PrepAway - Latest Free Exam Questions & Answers

Category: 2V0-61.20

Exam 2V0-61.20: VMware Professional Workspace ONE Exam

Which is used to authenticate and encrypt traffic from individual applications on compliant devices to interna

Which is used to authenticate and encrypt traffic from individual applications on compliant devices to internal resources? A. Email Notification Service B. Device Compliance C. Workspace ONE Intelligence D. VMware Tunnel Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/2005/Tunnel_Linux/GUID-AWT-TUNNEL-INTRODUCTION.html

Which certificate template configuration can an administrator modify to start renewing these certificates soon

A certificate profile set to AUTO will expire in 2 days and no new certificates are being renewed. Which certificate template configuration can an administrator modify to start renewing these certificates sooner? A. Set or lower the certificate the private key length. B. Set or increase the certificate revocation period. C. Set or lower the […]

Which feature of Workspace ONE can be used to create a custom dashboard showing key information about a device

Which feature of Workspace ONE can be used to create a custom dashboard showing key information about a device fleet? A. Secure Email Gateway B. Workspace ONE Intelligence C. Workspace ONE Access D. Unified Access Gateway Reference: https://docs.vmware.com/en/VMware-Workspace-ONE/services/intelligence-documentation/GUID-01_intel_intro.html

Which configuration will the administrators need to amend and apply to the SEGv2 servers?

IT management has announced all traffic from the DMZ will be blocked unless it passes through a newly configured proxy, effective immediately. Administrators notice that SEGv2 is unable to contact the Workspace ONE API server. Which configuration will the administrators need to amend and apply to the SEGv2 servers? A. inbound proxy B. SSL offloading […]

Which Workspace ONE component is required?

An organization has purchased a SaaS Workspace ONE solution and wants to implement these: • integration with back-end resources like Active Directory from Microsoft to sync users and groups • Kerberos authentication • integration with Virtual Desktops and Applications from services (Horizon 7, Horizon Cloud, or Citrix) • third party integration with RSA SecureID, RADIUS […]


Page 1 of 212