110 likes | 116 Views
PassQuestion provides you the latest VCTA-SEC 2021 1V0-81.20 Practice Test Questions from all the topics and exam syllabus that will solve all the confusion for preparing the Exam.
E N D
1V0-81.20 Free Questions 1V0-81.20 Free Questions Associate VMware Security Associate VMware Security https://www.passquestion.com/ https://www.passquestion.com/1V0-81.20 1V0-81.20.html .html
Question 1 Question 1 Which three are key features of VMware Carbon Black Cloud Enterprise EDR? (Choose Which three are key features of VMware Carbon Black Cloud Enterprise EDR? (Choose three.) three.) A. self-service security remediation A. self-service security remediation B. continuous and centralized recording B. continuous and centralized recording C. attack chain visualization and search C. attack chain visualization and search D. live response for remote remediation D. live response for remote remediation E. frequent Antivirus pattern updates E. frequent Antivirus pattern updates Answer: B,C,D Answer: B,C,D
Question 2 Question 2 In Workspace ONE UEM, from which menu would you access Workspace ONE Intelligence? In Workspace ONE UEM, from which menu would you access Workspace ONE Intelligence? A. Apps & Books A. Apps & Books B. General Settings B. General Settings C. Device C. Device D. Monitor D. Monitor Answer: D Answer: D
Question 3 Question 3 Which option would be considered an example of aHardware Based Exploit? Which option would be considered an example of aHardware Based Exploit? A. SQL Injection A. SQL Injection B. Social Engineering B. Social Engineering C. Jail Breaking C. Jail Breaking D. Denial of Service D. Denial of Service Answer: C Answer: C
Question 4 Question 4 Which three default connectors are available in Workspace ONE Intelligence to execute automation Which three default connectors are available in Workspace ONE Intelligence to execute automation actions? (Choose three.) actions? (Choose three.) A. ServiceNow A. ServiceNow B. vRealize Operations Manager B. vRealize Operations Manager C. Slack C. Slack D. Log Insight D. Log Insight E. Workspace ONE UEM E. Workspace ONE UEM Answer: A,C,E Answer: A,C,E
Question 5 Question 5 If the Compromised Protection switch is enabled in Workspace ONE UEM, what is the If the Compromised Protection switch is enabled in Workspace ONE UEM, what is the expected behavior on compromised devices in the environment? expected behavior on compromised devices in the environment? A. A tag is assigned to the compromised devices and the admin gets notification A. A tag is assigned to the compromised devices and the admin gets notification B. Compromised devices are automatically Enterprise Wiped B. Compromised devices are automatically Enterprise Wiped C. A block is set for all network connections except to the VMware servers C. A block is set for all network connections except to the VMware servers D. Devices are marked as non-compliant and the admin gets a notification D. Devices are marked as non-compliant and the admin gets a notification Answer: D Answer: D
Question 6 Question 6 Which three Workspace ONE UEM capabilities are used to configure security policies on Windows Which three Workspace ONE UEM capabilities are used to configure security policies on Windows 10 desktops? (Choose three.) 10 desktops? (Choose three.) A. Application Profiles A. Application Profiles B. Custom XML B. Custom XML C. Custom Attributes C. Custom Attributes D. Baselines D. Baselines E. Native Profiles E. Native Profiles Answer: B,C,D Answer: B,C,D
Question 7 Question 7 What is the default user’s network range when creating a new access policy rule What is the default user’s network range when creating a new access policy rule in Workspace ONE Access? in Workspace ONE Access? A. 10.0.0.0/8 A. 10.0.0.0/8 B. ALL RANGES B. ALL RANGES C. 192.168.0.0/16 C. 192.168.0.0/16 D. LOCAL SUBNET D. LOCAL SUBNET Answer: B Answer: B
Question 8 Question 8 Which three common mitigations for social engineering attacks? (Choose three.) Which three common mitigations for social engineering attacks? (Choose three.) A. user training A. user training B. filtering Email attachments B. filtering Email attachments C. update Antivirus software C. update Antivirus software D. remove applications D. remove applications E. blocking execution of suspicious files E. blocking execution of suspicious files Answer: A,C,E Answer: A,C,E
Question 9 Question 9 Which three are components of the NSX-T Software-defined Firewall? (Choose three.) Which three are components of the NSX-T Software-defined Firewall? (Choose three.) A. NSX Distributed IDS A. NSX Distributed IDS B. NSX Identity Firewall B. NSX Identity Firewall C. NSX Edge Firewall C. NSX Edge Firewall D. NSX Intelligence D. NSX Intelligence E. NSX Distributed Firewall E. NSX Distributed Firewall F. NSX Identity Manager F. NSX Identity Manager Answer: A,D,E Answer: A,D,E
Question 10 Question 10 In Workspace ONE Intelligence, which of the following is a role that can be assigned to an In Workspace ONE Intelligence, which of the following is a role that can be assigned to an administrator account? administrator account? A. Super User A. Super User B. Helpdesk B. Helpdesk C. Read-only C. Read-only D. Automater D. Automater Answer: A Answer: A