To easily pass the Associate VMware Security exam, the latest VMware 1V0-81.20 dumps are good preparation material. leads4pass 1V0-81.20 dumps 2023 preparation Materials help you understand the exam.
The brand new 1V0-81.20 dumps contain 54 questions, and if you want to stay ahead of the VMware 1V0-81.20 exam, then the leads4pass 1V0-81.20 dumps are the ideal choice for you, download 1V0-81.20 dumps https://www.leads4pass.com/1v0-81-20.html (PDF+VCE).
Free sample questions of 1V0-81.20 free dumps are provided here
Question 1:
DRAG DROP
Match each Workspace ONE Intelligence Security Risk Module tab on the left with its description on the right by dragging the tab\’s name into the correct box.
Select and Place:
Correct Answer:
Question 2:
DRAG DROP
Drag and drop the Cyber Kill events on the left into their proper sequential order on the right.
Select and Place:
Correct Answer:
Question 3:
Which VMware product allows you to query an endpoint like a database?
A. VMware NSX-T Data Center
B. VMware Carbon Black Audit and Remediation
C. VMware Workspace ONE UEM
D. VMware Carbon Black Endpoint Standard
Correct Answer: C
Question 4:
Which three are industry best practices of the Zero Trust framework? (Choose three.)
A. Employee machines need to have a passcode profile setup
B. Employee machines on the Internal network are trusted and have access to all internal resources
C. Employee machines are checked for compliance before they get access to applications
D. Employees are not required to provide MFA to access internal resources over VPN
E. Employees get access to only the required resources to get their job done
Correct Answer: ACE
Question 5:
Which three default connectors are available in Workspace ONE Intelligence to execute automation actions? (Choose three.)
A. ServiceNow
B. vRealize Operations Manager
C. Slack
D. Log Insight
E. Workspace ONE UEM
Correct Answer: ACE
Question 6:
Refer to the exhibit.
Which statement is true about the firewall rule?
A. It is a gateway firewall applied to a Tier-0 gateway that drops traffic on port 22
B. It is a distributed firewall applied to App-Services, DB-Servers, and Web-Servers that rejects traffic on port 22
C. It is a distributed firewall applied to App-Services, DB-Servers, and Web-Servers that drops traffic on port 22
D. It is a gateway firewall applied to a Tier-0 gateway that rejects traffic on port 22
Correct Answer: A
Question 7:
Refer to the exhibit.
From the VMware Carbon Black Cloud console, what page do you go to after clicking the Non-Malware bar in the Potentially Suspicious Activity chart?
A. Notifications page with the selected alert filtered
B. Reputations page with the selected reputation filtered
C. Investigate page with the selected reputation filtered
D. Alerts page with the selected alert filtered
Correct Answer: D
Reference: https://docs.vmware.com/en/VMware-Carbon-Black-Cloud/services/carbon-black-cloud-user-guide.pdf (15)
Question 8:
Which four alert filters are available on the VMware Carbon Black Cloud Investigate page? (Choose four.)
A. Watchlist
B. Target Value
C. Policy
D. Security Alert List
E. Effective Reputation
F. Alert Severity
Correct Answer: ABCF
Question 9:
Which is a common solution to implement for inbound network attacks?
A. Load Balancer
B. Firewall
C. Proxy
D. Reverse Proxy
Correct Answer: B
Question 10:
Which of the following is true about VMware Carbon Black Cloud Enterprise EDR watchlists?
A. They only update annually
B. You cannot customize them
C. They are made up of reports
D. Each watchlist is user-specific
Correct Answer: D
Reference: https://docs.vmware.com/en/VMware-Carbon-Black-EDR/7.5/VMware%20Carbon%20Black%20EDR%207.5%20User%20Guide.pdf
Question 11:
Which three Workspace ONE UEM capabilities are used to configure security policies on Windows 10 desktops? (Choose three.)
A. Application Profiles
B. Custom XML
C. Custom Attributes
D. Baselines
E. Native Profiles
Correct Answer: BCD
Question 12:
Which would require a Layer 7 Firewall?
A. block a specific port
B. block a subnet range
C. block a host
D. block a specific application
Correct Answer: D
Question 13:
VMware\’s Intrinsic Security layer includes functionality for which control points?
A. networks, workloads, endpoints, identity, and clouds
B. applications, workloads, devices, identity, virtual infrastructure
C. networks, containers, devices, users, and VMware Cloud
D. applications, users, networks, data center perimeter, vSphere
Correct Answer: A
Reference: https://www.globalknowledge.com/en-gb/resources/articles/what-is-intrinsic-security
Question 14:
Which three are key features of VMware Carbon Black Cloud Enterprise EDR? (Choose three.)
A. self-service security remediation
B. continuous and centralized recording
C. attack chain visualization and search
D. live response for remote remediation
E. frequent Antivirus pattern updates
Correct Answer: BCD
Reference: https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmwcb-enterprise-edr-datasheet.pdf (2)
Question 15:
What are the three core characteristics of VMware\’s Intrinsic Security solution? (Choose three.)
A. integrated
B. extensible
C. unified
D. content-centric
E. centrally managed
F. built-in
Correct Answer: ACF
In conclusion,
Successfully passing the VMware 1V0-81.20 exam is the key to finding good preparation materials. As mentioned at the beginning, the leads4pass 1V0-81.20 dumps are that good preparation material, all you need to do is get it, 1V0-81.20 dumps 2023 https://www.leads4pass.com/1v0-81-20.html (PDF+VCE).
Keep practicing, success is yours, good luck with the 1V0-81.20 exam.