Free VMware 3V0-31.22 Exam Actual Questions

The questions for 3V0-31.22 were last updated On Nov 17, 2024

Question No. 1

TASK 2

As a Cloud Administrator you have two tasks to complete:

1. Onboard new interns into vRealize Automation and assign the correct access. The Interns are split into two Active Directory groups, interns-group-a and interns-group-b. The interns-group-a group requires access to Cloud Assembly and the interns-group-b group requires access to Service Broker. The interns should be allocated the most restrictive access available.

2 Assist in resolving issues reported by the following users who do not have the correct access permissions in vRealize Automation. Each user should have the minimum permissions required to fulfill their role:

* A User with logon id appdevuset2@corp.local is only responsible for creating new and deploying from cloud templates in Cloud Assembly.

The following additional information is provided to help complete both tasks:

* IDM URL: https://identity-manager.corp.tocal/SAAS/admin or use bookmark

* IDM System Domain Username: admin

* IDM Admin Password: VMware1!

* AD Organization Unit ON: OU=lnterns.DC=corp.DC=local

* vRealize Automation URL: vr-automalion.corp.local

* Cloud Administrator Username: vca pad mm @corp. local

* Cloud Administrator Password: VMware1!

Show Answer Hide Answer
Correct Answer: A

To complete the tasks as a Cloud Administrator, follow these steps:

Task 1: Onboard New Interns into vRealize Automation

Log in to the Identity Manager (IDM) using the provided URL and credentials.

Navigate toIdentity & Access Management.

UnderEnterprise Groups, find and selectinterns-group-aandinterns-group-b.

Assigninterns-group-awith the role ofCloud Assembly User, which is the most restrictive access for Cloud Assembly.

Assigninterns-group-bwith the role ofService Broker User, which is the most restrictive access for Service Broker.

Ensure that the AD Organization Unit is correctly set toOU=Interns,DC=corp,DC=localfor proper group synchronization.

Task 2: Resolve Access Permissions Issues

Log in to the vRealize Automation URL using the Cloud Administrator credentials.

Go toIdentity & Access Management.

Locate the user with the logon idappdevuser2@corp.local.

Assign this user the role ofCloud Assembly Userto allow creating and deploying from cloud templates in Cloud Assembly.

Verify that the user has the minimum permissions required and does not have any additional roles that exceed their responsibility.

By following these steps, you should be able to onboard the interns with the correct access and resolve the access permissions issues for the specified user. Always ensure to adhere to the principle of least privilege, granting users the minimum level of access necessary to perform their roles.


Question No. 2

TASK 6

As the Cloud Administrator for the Saturn Project, you have been tasked to:

1. Create an ABX Action

2. Create a subscription to trigger the action only if the following conditions are met:

a. The Cloud Template is Saturn Ubuntu 18 only.

b The action should fire immediately after the compute resource gets provisioned.

c. The action should trigger only for the current project.

Additional Information required to complete the tasks:

* URL: https://vr-automation.corp.local

* Username: vcapadmin@corp.local

* Password: VMware1!

* Action Name: Saturn-Python-Script

* Python Script Content: "C:\Exam Files\Question 6\Satum Python Script.txt'

* FaaS Provider: On-Prem

* Subscription Name: Execute-Python-Script

Show Answer Hide Answer
Correct Answer: A

To complete Task 6 for the Saturn Project, follow these steps:

Step 1: Create an ABX Action

Log in to the vRealize Automation console athttps://vr-automation.corp.localusing the provided credentials.

Navigate toExtensibility>Actions.

Click onNew Action.

Enter theAction Nameas ''Saturn-Python-Script''.

Select theScripting Languageas Python and theFaaS Provideras On-Prem.

Use theImport Packageoption to upload the content of the Python script from ''C:\Exam Files\Question 6\Satum Python Script.txt''.

Save the action.

Step 2: Create a Subscription

Go toExtensibility>Subscriptions.

Click onNew Subscription.

Enter theSubscription Nameas ''Execute-Python-Script''.

Set theEvent Topicto trigger after the compute resource gets provisioned, which is typically the ''Compute Provision'' event.

Define theConditionsfor the subscription:

The Cloud Template is ''Saturn Ubuntu 18'' only.

The action should trigger only for the current project.

Save the subscription.

Ensure that the conditions for the subscription match the exact criteria needed for the Saturn Project. The action will now be triggered automatically under the specified conditions after the compute resource is provisioned.


Question No. 3

TASK 12

As the Cloud Administrator, you have been tasked to update the Atlas App cloud template in the Atlas project. Perform the following tasks:

1. Edit the existing cloud template Atlas App. such that it is a multi-tier application that meets the following requirements:

* 2 Web servers

* 1 Database server

* The Database server is always built before the Web servers

* 2 NSX Networks:

o The first network should use the NAT feature

* Resource Name: external

* Second network should be an existing network

* Resource Name: internal o All networks should be restricted to use only the Atlas project networks

o The internal network should be restricted to use only the nsx-atlas-existing NSX network

* Both the web and db VMs should be connected to the internal network

2. Add an NSX load balancer to provide access from the outside to the two Web servers:

* Resource Name: IbWeb

* Port: 443

* Protocol: HTTPS

3. Assign an existing Security Group to the Web servers:

* Resource Name: sgWeb

* Instances: Web Sewers

* Constraint Tag Key: sg

* Constraint Tag Value: atlasweb

Show Answer Hide Answer
Correct Answer: A

To update the Atlas App cloud template to meet the specified requirements, you would perform the following steps in vRealize Automation:

Task 1: Edit the Cloud Template for Multi-tier Application

Access the vRealize Automation console and navigate to Design > Cloud Templates.

Open the existing cloud template named ''Atlas App''.

Modify the template to include:

2 Web Server Instances: Define two instances of the web server component.

1 Database Server Instance: Define a single instance of the database server component.

Build Order: Ensure the database server is set to be built before the web servers by adjusting the dependsOn property.

2 NSX Networks:

External Network (NAT): Create a network resource with the name external and configure it to use NAT.

Internal Network (Existing): Create a network resource with the name internal and link it to the existing nsx-atlas-existing network.

Restrict Networks: Apply constraints to ensure that only networks associated with the Atlas project are used.

Task 2: Add NSX Load Balancer

In the cloud template, add an NSX load balancer resource with the name lbWeb.

Configure the load balancer to distribute traffic to the web servers on port 443 using the HTTPS protocol.

Task 3: Assign Security Group to Web Servers

Define a security group resource with the name sgWeb.

Assign this security group to the web server instances.

Use constraint tags with the key sg and value atlasweb to ensure the security group is applied correctly.

Here is a simplified example of what the YAML configuration might look like:

resources:

dbServer:

type: Cloud.Machine

properties:

...

webServer1:

type: Cloud.Machine

properties:

dependsOn: dbServer

...

webServer2:

type: Cloud.Machine

properties:

dependsOn: dbServer

...

external:

type: Cloud.Network

properties:

networkType: nat

...

internal:

type: Cloud.Network

properties:

networkType: existing

constraints:

- tag: 'nsx-atlas-existing'

...

lbWeb:

type: Cloud.LoadBalancer

properties:

port: 443

protocol: HTTPS

...

sgWeb:

type: Cloud.SecurityGroup

properties:

instances: [webServer1, webServer2]

constraints:

- tag: 'sg:atlasweb'

...

Make sure to adjust the properties and configurations as needed to fit the specific details of your environment and the Atlas project. After updating the cloud template, validate the changes and ensure that the template meets all the requirements before saving.


Question No. 4

TASK 4

As the Cloud Administrator, you have received the following request to make the changes in vRealize Automation to support new service capabilities.

1. Create a Storage Tier to support encryption.

2. Create a Network Profile for Phobos Project.

* Choose the NSX-T network from the available list.

3. The existing Phobos Zone should offer the following capabilities

* Initial workload placement should use VMware vRealize Operations and all workloads should be placed into a specific virtual machine folder by default.

The following information has been provided to assist you in these tasks:

The following information has been provided to assist you in these tasks:

* vRealize Automation URL: vr-automation.corp.local

* Cloud Admin Username: vcapadmin@corp.local

* Cloud Admin Password: VMware1!

Storage Profile Settings:

* Name: Encrypted Storage Tier

* Disk Type: Standard disk

* Region: vSphere Private Cloud / Local Dat

. Datastore/Cluster: RegionAOUSCSIOI-CC3'

* Provisioning Type: Thin

* Supports Encryption: Yes

* Capability Tag:

o Key: storage

o Value: encrypted

Network Profile Settings:

* Name: Phobos Networks

* Region: vSphere Private Cloud / Local Datacenter

* Network Segment: nsx-phobos-external

* Network IPv4 CIDR: 172.16.15.0/24

* Network Default Gateway: 172.16.15.1

* Domain: cofp.local

* IP Range Name: Phobos-range

* IP Range: 172.16.15.5-172.16.15.250

* Network Profile Capability Tag:

o Key: net

o Value: phobos

Cloud Zone Settings:

* Name: Phobos

* Folder: Workloads

Show Answer Hide Answer
Correct Answer: A

To support the new service capabilities in vRealize Automation, you will need to perform the following tasks:

Task 1: Create a Storage Tier to Support Encryption

Log in to the vRealize Automation console using the provided Cloud Admin credentials.

Navigate toInfrastructure>Configure>Storage Profiles.

ClickNew Storage Profile.

Enter theNameas ''Encrypted Storage Tier''.

Set theDisk Typeto ''Standard disk''.

Choose theRegionas ''vSphere Private Cloud / Local Datacenter''.

Select theDatastore/Clusteras ''RegionA01USCSIOI-CC3''.

ForProvisioning Type, select ''Thin''.

EnsureSupports Encryptionis set to ''Yes''.

Add aCapability Tagwith Key as ''storage'' and Value as ''encrypted''.

Save the storage profile.

Task 2: Create a Network Profile for Phobos Project

In the vRealize Automation console, go toInfrastructure>Configure>Network Profiles.

ClickNew Network Profile.

Provide theNameas ''Phobos Networks''.

Set theRegionto ''vSphere Private Cloud / Local Datacenter''.

UnderNetwork Segment, choose ''nsx-phobos-external''.

Enter theNetwork IPv4 CIDRas ''172.16.15.0/24''.

Set theNetwork Default Gatewayto ''172.16.15.1''.

Specify theDomainas ''corp.local''.

Go to theIP Rangestab and add a new range named ''Phobos-range'' with the range ''172.16.15.5-172.16.15.250''.

Add aNetwork Profile Capability Tagwith Key as ''net'' and Value as ''phobos''.

Save the network profile.

Task 3: Configure Workload Placement for Phobos Zone

Ensure that VMware vRealize Operations is integrated with vRealize Automation for advanced workload placement1.

In the vRealize Automation console, navigate toInfrastructure>Cloud Zones.

Locate and edit the existing cloud zone named ''Phobos''.

In thePlacement Policysection, set it to use VMware vRealize Operations.

Specify the default virtual machine folder for workload placement as ''Workloads''.

Save the changes to the cloud zone.

By completing these steps, you will have created a storage tier that supports encryption, a network profile for the Phobos Project, and configured the Phobos Zone to offer advanced capabilities using VMware vRealize Operations. Always ensure to follow your organization's best practices and security policies when making changes to the infrastructure.


Question No. 5

TASK 10

As the Cloud Administrator you have been tasked to troubleshoot and resolve the following issues raised by the developers on the Uranus Project:

* Developers have reported that Deployments are not getting deleted as per the company lease policy.

* The Uranus Project Team Leader is responsible for approving all snapshot create requests for deployments based only on the Uranus Server blueprint, however, they have received no requests so far.

* Developers have reported that they do not have the option to revert to existing snapshots for vSphere deployments.

Once you have completed your changes, deploy the Uranus Server Catalog Item to verify all the issues have been resolved.

NOTE: One or more of the tasks above may take some time to complete. For expediency, it is recommended that once the task has started successfully that you continue with the exam and return later to confirm the task has been completed successfully. There are no dependencies between any questions and therefore the successful completion of this question does not impact the ability to attempt any other question in this exam.

Information required to complete the tasks:

General Information;

* vRealize Automation FQDN: vr-aulomation.corp.local

* Cloud Administrator Username: vcapadmin@corp. local

* Cloud Administrator Password: VMware1!

* Project: Uranus

* Project Team Leader: vcapadmin@corp. local

* Blueprint Name: Uranus Server

* Deployment Name: Uranus-Check-Policies

Policy Information:

* Lease Policy name: Uranus - Lease Policy

* Lease Policy maximum lease period: 30 days

* Lease Policy maximum total lease period: 30 days

* Lease Policy grace period: 0 days

* Lease Policy scope: Uranus Project

* Day 2 Action Policy name: Uranus - Day 2 Actions Policy

* Approval Policy name: Uranus - Snapshot Approval Policy

Show Answer Hide Answer
Correct Answer: A

To troubleshoot and resolve the issues for the Uranus Project, you should take the following steps:

Deployments Not Getting Deleted as per Lease Policy:

Verify that the lease policy ''Uranus - Lease Policy'' is correctly configured and associated with the Uranus Project1.

Check if the lease policy has been applied to the deployments. If not, you may need to manually apply the policy or adjust the existing policy settings1.

Ensure that the lease policy's scope is set to the Uranus Project and that the maximum lease and total lease periods are correctly set to 30 days1.

Snapshot Create Requests Not Received for Approval:

Confirm that the ''Uranus - Snapshot Approval Policy'' is correctly set up and linked to the Uranus Server blueprint2.

Ensure that the project team leader is listed as the approver in the policy and that the policy is active2.

Check if the conditions for triggering the approval request are correctly defined and that they match the criteria for the Uranus Server blueprint deployments2.

Option to Revert to Existing Snapshots Not Available:

Review the Day 2 Actions Policy ''Uranus - Day 2 Actions Policy'' to ensure that the action to revert to snapshots is enabled for vSphere deployments3.

Verify that the developers have the necessary permissions to perform snapshot-related actions on their deployments3.

After making the necessary changes, deploy the Uranus Server Catalog Item with the deployment name ''Uranus-Check-Policies'' to verify that all issues have been resolved. Monitor the deployment process and check if the lease policy is enforced, snapshot approval requests are generated, and developers can revert to existing snapshots as expected.