Which Carbon Black Cloud feature allows an administrator to audit at scale and identify gaps in least privileg
Which Carbon Black Cloud feature allows an administrator to audit at scale and identify gaps in least privilege configuration controls? A. Watchlist B. Live Query C. Investigate D. CB Baseline Tool Reference: https://community.carbonblack.com/gbouw27325/attachments/gbouw27325/product-docs-news/3221/1/VMware%20Carbon%20Black%20App%20Control%20User%20Guide%20v8.6.pdf
What command does an administrator use on an ESXi Transport Node to check connectivity with the management pla
What command does an administrator use on an ESXi Transport Node to check connectivity with the management plane? A. esxcli network ip connection list 1234 B. esxcli firewall ip connection list | grep 1234 C. esxcli ip connection 1234 D. esxcli network ip connection list | grep 1234 Reference: https://docs.vmware.com/en/VMware-NSX-Data-Center-for-vSphere/6.4/com.vmware.nsx.troubleshooting.doc/GUID-18EDB577-1903-4110-8A0B-FE9647ED82B6.html
Which is the built-in two factor authentication method in Workspace ONE Access?
Which is the built-in two factor authentication method in Workspace ONE Access? A. VMware Verify B. VMware SMS C. VMware Auth D. VMware Push Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-Access/services/ws1_access_authentication_cloud/GUID-FE8A5B1C-BC17-4A5C-BC8D-614C5EE4057A.html
What is the correct sequence of options when creating a new compliance policy in Workspace ONE UEM?
What is the correct sequence of options when creating a new compliance policy in Workspace ONE UEM? A. Actions, Assignment, Rules, Summary B. Rules, Actions, Assignment, Summary C. Assignment, Rules, Actions, Summary D. Rules, Assignment, Actions, Summary Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/UEM_Managing_Devices/GUID-AddACompliancePolicy.html
An organization is expanding NSX to deploy the NSX Distributed Firewall on an AWS VPC and Azure VNET.
An organization is expanding NSX to deploy the NSX Distributed Firewall on an AWS VPC and Azure VNET. Which statement is true concerning the expansion? A. The request is not possible because NSX works only in VMware environments. B. NSX can only manage native security components on AWS and Azure with agent based mode. C. […]
When creating a sensor group in VMware Carbon Black Cloud, which three are valid criteria?
When creating a sensor group in VMware Carbon Black Cloud, which three are valid criteria? (Choose three.) A. Location Name B. Organizational Username C. Active Directory Organizational Unit D. Subnet E. Device Name Reference: https://docs.vmware.com/en/VMware-Carbon-Black-Cloud/services/carbon-black-cloud-user-guide/GUID-741989BE-4844-4953-B7FE-89A05A81EBE7.html
In a Carbon Black Cloud deployment, which two are recommended troubleshooting steps for Live Response not work
In a Carbon Black Cloud deployment, which two are recommended troubleshooting steps for Live Response not working? (Choose two.) A. Restart the Live Response Service three times to autocorrect. B. Ensure a duplicate Live Response session does not exist. C. Confirm Live Response is enabled in Sensor Policy settings. D. Ensure the account has RBAC […]
Which is the name of the default policy that is applied to all applications in Workspace ONE Access?
Which is the name of the default policy that is applied to all applications in Workspace ONE Access? A. primary_policy B. default_policy C. default_access_policy_set D. default_application_policy Reference: https://theidentityguy.ca/2021/02/25/workspace-one-access-best-practices-in-policy-management/
In the NSX Manager UI, which tab is selected to manage firewall rules?
In the NSX Manager UI, which tab is selected to manage firewall rules? A. Plan & Troubleshoot tab B. Security tab C. Inventory tab D. Networking tab Reference: https://docs.vmware.com/en/VMware-NSX-Data-Center-for-vSphere/6.4/com.vmware.nsx.admin.doc/GUID-96BBB6D2-A4AB-4C88-B40B-781CFF00910F.html
An administrator found an unwanted/untrusted application running in their environment.
An administrator found an unwanted/untrusted application running in their environment. What is the most efficient way of preventing the unwanted application from running and stopping any existing instances in Carbon Black Cloud? A. Mark the file as a PUP (Potentially Unwanted Program). B. Add a rule to each policy for unwanted.exe runs or if running […]