VMware 2V0-81.20 - Professional VMware Security Exam

Page:    1 / 14   
Total 70 questions

Which file can be used to validate repcli authentication was enabled for Carbon Black Cloud?

  • A. C:\Program Files\Confer\repcii.ini
  • B. C:\Program Files\Confer\config.ini
  • C. C:\Program Files\Confer\cfg.ini
  • D. C:\Program Files\Confer\cli.ini


Answer : A

Reference: https://community.carbonblack.com/t5/Knowledge-Base/Carbon-Black-Cloud-How-to-Enable-RepCLI-Authentication-on/ta-p/70393

Which is the correct Distinguished Name for connecting NSX-T Data Center to Active Directory, if your directory name is corp. local?

  • A. corp. local
  • B. DC=corp. local
  • C. DC=corp, DC=local
  • D. DC=local, DC=corp


Answer : C

Reference: https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-8B60D22B-3119-48F6-AEAE-AE27A9372189.html

What are two valid time limit selections when creating a Last Seen compliance policy in Workspace ONE UEM? (Choose two.)

  • A. Hours
  • B. Minutes
  • C. Days
  • D. Weeks
  • E. Months


Answer : BC

Reference: https://www.niap-ccevs.org/MMO/Product/st_vid11026-aar.pdf (47)

Which is true about Time-Based Firewall Policy rules?

  • A. Time-Based policy rules apply only to the NSX Distributed Firewall.
  • B. Time-Based policy rules apply to the NSX Gateway and Distributed Firewall.
  • C. Time-Based policy rules can only be used one time for NSX Gateway Firewall.
  • D. Time-Based policy rules apply only to the NSX Gateway Firewall.


Answer : B

Reference: https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-8572496E-A60E-48C3-A016-4A081AC80BE7.html

An administrator found an unwanted/untrusted application running in their environment.
What is the most efficient way of preventing the unwanted application from running and stopping any existing instances in Carbon Black Cloud?

  • A. Mark the file as a PUP (Potentially Unwanted Program).
  • B. Add a rule to each policy for unwanted.exe runs or if running terminate.
  • C. Send a delete application request to each machine.
  • D. Add the unwanted files hash to the company banned list.


Answer : D

Reference: https://community.carbonblack.com/gbouw27325/attachments/gbouw27325/product-docs-news/3221/1/VMware%20Carbon%20Black%20App%20Control%20User%20Guide%20v8.6.pdf (77)

Page:    1 / 14   
Total 70 questions