ExamGecko
Home Home / VMware / 5V0-63.21

VMware 5V0-63.21 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











An administrator is concerned with data loss on Workspace ONE managed endpoints.

Which three configurations should be enabled to further improve the device security posture? (Choose three.)

A.
Configure compliance policies to monitor rooted and jailbroken devices.
A.
Configure compliance policies to monitor rooted and jailbroken devices.
Answers
B.
Configure compliance policies to monitor Roaming Cell Data Usage.
B.
Configure compliance policies to monitor Roaming Cell Data Usage.
Answers
C.
Enable device-level data encryption.
C.
Enable device-level data encryption.
Answers
D.
Enable SMTP integration.
D.
Enable SMTP integration.
Answers
E.
Enable verbose logging.
E.
Enable verbose logging.
Answers
F.
Enable Data Loss Prevention policies.
F.
Enable Data Loss Prevention policies.
Answers
Suggested answer: A, C, F

An organization has purchased a SaaS Workspace ONE solution and wants to implement these:

integration with back-end resources like Active Directory from Microsoft to sync users and groups

Kerberos authentication integration with Virtual Desktops and Applications from services (Horizon 7, Horizon Cloud, or Citrix) third party integration with RSA SecureID, RADIUS for authentication

Which Workspace ONE component is required?

A.
VMware AirWatch Cloud Connector
A.
VMware AirWatch Cloud Connector
Answers
B.
VMware Workspace ONE Access Connector
B.
VMware Workspace ONE Access Connector
Answers
C.
VMware Workspace ONE Assist
C.
VMware Workspace ONE Assist
Answers
D.
VMware Workspace Unified Access Gateway
D.
VMware Workspace Unified Access Gateway
Answers
Suggested answer: B

Explanation:

https://docs.vmware.com/en/VMware-Workspace-ONE-Access/21.08/ws1_access_connector_install/GUID-271C47F6-856C-40F0-97AB-A8AD95025F9C.html

A customer is managing only iOS devices using Workspace ONE. They would like to begin managing Android devices.

What would be the first step an administrator needs to complete to begin managing Android Devices?

A.
Download and deploy Workspace ONE Unified Access Gateway.
A.
Download and deploy Workspace ONE Unified Access Gateway.
Answers
B.
Complete Android EMM registration from Workspace One Console.
B.
Complete Android EMM registration from Workspace One Console.
Answers
C.
Download and deploy Workspace ONE Access Connectors for Android devices.
C.
Download and deploy Workspace ONE Access Connectors for Android devices.
Answers
D.
Configure a Workspace ONE AirLift Server-side Connector.
D.
Configure a Workspace ONE AirLift Server-side Connector.
Answers
Suggested answer: B

For federal clients, FIPS 140-2 and AES 256-bit encryption are applied to which three areas? (Choose three.)

A.
data in use
A.
data in use
Answers
B.
data in flying
B.
data in flying
Answers
C.
data in pace
C.
data in pace
Answers
D.
data in rest
D.
data in rest
Answers
E.
data in transit
E.
data in transit
Answers
Suggested answer: A, D, E

An administrator has received complaints from end-users not receiving consistent email notifications on their iOS devices. Email is configured on the end-users devices using only the VMware Boxer email client. Boxer is only configured from Workspace ONE to use Office 365.

What can the administrator do to resolve the inconsistent email notifications?

A.
Configure VMware ENS v2 to provide consistent notification experience.
A.
Configure VMware ENS v2 to provide consistent notification experience.
Answers
B.
Configure SEG v2 to provide a better notification experience.
B.
Configure SEG v2 to provide a better notification experience.
Answers
C.
Configure Mobile SSO for VMware Boxer to prevent users from entering credentials.
C.
Configure Mobile SSO for VMware Boxer to prevent users from entering credentials.
Answers
D.
Configure VPN tunnel with a Boxer configuration, so that it is able to connect to the internal network.
D.
Configure VPN tunnel with a Boxer configuration, so that it is able to connect to the internal network.
Answers
Suggested answer: A

Explanation:

https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/WS1_ENS2_Doc/GUID-AWT-INTRODUCTION-ENSV2.html

' The Workspace ONE Boxer provides notifications about your emails by running in the background. Due to platform limitations, Boxer can only run in the background for a limited time. Email Notification Service (ENS2) provides a solution to deliver notifications to the user's device when Boxer is not running.'

You are an administrator configuring custom reports in Workspace ONE Intelligence.

What is the maximum number of custom reports you can create per Organization Group (OG)?

A.
10
A.
10
Answers
B.
50
B.
50
Answers
C.
99
C.
99
Answers
D.
500
D.
500
Answers
Suggested answer: B

An administrator wants to leverage the Workspace ONE Web application to allow end-user credentials to be passed to specific internal sites.

Which security policy in Workspace ONE UEM must be configured?

A.
Offline Access
A.
Offline Access
Answers
B.
Single Sign-On
B.
Single Sign-On
Answers
C.
Network Access Control
C.
Network Access Control
Answers
D.
Integrated Authentication
D.
Integrated Authentication
Answers
Suggested answer: B

Which three are features of the ENS v2? (Choose three.)

A.
Supports most existing corporate file servers.
A.
Supports most existing corporate file servers.
Answers
B.
Provides email notification for Exchange Active Sync.
B.
Provides email notification for Exchange Active Sync.
Answers
C.
Secures access to internal content repositories.
C.
Secures access to internal content repositories.
Answers
D.
Updates the badge count for an unread email.
D.
Updates the badge count for an unread email.
Answers
E.
Triggers a background sync on Workspace ONE Boxer.
E.
Triggers a background sync on Workspace ONE Boxer.
Answers
Suggested answer: B, D, E

An administrator noticed after syncing sAMAccountName as EnrollmentUser and syncing in an administrator group, that users are unable to log in with sAMAccountName.

What could be the cause of the issue?

A.
Admins need to apply <domain>\fullName as their username.
A.
Admins need to apply <domain>\fullName as their username.
Answers
B.
Admins need to apply <domain>\sAMAccountName as their username.
B.
Admins need to apply <domain>\sAMAccountName as their username.
Answers
C.
Admins need to have the role admin to be allowed to log in.
C.
Admins need to have the role admin to be allowed to log in.
Answers
D.
Admins need to sign in with their UPN as their username.
D.
Admins need to sign in with their UPN as their username.
Answers
Suggested answer: C

What is the purpose of the Workspace ONE UEM Security Pin?

A.
Serves as a second layer of security for administrators while preventing inadvertent commands.
A.
Serves as a second layer of security for administrators while preventing inadvertent commands.
Answers
B.
Provides a second factor of authentication for administrators during console login.
B.
Provides a second factor of authentication for administrators during console login.
Answers
C.
Provides multi-factor authentication for users during device enrollment.
C.
Provides multi-factor authentication for users during device enrollment.
Answers
D.
Serves as a second layer of security for end users while preventing inadvertent commands.
D.
Serves as a second layer of security for end users while preventing inadvertent commands.
Answers
Suggested answer: A
Total 66 questions
Go to page: of 7