PrepAway - Latest Free Exam Questions & Answers

Category: 1V0-81.20

VMware’s Intrinsic Security layer includes functionality for which control points?

VMware’s Intrinsic Security layer includes functionality for which control points? A. networks, workloads, endpoints, identity, and clouds B. applications, workloads, devices, identity, virtual infrastructure C. networks, containers, devices, users, and VMware Cloud D. applications, users, networks, data center perimeter, vSphere Reference: https://www.globalknowledge.com/en-gb/resources/articles/what-is-intrinsic-security

Which three Workspace ONE UEM capabilities are used to configure security policies on Windows 10 desktops?

Which three Workspace ONE UEM capabilities are used to configure security policies on Windows 10 desktops? (Choose three.) A. Application Profiles B. Custom XML C. Custom Attributes D. Baselines E. Native Profiles Explanation: Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/Windows_Desktop_Device_Management/GUID-uemWindeskProfiles.html

Which of the following is true about VMware Carbon Black Cloud Enterprise EDR watchlists?

Which of the following is true about VMware Carbon Black Cloud Enterprise EDR watchlists? A. They only update annually B. You cannot customize them C. They are made up of reports D. Each watchlist is user specific Reference: https://docs.vmware.com/en/VMware-Carbon-Black-EDR/7.5/VMware%20Carbon%20Black%20EDR%207.5%20User%20Guide.pdf

Which three default connectors are available in Workspace ONE Intelligence to execute automation actions?

Which three default connectors are available in Workspace ONE Intelligence to execute automation actions? (Choose three.) A. ServiceNow B. vRealize Operations Manager C. Slack D. Log Insight E. Workspace ONE UEM Explanation: Reference: https://docs.vmware.com/en/VMware-Workspace-ONE/services/intelligence-documentation/GUID-21_intel_automations.html

Which three are industry best practices of Zero Trust framework?

Which three are industry best practices of Zero Trust framework? (Choose three.) A. Employee machines need to have a passcode profile setup B. Employee machines on Internal network are trusted and have access to all internal resources C. Employee machines are checked for compliance before they get access to applications D. Employees are not required […]


Page 1 of 212