1V0-81.20 Dumps
1V0-81.20 Braindumps 1V0-81.20 Real Questions 1V0-81.20 Practice Test
1V0-81.20 Actual Questions
killexams.com
Associate VMware Security (VCTA-SEC)
https://killexams.com/pass4sure/exam-detail/1V0-81.20
Which three default connectors are available in Workspace ONE Intelligence to execute automation actions? (Choose three.)
ServiceNow
vRealize Operations Manager
Slack
Log Insight
Workspace ONE UEM
Explanation:
Reference: https://docs.vmware.com/en/VMware-Workspace-ONE/services/intelligence-documentation/GUID- 21_intel_automations.html
If the Compromised Protection switch is enabled in Workspace ONE UEM, what is the expected behavior on compromised devices in the environment?
A tag is assigned to the compromised devices and the admin gets notification
Compromised devices are automatically Enterprise Wiped
A block is set for all network connections except to the VMware servers
Devices are marked as non-compliant and the admin gets a notification
From theVMware Carbon Black Cloud console, what page do you go to after clicking the Non-Malware bar in the Potentially Suspicious Activity chart?
Notifications page with the selected alert filtered
Reputations page with the selected reputation filtered
Investigate page with the selected reputation filtered
Alerts page with the selected alert filtered
Explanation:
Reference: https://docs.vmware.com/en/VMware-Carbon-Black-Cloud/services/carbon-black-cloud-user-guide.pdf (15)
Which three Workspace ONE UEM capabilities are used to configure security policies on Windows 10 desktops? (Choose three.)
Application Profiles
Custom XML
Custom Attributes
Baselines
Native Profiles
Explanation:
Reference: https://docs.vmware.com/en/VMware-Workspace-ONE- UEM/services/Windows_Desktop_Device_Management/GUID-uemWindeskProfiles.html
What is the default userĂ¢s network range when creating a new access policy rule in Workspace ONE Access?
A. 10.0.0.0/8
B. ALL RANGES C. 192.168.0.0/16
D. LOCAL SUBNET
Explanation:
Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-Access/20.01/ws1_access_authentication/GUID- 3D7AB065-E2ED-4525-B575-2A576BAA3CC3.html
Which three common mitigations for social engineering attacks? (Choose three.)
user training
filtering Email attachments
update Antivirus software
remove applications
blocking execution of suspicious files
Which three are components of the NSX-T Software-defined Firewall? (Choose three.)
NSX Distributed IDS
NSX Identity Firewall
NSX Edge Firewall
NSX Intelligence
NSX Distributed Firewall
NSX Identity Manager
Explanation:
Reference: https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/products/nsx/vmware-nsx- datasheet.pdf
In Workspace ONE Intelligence, which of the following is a role that can be assigned to an administrator account?
Super User
Helpdesk
Read-only
Automater Answer: A Question: 187
What is the safe course of action for a USB disk of unknown ownership and origin?
Do not connect the USB to any computer as it may be a USB Killer device
Connect the USB device to your computer and allow the DLP software to protect it
Connect the USB to a non-Windows device and examine it
Connect the USB to an air gapped system and examine it
Explanation:
Reference: https://blogs.vmware.com/vsphere/2020/02/good-security-thrives-in-simplicity.html
Which would require a Layer 7 Firewall?
block a specific port
block a subnet range
block a host
block a specific application
Explanation:
Reference: https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-8F3CB282-B38E- 49E1-951A-7D6B972B1FB7.html
Refer to the exhibit.
Whichstatement is true about the firewall rule?
It is a gateway firewall applied to a Tier-0 gateway that drops traffic on port 22
It is a distributed firewall applied to App-Services, DB-Servers and Web-Servers that rejects traffic on port 22
It is adistributed firewall applied to App-Services, DB-Servers and Web-Servers that drops traffic on port 22
It is a gateway firewall applied to a Tier-0 gateway that rejects traffic on port 22