Broker state would an administrator use to execute a workflow to add CPU to a virtual machine?
A. MachineProvisioned
B. Requested
C. OnCloneMachineComplete
D. BuildingMachine
To which log would an administrator refer when investigating login issues to the vRealize Automation portal?
A. /storage/log/vmware/horizon/connector.log
B. /storage/log/vmware/vcac/catalina.out
C. /storage/db/pgdata/pg_log/postgresql.csv
D. /opt/vmware/var/log/vami/vami.log
Users are not able to login after installation of vRealize Automation (vRA) is complete.
What is a possible cause of this issue?
A. An approval policy is not activated.
B. Users belong to a different business group.
C. Time servers on all vRA servers are not synchronized.
D. Users are not entitled to a catalog item.
What is prerequisite for creating a NAT or routed network profile in vRealize Automation?
A. An existing external network profile
B. A load balancer
C. A predefined DNS server
D. A predefined DHCP range
What is the minimum supported key length that can be used in vRealize Automation SSL certificates?
A. 4096 bits
B. 1024 bits
C. 2048 bits
D. 512 bits
Which two methods can be used to ensure users enter a valid value in custom forms? (Choose two.)
A. Use constraints with pre-defined values in the form.
B. Use an image field in the form.
C. Use an external validation (such as with vRealize Orchestrator) in the form.
D. Use a text field in the form.
E. Use a bind variable in the form.
Which two pieces of information can be used to search for machines to reclaim in order to conserve resources? (Choose two.)
A. Last usage date range
B. Number of CPUs
C. Number of disks attached
D. Memory usage
E. Expiration date range
A blueprint architect wants to grant a user the ability to edit a custom property in a blueprint request during deployment.
Which two options must be enabled to meet this requirement? (Choose two.)
A. multi-select
B. show in request
C. encrypted
D. overridable