March Sale Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

VMware 2V0-81.20 Professional VMware Security Exam Practice Test

Note! Following 2V0-81.20 Exam is Retired now. Please select the alternative replacement for your Exam Certification.
Page: 1 / 7
Total 70 questions

Professional VMware Security Questions and Answers

Question 1

When creating a Windows Update Policy for a Workspace ONE solution, which option allows an administrator to utilize local network traffic only for peer traffic?

Options:

A.

use peers on same NAT only

B.

use peers on the same local network domain

C.

simple download mode

D.

use internet peers

Question 2

In a Workspace ONE environment, which two Risk Indicators are supported on the Windows 10 & MacOS platforms? (Choose two.)

Options:

A.

Risky Setting

B.

Compulsive App Download

C.

App Collector

D.

Rare App Collector

E.

Laggard Update

Question 3

In what order are NSX-T Distributed Firewall rules processed?

Options:

A.

Top-to-bottom, left-to-right, finding a rule match the packet is processed per the rule and stops.

B.

Left-to-right, top-to-bottom, finding a rule match the packet is processed per the rule and stops.

C.

Left-to-right, top-to-bottom, finding a rule match the packet is processed per the rule and continues to next rule.

D.

Top-to-bottom, left-to-right, finding a rule match the packet is processed per the rule and continues to next rule.

Question 4

What traffic type is used to create an NSX Transport Zone to connect to the physical infrastructure?

Options:

A.

Trunk

B.

Vlan

C.

Underlay

D.

Overlay

Question 5

Which three statements are correct for Active Directory integration with Identity Firewalls (IDFW) in an NSX-T Data Center deployment? (Choose three.)

Options:

A.

The IDFW can be used on both physical and virtual servers as long as supported operating system is installed.

B.

The Thin Agent must be enabled in VMWare tools as it is not enabled by default.

C.

The IDFW can be used for Virtual Desktops (VDI) or Remote desktop sessions (RDSH support).

D.

Identity-based groups can be used as the source or destination in DFW rules.

E.

User identity information is provided by the NSX Guest Introspection Thin Agent.

Question 6

When creating a new Identity Provider (IdP) in Workspace ONE Access, which two methods are used to identify users? (Choose two.)

Options:

A.

SAML Attribute

B.

NameID Element

C.

UserID Element

D.

User Attribute

E.

SAML Response

Question 7

How does an NSX-T Data Center firewall rule handle an Apply To setting for the firewall policy and firewall rule?

Options:

A.

The rule Apply To will take precedent.

B.

The first Apply To created will take precedent.

C.

The last Apply To created will take precedent.

D.

The policy Apply To will take precedent.

Question 8

Refer to the exhibit.

Question # 8

What command was run on the NSX Edge node to pull this information?

Options:

A.

get tunnel-ID

B.

show vteps

C.

get vteps

D.

list vteps

Question 9

Users on iOS and Android devices are being prompted for their credentials when accessing an application protected by Workspace ONE Access.

The current configuration includes:

Workspace ONE UEM is integrated with Workspace ONE Access

Workspace ONE UEM has a Certificate Authority configured

Single sign-on has been enabled through device profiles

What authentication method can be used to allow iOS and Android devices to launch an application without being prompted for credentials?

Options:

A.

TRUESSO

B.

Kerberos

C.

Mobile SSO

D.

Windows SSO

E.

OKTA

Question 10

What is used to establish trust with an identity provider in Workspace ONE Access?

Options:

A.

SAML Attribute

B.

SAML Metadata

C.

SAML Context

D.

SAML Request

Page: 1 / 7
Total 70 questions