Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! 2V0-81.20 has been withdrawn.

2V0-81.20 Practice Exam Questions with Answers Professional VMware Security Certification

Question # 6

For Carbon Black Cloud two-factor authentication, which of the following is true?

A.

It is required at first login by default.

B.

At least two registered users are required.

C.

It is enabled once the organization passes 100 users.

D.

Only Google Authentication is supported.

Full Access
Question # 7

What is the purpose of Flow Statistics in an NSX-T Data Center firewall rule?

A.

It is a toggle for turning on NETFLOW monitoring for a particular firewall rule.

B.

It is a read-only field that displays the byte, packet count, and sessions.

C.

It is a toggle for disabling display of the byte, packet count, and sessions.

D.

It is a read-only field that displays any NETFLOW traffic analysis.

Full Access
Question # 8

Which statement is true about TraceFlow when used in an NSX-T Data Center deployment?

A.

Traceflow mirrors a source port for inspection.

B.

Traceflow allows you to inject a packet into the network and monitor its flow across the network.

C.

Traceflow allows you to perform a traceroute cmd between selected hosts.

D.

Traceflow enables IPFIX forwarding for the selected port.

Full Access
Question # 9

Which two options are available for Windows Update Source when creating a Windows Profile for patch management in a Workspace ONE deployment? (Choose two.)

A.

VMware Update Manager

B.

Microsoft Update Service

C.

VMware Update Service

D.

Cloud Update Service

E.

WSUS

Full Access
Question # 10

Which three options are used to automate patch remediation based on CVEs for Windows devices using Workspace ONE Intelligence? (Choose three.)

A.

Use Workspace ONE UEM console to approve patches.

B.

Create Automated remediation based on Risk score.

C.

Create automated remediation based on CVE vulnerabilities.

D.

Identify vulnerable devices across the entire environment based on CVE information.

E.

Create a dashboard to track CVE remediation.

Full Access