1V0-81.20 Dumps 1V0-81.20 Braindumps 1V0-81.20 Real Questions 1V0-81.20 Practice Test 1V0-81.20 Actual Questions Vmware 1V0-81.20 Associate VMware Security (VCTA-SEC) https://killexams.com/pass4sure/exam-detail/1V0-81.20 Question: 179 Which three default connectors are available in Workspace ONE Intelligence to execute automation actions? (Choose three.) A. ServiceNow B. vRealize Operations Manager C. Slack D. Log Insight E. Workspace ONE UEM Answer: A,C,E Explanation: Reference: https://docs.vmware.com/en/VMware-Workspace-ONE/services/intelligence-documentation/GUID- 21_intel_automations.html Question: 180 If the Compromised Protection switch is enabled in Workspace ONE UEM, what is the expected behavior on compromised devices in the environment? A. A tag is assigned to the compromised devices and the admin gets notification B. Compromised devices are automatically Enterprise Wiped C. A block is set for all network connections except to the VMware servers D. Devices are marked as non-compliant and the admin gets a notification Answer: D Question: 181 Refer to the exhibit. From theVMware Carbon Black Cloud console, what page do you go to after clicking the Non-Malware bar in the Potentially Suspicious Activity chart? A. Notifications page with the selected alert filtered B. Reputations page with the selected reputation filtered C. Investigate page with the selected reputation filtered D. Alerts page with the selected alert filtered Answer: D Explanation: Reference: https://docs.vmware.com/en/VMware-Carbon-Black-Cloud/services/carbon-black-cloud-user-guide.pdf (15) Question: 182 Which three Workspace ONE UEM capabilities are used to configure security policies on Windows 10 desktops? (Choose three.) A. Application Profiles B. Custom XML C. Custom Attributes D. Baselines E. Native Profiles Answer: A,B,C,D Explanation: Reference: https://docs.vmware.com/en/VMware-Workspace-ONE- UEM/services/Windows_Desktop_Device_Management/GUID-uemWindeskProfiles.html Question: 183 What is the default userâs network range when creating a new access policy rule in Workspace ONE Access? A. 10.0.0.0/8 B. ALL RANGES C. 192.168.0.0/16 D. LOCAL SUBNET Answer: B Explanation: Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-Access/20.01/ws1_access_authentication/GUID- 3D7AB065-E2ED-4525-B575-2A576BAA3CC3.html Question: 184 Which three common mitigations for social engineering attacks? (Choose three.) A. user training B. filtering Email attachments C. update Antivirus software D. remove applications E. blocking execution of suspicious files Answer: A,C,E Question: 185 Which three are components of the NSX-T Software-defined Firewall? (Choose three.) A. NSX Distributed IDS B. NSX Identity Firewall C. NSX Edge Firewall D. NSX Intelligence E. NSX Distributed Firewall F. NSX Identity Manager Answer: A,D,E Explanation: Reference: https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/products/nsx/vmware-nsx- datasheet.pdf Question: 186 In Workspace ONE Intelligence, which of the following is a role that can be assigned to an administrator account? A. Super User B. Helpdesk C. Read-only D. Automater Answer: A Question: 187 What is the safe course of action for a USB disk of unknown ownership and origin? A. Do not connect the USB to any computer as it may be a USB Killer device B. Connect the USB device to your computer and allow the DLP software to protect it C. Connect the USB to a non-Windows device and examine it D. Connect the USB to an air gapped system and examine it Answer: D Explanation: Reference: https://blogs.vmware.com/vsphere/2020/02/good-security-thrives-in-simplicity.html Question: 188 Which would require a Layer 7 Firewall? A. block a specific port B. block a subnet range C. block a host D. block a specific application Answer: D Explanation: Reference: https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-8F3CB282-B38E- 49E1-951A-7D6B972B1FB7.html Question: 1 Refer to the exhibit. Whichstatement is true about the firewall rule? A. It is a gateway firewall applied to a Tier-0 gateway that drops traffic on port 22 B. It is a distributed firewall applied to App-Services, DB-Servers and Web-Servers that rejects traffic on port 22 C. It is adistributed firewall applied to App-Services, DB-Servers and Web-Servers that drops traffic on port 22 D. It is a gateway firewall applied to a Tier-0 gateway that rejects traffic on port 22 Answer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