VMware 5v0-62-19 practice test

VMware Workspace ONE Advanced Integration andDesign Specialist Exam

Last exam update: Dec 15 ,2024
Page 1 out of 5. Viewing questions 1-15 out of 63

Question 1

Which authentication method needs to be configured when configuring Mobile SSO for Apple
devices?
A. Mobile SSO (Android and IOS)
B. Mobile SSO (for IOS)
C. Mobile SSO
D. Mobile SSO (IOS and IPadOS)

Mark Question:
Answer:

B
Thank you for your visit.
To try more exams, please visit below link

Discussions
0 / 1000

Question 2

An administrator wants to configure Okta as the Service Provider for Workspace ONE. Which
metadata needs to be provided? (Choose two.)

  • A. Service Provider (SP) metadata
  • B. Network Range
  • C. Identity Provider (IdP) metadata
  • D. Signing Certificate
  • E. Authentication Type
Mark Question:
Answer:

A,D

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 3

Which two are requirements for managing Microsoft Windows endpoints with Microsoft System
Center Configuration Manager (SCCM) and Workspace ONE UEM? (Choose two.)

  • A. VMware Workspace ONE SCCM Integration client
  • B. Identity connector directly installed on the SCCM server
  • C. AirWatch 8.2 and higher
  • D. Directory Synchronization Server for SCCM
  • E. Windows 7 devices and newer
Mark Question:
Answer:

A,B

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 4

Which three enrollment options are supported with Workspace ONE and Azure AD? (Choose three.)

  • A. Only supported on Dell EMC devices.
  • B. Enroll through On-Premise Exchange.
  • C. Enroll through Out of Box Experience.
  • D. Enroll through Office 365 apps.
  • E. Enroll an Azure AD managed device into Workspace ONE UEM.
  • F. Enroll in the local AD and then sync to Azure AD.
Mark Question:
Answer:

C,D,E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
Discussions
vote your answer:
A
B
C
D
E
F
0 / 1000

Question 5

An administrator is tasked to configure Okta as an Identity Provider for Workspace ONE.
What is the correct order of implementation?

  • A. Add a Connector, create a third-party IDM in Workspace ONE, and create SAML app in Okta.
  • B. Create SAML App in Okta, configure Routing Rules, and create a third-party IDP in Workspace ONE.
  • C. Gather Service Provider Metadata from Identity Manager, create SAML App in Okta, and create a third-party IDP in Workspace ONE.
  • D. Create a third-party IDP in Workspace ONE, gather Service Provider Metadata from Identity Manager, and create SAML App in Okta.
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Refer to the ACME Financials design use case.
ACME Financials Design Use Case
1. Introduction
1.1 Business Overview
ACME Financials is an investment firm that has established itself as a leader in USA's fast-moving
financial asset management market and has around 1000 employees.
ACME plans to transform its end-user computing resources to the digital workspace. ACME wants a
secure platform that is available from any device and from anywhere, as well as a solution that
reduces operating costs.
ACME's major business driver for the digital workplace is to enable employees to work remotely, and
to enable the secure access to all of its resources from anywhere and any device while enhancing
security with multi-factor authentication. The solution should support its BYOD strategy and let
remote employees use their own laptop, desktop, or mobile device to access the resources from any
location.
ACME also wants to remove the need to supply and manage desktop hardware to external
contractors. Because financial data is highly sensitive, the firm needs a technology that would protect
customer and other critical information - even when accessed on a mobile device. ACME is looking to
improve the security of the desktop and application platforms across the enterprise. In addition to
using endpoint security tools and multi-factor authentication, ACME insists on using additional
security and controls to provide the highest level of security and protection to services and
applications.
ACME currently uses a VPN-based remote access solution. ACME would like to remove additional
components that add support or management complexity, and device dependence for remote access
users. ACME is looking to achieve the same access to virtual desktops and Windows 10 or mobile
applications, both inside and outside of the ACME enterprise network.
ACME is very keen on enforcing standardization to keep the IT infrastructure as consistent as
possible. IT wants to use standardized versions of Windows (Windows 10), consistent configurations,
and application delivery from a central source. All while maintaining the compliance of every device
that requires encryption, password and PIN protection, as well as update -and anti-virus control.
To simplify and standardize desktop and application delivery, ACME wants to offer a service catalog
based approach based on ACME IT standards. This will allow ACME to effectively deliver and manage
resources, allowing IT to deliver device and application services that meet business and technical
needs, while maximizing the use of shared IT computing resources.
Additional Facts
Speaking to the developers revealed that most apps are standardized apps from public app-stores,
but ACME uses some their in-house developed, critical mobile apps, where some of the developers
have already left the company, so that they cannot be rewritten in a short amount of time.
To reduce operating costs, ACME has already moved to Office 365 and is currently running a few
migrations from on-premises to the cloud for other applications.
ACME's IT says that it is a Microsoft Windows only shop, but the assessment shows that currently
most of the managers are using Apple devices.
ACME currently uses directory services and two-factor authentication mechanisms (Radius) for
internal and external access. ACME requires to support Single Sign-On (SSO) integration with their
current authentication solutions. They also require to use SSO whenever possible, as they do not
believe in having multiple user accounts and passwords for their end users.
ACME wants the solution to provide mechanisms to provide a secure e-mail solution to any device
that complies to global security standards even for BYO devices.
1.2 High Level User Classification
680 Office workers (call center, corporate and office administrators) use standardized PCs or Thin-
Clients to access ACME's core apps and tools.
240 Remote-office workers use the company's CYOD initiative and use these devices (Notebooks,
Convertibles, Tablets, Android phones) to access their apps and tools from remote.
30 Executives use Apple Mac Books as well as iPhones and iPads to work on- and off-premises.
80 IT -admins and software developers are using high-end workstations with administrative access.
1.3 High Level Application Assessment
ACME currently has 261 applications, of which 186 are based on Microsoft Windows.
Today, users are allocated applications via AD group membership.
75 applications are either web-based or SaaS-based, including Office 365.
A major incident recently meant sales workers were disappearing suddenly along with their data
and laptops on some new colonies.
Any external access should require multi-factor authentication. Access from the internal network
should work seamlessly with SSO for the core applications. High-security applications also require
MFA from internal access.
The address ranges of the HQ datacenter are as follows:
172.16.0.0/16 internal
80.34.57. external
2. Initial Stakeholder Interview Findings
In addition to the goals summarized in the previous section, the following are findings from initial
interviews with the key stakeholders and an analysis of their service level agreements.
The design must use the F5 Loadbalancer and should be as redundant as possible.
Qualified IT personal is hard to find these days. If possible, reduce operational costs and try to
automate or outsource basic IT-tasks.
ACME is very particular about meeting the go-live date. If there are unforeseen delays, the project
may not be delivered for the required go-live date.
What are three required components in the logical design? (Choose three.)

  • A. VMware Universal Access Gateways (UAG)
  • B. Airwatch Cloud Connector
  • C. Secure e-mail gateway
  • D. Microsoft Exchange Server
  • E. Microsoft System Center Virtual Machine Manager
Mark Question:
Answer:

A,B,D

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 7

What are two prerequisites for the integration of Office 365 in VMware Workspace ONE? (Choose
two.)

  • A. Attributes sAMAccountName and object GUID or sourceAnchor enabled
  • B. Attributes userPrincipalName and object GUID or sourceAnchor enabled
  • C. Microsoft Office 365 Business Premium account
  • D. Certificate from Microsoft Office 365
  • E. PowerShell 1.0 installed on the Windows server
Mark Question:
Answer:

B,C

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 8

Refer to the ACME Financials design use case.
ACME Financials Design Use Case
1. Introduction
1.1 Business Overview
ACME Financials is an investment firm that has established itself as a leader in USA's fast-moving
financial asset management market and has around 1000 employees.
ACME plans to transform its end-user computing resources to the digital workspace. ACME wants a
secure platform that is available from any device and from anywhere, as well as a solution that
reduces operating costs.
ACME's major business driver for the digital workplace is to enable employees to work remotely, and
to enable the secure access to all of its resources from anywhere and any device while enhancing
security with multi-factor authentication. The solution should support its BYOD strategy and let
remote employees use their own laptop, desktop, or mobile device to access the resources from any
location.
ACME also wants to remove the need to supply and manage desktop hardware to external
contractors. Because financial data is highly sensitive, the firm needs a technology that would protect
customer and other critical information - even when accessed on a mobile device. ACME is looking to
improve the security of the desktop and application platforms across the enterprise. In addition to
using endpoint security tools and multi-factor authentication, ACME insists on using additional
security and controls to provide the highest level of security and protection to services and
applications.
ACME currently uses a VPN-based remote access solution. ACME would like to remove additional
components that add support or management complexity, and device dependence for remote access
users. ACME is looking to achieve the same access to virtual desktops and Windows 10 or mobile
applications, both inside and outside of the ACME enterprise network.
ACME is very keen on enforcing standardization to keep the IT infrastructure as consistent as
possible. IT wants to use standardized versions of Windows (Windows 10), consistent configurations,
and application delivery from a central source. All while maintaining the compliance of every device
that requires encryption, password and PIN protection, as well as update -and anti-virus control.
To simplify and standardize desktop and application delivery, ACME wants to offer a service catalog
based approach based on ACME IT standards. This will allow ACME to effectively deliver and manage
resources, allowing IT to deliver device and application services that meet business and technical
needs, while maximizing the use of shared IT computing resources.
Additional Facts
Speaking to the developers revealed that most apps are standardized apps from public app-stores,
but ACME uses some their in-house developed, critical mobile apps, where some of the developers
have already left the company, so that they cannot be rewritten in a short amount of time.
To reduce operating costs, ACME has already moved to Office 365 and is currently running a few
migrations from on-premises to the cloud for other applications.
ACME's IT says that it is a Microsoft Windows only shop, but the assessment shows that currently
most of the managers are using Apple devices.
ACME currently uses directory services and two-factor authentication mechanisms (Radius) for
internal and external access. ACME requires to support Single Sign-On (SSO) integration with their
current authentication solutions. They also require to use SSO whenever possible, as they do not
believe in having multiple user accounts and passwords for their end users.
ACME wants the solution to provide mechanisms to provide a secure e-mail solution to any device
that complies to global security standards even for BYO devices.
1.2 High Level User Classification
680 Office workers (call center, corporate and office administrators) use standardized PCs or Thin-
Clients to access ACME's core apps and tools.
240 Remote-office workers use the company's CYOD initiative and use these devices (Notebooks,
Convertibles, Tablets, Android phones) to access their apps and tools from remote.
30 Executives use Apple Mac Books as well as iPhones and iPads to work on- and off-premises.
80 IT -admins and software developers are using high-end workstations with administrative access.
1.3 High Level Application Assessment
ACME currently has 261 applications, of which 186 are based on Microsoft Windows.
Today, users are allocated applications via AD group membership.
75 applications are either web-based or SaaS-based, including Office 365.
A major incident recently meant sales workers were disappearing suddenly along with their data
and laptops on some new colonies.
Any external access should require multi-factor authentication. Access from the internal network
should work seamlessly with SSO for the core applications. High-security applications also require
MFA from internal access.
The address ranges of the HQ datacenter are as follows:
172.16.0.0/16 internal
80.34.57. external
2. Initial Stakeholder Interview Findings
In addition to the goals summarized in the previous section, the following are findings from initial
interviews with the key stakeholders and an analysis of their service level agreements.
The design must use the F5 Loadbalancer and should be as redundant as possible.
Qualified IT personal is hard to find these days. If possible, reduce operational costs and try to
automate or outsource basic IT-tasks.
ACME is very particular about meeting the go-live date. If there are unforeseen delays, the project
may not be delivered for the required go-live date.
What could be a business driver for ACME Financials to use Workspace ONE UEM?

  • A. Standardization of app and device controls.
  • B. Utilization of already owned apps and hardware.
  • C. Always use MFA for high-security apps.
  • D. Utilization of high-end workstations for administrators and developers.
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Which list of Okta apps that are supported for an Okta integration into VMware Workspace ONE
Identity Manager is the most complete?

  • A. SAML 2.0, WS-Federation, OpenID Connect, Bookmark
  • B. SAML 1.x, SAML 2.0, WS-Federation, OpenID Connect, Bookmark
  • C. SAML 1.x, SAML 2.0, WS-Federation, OpenID Connect
  • D. SAML 2.0, WS-Federation, OpenID Connect
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

What needs to be configured in VMware Identity Manager to access the applications or desktop
externally when implementing Horizon in Workspace ONE?

  • A. Client Access URLs
  • B. Entitlement
  • C. Pod Federation
  • D. Catalog Item
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Refer to the ACME Financials design use case.
ACME Financials Design Use Case
1. Introduction
1.1 Business Overview
ACME Financials is an investment firm that has established itself as a leader in USA's fast-moving
financial asset management market and has around 1000 employees.
ACME plans to transform its end-user computing resources to the digital workspace. ACME wants a
secure platform that is available from any device and from anywhere, as well as a solution that
reduces operating costs.
ACME's major business driver for the digital workplace is to enable employees to work remotely, and
to enable the secure access to all of its resources from anywhere and any device while enhancing
security with multi-factor authentication. The solution should support its BYOD strategy and let
remote employees use their own laptop, desktop, or mobile device to access the resources from any
location.
ACME also wants to remove the need to supply and manage desktop hardware to external
contractors. Because financial data is highly sensitive, the firm needs a technology that would protect
customer and other critical information - even when accessed on a mobile device. ACME is looking to
improve the security of the desktop and application platforms across the enterprise. In addition to
using endpoint security tools and multi-factor authentication, ACME insists on using additional
security and controls to provide the highest level of security and protection to services and
applications.
ACME currently uses a VPN-based remote access solution. ACME would like to remove additional
components that add support or management complexity, and device dependence for remote access
users. ACME is looking to achieve the same access to virtual desktops and Windows 10 or mobile
applications, both inside and outside of the ACME enterprise network.
ACME is very keen on enforcing standardization to keep the IT infrastructure as consistent as
possible. IT wants to use standardized versions of Windows (Windows 10), consistent configurations,
and application delivery from a central source. All while maintaining the compliance of every device
that requires encryption, password and PIN protection, as well as update -and anti-virus control.
To simplify and standardize desktop and application delivery, ACME wants to offer a service catalog
based approach based on ACME IT standards. This will allow ACME to effectively deliver and manage
resources, allowing IT to deliver device and application services that meet business and technical
needs, while maximizing the use of shared IT computing resources.
Additional Facts
Speaking to the developers revealed that most apps are standardized apps from public app-stores,
but ACME uses some their in-house developed, critical mobile apps, where some of the developers
have already left the company, so that they cannot be rewritten in a short amount of time.
To reduce operating costs, ACME has already moved to Office 365 and is currently running a few
migrations from on-premises to the cloud for other applications.
ACME's IT says that it is a Microsoft Windows only shop, but the assessment shows that currently
most of the managers are using Apple devices.
ACME currently uses directory services and two-factor authentication mechanisms (Radius) for
internal and external access. ACME requires to support Single Sign-On (SSO) integration with their
current authentication solutions. They also require to use SSO whenever possible, as they do not
believe in having multiple user accounts and passwords for their end users.
ACME wants the solution to provide mechanisms to provide a secure e-mail solution to any device
that complies to global security standards even for BYO devices.
1.2 High Level User Classification
680 Office workers (call center, corporate and office administrators) use standardized PCs or Thin-
Clients to access ACME's core apps and tools.
240 Remote-office workers use the company's CYOD initiative and use these devices (Notebooks,
Convertibles, Tablets, Android phones) to access their apps and tools from remote.
30 Executives use Apple Mac Books as well as iPhones and iPads to work on- and off-premises.
80 IT -admins and software developers are using high-end workstations with administrative access.
1.3 High Level Application Assessment
ACME currently has 261 applications, of which 186 are based on Microsoft Windows.
Today, users are allocated applications via AD group membership.
75 applications are either web-based or SaaS-based, including Office 365.
A major incident recently meant sales workers were disappearing suddenly along with their data
and laptops on some new colonies.
Any external access should require multi-factor authentication. Access from the internal network
should work seamlessly with SSO for the core applications. High-security applications also require
MFA from internal access.
The address ranges of the HQ datacenter are as follows:
172.16.0.0/16 internal
80.34.57. external
2. Initial Stakeholder Interview Findings
In addition to the goals summarized in the previous section, the following are findings from initial
interviews with the key stakeholders and an analysis of their service level agreements.
The design must use the F5 Loadbalancer and should be as redundant as possible.
Qualified IT personal is hard to find these days. If possible, reduce operational costs and try to
automate or outsource basic IT-tasks.
ACME is very particular about meeting the go-live date. If there are unforeseen delays, the project
may not be delivered for the required go-live date.
After the successful deployment of Workspace ONE, ACME plans to move their virtual desktop
infrastructure to Horizon on AWS. But there are still Web apps and file services which will run in the
on-premises datacenter.
Which two components are still needed in the on-premises datacenter? (Choose two.)

  • A. Content gateway
  • B. PowerShell host for e-mail
  • C. Layer 2 connection between Horizon on AWS on the ACME datacenter
  • D. AWS Storage
  • E. Identity bridging
Mark Question:
Answer:

C,E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 12

What is the purpose of network ranges in conditional access policies?

  • A. Network ranges are a fallback authentication method for an application.
  • B. Network ranges limit access to an application depending of the source IP address.
  • C. All applications are using the new network range by default.
  • D. Network ranges limit access to an application depending of the destination IP address.
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

What are three requirements for a device that is already joined to Azure AD to enroll into Workspace
ONE UEM? (Choose three.)

  • A. No Azure AD account configured on the device.
  • B. Windows 10 OS build 14393.82 and above.
  • C. KB update КВ3176934 installed.
  • D. No MDM managed.
  • E. User must be a member of the Console Admin Group.
  • F. Windows Update services not started.
Mark Question:
Answer:

B,C,D

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
Discussions
vote your answer:
A
B
C
D
E
F
0 / 1000

Question 14

Which settings need to be prepared when planning a Workspace ONE AirLift installation?

  • A. Identity Manager Tenant URL
  • B. IDP.XML
  • C. SSO Domain
  • D. System Center Configuration Manager (SCCM) Site Code
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

Which certificate is needed during profile configuration when configuring an iOS Mobile SSO profile
within Workspace ONE UEM?

  • A. The Workspace ONE UEM Device root certificate
  • B. KDC certificate
  • C. Valid Webserver certificate from a Devices Server
  • D. APNS certificate
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2