Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

VMware 1V0-81.20 Associate VMware Security Exam Practice Test

Note! Following 1V0-81.20 Exam is Retired now. Please select the alternative replacement for your Exam Certification.
Page: 1 / 6
Total 55 questions

Associate VMware Security Questions and Answers

Question 1

Which four alertfilters are available in the VMware Carbon Black Cloud Investigate page? (Choose four.)

Options:

A.

Watchlist

B.

Target Value

C.

Policy

D.

Security Alert List

E.

Effective Reputation

F.

Alert Severity

Question 2

In a Workspace ONE deployment, Per App Tunnel uses the Native Platform API for which platforms?

Options:

A.

iOS & Android only

B.

iOS, Android, MacOS & Windows

C.

iOS & MacOS only

D.

Android & Windows only

Question 3

Which three default connectors are available in Workspace ONE Intelligence to execute automation actions? (Choose three.)

Options:

A.

ServiceNow

B.

vRealize Operations Manager

C.

Slack

D.

Log Insight

E.

Workspace ONE UEM

Question 4

What is the term used to describe a type of social engineering attack aimed at a specific person or specific type of person?

Options:

A.

Phishing

B.

Whaling

C.

Tailgating

D.

Spear Phishing

Question 5

What types of hosts are supported for hosting both NSX-T Data Center managers and host transport nodes?

Options:

A.

vSphere ESXi 6.7U1 or higher, KVM on CentOS Linux

B.

vSphere ESXi 6.7U1 or higher, KVM on RHEL 7.6, Ubuntu 18.04.2 LTS

C.

vSphere ESXi 6.5, KVM on RHEL 7.6, Ubuntu 18.04.2 LTS

D.

vSphere ESXi 6.7U1 or higher, CentOS KVM 7.6, RHEL KVM

Question 6

Which three Workspace ONE UEM capabilities are used to configure security policies on Windows 10 desktops? (Choose three.)

Options:

A.

Application Profiles

B.

Custom XML

C.

Custom Attributes

D.

Baselines

E.

Native Profiles

Question 7

In VMware Carbon Black Cloud, which two of these statements are true of the Permissions section of the Prevention tab under Policies? (Choose two.)

Options:

A.

assigns access rights to specific applications

B.

deny or close Applications or Actions

C.

take precedence over blocking and isolation

D.

allows specific operations or applications

E.

assigns accessrights to specific individuals

Question 8

When filtering firewall rules after selecting an object to filter by,which four columns does the filter search? (Choose four.)

Options:

A.

Services

B.

Action

C.

Protocol

D.

Log

E.

Applied To

F.

Source

G.

Destinations

Page: 1 / 6
Total 55 questions