DRAG DROP
Drag and drop the Cyber Kill events on the left into their proper sequential order on the right.
Select and Place:
Which VMware product allows you to query an endpoint like a database?
A. VMware NSX-T Data Center
B. VMware Carbon Black Audit and Remediation
C. VMware Workspace ONE UEM
D. VMware Carbon Black Endpoint Standard
Which four alert filters are available in the VMware Carbon Black Cloud Investigate page? (Choose four.)
A. Watchlist
B. Target Value
C. Policy
D. Security Alert List
E. Effective Reputation
F. Alert Severity
Which two are true about a VMware Service-defined Firewall? (Choose two.)
A. A firewall that allows you to use 3rd party features like IDS/IPS, threat protection, anti-bot, and anti-virus solutions
B. A firewall that blocks external access into your internal network based on IP services
C. A firewall that enforces policy for North-South traffic
D. A firewall that is auto scalable as new workloads are deployed
E. A firewall that provides East-West protection between internal applications
Which would require a Layer 7 Firewall?
A. block a specific port
B. block a subnet range
C. block a host
D. block a specific application
What are three core characteristics of VMware's Intrinsic Security solution? (Choose three.)
A. integrated
B. extensible
C. unified
D. content-centric
E. centrally managed
F. built-in
What types of hosts are supported for hosting both NSX-T Data Center managers and host transport nodes?
A. vSphere ESXi 6.7U1 or higher, KVM on CentOS Linux
B. vSphere ESXi 6.7U1 or higher, KVM on RHEL 7.6, Ubuntu 18.04.2 LTS
C. vSphere ESXi 6.5, KVM on RHEL 7.6, Ubuntu 18.04.2 LTS
D. vSphere ESXi 6.7U1 or higher, CentOS KVM 7.6, RHEL KVM
Refer to the exhibit.
When attempting to run the recommended query for all Authorized SSH Keys in an organization, you see this view in the console.
Why are you not able to run the query?
A. You must schedule the query first, before you can run the query
B. The policy Windows Endpoints have no devices
C. You need the ‘Use Recommended Query
Which option would be considered an example of a Hardware Based Exploit?
A. SQL Injection
B. Social Engineering
C. Jail Breaking
D. Denial of Service
Network Security teams can leverage Micro-Segmentation for which purpose?
A. deny attackers the possibility to breach the data center perimeter
B. deny attackers the opportunity to move laterally within the internal network
C. replace the need to leverage traditional network segmentation
D. prevent a successful attack to any of the systems attached to the network
In Workspace ONE Intelligence, which of the following is a role that can be assigned to an administrator account?
A. Super User
B. Helpdesk
C. Read-only
D. Automater
Which VMware application enrolls an endpoint into Workspace ONE?
A. Workspace ONE Web
B. CB Defense Sensor
C. VMware Horizon Client
D. Workspace ONE Intelligent Hub
In VMware Carbon Black Cloud, which reputations have the highest priority during analysis?
A. Known Priority
B. Trusted Allow List
C. Company Allow List
D. Ignore
Which three are VMware Workspace ONE SDK capabilities? (Choose three.)
A. data loss prevention
B. find my device
C. single sign-on
D. geofencing
E. application blacklist
When filtering firewall rules after selecting an object to filter by, which four columns does the filter search? (Choose four.)
A. Services
B. Action
C. Protocol
D. Log
E. Applied To
F. Source
G. Destinations