Pass the VMware VMware Specialist - Workspace ONE 21.X Advanced Integration 2022 5V0-61.22 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which three configurations are managed in the identity provider (IdP) settings in VMware Workspace ONE Access? (Choose three.)

Options:

A.

Authentication Methods


B.

Directory


C.

Automation Methods


D.

Group Attributes


E.

Networks


F.

User Attributes


Expert Solution
Questions # 2:

An administrator has enabled and configured Kerberos in the VMware Workspace ONE Access console, but the connection test fails.

What is one reason this connection failed to authenticate?

Options:

A.

The Linux machine on which the Kerberos Auth service is installed was not joined to the domain


B.

The certificate was not enabled on VMware Workspace ONE UEM console


C.

The Kerberos Auth service are incorrectly configured on the AirWatch Cloud Connector


D.

The certificate is unsigned by a trusted SSL or public or internal certificate authority


Expert Solution
Questions # 3:

A customer has asked for recommendations around a disaster recovery architecture design for VMware Workspace ONE Access. The customer has an extremely aggressive recovery point objective and recovery time objective.

Which HA/DR design should be recommended, given the supported options?

Options:

A.

Multi-datacenter design with two 3-node clusters, One 3-node cluster Datacenter 1 and the other 3-node cluster m Datacenter 2. The two 3-node clusters are setup in an active/passive configuration.


B.

Multi-datacenter design with two 3-node clusters. One 3-node cluster Datacenter 1 and the other 3-node cluster m Datacenter 2. The two 3-node clusters are setup in an active/active configuration.


C.

Multi datacenter design with two 3-node clusters, Both 3-node clusters are spanned across both datacenters, two nodes in one datacenter and one in the other, respectively. The two 3-node clusters are setup in an active/active configuration.


D.

Multi-datacenter design with two 3-node clusters, Both 3-node clusters are spanned across both datacenters, two nodes in one datacenter and one in the other, respectively. The two 3-node clusters are setup in an active/passive configuration.


Expert Solution
Questions # 4:

Which type of message will a user's browser send to the Identity Provider when executing a Service Provider initiated federated SSO workflow?

Options:

A.

OAuthRequest


B.

SAMLpRequest


C.

AuthzRequest


D.

AuthnRequest


Expert Solution
Questions # 5:

Which two options are valid when managing directories m VMware Workspace ONE Access through the Manage > Directories page? (Choose two.)

Options:

A.

Enable Password Recovery Assistant


B.

Schedule the sync frequency


C.

Configure Kerberos Auth Service


D.

Change the mapped attributes list


E.

Manage built-in identity provider for User Auth


Expert Solution
Questions # 6:

Which two directory sync types are valid when configuring password (cloud deployment) authentication for VMware Workspace ONE Access? (Choose two.)

Options:

A.

RSA SecureID


B.

RSA Authentication


C.

RADIUS Authentication


D.

Active Directory over LDAP/IWA


E.

LDAP Directory


Expert Solution
Questions # 7:

Which statement about VMware Workspace ONE Access with other VMware Workspace ONE product integrations is accurate?

Options:

A.

VMware Workspace ONE Trust Network includes several security solutions that can be integrated with VMware Workspace ONE Access, which can provide a consolidated view of al threats reported by the various security solutions


B.

VMware Workspace ONE Assist can be integrated with VMware Workspace ONE Access to provide administrators the ability to seamlessly launch remote management sessions for eligible devices from the VMware Workspace ONE Access console


C.

AirWatch Cloud connector can be integrated with VMware Workspace ONE Access to act as a proxy for users to access internal resources


D.

VMware Workspace ONE Access can be integrated with VMware Workspace ONE Intelligence to provide insights on user logins and application launches


Expert Solution
Questions # 8:

An administrator wants to ensure end-users have a seamless cross-device authentication experience while leveraging Single Sign-On (SSO) and meeting security compliance requirements.

Which VMware solutions can be integrated to achieve this use-case?

Options:

A.

Workspace ONE Access + Workspace ONE UEM


B.

Workspace ONE Intelligence + Workspace ONE Access


C.

Workspace ONE Assist + Workspace ONE Intelligence


D.

Workspace ONE UEM + Workspace ONE Assist


Expert Solution
Questions # 9:

An administrator of iOS supervised devices has noticed that devices are checking in regularly but are failing the Last Compromised Scan compliance policy. The administrator is fine with having slight disruptions to users but does not want any interaction from the user to be required.

The administrator decides to use an action in the Last Compromised Scan compliance policy that would force the device to report back the compromised status without requiring user input.

Which action m the Last Compromised Scan compliance policy should be used?

Options:

A.

Assign a sensor to the device to request the compromised status


B.

Assign the command to Request Device Check-In


C.

Assign a push notification to the device to request the compromised status


D.

Assign a compliance profile containing a single app payload for the Hub application


Expert Solution
Questions # 10:

Which two considerations should be noted when designing a Workspace ONE environment? (Choose two.)

Options:

A.

Installing all product components


B.

Testing environment


C.

Involving stakeholders


D.

Defining business drivers


E.

Configuring integrations


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions