Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which two steps would an administrator complete to enable auto-discovery for their Workspace ONE UEM environment? (Choose two.)

A.

Enter the email domain when installing the AirWatch Cloud Connector.

B.

Verify the domain by accepting the link in the email that registered auto-discovery.

C.

Register email domain within Workspace ONE UEM.

D.

Enter the email domain when establishing directory services.

E.

Email auto-discovery@workspaceone.com with the domain the administrator wants to register.

Which three features within Hub Services can an administrator leverage when Workspace ONE Access is configured and integrated with Workspace ONE UEM? (Choose three.)

A.

Email Notification

B.

Mobile Flows

C.

AirLift

D.

Virtual Assistant

E.

People

When configuring a Certificate Authority in Workspace ONE, which three protocols are supported? (Choose three.)

A.

ADCS

B.

SCEP

C.

EST

D.

PKI

E.

CMP

Which component can use an AirWatch generated certificate for Inbound SSL Traffic?

A.

VMware Tunnel

B.

VMware Secure Email Gateway

C.

AirWatch Cloud Connector

D.

Reverse Proxy

During an enrollment attempt, a user enters their email address in the initial field in the Intelligent Hub. The user receives an error stating, “Something went wrong with discovery”.

Which configuration setting can be enabled to allow end users to enter an email address instead of a Server URL?

A.

Autodiscovery Enrollment

B.

Pre-Register devices

C.

Allow only known users

D.

Enrollment Token

As a Workspace ONE administrator, you have been tasked with creating a custom visualization for management that shows device statistics, trust network threats, and application adoption metrics in a single view.

Which feature of Workspace ONE can be used?

A.

Workspace ONE Intelligence Dashboards

B.

Workspace ONE Access Application View

C.

Workspace ONE Intelligence Automations

D.

Workspace ONE UEM Device List View

An administrator is concerned about help desk employees having the Console Administrator role. The help desk employees only need to access the device list view page and perform minor troubleshooting steps.

Which console security feature can eliminate the administrators concern?

A.

Use Role-Based Access for help desk employees.

B.

Change the help desk accounts to user accounts.

C.

Use Directory-Based Access for help desk employees.

D.

Prevent all access by help-desk accounts.

An administrator requires a report on the chassis type of their Windows desktop devices. The information is currently not showing as a table entry in Workspace ONE Intelligence.

What does the administrator need to create to have this information show in Workspace ONE Intelligence?

A.

profile

B.

B. product

C.

sensor

D.

custom attribute

Which two platforms can be used with Email Notification Service v2 (ENS2)? (Choose two.)

A.

iOS

B.

Chrome OS

C.

macOS

D.

Android

E.

Windows CE

An administrator is concerned with data loss on Workspace ONE managed endpoints.

Which three configurations should be enabled to further improve the device security posture? (Choose three.)

A.

Configure compliance policies to monitor rooted and jailbroken devices.

B.

Configure compliance policies to monitor Roaming Cell Data Usage.

C.

Enable device-level data encryption.

D.

Enable SMTP integration.

E.

Enable verbose logging.

F.

Enable Data Loss Prevention policies.