Which file can be used to validate repcli authentication was enabled for Carbon Black Cloud?
A. C:\Program Files\Confer\repcii.ini
B. C:\Program Files\Confer\config.ini
C. C:\Program Files\Confer\cfg.ini
D. C:\Program Files\Confer\cli.ini
In a Carbon Black Cloud deployment, which two are recommended troubleshooting steps for Live Response not working? (Choose two.)
A. Restart the Live Response Service three times to autocorrect.
B. Ensure a duplicate Live Response session does not exist.
C. Confirm Live Response is enabled in Sensor Policy settings.
D. Ensure the account has RBAC permission for Live Response.
E. Confirm the Live Response timeline spans the search window.
Which Carbon Black Cloud feature allows an administrator to audit at scale and identify gaps in least privilege configuration controls?
A. Watchlist
B. Live Query
C. Investigate
D. CB Baseline Tool
What is the purpose of Flow Statistics in an NSX-T Data Center firewall rule?
A. It is a toggle for turning on NETFLOW monitoring for a particular firewall rule.
B. It is a read-only field that displays the byte, packet count, and sessions.
C. It is a toggle for disabling display of the byte, packet count, and sessions.
D. It is a read-only field that displays any NETFLOW traffic analysis.
Which three statements are correct for Active Directory integration with Identity Firewalls (IDFW) in an NSX-T Data Center deployment? (Choose three.)
A. The IDFW can be used on both physical and virtual servers as long as supported operating system is installed.
B. The Thin Agent must be enabled in VMWare tools as it is not enabled by default.
C. The IDFW can be used for Virtual Desktops (VDI) or Remote desktop sessions (RDSH support).
D. Identity-based groups can be used as the source or destination in DFW rules.
E. User identity information is provided by the NSX Guest Introspection Thin Agent.
An administrator has deployed a new NSX Distributed Firewall rule that allows only TLS 1.2 and TLS 1.3 HTTPS connections. The new rule is working, but TLS 1.0 and TLS 1.1 connections are still occurring. What step is required to enforce the TLS policy restriction?
A. Configure a Context Profile and select DNS-TCP and DNS-UDP attributes.
B. Configure a Context Profile and select a FQDN attributes.
C. Configure a Context Profile and select TLS 1.2 and 1.3 attributes.
D. Configure a Context Profile and select HTTPS and HTTP attributes.
Which would be a cause for a device being flagged as compromised in the Workspace ONE UEM dashboard?
A. Device was stolen.
B. Device was lost.
C. Device was damaged.
D. Device was jailbroken.
What are the three types of NSX-T Data Center installation workflows? (Choose three. )
A. NSX-T for Bare Metal
B. NSX-T for OpenBox
C. NSX-T for VxRail
D. NSX-T for Hyper-V
E. NSX-T for KVM
F. NSX-T for vSphere
An administrator has been asked to install Guest Introspection Thin Agent using VMware Tools on a
Windows 10 VDI solution.
Which statement is correct for enabling the Identity Firewall feature?
A. Guest Introspection drivers are included with VMware Tools for Windows and a reboot of the VM is required to initialize the drivers.
B. To install Guest Introspection on a Windows VM, you must perform a custom install and select the drivers.
C. Guest Introspection drivers are available from third-party providers and can be initialized without a VM reboot.
D. Select Guest Introspection Drivers to install File Introspection (vsepfit) and Network Introspection (vnetfit) drivers.
When creating a new Identity Provider (IdP) in Workspace ONE Access, which two methods are used to identify users? (Choose two.)
A. SAML Attribute
B. NameID Element
C. UserID Element
D. User Attribute
E. SAML Response
An administrator works for a company that supplies iOS devices to its employees. The administrator is notified there is a security vulnerability with the latest version of iOS. The administrator must prevent users from updating devices immediately. The administrator implements a device profile to configure the updates payload and prevent the devices from detecting the update. How long can devices be prevented from accessing the update from Apple?
A. 90 Days
B. 60 Days
C. 30 Days
D. 180 Days
As an IT administrator, you want to prevent users from launching a protected SaaS web application when they are not connected to the internal LAN. The application is federated with Workspace ONE Access. What can be configured to prevent the application from launching?
A. Access Policy
B. IdP Response
C. SAML Attribute
D. Authentication Method
A company has just implemented new security guidelines in regards to device management. All iOS
devices must now require a passcode to unlock the device.
An administrator must implement these requirements:
all iOS devices must have a passcode
minimum passcode length of 6 numerals
auto-lock after 2 minutes
What type of profile in Workspace ONE UEM would the administrator create to accomplish this task?
A. Compliance Profile
B. User Profile
C. Device Profile
D. Access Profile
What is used to establish trust with an identity provider in Workspace ONE Access?
A. SAML Attribute
B. SAML Metadata
C. SAML Context
D. SAML Request
Where in the NSX UI does an administrator deploy NSX Intelligence?
A. Go to Plan and Troubleshoot > Configuration > ADD NSX INTELLIGENCE APPLIANCE
B. Go to Security > Configuration > Appliances > ADD NSX INTELLIGENCE APPLIANCE
C. Go to System > Configuration > Appliances > ADD NSX INTELLIGENCE APPLIANCE
D. Go to Home > Configuration > Appliances > ADD NSX INTELLIGENCE APPLIANCE