Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which two actions are valid based on identified risk behaviors in VMware Workspace ONE Intelligence Risk Analytics? (Choose two.)

A.

Add authentication methods to the user or device with VMware Workspace ONE Access integration

B.

Delete all previous risk scoring for the user

C.

Move the user to the "very high" risk category

D.

Monitor the device or user

E.

Add authentication methods to the user or device with VMware Workspace ONE UEM integration

Which types of authentication services does the VMware Workspace ONE Access connector provide, beginning with connector version 21.01?

A.

User Auth service and Kerberos Auth service

B.

Kerberos Auth service and Two-Factor Authentication

C.

Extensible Authentication service and Kerberos Auth service

D.

User Auth service and Multi-Factor Authentication service

An organization wants to prevent users from connecting to VMware Horizon desktop or application pools from a Horizon Pod deployed on their internal network unless the user selects the Horizon pool from the Unified Catalog of their Workspace ONE Access shared SaaS tenant.

Which additional setting must the organization administrator configure?

A.

Enable the Virtual App Service on al Unified Access Gateway systems that allow users to connect to Horizon pools from the Horizon Pod

B.

Configure the Workspace ONE Access tenant as a SAML 2.0 authenticator on all Horizon Connection Servers in the Horizon Pod

C.

Enable the VMware Tunnel on all Unified Access Gateway systems that allow users to connect to Horizon pools from the Horizon Pod

D.

Set “Delegation of authentication to VMware Horizon (SAML 2.0 Authenticator)” to “Allowed” on all Horizon Connection Servers in the Horizon Pod

Which service on the connector server must be able to access the RADIUS server when configuring RADIUS (cloud deployment) authentication?

A.

Password Auth

B.

Application Auth

C.

User Auth

D.

Cloud Connector

Which two methods may administrators use to provision users from Okta to VMware Workspace ONE Access? (Choose two.)

A.

System for Cross-domain Identity Management (SCIM) API

B.

Workspace ONE UEM REST API

C.

Active Directory Sync

D.

Just-in-time (JIT) Provisioning

E.

AirWatch Cloud Connector

Which feature limits the number of changes that can be made to Users and Groups when updating directories in VMware Workspace ONE Access?

A.

UEM Security PIN

B.

Default Action For Inactive Users

C.

Conditional Group Sync

D.

Directory Sync Safeguard

An administrator is setting up a new integration between VMware Workspace ONE UEM and VMware Workspace ONE Access.

Which settings need to be configured in the VMware Workspace ONE UEM console?

A.

Kerberos admin key, import the Kerberos Admin account, and the admin auth certificate for VMware Workspace ONE Access

B.

REST API admin key, import the API Admin account, and the admin auth certificate for VMware Workspace ONE Access

C.

SOAP API admin key, import the API Admin account, and the admin auth certificate for VMware Workspace ONE Access

D.

Certificate API admin key, import the API Admin account, and the admin auth certificate for VMware Workspace ONE Access

An IT administrator starts infrastructure design for authentication management and would like to enable the single sign-on ability into VMware Workspace ONE UEM Self-Service Portal and VMware Workspace ONE console for administrators.

Which third-party component should the IT administrator use?

A.

SAML-based Identity Provider

B.

Active Directory

C.

LDAP based Directory

D.

DHCP