Most Up to Date Version of 1V0-81.20 Exam Dumps for Free

Attention please! Here is the shortcut to pass your Hotest 1V0-81.20 practice exam! Get yourself well prepared for the VCTA-SEC 2021 May 11,2022 Newest 1V0-81.20 vce dumps Associate VMware Security exam is really a hard job. But don’t worry! We We, provides the most update 1V0-81.20 dumps. With We latest latest 1V0-81.20 dumps, you’ll pass the VCTA-SEC 2021 Latest 1V0-81.20 practice Associate VMware Security exam in an easy way

We Geekcert has our own expert team. They selected and published the latest 1V0-81.20 preparation materials from Official Exam-Center.

The following are the 1V0-81.20 free dumps. Go through and check the validity and accuracy of our 1V0-81.20 dumps.The following questions and answers are from the latest 1V0-81.20 free dumps. It will help you understand the validity of the latest 1V0-81.20 dumps.

Question 1:


Match each Workspace ONE Intelligence Security Risk Module tab on the left with its description on the right by dragging the tab\’s name into the correct box.

Select and Place:

Correct Answer:

Question 2:


Drag and drop the Cyber Kill events on the left into their proper sequential order on the right.

Select and Place:

Correct Answer:

Question 3:

Which VMware product allows you to query an endpoint like a database?

A. VMware NSX-T Data Center

B. VMware Carbon Black Audit and Remediation

C. VMware Workspace ONE UEM

D. VMware Carbon Black Endpoint Standard

Correct Answer: C

Question 4:

Which three are industry best practices of Zero Trust framework? (Choose three.)

A. Employee machines need to have a passcode profile setup

B. Employee machines on Internal network are trusted and have access to all internal resources

C. Employee machines are checked for compliance before they get access to applications

D. Employees are not required to provide MFA to access internal resources over VPN

E. Employees get access to only the required resources to get their job done

Correct Answer: ACE

Question 5:

Which three default connectors are available in Workspace ONE Intelligence to execute automation actions? (Choose three.)

A. ServiceNow

B. vRealize Operations Manager

C. Slack

D. Log Insight

E. Workspace ONE UEM

Correct Answer: ACE

Question 6:

Refer to the exhibit.

Which statement is true about the firewall rule?

A. It is a gateway firewall applied to a Tier-0 gateway that drops traffic on port 22

B. It is a distributed firewall applied to App-Services, DB-Servers and Web-Servers that rejects traffic on port 22

C. It is a distributed firewall applied to App-Services, DB-Servers and Web-Servers that drops traffic on port 22

D. It is a gateway firewall applied to a Tier-0 gateway that rejects traffic on port 22

Correct Answer: A

Question 7:

Which four alert filters are available in the VMware Carbon Black Cloud Investigate page? (Choose four.)

A. Watchlist

B. Target Value

C. Policy

D. Security Alert List

E. Effective Reputation

F. Alert Severity

Correct Answer: ABCF

Question 8:

Which is a common solution to implement for inbound network attacks?

A. Load Balancer

B. Firewall

C. Proxy

D. Reverse Proxy

Correct Answer: B

Question 9:

Which of the following is true about VMware Carbon Black Cloud Enterprise EDR watchlists?

A. They only update annually

B. You cannot customize them

C. They are made up of reports

D. Each watchlist is user specific

Correct Answer: D

Reference: Carbon Black% 20EDR 7.5 User Guide.pdf

Question 10:

A technician has been asked to confirm a specific browser extension does not exist on any endpoint in their environment.

Which is the VMware Carbon Black tool to use for this task?

A. Enterprise EDR


C. Audit and Remediation

D. Endpoint Standard

Correct Answer: A

Question 11:

Which three Workspace ONE UEM capabilities are used to configure security policies on Windows 10 desktops? (Choose three.)

A. Application Profiles

B. Custom XML

C. Custom Attributes

D. Baselines

E. Native Profiles

Correct Answer: BCD

Question 12:

Which would require a Layer 7 Firewall?

A. block a specific port

B. block a subnet range

C. block a host

D. block a specific application

Correct Answer: D

Question 13:

VMware\’s Intrinsic Security layer includes functionality for which control points?

A. networks, workloads, endpoints, identity, and clouds

B. applications, workloads, devices, identity, virtual infrastructure

C. networks, containers, devices, users, and VMware Cloud

D. applications, users, networks, data center perimeter, vSphere

Correct Answer: A


Question 14:

Which three are key features of VMware Carbon Black Cloud Enterprise EDR? (Choose three.)

A. self-service security remediation

B. continuous and centralized recording

C. attack chain visualization and search

D. live response for remote remediation

E. frequent Antivirus pattern updates

Correct Answer: BCD

Reference: (2)

Question 15:

What are three core characteristics of VMware\’s Intrinsic Security solution? (Choose three.)

A. integrated

B. extensible

C. unified

D. content-centric

E. centrally managed

F. built-in

Correct Answer: ACF