VMware 5V0-61.22 Exam Practice Questions (P. 5)
- Full Access (60 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
Which type of message will a user's browser send to the Identity Provider when executing a Service Provider initiated federated SSO workflow?
send
light_mode
delete
Question #22
A customer has asked for recommendations around a disaster recovery architecture design for VMware Workspace ONE Access. The customer has an extremely aggressive recovery point objective and recovery time objective.
Which HA/DR design should be recommended, given the supported options?
Which HA/DR design should be recommended, given the supported options?
- AMulti-datacenter design with two 3-node clusters, One 3-node cluster Datacenter 1 and the other 3-node cluster m Datacenter 2. The two 3-node clusters are setup in an active/passive configuration.Most Voted
- BMulti-datacenter design with two 3-node clusters. One 3-node cluster Datacenter 1 and the other 3-node cluster m Datacenter 2. The two 3-node clusters are setup in an active/active configuration.
- CMulti datacenter design with two 3-node clusters, Both 3-node clusters are spanned across both datacenters, two nodes in one datacenter and one in the other, respectively. The two 3-node clusters are setup in an active/active configuration.
- DMulti-datacenter design with two 3-node clusters, Both 3-node clusters are spanned across both datacenters, two nodes in one datacenter and one in the other, respectively. The two 3-node clusters are setup in an active/passive configuration.
Correct Answer:
C
C
send
light_mode
delete
Question #23
An administrator of iOS supervised devices has noticed that devices are checking in regularly but are failing the Last Compromised Scan compliance policy. The administrator is fine with having slight disruptions to users but does not want any interaction from the user to be required.
The administrator decides to use an action in the Last Compromised Scan compliance policy that would force the device to report back the compromised status without requiring user input.
Which action m the Last Compromised Scan compliance policy should be used?
The administrator decides to use an action in the Last Compromised Scan compliance policy that would force the device to report back the compromised status without requiring user input.
Which action m the Last Compromised Scan compliance policy should be used?
- AAssign a sensor to the device to request the compromised status
- BAssign the command to Request Device Check-In
- CAssign a push notification to the device to request the compromised statusMost Voted
- DAssign a compliance profile containing a single app payload for the Hub application
Correct Answer:
C
C
send
light_mode
delete
Question #24
Which category setting of Citrix-published resources is supported in VMware Workspace ONE Access?
send
light_mode
delete
Question #25
An administrator is setting up a new integration between VMware Workspace ONE UEM and VMware Workspace ONE Access.
Which settings need to be configured in the VMware Workspace ONE UEM console?
Which settings need to be configured in the VMware Workspace ONE UEM console?
- AKerberos admin key, import the Kerberos Admin account, and the admin auth certificate for VMware Workspace ONE Access
- BREST API admin key, import the API Admin account, and the admin auth certificate for VMware Workspace ONE AccessMost Voted
- CSOAP API admin key, import the API Admin account, and the admin auth certificate for VMware Workspace ONE Access
- DCertificate API admin key, import the API Admin account, and the admin auth certificate for VMware Workspace ONE Access
Correct Answer:
B
B
send
light_mode
delete
All Pages