1V0-81.20 Dumps

1V0-81.20 Braindumps 1V0-81.20 Real Questions 1V0-81.20 Practice Test

1V0-81.20 Actual Questions


killexams.com


Vmware


1V0-81.20


Associate VMware Security (VCTA-SEC)


https://killexams.com/pass4sure/exam-detail/1V0-81.20


Question: 179


Which three default connectors are available in Workspace ONE Intelligence to execute automation actions? (Choose three.)


  1. ServiceNow

  2. vRealize Operations Manager

  3. Slack

  4. Log Insight

  5. Workspace ONE UEM


Answer: A,C,E


Explanation:


Reference: https://docs.vmware.com/en/VMware-Workspace-ONE/services/intelligence-documentation/GUID- 21_intel_automations.html


Question: 180


If the Compromised Protection switch is enabled in Workspace ONE UEM, what is the expected behavior on compromised devices in the environment?

  1. A tag is assigned to the compromised devices and the admin gets notification

  2. Compromised devices are automatically Enterprise Wiped

  3. A block is set for all network connections except to the VMware servers

  4. Devices are marked as non-compliant and the admin gets a notification


Answer: D Question: 181 Refer to the exhibit.


From theVMware Carbon Black Cloud console, what page do you go to after clicking the Non-Malware bar in the Potentially Suspicious Activity chart?


  1. Notifications page with the selected alert filtered

  2. Reputations page with the selected reputation filtered

  3. Investigate page with the selected reputation filtered

  4. Alerts page with the selected alert filtered


Answer: D


Explanation:


Reference: https://docs.vmware.com/en/VMware-Carbon-Black-Cloud/services/carbon-black-cloud-user-guide.pdf (15)


Question: 182


Which three Workspace ONE UEM capabilities are used to configure security policies on Windows 10 desktops? (Choose three.)


  1. Application Profiles

  2. Custom XML

  3. Custom Attributes

  4. Baselines

  5. Native Profiles


Answer: A,B,C,D


Explanation:


Reference: https://docs.vmware.com/en/VMware-Workspace-ONE- UEM/services/Windows_Desktop_Device_Management/GUID-uemWindeskProfiles.html


Question: 183


What is the default userĂ¢s network range when creating a new access policy rule in Workspace ONE Access?

A. 10.0.0.0/8

B. ALL RANGES C. 192.168.0.0/16

D. LOCAL SUBNET


Answer: B


Explanation:


Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-Access/20.01/ws1_access_authentication/GUID- 3D7AB065-E2ED-4525-B575-2A576BAA3CC3.html


Question: 184


Which three common mitigations for social engineering attacks? (Choose three.)


  1. user training

  2. filtering Email attachments

  3. update Antivirus software

  4. remove applications

  5. blocking execution of suspicious files


Answer: A,C,E Question: 185

Which three are components of the NSX-T Software-defined Firewall? (Choose three.)


  1. NSX Distributed IDS

  2. NSX Identity Firewall

  3. NSX Edge Firewall

  4. NSX Intelligence

  5. NSX Distributed Firewall

  6. NSX Identity Manager


Answer: A,D,E


Explanation:


Reference: https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/products/nsx/vmware-nsx- datasheet.pdf


Question: 186


In Workspace ONE Intelligence, which of the following is a role that can be assigned to an administrator account?


  1. Super User

  2. Helpdesk

  3. Read-only

  4. Automater Answer: A Question: 187

What is the safe course of action for a USB disk of unknown ownership and origin?


  1. Do not connect the USB to any computer as it may be a USB Killer device

  2. Connect the USB device to your computer and allow the DLP software to protect it

  3. Connect the USB to a non-Windows device and examine it

  4. Connect the USB to an air gapped system and examine it


Answer: D


Explanation:


Reference: https://blogs.vmware.com/vsphere/2020/02/good-security-thrives-in-simplicity.html


Question: 188


Which would require a Layer 7 Firewall?


  1. block a specific port

  2. block a subnet range

  3. block a host

  4. block a specific application


Answer: D


Explanation:


Reference: https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-8F3CB282-B38E- 49E1-951A-7D6B972B1FB7.html


Question: 189


Refer to the exhibit.



Whichstatement is true about the firewall rule?


  1. It is a gateway firewall applied to a Tier-0 gateway that drops traffic on port 22

  2. It is a distributed firewall applied to App-Services, DB-Servers and Web-Servers that rejects traffic on port 22

  3. It is adistributed firewall applied to App-Services, DB-Servers and Web-Servers that drops traffic on port 22

  4. It is a gateway firewall applied to a Tier-0 gateway that rejects traffic on port 22


Answer: A