An administrator is troubleshooting the Per-App VPN function in the VMware Tunnel and runs the following command:
openssl s_client -showcerts -connect
They notice that the response is the certificate from their firewall and not the certificate from the Tunnel server.
What remediation step should be taken?
A. The VMware Tunnel should be re-configured to use the certificate from the firewall
B. The VMware Tunnel SSL traffic needs to pass through the firewall unmodified
C. The VMware Tunnel should be re-configured to trust the certificate from the firewall
D. The VMware Tunnel Certificate should be exported from the console and uploaded to the firewall
What role does vIDM support in an OpenID Connect (OIDC) authentication flow?
A. Relying Party
B. Resource Server
C. User-Agent
D. OpenID Provider
Which report will give information about source IP when troubleshooting a network access policy in vIDM?
A. Group membership
B. Resource Entitlements
C. Role membership
D. Audit Events
What is the VMware recommended practice if you want to apply specific Conditional Access to all your Apple iOS devices regardless of browser or application used on the Apple iOS devices?
A. Create a brand new Access Policy to only contain Apple iOS specific access rules
B. Prioritize Apple iOS platform in Access Policies in the VMware Identity Manager Console
C. Remove other access rules from Access Policies except the Apple iOS access rule
D. Create a custom AirWatch SDK profile and assign it to the Apple iOS devices
Which Workspace ONE component can be integrated with VMware NSX to implement network micro-segmentation?
A. VMware Tunnel
B. VMware AirWatch Content Gateway
C. VMware Identity Manager Connector
D. VMware AirWatch Secure Email Gateway
Which URL would an administrator use to download Unified Access Gateway logs without logging in?
A. https://
B. https://
C. https://
D. https://
What VMware client application is used for Android Mobile SSO, and what authentication method is utilized by this application?
A. Workspace ONE Web and Certificate Authentication
B. VMware Tunnel and Certificate Authentication
C. Workspace ONE Intelligence Hub and Kerberos
D. VMware Tunnel and Kerberos
A customer has Office 365 that is accessible to all devices for both OWA and Active Sync. The customer wishes to restrict email access so that email is only allowed on Workspace One Managed Devices.
What are two VMware Recommended technologies to achieve this? (Choose two.)
A. VMware Secure Email Gateway
B. VMware Identity Manager
C. AirWatch Cloud Connector
D. VMware Tunnel
E. PowerShell Integration
When using Okta as a 3rd Party IdP with Workspace ONE, which party owns the entitlement of resources in Workspace ONE?
A. Workspace ONE
B. Okta
C. SAML
D. OAuth
Which two email management technologies allow you to enforce data loss prevention? (Choose two.)
A. PowerShell Integration
B. Secure Email Gateway
C. Direct Google Sync Integration
D. VMware Workspace ONE Boxer
E. Conditional Access
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only VMware exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 2V0-61.19 exam preparations and VMware certification application, do not hesitate to visit our Vcedump.com to find your solutions here.