Certbus > VMware > VMware Certifications > 1V0-81.20 > 1V0-81.20 Online Practice Questions and Answers

1V0-81.20 Online Practice Questions and Answers

Questions 4

DRAG DROP

Match each Workspace ONE Intelligence Security Risk Module tab on the left with its description on the right by dragging the tab's name into the correct box.

Select and Place:

Browse 54 Q&As
Questions 5

Which VMware product allows you to query an endpoint like a database?

A. VMware NSX-T Data Center

B. VMware Carbon Black Audit and Remediation

C. VMware Workspace ONE UEM

D. VMware Carbon Black Endpoint Standard

Browse 54 Q&As
Questions 6

Which three default connectors are available in Workspace ONE Intelligence to execute automation actions? (Choose three.)

A. ServiceNow

B. vRealize Operations Manager

C. Slack

D. Log Insight

E. Workspace ONE UEM

Browse 54 Q&As
Questions 7

Which is a common solution to implement for inbound network attacks?

A. Load Balancer

B. Firewall

C. Proxy

D. Reverse Proxy

Browse 54 Q&As
Questions 8

A technician has been asked to confirm a specific browser extension does not exist on any endpoint in their environment. Which is the VMware Carbon Black tool to use for this task?

A. Enterprise EDR

B. EDR

C. Audit and Remediation

D. Endpoint Standard

Browse 54 Q&As
Questions 9

Which three are key features of VMware Carbon Black Cloud Enterprise EDR? (Choose three.)

A. self-service security remediation

B. continuous and centralized recording

C. attack chain visualization and search

D. live response for remote remediation

E. frequent Antivirus pattern updates

Browse 54 Q&As
Questions 10

When considering the Device Details page in Workspace ONE UEM, what three sub menus can you check for changes in compliance? (Choose three.)

A. Profiles

B. Troubleshooting

C. Updates

D. Status History

E. Compliance

Browse 54 Q&As
Questions 11

Micro segmentation is under which pillar of trust in VMware's 5 pillars of Zero Trust?

A. User

B. Session/Transport

C. Application

D. Device

Browse 54 Q&As
Questions 12

Which two choices are advantages for using baselines in Workspace ONE UEM? (Choose two.)

A. ability to apply a network security standard to a device

B. ability to use industry standard settings to a device

C. ability to apply drive updates to a device

D. ability to apply Windows Update patches to a device

E. ability to audit network security compliance to a device

Browse 54 Q&As
Questions 13

What is the term used to describe a type of social engineering attack aimed at a specific person or specific type of person?

A. Phishing

B. Whaling

C. Tailgating

D. Spear Phishing

Browse 54 Q&As
Questions 14

In VMware Carbon Black Cloud Endpoint Standard, which items are available in the Event view?

A. Hashes, Reputations

B. Emails, Policies, OS, Locations

C. Connection, IP/Port

D. IDs, Indicators/TTPs

Browse 54 Q&As
Questions 15

Which VMware application enrolls an endpoint into Workspace ONE?

A. Workspace ONE Web

B. CB Defense Sensor

C. VMware Horizon Client

D. Workspace ONE Intelligent Hub

Browse 54 Q&As
Questions 16

Least Privilege is a common method for minimizing the risk of what kind of threat?

A. Insider Threats

B. Spear Phishing

C. Distributed Denial of Service

D. Man in the Middle

Browse 54 Q&As
Questions 17

In a Workspace ONE deployment, Per App Tunnel uses the Native Platform API for which platforms?

A. iOS and Android only

B. iOS, Android, MacOS and Windows

C. iOS and MacOS only

D. Android and Windows only

Browse 54 Q&As
Questions 18

When filtering firewall rules after selecting an object to filter by, which four columns does the filter search? (Choose four.)

A. Services

B. Action

C. Protocol

D. Log

E. Applied To

F. Source

G. Destinations

Browse 54 Q&As
Exam Code: 1V0-81.20
Exam Name: Associate VMware Security
Last Update: Mar 14, 2025
Questions: 54 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99