2V0-81.20

Practice 2V0-81.20 Exam

Is it difficult for you to decide to purchase Vmware 2V0-81.20 exam dumps questions? CertQueen provides FREE online Professional VMware Security 2V0-81.20 exam questions below, and you can test your 2V0-81.20 skills first, and then decide whether to buy the full version or not. We promise you get the following advantages after purchasing our 2V0-81.20 exam dumps questions.
1.Free update in ONE year from the date of your purchase.
2.Full payment fee refund if you fail 2V0-81.20 exam with the dumps

 

 Full 2V0-81.20 Exam Dump Here

Latest 2V0-81.20 Exam Dumps Questions

The dumps for 2V0-81.20 exam was last updated on Dec 14,2021 .

Viewing page 1 out of 2 pages.

Viewing questions 1 out of 14 questions

Question#1

Which is the built-in two factor authentication method in Workspace ONE Access?

A. VMware Verify
B. VMware SMS
C. VMware Auth
D. VMware Push

Explanation:
Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-Access/services/ws1_access_authentication_cloud/GUID-FE8A5B1C-BC17-4A5C-BC8D-614C5EE4057A.html

Question#2

What is the purpose of Flow Statistics in an NSX-T Data Center firewall rule?

A. It is a toggle for turning on NETFLOW monitoring for a particular firewall rule.
B. It is a read-only field that displays the byte, packet count, and sessions.
C. It is a toggle for disabling display of the byte, packet count, and sessions.
D. It is a read-only field that displays any NETFLOW traffic analysis.

Explanation:
Reference: https://docs.vmware.com/en/VMware-NSX-T-Data-Center/2.3/com.vmware.nsxt.admin.doc/GUID-22DF2616-8B3F-4E13-8116-B7501D2A8E6D.html

Question#3

When creating a compliance policy in Workspace ONE UEM, which three of the following options are valid Notify actions? (Choose three.)

A. Send SMS to Device
B. Send Push Notification to Device
C. Voice Call to User
D. Send Email to User
E. SMS to Manager

Explanation:
Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/UEM_Managing_Devices/GUID-CompliancePolicies.html

Question#4

When creating a firewall rule in NSX-T Data Center, what are the three valid options in the action column? (Choose three.)

A. Drop
B. Log
C. Allow
D. Isolate
E. Reject

Explanation:
Reference: https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-DE6FE8CB-017E-41C8-85FC-D71CF27F85C2.html

Question#5

An administrator found an unwanted/untrusted application running in their environment.
What is the most efficient way of preventing the unwanted application from running and stopping any existing instances in Carbon Black Cloud?

A. Mark the file as a PUP (Potentially Unwanted Program).
B. Add a rule to each policy for unwanted.exe runs or if running terminate.
C. Send a delete application request to each machine.
D. Add the unwanted files hash to the company banned list.

Explanation:
Reference:
https://community.carbonblack.com/gbouw27325/attachments/gbouw27325/product-docs-news/3221/1/VMware%20Carbon%20Black%20App%20Control%20User%20Guide%20v8 .6.pdf (77)

Exam Code: 2V0-81.20         Q & A: 70 Q&As         Updated:  Dec 14,2021

 

 Full 2V0-81.20 Exam Dumps Here