VMware 1V0-81.20 Associate VMware Security Exam Practice Test

Page: 1 / 14
Total 55 questions
Question 1

Which network virtualization technologies can be used with an Ethernet VPN (EVPN) deployment in NSX-T Data Center? (Choose two.)



Answer : A, E


Question 2

Which shell command line syntax represents less suspicious danger than the others?



Answer : C


Question 3

When filtering firewall rules after selecting an object to filter by, which four columns does the filter search? (Choose four.)



Answer : A, E, F, G


Question 4

Which Workspace ONE feature incorporates network range, device platform, and authentication method into decision making when evaluating an access request from a user?



Answer : C


Question 5

In VMware Carbon Black Cloud, which two of these statements are true of the Permissions section of the Prevention tab under Policies? (Choose two.)



Answer : A, D


Question 6

Which three are VMware Workspace ONE SDK capabilities? (Choose three.)



Answer : A, C, D


Question 7

Which attack technique probes the environment for openings on devices or the firewall?



Answer : A


Page:    1 / 14   
Total 55 questions