VCP-SEC 2021

[Newest Version] Free 2v0-81.20 PDF and Exam Questions Download 100% Pass Exam

Don’t worry about how to get yourself well prepared your VCP-SEC 2021 Newest 2v0-81.20 practice exam! We will work you out of your VCP-SEC 2021 Apr 20,2022 Hotest 2v0-81.20 vce exam with the latest updated Professional VMware Security 2v0-81.20 pdf . We provides the latest real VCP-SEC 2021 2v0-81.20 exam question, covering every aspect of Latest 2v0-81.20 study guide exam curriculum.

We Geekcert has our own expert team. They selected and published the latest 2v0-81.20 preparation materials from Official Exam-Center.

The following are the 2v0-81.20 free dumps. Go through and check the validity and accuracy of our 2v0-81.20 dumps.These questions are from 2v0-81.20 free dumps. All questions in 2v0-81.20 dumps are from the latest 2v0-81.20 real exams.

Question 1:

Which file can be used to validate repcli authentication was enabled for Carbon Black Cloud?

A. C:\Program Files\Confer\repcii.ini

B. C:\Program Files\Confer\config.ini

C. C:\Program Files\Confer\cfg.ini

D. C:\Program Files\Confer\cli.ini

Correct Answer: A


Question 2:

Which is the correct Distinguished Name for connecting NSX-T Data Center to Active Directory, if your directory name is corp. local?

A. corp. local

B. DC=corp. local

C. DC=corp, DC=local

D. DC=local, DC=corp

Correct Answer: C


Question 3:

What are two valid time limit selections when creating a Last Seen compliance policy in Workspace ONE UEM? (Choose two.)

A. Hours

B. Minutes

C. Days

D. Weeks

E. Months

Correct Answer: BC


Question 4:

Which is true about Time-Based Firewall Policy rules?

A. Time-Based policy rules apply only to the NSX Distributed Firewall.

B. Time-Based policy rules apply to the NSX Gateway and Distributed Firewall.

C. Time-Based policy rules can only be used one time for NSX Gateway Firewall.

D. Time-Based policy rules apply only to the NSX Gateway Firewall.

Correct Answer: B


Question 5:

An administrator found an unwanted/untrusted application running in their environment.

What is the most efficient way of preventing the unwanted application from running and stopping any

existing instances in Carbon Black Cloud?

A. Mark the file as a PUP (Potentially Unwanted Program).

B. Add a rule to each policy for unwanted.exe runs or if running terminate.

C. Send a delete application request to each machine.

D. Add the unwanted files hash to the company banned list.

Correct Answer: D


Question 6:

In the NSX Manager UI, which tab is selected to manage firewall rules?

A. Plan and Troubleshoot tab

B. Security tab

C. Inventory tab

D. Networking tab

Correct Answer: B


Question 7:

Which is the name of the default policy that is applied to all applications in Workspace ONE Access?

A. primary_policy

B. default_policy

C. default_access_policy_set

D. default_application_policy

Correct Answer: C


Question 8:

In a Carbon Black Cloud deployment, which two are recommended troubleshooting steps for Live Response not working? (Choose two.)

A. Restart the Live Response Service three times to autocorrect.

B. Ensure a duplicate Live Response session does not exist.

C. Confirm Live Response is enabled in Sensor Policy settings.

D. Ensure the account has RBAC permission for Live Response.

E. Confirm the Live Response timeline spans the search window.

Correct Answer: CD


Question 9:

When creating a sensor group in VMware Carbon Black Cloud, which three are valid criteria? (Choose three.)

A. Location Name

B. Organizational Username

C. Active Directory Organizational Unit

D. Subnet

E. Device Name

Correct Answer: CDE


Question 10:

What is the correct sequence of options when creating a new compliance policy in Workspace ONE UEM?

A. Actions, Assignment, Rules, Summary

B. Rules, Actions, Assignment, Summary

C. Assignment, Rules, Actions, Summary

D. Rules, Assignment, Actions, Summary

Correct Answer: B


Question 11:

Which is the built-in two factor authentication method in Workspace ONE Access?

A. VMware Verify

B. VMware SMS

C. VMware Auth

D. VMware Push

Correct Answer: A


Question 12:

Refer to the exhibit.

What command was run on the NSX Edge node to pull this information?

A. get tunnel-ID

B. show vteps

C. get vteps

D. list vteps

Correct Answer: C


Question 13:

What command does an administrator use on an ESXi Transport Node to check connectivity with the management plane?

A. esxcli network ip connection list 1234

B. esxcli firewall ip connection list | grep 1234

C. esxcli ip connection 1234

D. esxcli network ip connection list | grep 1234

Correct Answer: D


Question 14:

Which Carbon Black Cloud feature allows an administrator to audit at scale and identify gaps in least privilege configuration controls?

A. Watchlist

B. Live Query

C. Investigate

D. CB Baseline Tool

Correct Answer: C


Question 15:

In what order are NSX-T Distributed Firewall configurable rules categories processed?

A. Emergency, Ethernet, Environment, Infrastructure, Application

B. Ethernet, Environment, Infrastructure, Application, Emergency

C. Ethernet, Emergency, Infrastructure, Environment, Application

D. Emergency, Ethernet, Infrastructure, Environment, Application

Correct Answer: C