Which three configurations are managed in the identity provider (IdP) settings in VMware Workspace ONE Access? (Choose three.)
A. Authentication Methods
B. Directory
C. Automation Methods
D. Group Attributes
E. Networks
F. User Attributes
A customer has asked for recommendations around a disaster recovery architecture design for VMware Workspace ONE Access. The customer has an extremely aggressive recovery point objective and recovery time objective. Which HA/DR design should be recommended, given the supported options?
A. Multi-datacenter design with two 3-node clusters, One 3-node cluster Datacenter 1 and the other 3-node cluster m Datacenter 2. The two 3-node clusters are setup in an active/passive configuration.
B. Multi-datacenter design with two 3-node clusters. One 3-node cluster Datacenter 1 and the other 3-node cluster m Datacenter 2. The two 3-node clusters are setup in an active/active configuration.
C. Multi datacenter design with two 3-node clusters, Both 3-node clusters are spanned across both datacenters, two nodes in one datacenter and one in the other, respectively. The two 3-node clusters are setup in an active/active configuration.
D. Multi-datacenter design with two 3-node clusters, Both 3-node clusters are spanned across both datacenters, two nodes in one datacenter and one in the other, respectively. The two 3-node clusters are setup in an active/passive configuration.
Which VMware Workspace ONE Access prerequisites must be completed to successfully deploy a Virtual Apps Collection?
A. Workspace ONE Access Connector Enrollment Server, App Volumes Manager
B. SAML Authenticator, Enrollment Server, Horizon Pod
C. SAML Authenticator, Workspace ONE Access Connector, Horizon Pod
D. Workspace ONE Access Connector, Horizon Connection Server, App Volumes Manager
Which statement accurately describes modem claims-based identity management?
A. It supports multiple authentication methods except Single Sign-On
B. It doesn't support multiple providers
C. It requires the application to perform the authentication task
D. It makes account management easier by centralizing authentication
A VMware Workspace ONE environment has been setup with Roles Based Access Control (RBAC), and the directory-based administrators who managed in Workspace ONE UEM have limited permissions to access the console.
The administrator has enabled VMware Workspace ONE Intelligence in the environment and must now enable the correct configuration setting that will allow administrators to access VMware Workspace ONE Intelligence from VMware
Workspace ONE UEM.
Which configuration setting must be enabled?
A. Create a new admin role in the Intelligence Console, and then give the rote Read and Edit permissions to Intelligence
B. Create a new user role, and then give the role Read and Edit permissions to Intelligence in Categories > Monitor
C. Create a new admin role, and then give the role Read and Edit permissions to Intelligence in Categories > Monitor
D. Create a new user role in the Intelligence Console, and then give the role Read and Edit permissions to Intelligence
Which two methods may administrators use to provision users from Okta to VMware Workspace ONE Access? (Choose two.)
A. System for Cross-domain Identity Management (SCIM) API
B. Workspace ONE UEM REST API
C. Active Directory Sync
D. Just-in-time (JIT) Provisioning
E. AirWatch Cloud Connector
A leadership team would like to enable VMware Workspace ONE Notifications with Hub Services so push notifications can occur to the end-user devices. Which types of notifications are sent?
A. Immediate and Instructive
B. Actionable and Informational
C. Informational and Immediate
D. Instructive and Actionable
A user is able to login to VMware Workspace ONE Access Catalog and launch a Citrix Desktop application without any prompt for credentials. Which Authentication Method must have been previously executed to have gained access to the VMware Workspace ONE Access Catalog?
A. OAuth SSO
B. True SSO
C. Kerberos Auth Adapter
D. Password (Cloud Deployment)
A company wants to rest net a VMware Workspace ONE legacy application from accessing company resources
What is the proper way to achieve that without compromising use of the Workspace ONE Intelligent Hub app?
A. Set the VMware Workspace ONE Access policy by adding "All Device Types / Web Browser" as the Device Type first on the list with "Password (Cloud Deployment)" as authentication method + add a "Custom Error Message" that tells users to download the VMware Workspace ONE Intelligent Hub app and try again.
B. Set the VMware Workspace ONE Access policy by adding "All Device Types" as the Device Type with "Certificate (Cloud Deployment)" and fallback with "Password (Cloud Deployment)" as authentication method + add a "Custom Error Message" that tells users to download the VMware Workspace ONE Intelligent Hub app and try again.
C. Set the VMware Workspace ONE Access policy by adding each device type "iOS, iPad, MacOS, Android, Windows 10, Web Browser" as the device type, m that order, with "Password (Cloud Deployment)" authentication method + add a "Custom Error Message" that tells users to download the VMware Workspace ONE Intelligent Hub app and try again.
D. Set the VMware Workspace ONE Access policy by adding "Device Enrolment / Windows 10 Enrollment" as the Device Type first on the list with "Password (Cloud Deployment)" as authentication method + add a "Custom Error Message" that tells users to download the VMware Workspace ONE Intelligent Hub app and try again.
Which three resources can be deployed to users through Workspace ONE Access? (Choose three.)
A. Email account
B. Web applications
C. Virtual desktops
D. Virtual applications
E. Native applications
F. Device profiles