Pass4itsure > VMware > VCTA-SEC 2021 > 1V0-81.20 > 1V0-81.20 Online Practice Questions and Answers

1V0-81.20 Online Practice Questions and Answers

Questions 4

DRAG DROP

Match each Workspace ONE Intelligence Security Risk Module tab on the left with its description on the right by dragging the tab's name into the correct box.

Select and Place:

Buy Now
Questions 5

Refer to the exhibit.

Which statement is true about the firewall rule?

A. It is a gateway firewall applied to a Tier-0 gateway that drops traffic on port 22

B. It is a distributed firewall applied to App-Services, DB-Servers and Web-Servers that rejects traffic on port 22

C. It is a distributed firewall applied to App-Services, DB-Servers and Web-Servers that drops traffic on port 22

D. It is a gateway firewall applied to a Tier-0 gateway that rejects traffic on port 22

Buy Now
Questions 6

Which two are true about a VMware Service-defined Firewall? (Choose two.)

A. A firewall that allows you to use 3rd party features like IDS/IPS, threat protection, anti-bot, and anti-virus solutions

B. A firewall that blocks external access into your internal network based on IP services

C. A firewall that enforces policy for North-South traffic

D. A firewall that is auto scalable as new workloads are deployed

E. A firewall that provides East-West protection between internal applications

Buy Now
Questions 7

Which would require a Layer 7 Firewall?

A. block a specific port

B. block a subnet range

C. block a host

D. block a specific application

Buy Now
Questions 8

VMware's Intrinsic Security layer includes functionality for which control points?

A. networks, workloads, endpoints, identity, and clouds

B. applications, workloads, devices, identity, virtual infrastructure

C. networks, containers, devices, users, and VMware Cloud

D. applications, users, networks, data center perimeter, vSphere

Buy Now
Questions 9

What are the four valid options for a Windows compliance rule based on firewall status in a Workspace ONE environment? (Choose four.)

A. Good

B. Snoozed

C. Not Monitored

D. Deferred

E. Bad

F. Poor

Buy Now
Questions 10

Which option would be considered an example of a Hardware Based Exploit?

A. SQL Injection

B. Social Engineering

C. Jail Breaking

D. Denial of Service

Buy Now
Questions 11

Which three common mitigations for social engineering attacks? (Choose three.)

A. user training

B. filtering Email attachments

C. update Antivirus software

D. remove applications

E. blocking execution of suspicious files

Buy Now
Questions 12

Which VMware Carbon Black Cloud function allows an administrator to remotely run commands on protected endpoints?

A. Live Query

B. Alert Triage

C. Investigate

D. Live Response

Buy Now
Questions 13

Which attack technique probes the environment for openings on devices or the firewall?

A. Port Scan

B. Denial of Service

C. Living off the Land

D. Phishing

Buy Now
Exam Code: 1V0-81.20
Exam Name: Associate VMware Security
Last Update: Apr 10, 2024
Questions: 54
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99