Which option would be considered an example of a Hardware Based Exploit?
Answer : C
Reference:
https://www.kaspersky.com/resource-center/definitions/what-is-jailbreaking
Network Security teams can leverage Micro-Segmentation for which purpose?
Answer : B
Which three common mitigations for social engineering attacks? (Choose three.)
Answer : ACE
In Workspace ONE Intelligence, which of the following is a role that can be assigned to an administrator account?
Answer : A
In Workspace ONE UEM, from which menu would you access Workspace ONE Intelligence?
Answer : D
Explanation:
Which VMware application enrolls an endpoint into Workspace ONE?
Answer : D
Explanation:
Least Privilege is a common method for minimizing the risk of what kind of threat?
Answer : A
Reference:
https://www.beyondtrust.com/blog/entry/what-is-least-privilege
Which VMware Carbon Black Cloud function allows an administrator to remotely run commands on protected endpoints?
Answer : A
Reference:
https://docs.vmware.com/en/VMware-Carbon-Black-Cloud/services/carbon-black-cloud-user-guide.pdf
(26)
Which NSX functionality allows technology partners to integrate third-party solutions to examine North-South and East-West network traffic?
Answer : B
An organization using VMware Carbon Black makes use of an unsigned third party application that is critical to business function. Unfortunately, the application has a reputation of Potentially Unwanted Program and is prevented from running based on the policy.
What Approved list mechanism will allow this application to run in your environment while maintaining the most secure posture?
Answer : D
Reference:
https://community.carbonblack.com/gbouw27325/attachments/gbouw27325/product-docs-news/3221/1/VMware%20Carbon%20Black%20App%
20Control%20User%20Guide%20v8.6.pdf
Which three are components of the NSX-T Software-defined Firewall? (Choose three.)
Answer : ADE
Reference:
https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/products/nsx/vmware-nsx-datasheet.pdf
What is one of the limitations of traditional Antivirus when compared to Next Generation Antivirus?
Answer : B
Explanation:
In VMware Carbon Black Cloud, which reputations have the highest priority during analysis?
Answer : B
If the Compromised Protection switch is enabled in Workspace ONE UEM, what is the expected behavior on compromised devices in the environment?
Answer : D
In a Workspace ONE deployment, Per App Tunnel uses the Native Platform API for which platforms?
Answer : A
Explanation:
Have any questions or issues ? Please dont hesitate to contact us