March Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > VMware > VMware Specialist - Workspace ONE 21.X Advanced Integration 2022 > 5V0-61.22

5V0-61.22 VMware Workspace ONE 21.X Advanced Integration Specialist Question and Answers

Question # 4

Workspace ONE Access has been implemented in the environment, and User and Kerberos authentication services are now being configured.

Which component is required to enable these services?

A.

Workspace ONE Content Gateway

B.

Workspace ONE Access Connector

C.

Workspace ONE UEM Cloud Connector

D.

Workspace ONE Unified Access Gateway

Full Access
Question # 5

An administrator of iOS supervised devices has noticed that devices are checking in regularly but are failing the Last Compromised Scan compliance policy. The administrator is fine with having slight disruptions to users but does not want any interaction from the user to be required.

The administrator decides to use an action in the Last Compromised Scan compliance policy that would force the device to report back the compromised status without requiring user input.

Which action m the Last Compromised Scan compliance policy should be used?

A.

Assign a sensor to the device to request the compromised status

B.

Assign the command to Request Device Check-In

C.

Assign a push notification to the device to request the compromised status

D.

Assign a compliance profile containing a single app payload for the Hub application

Full Access
Question # 6

Which combination of authentication challenges does an integration of RSA SecurID in Workspace ONE Access provide to protect resources?

A.

Password and PIN

B.

Password, PIN, and biometrics

C.

Password and biometrics

D.

Password, email, and biometrics

Full Access
Question # 7

An administrator wants to ensure end-users have a seamless cross-device authentication experience while leveraging Single Sign-On (SSO) and meeting security compliance requirements.

Which VMware solutions can be integrated to achieve this use-case?

A.

Workspace ONE Access + Workspace ONE UEM

B.

Workspace ONE Intelligence + Workspace ONE Access

C.

Workspace ONE Assist + Workspace ONE Intelligence

D.

Workspace ONE UEM + Workspace ONE Assist

Full Access
Question # 8

A company has applications deployed in separate networks/locations which are managed by different identities. The company needs a technology that can empower the admin to securely provide Single Sign-on (SSO) experience to end-users across the board among these applications.

Which technology should be recommended?

A.

Delegated Authentication

B.

Basic Authentication

C.

Legacy Authentication

D.

Claims-Based Authentication

Full Access
Question # 9

An administrator is configuring authentication n VMware Workspace ONE Access and will be using an authentication method that will not require the use of VMware Workspace ONE Access Connector.

Which authentication method is being used?

A.

RSA SecurID

B.

Kerberos Auth service

C.

User Auth service

D.

VMware Verify

Full Access