Practice Free 5V0-63.23 Exam Online Questions
A customer intends to implement Android device management in their environment.
Which three enrollment options would result in an end-user experience in which a dedicated container is created on the device for only business applications and contents? (Choose three.)
- A . Knox Container
- B . Device Enrollment Program (DEP)
- C . Work Managed Device
- D . Legacy enrolled
- E . Corporate Owned Personally Enabled (COPE)
- F . Work Profile
Which three can be used to enforce conditional access in Workspace ONE? (Choose three.)
- A . device ownership type
- B . device enrollment method
- C . device platform
- D . application specific
- E . network range
- F . user-based role
CDE
Explanation:
https://blogs.vmware.com/euc/2021/01/vmware-workspace-one-delivers-improved-multi-factor-authentication.html#:~:text=%20Workspace%20ONE%20can%20make%20conditional%20access%20decisions,access%3F%20Internal%2C%20external%2C%20high%20security%2C%20etc.%3F%20More %20 And page 562 of manual WS1
Which platform is responsible for securing external access to Horizon desktops and applications?
- A . VMware: AppDefense
- B . Horizon Cloud Connector
- C . Unified Access Gateway
- D . VMvware Tunnel
Which feature of Workspace ONE UEM can be configured to allow reports to run on a schedule and have them delivered to a subset of administrators?
- A . Windows Scheduled Tasks
- B . Report Subscriptions
- C . Timed Report Execution
- D . SQL Server Reporting Services
B
Explanation:
https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/WS1_ReportsAnalytics.pdf
As a Workspace ONE administrator, you have been tasked with creating a custom visualization for management that shows device statistics, trust network threats, and application adoption metrics in a single view.
Which feature of Workspace ONE can be used?
- A . Workspace ONE Intelligence Dashboards
- B . Workspace ONE Access Application View
- C . Workspace ONE Intelligence Automations
- D . Workspace ONE UEM Device List View
A
Explanation:
Reference: https://techzone.vmware.com/resource/workspace-one-intelligence-architecture#workspace-one-uem
Which of the following explains the differences between Workspace ONE UEM reports and Workspace ONE Intelligence Custom Reports?
- A . Workspace ONE Intelligence Reports uses an on-premises reporting database to push data to a reports cloud service as Workspace ONE UEM Reports extracts data from your Workspace ONE UEM environment.
- B . Workspace ONE Intelligence Reports uses a separate service to push data to a reports cloud service and Workspace ONE UEM Reports extracts data from your WS ONE UEM environment.
- C . Workspace ONE Intelligence Reports use the same an API service to push data to a reports cloud service as Workspace ONE UEM Reports.
- D . Workspace ONE Intelligence Reports use the same service to push data to a reports cloud service as Workspace ONE UEM Reports.
B
Explanation:
Reference: https://docs.vmware.com/en/VMware-Workspace-ONE/services/intelligence-documentation/GUID-28_intel_reporting.html
Which protocol does Workspace ONE use to communicate with third party Identity Providers?
- A . SAML
- B . Kerberos
- C . RADIUS
- D . OAuth
What is the VMware recommended practice if you want to apply specific Conditional Access to all your Apple iOS devices regardless of browser or application used on the Apple iOS devices?
- A . Create a brand new Access Policy to only contain Apple iOS specific access rules
- B . Prioritize Apple iOS platform in Access Policies in the VMware Identity Manager Console
- C . Remove other access rules from Access Policies except the Apple iOS access rule
- D . Create a custom AirWatch SDK profile and assign it to the Apple iOS devices
Which administrative console is used to change to an organization logo (branding) in the Intelligent Hub Catalog?
- A . Workspace ONE Access
- B . Workspace ONE Hub Services
- C . Workspace ONE
- D . Workspace ONE UEM
D
Explanation:
Reference: https://docs.vmware.com/en/VMware-Workspace-ONE/services/intelligent-hub_IDM/GUID-DD632B89-7457-4764-B14F-48AAFAAC8113.html
Which is used to authenticate and encrypt traffic from individual applications on compliant devices to internal resources?
- A . VMware Tunnel
- B . Device Compliance
- C . Workspace ONE Intelligence
- D . Email Notification Service