Pass4itsure > VMware > VCTA-SEC 2021 > 1V0-81.20 > 1V0-81.20 Online Practice Questions and Answers

1V0-81.20 Online Practice Questions and Answers

Questions 4

Refer to the exhibit.

Which statement is true about the firewall rule?

A. It is a gateway firewall applied to a Tier-0 gateway that drops traffic on port 22

B. It is a distributed firewall applied to App-Services, DB-Servers and Web-Servers that rejects traffic on port 22

C. It is a distributed firewall applied to App-Services, DB-Servers and Web-Servers that drops traffic on port 22

D. It is a gateway firewall applied to a Tier-0 gateway that rejects traffic on port 22

Buy Now
Questions 5

Which of the following is true about VMware Carbon Black Cloud Enterprise EDR watchlists?

A. They only update annually

B. You cannot customize them

C. They are made up of reports

D. Each watchlist is user specific

Buy Now
Questions 6

Which would require a Layer 7 Firewall?

A. block a specific port

B. block a subnet range

C. block a host

D. block a specific application

Buy Now
Questions 7

What is the safe course of action for a USB disk of unknown ownership and origin?

A. Do not connect the USB to any computer as it may be a USB Killer device

B. Connect the USB device to your computer and allow the DLP software to protect it

C. Connect the USB to a non-Windows device and examine it

D. Connect the USB to an air gapped system and examine it

Buy Now
Questions 8

When you share a report in Workspace One Intelligence with a specified user, how is the report shared?

A. Desktop Notification

B. Console Message

C. SMS

D. Email

Buy Now
Questions 9

Micro segmentation is under which pillar of trust in VMware's 5 pillars of Zero Trust?

A. User

B. Session/Transport

C. Application

D. Device

Buy Now
Questions 10

What is the term used to describe a type of social engineering attack aimed at a specific person or specific type of person?

A. Phishing

B. Whaling

C. Tailgating

D. Spear Phishing

Buy Now
Questions 11

What is a unique benefit of Next Generation Antivirus over standard Antivirus?

A. signature based heuristics

B. predictive analytics

C. file based heuristics

D. reactive analytics

Buy Now
Questions 12

An organization using VMware Carbon Black makes use of an unsigned third party application that is critical to business function. Unfortunately, the application has a reputation of Potentially Unwanted Program and is prevented from running based on the policy.

What Approved list mechanism will allow this application to run in your environment while maintaining the most secure posture?

A. MD5 Hash based

B. Certs based

C. IT Tools based

D. SHA-256 Hash based

Buy Now
Questions 13

Which three are VMware Workspace ONE SDK capabilities? (Choose three.)

A. data loss prevention

B. find my device

C. single sign-on

D. geofencing

E. application blacklist

Buy Now
Exam Code: 1V0-81.20
Exam Name: Associate VMware Security
Last Update: Dec 19, 2024
Questions: 54
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99