VMware’s Intrinsic Security layer includes functionality for which control points?
VMware’s Intrinsic Security layer includes functionality for which control points? A. networks, workloads, endpoints, identity, and clouds B. applications, workloads, devices, identity, virtual infrastructure C. networks, containers, devices, users, and VMware Cloud D. applications, users, networks, data center perimeter, vSphere Reference: https://www.globalknowledge.com/en-gb/resources/articles/what-is-intrinsic-security
Which would require a Layer 7 Firewall?
Which would require a Layer 7 Firewall? A. block a specific port B. block a subnet range C. block a host D. block a specific application Explanation: Reference: https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-8F3CB282-B38E-49E1-951A-7D6B972B1FB7.html
Which three Workspace ONE UEM capabilities are used to configure security policies on Windows 10 desktops?
Which three Workspace ONE UEM capabilities are used to configure security policies on Windows 10 desktops? (Choose three.) A. Application Profiles B. Custom XML C. Custom Attributes D. Baselines E. Native Profiles Explanation: Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/Windows_Desktop_Device_Management/GUID-uemWindeskProfiles.html
A technician has been asked to confirm a specific browser extension does not exist on any endpoint in their en
A technician has been asked to confirm a specific browser extension does not exist on any endpoint in their environment. Which is the VMware Carbon Black tool to use for this task? A. Enterprise EDR B. EDR C. Audit and Remediation D. Endpoint Standard
Which of the following is true about VMware Carbon Black Cloud Enterprise EDR watchlists?
Which of the following is true about VMware Carbon Black Cloud Enterprise EDR watchlists? A. They only update annually B. You cannot customize them C. They are made up of reports D. Each watchlist is user specific Reference: https://docs.vmware.com/en/VMware-Carbon-Black-EDR/7.5/VMware%20Carbon%20Black%20EDR%207.5%20User%20Guide.pdf
Which two are true about a VMware Service-defined Firewall?
Which two are true about a VMware Service-defined Firewall? (Choose two.) A. A firewall that allows you to use 3rd party features like IDS/IPS, threat protection, anti-bot, and anti-virus solutions B. A firewall that blocks external access into your internal network based on IP services C. A firewall that enforces policy for North-South traffic D. […]
Which is a common solution to implement for inbound network attacks?
Which is a common solution to implement for inbound network attacks? A. Load Balancer B. Firewall C. Proxy D. Reverse Proxy
Which four alert filters are available in the VMware Carbon Black Cloud Investigate page?
Which four alert filters are available in the VMware Carbon Black Cloud Investigate page? (Choose four.) A. Watchlist B. Target Value C. Policy D. Security Alert List E. Effective Reputation F. Alert Severity
Which three default connectors are available in Workspace ONE Intelligence to execute automation actions?
Which three default connectors are available in Workspace ONE Intelligence to execute automation actions? (Choose three.) A. ServiceNow B. vRealize Operations Manager C. Slack D. Log Insight E. Workspace ONE UEM Explanation: Reference: https://docs.vmware.com/en/VMware-Workspace-ONE/services/intelligence-documentation/GUID-21_intel_automations.html
Which three are industry best practices of Zero Trust framework?
Which three are industry best practices of Zero Trust framework? (Choose three.) A. Employee machines need to have a passcode profile setup B. Employee machines on Internal network are trusted and have access to all internal resources C. Employee machines are checked for compliance before they get access to applications D. Employees are not required […]