Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free VMware 5V0-61.22 Practice Exam with Questions & Answers

Questions 1

What is the primary benefit of utilizing Verify (Intelligent Hub) authentication m VMware Workspace ONE Access?

Options:
A.

It allows administrators to integrate with RSA for multi-factor authentication

B.

It provides a second authentication method through Intelligent Hub to access a restricted Hub catalog or restricted applications

C.

It is the primary means of performing direct integration between VMware Workspace ONE Access and VMware Workspace ONE UEM

D.

It integrates with Duo Security for two-factor authentication

VMware 5V0-61.22 Premium Access
Questions 2

Which service on the connector server must be able to access the RADIUS server when configuring RADIUS (cloud deployment) authentication?

Options:
A.

Password Auth

B.

Application Auth

C.

User Auth

D.

Cloud Connector

Questions 3

Which feature limits the number of changes that can be made to Users and Groups when updating directories in VMware Workspace ONE Access?

Options:
A.

UEM Security PIN

B.

Default Action For Inactive Users

C.

Conditional Group Sync

D.

Directory Sync Safeguard

Questions 4

Which step is required to configure Digital Employee Experience Management (DEEM)?

Options:
A.

Ensure devices ownership type is set to employee-owned

B.

Enable DEEM Workspace ONE Access

C.

Integrate the productivity app with Workspace ONE SDK

D.

Use Windows and/or macOS managed devices in Workspace ONE UEM

Questions 5

Which service of the VMware Workspace ONE Access Connector Server requires inbound connectivity?

Options:
A.

Directory Sync Service

B.

Virtual App Service

C.

User Auth Service

D.

Kerberos Auth Service

Questions 6

Which step is required to set up Hub Digital Badge Service in VMware Workspace ONE Hub Services?

Options:
A.

Customize the Digital Badge layout m the Hub services console

B.

Configure Hub Embedded iFrame for Digital Badge in the Hub Services console

C.

Configure HID Global Origo setting and C• CURE setting m the Hub Services console

D.

Customize Hub templates for Digital Badge n the Hub Services console

Questions 7

A company wants to rest net a VMware Workspace ONE legacy application from accessing company resources

What is the proper way to achieve that without compromising use of the Workspace ONE Intelligent Hub app?

Options:
A.

Set the VMware Workspace ONE Access policy by adding “All Device Types / Web Browser” as the Device Type first on the list with "Password (Cloud Deployment)" as authentication method + add a "Custom Error Message" that tells users to download the VMware Workspace ONE Intelligent Hub app and try again.

B.

Set the VMware Workspace ONE Access policy by adding “All Device Types” as the Device Type with “Certificate (Cloud Deployment)” and fallback with “Password (Cloud Deployment)” as authentication method + add a “Custom Error Message” that tells users to download the VMware Workspace ONE Intelligent Hub app and try again.

C.

Set the VMware Workspace ONE Access policy by adding each device type “iOS, iPad, MacOS, Android, Windows 10, Web Browser” as the device type, m that order, with “Password (Cloud Deployment)” authentication method + add a “Custom Error Message” that tells users to download the VMware Workspace ONE Intelligent Hub app and try again.

D.

Set the VMware Workspace ONE Access policy by adding “Device Enrolment / Windows 10 Enrollment” as the Device Type first on the list with “Password (Cloud Deployment)” as authentication method + add a “Custom Error Message” that tells users to download the VMware Workspace ONE Intelligent Hub app and try again.

Questions 8

An administrator is configuring authentication n VMware Workspace ONE Access and will be using an authentication method that will not require the use of VMware Workspace ONE Access Connector.

Which authentication method is being used?

Options:
A.

RSA SecurID

B.

Kerberos Auth service

C.

User Auth service

D.

VMware Verify

Questions 9

A VMware Workspace ONE administrator and the Information Security Officer reported that the Unified Access Gateway (UAG) front-end network is compromised. The compromised device was reconfigured to bypass the UAG.

Why did this action fail in a two-NIC deployment?

Options:
A.

The UAG combines layer 5 firewall rules with layer 7 Unified Access Gateway security

B.

The UAG combines layer 4 firewall rules with layer 7 Unified Access Gateway security

C.

The UAG combines layer 3 firewall rules with layer 7 Unified Access Gateway security

D.

The UAG combines layer 2 firewall rules with layer 7 Unified Access Gateway security

Questions 10

Which two methods may administrators use to provision users from Okta to VMware Workspace ONE Access? (Choose two.)

Options:
A.

System for Cross-domain Identity Management (SCIM) API

B.

Workspace ONE UEM REST API

C.

Active Directory Sync

D.

Just-in-time (JIT) Provisioning

E.

AirWatch Cloud Connector