PrepAway - Latest Free Exam Questions & Answers

Category: 2V0-81.20

Which Carbon Black Cloud feature allows an administrator to audit at scale and identify gaps in least privileg

Which Carbon Black Cloud feature allows an administrator to audit at scale and identify gaps in least privilege configuration controls? A. Watchlist B. Live Query C. Investigate D. CB Baseline Tool Reference: https://community.carbonblack.com/gbouw27325/attachments/gbouw27325/product-docs-news/3221/1/VMware%20Carbon%20Black%20App%20Control%20User%20Guide%20v8.6.pdf

What command does an administrator use on an ESXi Transport Node to check connectivity with the management pla

What command does an administrator use on an ESXi Transport Node to check connectivity with the management plane? A. esxcli network ip connection list 1234 B. esxcli firewall ip connection list | grep 1234 C. esxcli ip connection 1234 D. esxcli network ip connection list | grep 1234 Reference: https://docs.vmware.com/en/VMware-NSX-Data-Center-for-vSphere/6.4/com.vmware.nsx.troubleshooting.doc/GUID-18EDB577-1903-4110-8A0B-FE9647ED82B6.html

What is the correct sequence of options when creating a new compliance policy in Workspace ONE UEM?

What is the correct sequence of options when creating a new compliance policy in Workspace ONE UEM? A. Actions, Assignment, Rules, Summary B. Rules, Actions, Assignment, Summary C. Assignment, Rules, Actions, Summary D. Rules, Assignment, Actions, Summary Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/UEM_Managing_Devices/GUID-AddACompliancePolicy.html

An organization is expanding NSX to deploy the NSX Distributed Firewall on an AWS VPC and Azure VNET.

An organization is expanding NSX to deploy the NSX Distributed Firewall on an AWS VPC and Azure VNET. Which statement is true concerning the expansion? A. The request is not possible because NSX works only in VMware environments. B. NSX can only manage native security components on AWS and Azure with agent based mode. C. […]

When creating a sensor group in VMware Carbon Black Cloud, which three are valid criteria?

When creating a sensor group in VMware Carbon Black Cloud, which three are valid criteria? (Choose three.) A. Location Name B. Organizational Username C. Active Directory Organizational Unit D. Subnet E. Device Name Reference: https://docs.vmware.com/en/VMware-Carbon-Black-Cloud/services/carbon-black-cloud-user-guide/GUID-741989BE-4844-4953-B7FE-89A05A81EBE7.html

In a Carbon Black Cloud deployment, which two are recommended troubleshooting steps for Live Response not work

In a Carbon Black Cloud deployment, which two are recommended troubleshooting steps for Live Response not working? (Choose two.) A. Restart the Live Response Service three times to autocorrect. B. Ensure a duplicate Live Response session does not exist. C. Confirm Live Response is enabled in Sensor Policy settings. D. Ensure the account has RBAC […]

An administrator found an unwanted/untrusted application running in their environment.

An administrator found an unwanted/untrusted application running in their environment. What is the most efficient way of preventing the unwanted application from running and stopping any existing instances in Carbon Black Cloud? A. Mark the file as a PUP (Potentially Unwanted Program). B. Add a rule to each policy for unwanted.exe runs or if running […]


Page 1 of 212