VMware 1V0-81.20 Exam Dumps 2023 | Latest Exam Materials

Successfully passing the Associate VMware Security 1V0-81.20 exam requires not only 1V0-81.20 exam materials but also up-to-date. At the start of the new year, you need the latest VMware 1V0-81.20 exam dumps 2023 to provide you with the latest 1V0-81.20 exam materials.

Passitdump exists to solve the problem for you. Passitdump provides you with the latest 1V0-81.20 exam dumps to help you pass the exam smoothly, rest assured, it has been updated, and ensure the latest version.

Check the following 1V0-81.20 free dumps or download 1V0-81.20 dumps here.

Question 1:

DRAG DROP

Match each Workspace ONE Intelligence Security Risk Module tab on the left with its description on the right by dragging the tab\’s name into the correct box.

Select and Place:

Correct Answer:


Question 2:

DRAG DROP

Drag and drop the Cyber Kill events on the left into their proper sequential order on the right.

Select and Place:

Correct Answer:


Question 3:

Which three default connectors are available in Workspace ONE Intelligence to execute automation actions? (Choose three.)

A. ServiceNow

B. vRealize Operations Manager

C. Slack

D. Log Insight

E. Workspace ONE UEM

Correct Answer: ACE


Question 4:

Refer to the exhibit.

Which statement is true about the firewall rule?

A. It is a gateway firewall applied to a Tier-0 gateway that drops traffic on port 22

B. It is a distributed firewall applied to App-Services, DB-Servers and Web-Servers that rejects traffic on port 22

C. It is a distributed firewall applied to App-Services, DB-Servers and Web-Servers that drops traffic on port 22

D. It is a gateway firewall applied to a Tier-0 gateway that rejects traffic on port 22

Correct Answer: A


Question 5:

Refer to the exhibit.

From the VMware Carbon Black Cloud console, what page do you go to after clicking the Non-Malware bar in the Potentially Suspicious Activity chart?

A. Notifications page with the selected alert filtered

B. Reputations page with the selected reputation filtered

C. Investigate page with the selected reputation filtered

D. Alerts page with the selected alert filtered

Correct Answer: D

Reference: https://docs.vmware.com/en/VMware-Carbon-Black-Cloud/services/carbon-black-cloud-userguide.pdf (15)


Question 6:

Which four alert filters are available in the VMware Carbon Black Cloud Investigate page? (Choose four.)

A. Watchlist

B. Target Value

C. Policy

D. Security Alert List

E. Effective Reputation

F. Alert Severity

Correct Answer: ABCF


Question 7:

Which is a common solution to implement for inbound network attacks?

A. Load Balancer

B. Firewall

C. Proxy

D. Reverse Proxy

Correct Answer: B


Question 8:

Which two are true about a VMware Service-defined Firewall? (Choose two.)

A. A firewall that allows you to use 3rd party features like IDS/IPS, threat protection, anti-bot, and anti-virus solutions

B. A firewall that blocks external access into your internal network based on IP services

C. A firewall that enforces policy for North-South traffic

D. A firewall that is auto scalable as new workloads are deployed

E. A firewall that provides East-West protection between internal applications

Correct Answer: AE

Reference: https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/products/vmware-nsxservice-defined-firewall.pdf


Question 9:

Which of the following is true about VMware Carbon Black Cloud Enterprise EDR watchlists?

A. They only update annually

B. You cannot customize them

C. They are made up of reports

D. Each watchlist is user specific

Correct Answer: D

Reference: https://docs.vmware.com/en/VMware-Carbon-Black-EDR/7.5/VMware%20Carbon%20Black% 20EDR%207.5%20User%20Guide.pdf


Question 10:

A technician has been asked to confirm a specific browser extension does not exist on any endpoint in their environment.

Which is the VMware Carbon Black tool to use for this task?

A. Enterprise EDR

B. EDR

C. Audit and Remediation

D. Endpoint Standard

Correct Answer: A


Question 11:

Which three Workspace ONE UEM capabilities are used to configure security policies on Windows 10 desktops? (Choose three.)

A. Application Profiles

B. Custom XML

C. Custom Attributes

D. Baselines

E. Native Profiles

Correct Answer: BCD


Question 12:

Which would require a Layer 7 Firewall?

A. block a specific port

B. block a subnet range

C. block a host

D. block a specific application

Correct Answer: D


Question 13:

VMware\’s Intrinsic Security layer includes functionality for which control points?

A. networks, workloads, endpoints, identity, and clouds

B. applications, workloads, devices, identity, virtual infrastructure

C. networks, containers, devices, users, and VMware Cloud

D. applications, users, networks, data center perimeter, vSphere

Correct Answer: A

Reference: https://www.globalknowledge.com/en-gb/resources/articles/what-is-intrinsic-security


Question 14:

Which three are key features of VMware Carbon Black Cloud Enterprise EDR? (Choose three.)

A. self-service security remediation

B. continuous and centralized recording

C. attack chain visualization and search

D. live response for remote remediation

E. frequent Antivirus pattern updates

Correct Answer: BCD

Reference: https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmwcb-enterpriseedr-datasheet.pdf (2)


Question 15:

What is the safe course of action for a USB disk of unknown ownership and origin?

A. Do not connect the USB to any computer as it may be a USB Killer device

B. Connect the USB device to your computer and allow the DLP software to protect it

C. Connect the USB to a non-Windows device and examine it

D. Connect the USB to an air gapped system and examine it

Correct Answer: D