Question: 1
An architect is asked to analyze poor performance on a Horizon VDI environment and provide recommendations on how to improve the user experience.
The architect documents:
An ESXi cluster of 4 nodes using vSAN
Each node has 128GB of RAM, four 500GB 10K HDD, one 200GB SSD
Each desktop is configured with 4GB of RAM and 2vCPUs
Each desktop has a working set of 20 GB
The environment peaks at 150 concurrent desktops in use
What action can the architect recommend?
Question: 2
When meeting with a customer, these VM template requirements for instant-clone are determined:
2 vCPU
4 GB Memory
20 GB OS disk
Which is the formula to design a 40% utilization strategy for 80 desktops, given the above requirements?
Question: 3
An application packaging team is preparing to deploy a new enterprise application for 1000 users.
Application requirements and limitations include:
Windows 2012 R2 or Windows 10 64-bit OS
Installation of a PDF printer
Application only allows a single instance to be launched
1 GB RAM
The organization is only using Horizon hosted applications on Windows 2012 R2. The servers are at 30% utilization. No additional users will be added.
What changes to the Horizon environment will be required to deploy the application?
Question: 4
An architect has been asked to evaluate the existing Active Directory infrastructure to implement a Horizon 7-based virtual Desktop infrastructure.
The Active Directory Admin helped the architect create the attached exhibit related to the current Active Directory.
The customer specified these requirements:
Extend the same Horizon 7 infrastructure to a 20 User Organization from Stand-Alone Domain.
Two users from the Stand-Alone Domain must have Administration access to Horizon View Infrastructure.
The architect has been asked to recommend Active Directory changes with a constraint of least possible trust relationship and credential duplication to meet the additional requirement.
Referring to the exhibit, which two recommendations would enable Active Directory infrastructure to meet requirements?
Question: 5
A customer wants to securely deliver applications. They have given these requirements to an architect:
1,100 corporate users
Applications run on Windows
Confidential data must remain inside the datacenter at all times
Datacenter has a firewall separating it off from the corporate LAN
Security team policy will NOT allow a corporate LAN subnet through the firewall to a datacenter subnet (example: source 172.16.30.0 /24, destination 10.10.1.0 /24 would NOT be allowed)
Security team policy does allow corporate LAN subnets to access specific datacenter IP addresses (example: source 172.16.30.0 /24, destination 10.10.1.100 /24 would be allowed)
50 of the 1,100 internal users work exclusively on tablets, some Android and some IOS devices
Which two recommendations can the architect propose? (Choose two.)