DRAG DROP
Match each Workspace ONE Intelligence Security Risk Module tab on the left with its description on the right by dragging the tab's name into the correct box.
Select and Place:
Refer to the exhibit.
Which statement is true about the firewall rule?
A. It is a gateway firewall applied to a Tier-0 gateway that drops traffic on port 22
B. It is a distributed firewall applied to App-Services, DB-Servers and Web-Servers that rejects traffic on port 22
C. It is a distributed firewall applied to App-Services, DB-Servers and Web-Servers that drops traffic on port 22
D. It is a gateway firewall applied to a Tier-0 gateway that rejects traffic on port 22
Which two are true about a VMware Service-defined Firewall? (Choose two.)
A. A firewall that allows you to use 3rd party features like IDS/IPS, threat protection, anti-bot, and anti-virus solutions
B. A firewall that blocks external access into your internal network based on IP services
C. A firewall that enforces policy for North-South traffic
D. A firewall that is auto scalable as new workloads are deployed
E. A firewall that provides East-West protection between internal applications
Which would require a Layer 7 Firewall?
A. block a specific port
B. block a subnet range
C. block a host
D. block a specific application
VMware's Intrinsic Security layer includes functionality for which control points?
A. networks, workloads, endpoints, identity, and clouds
B. applications, workloads, devices, identity, virtual infrastructure
C. networks, containers, devices, users, and VMware Cloud
D. applications, users, networks, data center perimeter, vSphere
What are the four valid options for a Windows compliance rule based on firewall status in a Workspace ONE environment? (Choose four.)
A. Good
B. Snoozed
C. Not Monitored
D. Deferred
E. Bad
F. Poor
Which option would be considered an example of a Hardware Based Exploit?
A. SQL Injection
B. Social Engineering
C. Jail Breaking
D. Denial of Service
Which three common mitigations for social engineering attacks? (Choose three.)
A. user training
B. filtering Email attachments
C. update Antivirus software
D. remove applications
E. blocking execution of suspicious files
Which VMware Carbon Black Cloud function allows an administrator to remotely run commands on protected endpoints?
A. Live Query
B. Alert Triage
C. Investigate
D. Live Response
Which attack technique probes the environment for openings on devices or the firewall?
A. Port Scan
B. Denial of Service
C. Living off the Land
D. Phishing