Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

VMware 5V0-61.22 Dumps

Page: 1 / 6
Total 60 questions

VMware Workspace ONE 21.X Advanced Integration Specialist Questions and Answers

Question 1

An administrator is setting up a new integration between VMware Workspace ONE UEM and VMware Workspace ONE Access.

Which settings need to be configured in the VMware Workspace ONE UEM console?

Options:

A.

Kerberos admin key, import the Kerberos Admin account, and the admin auth certificate for VMware Workspace ONE Access

B.

REST API admin key, import the API Admin account, and the admin auth certificate for VMware Workspace ONE Access

C.

SOAP API admin key, import the API Admin account, and the admin auth certificate for VMware Workspace ONE Access

D.

Certificate API admin key, import the API Admin account, and the admin auth certificate for VMware Workspace ONE Access

Question 2

Which step is required to configure the AirWatch Provisioning App?

Options:

A.

Configure an identify provider as the SAML Provider

B.

Configure LDAP - Other LDAP at the Container OG level m Workspace ONE UEM

C.

Set up LDAP - Active Directory at the Customer OG level m Workspace ONE UEM

D.

Provision Users at the Container OG level n Workspace ONE UEM

Question 3

The following functionaries must be achieved:

Assign Device Profiles

Apply Data Loss Prevention

Provide App catalog with Custom Templates

Which two components at a minimum, need to be integrated to achieve these functionalities? (Choose two.)

Options:

A.

Workspace ONE Intelligence

B.

AirWatch Cloud Connector

C.

Unified Access Gateway

D.

Hub Services

E.

Workspace ONE UEM

Question 4

A resource server in the workflow of an OAuth request refers to a server that hosts the protected resources a client is attempting to access.

Which Workspace ONE services acts as the resource server in the OAuth workflow?

Options:

A.

VMware Unified Access Gateway

B.

Workspace ONE Access

C.

Workspace ONE Content Delivery Network

D.

Workspace ONE UEM

Question 5

A VMware Workspace ONE administrator and the Information Security Officer reported that the Unified Access Gateway (UAG) front-end network is compromised. The compromised device was reconfigured to bypass the UAG.

Why did this action fail in a two-NIC deployment?

Options:

A.

The UAG combines layer 5 firewall rules with layer 7 Unified Access Gateway security

B.

The UAG combines layer 4 firewall rules with layer 7 Unified Access Gateway security

C.

The UAG combines layer 3 firewall rules with layer 7 Unified Access Gateway security

D.

The UAG combines layer 2 firewall rules with layer 7 Unified Access Gateway security

Question 6

What is the proper sequence of steps to integrate Unified Access Gateway with VMware Workspace ONE Intelligence?

Options:

A.

Download the credentials file from VMware Workspace ONE Intelligence

Upload the credentials file n the Unified Access Gateway admin console

Complete the setting by Opt In/Out toggle

B.

Download the credentials file from Unified Access Gateway

Upload the credentials file n the VMware Workspace ONE Intelligence admin console

Complete the setting by Opt In/Out toggle

C.

Download the Device Root Certification from the UEM admin console under Tunnel Settings

Upload the fie m the VMware Workspace ONE Intelligence admin console

Complete the setting by Opt In/Out toggle

D.

Download the Device Root Certification from the UEM admin console under Tunnel Settings

Upload the fie m the Unified Access Gateway admin console

Complete the setting by Opt In/Out toggle

Question 7

Which combination of authentication challenges does an integration of RSA SecurID in Workspace ONE Access provide to protect resources?

Options:

A.

Password and PIN

B.

Password, PIN, and biometrics

C.

Password and biometrics

D.

Password, email, and biometrics

Question 8

Which statement accurately describes modem claims-based identity management?

Options:

A.

It supports multiple authentication methods except Single Sign-On

B.

It doesn't support multiple providers

C.

It requires the application to perform the authentication task

D.

It makes account management easier by centralizing authentication

Question 9

Which statement accurately describes Just-in-Time Provisioning (JIT)?

Options:

A.

Workspace ONE Access acts as the service provider

B.

Users are pre-synced into Workspace ONE Access from an Active Directory

C.

Workspace ONE Access Connector is required for JU Provisioning to work

D.

JIT provisioned users can be individually deleted

Page: 1 / 6
Total 60 questions