Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

VMware 5V0-61.22 - VMware Workspace ONE 21.X Advanced Integration Specialist

Page: 2 / 2
Total 60 questions

A resource server in the workflow of an OAuth request refers to a server that hosts the protected resources a client is attempting to access.

Which Workspace ONE services acts as the resource server in the OAuth workflow?

A.

VMware Unified Access Gateway

B.

Workspace ONE Access

C.

Workspace ONE Content Delivery Network

D.

Workspace ONE UEM

An administrator is configuring authentication n VMware Workspace ONE Access and will be using an authentication method that will not require the use of VMware Workspace ONE Access Connector.

Which authentication method is being used?

A.

RSA SecurID

B.

Kerberos Auth service

C.

User Auth service

D.

VMware Verify

An IT administrator starts infrastructure design for authentication management and would like to enable the single sign-on ability into VMware Workspace ONE UEM Self-Service Portal and VMware Workspace ONE console for administrators.

Which third-party component should the IT administrator use?

A.

SAML-based Identity Provider

B.

Active Directory

C.

LDAP based Directory

D.

DHCP

Which two solutions needs to be integrated for an administrator to have conditional access with User Risk Score? (Choose two.)

A.

Workspace ONE Hub Services

B.

Workspace ONE SASE

C.

Workspace ONE Assist

D.

Workspace ONE Access

E.

Workspace ONE Intelligence

What is the primary purpose of VMware Workspace ONE Trust Network in VMware Workspace ONE Intelligence?

A.

Delivering VPN profiles to devices

B.

Assisting with integration of the Multi-Domain directory services across a trusted network

C.

Integrating threat data from security solutions, including endpoint detection and response (EDR) solutions

D.

Providing applications to end users

An administrator needs to configure OpenID Connect in VMware Workspace ONE Access for third-party identity providers so the users may use their credentials for single sign-on.

Which primary authentication protocol is used?

A.

LDAP

B.

FTP

C.

IMAP

D.

OAuth2

Which step is required to configure the AirWatch Provisioning App?

A.

Configure an identify provider as the SAML Provider

B.

Configure LDAP - Other LDAP at the Container OG level m Workspace ONE UEM

C.

Set up LDAP - Active Directory at the Customer OG level m Workspace ONE UEM

D.

Provision Users at the Container OG level n Workspace ONE UEM

An administrator of iOS supervised devices has noticed that devices are checking in regularly but are failing the Last Compromised Scan compliance policy. The administrator is fine with having slight disruptions to users but does not want any interaction from the user to be required.

The administrator decides to use an action in the Last Compromised Scan compliance policy that would force the device to report back the compromised status without requiring user input.

Which action m the Last Compromised Scan compliance policy should be used?

A.

Assign a sensor to the device to request the compromised status

B.

Assign the command to Request Device Check-In

C.

Assign a push notification to the device to request the compromised status

D.

Assign a compliance profile containing a single app payload for the Hub application