ExamGecko
Home Home / VMware / 2V0-62.21

VMware 2V0-62.21 Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

IT management has announced all traffic from the DMZ will be blocked unless it passes through a newly configured proxy, effective immediately. Administrators notice that SEGv2 is unable to contact the Workspace ONE API Service in their SaaS environment.

Which configuration will the administrators need to amend and apply to the SEGv2 servers?

A.
SSL offloading
A.
SSL offloading
Answers
B.
outbound proxy
B.
outbound proxy
Answers
C.
inbound proxy
C.
inbound proxy
Answers
D.
KCD integration
D.
KCD integration
Answers
Suggested answer: B

A company using Mobile SSO would like to avoid deploying an additional connector for Workspace ONE. They currently do not have a use case for Virtual Apps or advanced authentication such as kerberos, RSA SecureID or Radius.

Which configuration can be used to sync users and groups with a single connector for Workspace ONE?

A.
Directory Sync from Workspace ONE UEM to Workspace ONE Access
A.
Directory Sync from Workspace ONE UEM to Workspace ONE Access
Answers
B.
Directory Sync from Workspace ONE Assist to Workspace ONE Access
B.
Directory Sync from Workspace ONE Assist to Workspace ONE Access
Answers
C.
Directory Sync from Workspace ONE Access to Workspace ONE Unified Access Gateway
C.
Directory Sync from Workspace ONE Access to Workspace ONE Unified Access Gateway
Answers
D.
Directory Sync from Workspace ONE Intelligence to Workspace ONE Access
D.
Directory Sync from Workspace ONE Intelligence to Workspace ONE Access
Answers
Suggested answer: A

Explanation:

Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-Access/20.01/ws1_access_authentication.pdf (13)

What product from Workspace ONE needs to be enabled to provide administrators a flexible method for alerting and informing end-users?

A.
AirWatch Cloud Connector
A.
AirWatch Cloud Connector
Answers
B.
Workspace ONE Intelligence
B.
Workspace ONE Intelligence
Answers
C.
Workspace ONE Hub Services
C.
Workspace ONE Hub Services
Answers
D.
VMware Tunnel
D.
VMware Tunnel
Answers
Suggested answer: C

Explanation:

Reference: https://techzone.vmware.com/automating-notifications-workspace-one-operational-tutorial#_1267872

An administrator would like to configure SSO for Workspace ONE UEM console login.

Which catalog setting from Workspace ONE Access needs to be configured?

A.
Web Apps
A.
Web Apps
Answers
B.
Virtual Apps
B.
Virtual Apps
Answers
C.
Hub Configuration
C.
Hub Configuration
Answers
D.
Hub Catalog
D.
Hub Catalog
Answers
Suggested answer: B

Explanation:

Reference: https://docs.vmware.com/en/VMware-Workspace-ONE/services/WS1-Access-deploymentguide/GUIDB2CDDF6F-91D5-43DB-8C7D-A375BA71A6C1.html

Which of the following is a prerequisite to deploy VMware Unified Access Gateway OVF?

A.
VMware vSphere
A.
VMware vSphere
Answers
B.
VMware Workstation
B.
VMware Workstation
Answers
C.
VMware Fusion
C.
VMware Fusion
Answers
D.
VMware Horizon
D.
VMware Horizon
Answers
Suggested answer: A

Explanation:

Reference: https://docs.vmware.com/en/Unified-Access-Gateway/3.5/com.vmware.uag-35-deploy-config.doc/GUID-13DCCA35-8620-4F4C-8FBC-6916396221AD.html

A company has BYOD iOS devices and would like to give them access to internal sites in VMware Web without requiring full device management.

Which VMware best practice configuration is needed to enable this?

A.
Configure Tunnel for VMware Tunnel in the SDK settings.
A.
Configure Tunnel for VMware Tunnel in the SDK settings.
Answers
B.
Configure Tunnel for VMware Tunnel Proxy in the SDK settings.
B.
Configure Tunnel for VMware Tunnel Proxy in the SDK settings.
Answers
C.
Configure a VPN Profile for VMware Tunnel.
C.
Configure a VPN Profile for VMware Tunnel.
Answers
D.
Configure a VPN Profile for VMware Tunnel Proxy.
D.
Configure a VPN Profile for VMware Tunnel Proxy.
Answers
Suggested answer: C

Which is used to authenticate and encrypt traffic from individual applications on compliant devices to internal resources?

A.
VMware Tunnel
A.
VMware Tunnel
Answers
B.
Device Compliance
B.
Device Compliance
Answers
C.
Workspace ONE Intelligence
C.
Workspace ONE Intelligence
Answers
D.
Email Notification Service
D.
Email Notification Service
Answers
Suggested answer: A

An administrator is preparing to setup email management for Office 365 in UEM.

Which is VMware’s recommended email deployment model for this scenario?

A.
VPN
A.
VPN
Answers
B.
Proxy
B.
Proxy
Answers
C.
Indirect
C.
Indirect
Answers
D.
Direct
D.
Direct
Answers
Suggested answer: D

Which three can be used to enforce conditional access in Workspace ONE? (Choose three.)

A.
device ownership type
A.
device ownership type
Answers
B.
device enrollment method
B.
device enrollment method
Answers
C.
device platform
C.
device platform
Answers
D.
application specific
D.
application specific
Answers
E.
network range
E.
network range
Answers
F.
user-based role
F.
user-based role
Answers
Suggested answer: A, B, C

When creating Workspace ONE Intelligence Dashboards, what helps visualize collected data?

A.
Elements
A.
Elements
Answers
B.
Widgets
B.
Widgets
Answers
C.
Gizmos
C.
Gizmos
Answers
D.
Snapshots
D.
Snapshots
Answers
Suggested answer: B

Explanation:

Reference: https://techzone.vmware.com/getting-started-workspace-one-intelligence-reports-and-dashboards-workspaceone-operational#_1017740

Total 94 questions
Go to page: of 10