Professional VMware Security v1.0

Page:    1 / 5   
Exam contains 77 questions

Which would be a cause for a device being flagged as compromised in the Workspace ONE UEM dashboard?

  • A. Device was stolen.
  • B. Device was lost.
  • C. Device was damaged.
  • D. Device was jailbroken.


Answer : A

Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/Windows_Desktop_Device_Management/GUID-uemWindeskCompliance.html

Where in the NSX UI does an administrator add an Active Directory Domain?

  • A. Go to System > Configuration > Identity Firewall AD > ADD ACTIVE DIRECTORY
  • B. Go to Inventory > Configuration > Identity Firewall AD > ADD ACTIVE DIRECTORY
  • C. Go to Home > Configuration > Identity Firewall AD > ADD ACTIVE DIRECTORY
  • D. Go to Security > Configuration > Identity Firewall AD > ADD ACTIVE DIRECTORY


Answer : A

Reference: https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-8B60D22B-3119-48F6-AEAE-AE27A9372189.html

An administrator is trying to secure Workspace ONE components with firewall rules.
What port does the administrator need to allow for communication between the UEM Console Server and the UEM Database Server?

  • A. 443
  • B. 3389
    C.445
    D.1433


Answer : D

Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/2105/WS1_Assist/GUID-AWT-ARM-NETWORKSECURITYREQS.html

In a Workspace ONE environment, which two Risk Indicators are supported on the Windows 10 & MacOS platforms? (Choose two.)

  • A. Risky Setting
  • B. Compulsive App Download
  • C. App Collector
  • D. Rare App Collector
  • E. Laggard Update


Answer : BD

Reference: https://docs.vmware.com/en/VMware-Workspace-ONE/services/intelligence-documentation/GUID-14_intel_user_risk_dashboard.html

How does an NSX-T Data Center firewall rule handle an Apply To setting for the firewall policy and firewall rule?

  • A. The rule Apply To will take precedent.
  • B. The first Apply To created will take precedent.
  • C. The last Apply To created will take precedent.
  • D. The policy Apply To will take precedent.


Answer : B

Which two options are needed to configure NSX-T Data Center to access the Active Directory? (Choose two.)

  • A. Domain Controller Name
  • B. Distinguished Name
  • C. username
  • D. Port
  • E. netBIOS name


Answer : BE

Reference: https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-8B60D22B-3119-48F6-AEAE-AE27A9372189.html

Considering the NSX Manager Node, what is VMware's recommended size for a typical production deployment?

  • A. small appliance for deployments with up to 64 hosts
  • B. medium appliance for deployments with up to 64 hosts
  • C. medium appliance for deployments with up to 128 hosts
  • D. small appliance for deployments with up to 32 hosts


Answer : B

Reference: https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/installation/GUID-AECA2EE0-90FC-48C4-8EDB-66517ACFE415.html

When creating a policy in VMware Carbon Black Cloud, what impact does setting the Target Value to Low have?

  • A. Alerts Severity scores are raised by 1.
  • B. Alerts Severity scores are raised by 2.
  • C. Alerts Severity scores are lowered by 1.
  • D. Alerts Severity scores are lowered by 2.


Answer : D

Reference: https://docs.vmware.com/en/VMware-Carbon-Black-Cloud/services/carbon-black-cloud-user-guide.pdf (20)

For Carbon Black Cloud two-factor authentication, which of the following is true?

  • A. It is required at first login by default.
  • B. At least two registered users are required.
  • C. It is enabled once the organization passes 100 users.
  • D. Only Google Authentication is supported.


Answer : D

Reference: https://community.carbonblack.com/t5/Knowledge-Base/PSC-How-to-Enable-Google-Two-Factor-Authentication/ta-p/84645

Which three statements are true about NSX Intelligence and vRealize Network Insight? (Choose three.)

  • A. NSX Intelligence provides stateful layer 7 processing using distributed in-line processing on each hypervisor.
  • B. vRealize Network Insight complements NSX Intelligence when planning for micro-segmentation.
  • C. vRealize Network Insight Enterprise allows for Security Planning and Visibility for VMware Cloud on AWS.
  • D. NSX Intelligence provides stateful layer 7 processing on VeloCloud SD-WAN.
  • E. Both vRealize Network Insight and NSX Intelligence allow integration with SD-WAN.


Answer : BCD

Reference: https://datacenternews.asia/story/vmware-launches-software-defined-networking-and-security-stack-built-for-multi-cloud

Which of the following statements is true about Monitor Port Mirroring Sessions in NSX-T Data Center?

  • A. This feature requires a SPAN compliant appliance.
  • B. A source mirror port can be in more than one mirror session.
  • C. A source mirror port cannot be in more than one mirror session.
  • D. This feature requires an IPFIX compliant collector.


Answer : C

Reference: https://docs.vmware.com/en/VMware-NSX-T-Data-Center/2.3/com.vmware.nsxt.admin.doc/GUID-3D403B24-51F6-4A16-8266-0827BFE9FAA9.html

Which three options are valid unattended installation options for Carbon Black Cloud Sensors? (Choose three.)

  • A. UPDATESOURCE=
  • B. GROUP_NAME=
  • C. LICENSE_CODE=
  • D. COMPANY_CODE=
  • E. AUTO_UPDATE=


Answer : BDE

Reference: https://community.carbonblack.com/t5/Knowledge-Base/Carbon-Black-Cloud-How-to-Perform-an-Unattended-Installation-of/ta-p/65874

Which two are features of a hybrid cloud model for networking and security when using NSX-T Data Center and VMware NSX Cloud? (Choose two.)

  • A. NSX Data Center provides consistent logical networking and security across protected and recovery sites.
  • B. NSX Data Center supports Layer 2 VPN between an NSX Edge and a Direct Connect Gateway.
  • C. NSX Data Center and VMware NSX Cloud stretch Layer 2 domains between public clouds using the Geneve overlay.
  • D. NSX Data Center supports secure, encrypted user access to private corporate applications (SSL VPN).
  • E. NSX Data Center supports remote sites (IPsec VPN) with optional VPN gateways or hardware routers from other vendors.


Answer : AE

Reference: https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/products/nsx/vmware-nsx-datasheet.pdf

In a Workspace ONE deployment, which three are valid pre-configured sources for creating a baseline with the Baseline Wizard? (Choose three.)

  • A. GPO Connector
  • B. Registry File Import
  • C. Windows Security Baseline
  • D. CIS Benchmarks
  • E. Custom Baseline


Answer : CDE

Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/Windows_Desktop_Device_Management/GUID-uemWindeskUsingBaselines.html

A company has deployed a new application. Users are complaining they cannot connect. The administrator suspects there is an issue with the Distributed Firewall (DFW).
What three steps can be taken to troubleshoot the DFW? (Choose three.)

  • A. The administrator should confirm that SLOT 2, which is used by the DFW, is configured under the vNICs of the VMs.
  • B. The administrator should configure vRealize Log Insight using the Insight agent as the type and review the DFW rule logs in vRealize Log Insight.
  • C. The administrator should confirm if the DFW rule is set to log, and then look on the hypervisor where the VMs reside and look at logs at /var/log/dfwpktlogs.log.
  • D. The administrator should verify firewall rules exist to permit traffic and verify the hit counters are increasing.
  • E. The administrator should configure vRealize Log Insight using syslog as the type and review the DFW rule logs in vRealize Log Insight.


Answer : CDE

Page:    1 / 5   
Exam contains 77 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy