Which network virtualization technologies can be used with an Ethernet VPN (EVPN) deployment in
NSX-T Data Center? (Choose two.)
AE
Which shell command line syntax represents less suspicious danger than the others?
C
When filtering firewall rules after selecting an object to filter by, which four columns does the filter
search? (Choose four.)
A, E, F, G
Reference:
https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-BF564729-868B-4136-9AD0-857C47078FB3.html
DRAG DROP
Drag and drop the Cyber Kill events on the left into their proper sequential order on the right.
Which Workspace ONE feature incorporates network range, device platform, and authentication
method into decision making when evaluating an access request from a user?
C
Reference:
https://techzone.vmware.com/resource/what-workspace-one
In VMware Carbon Black Cloud, which two of these statements are true of the Permissions section of
the Prevention tab under Policies? (Choose two.)
A, D
Which three are VMware Workspace ONE SDK capabilities? (Choose three.)
A, C, D
Explanation:
Reference:
https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/VMware-Workspace-ONE-SDK-for-iOS-(Swift)/GUID-AWT-KS-SDK-IOSSWIFT-CAPABILITIES.html
Which attack technique probes the environment for openings on devices or the firewall?
A
In VMware Carbon Black Cloud, what is the search field you would use when searching for a
command line?
D
Reference:
https://docs.vmware.com/en/VMware-Carbon-Black-Cloud/services/carbon-black-cloud-
user-guide.pdf
(29)
DRAG DROP
Match each Workspace ONE Intelligence Security Risk Module tab on the left with its description on
the right by dragging the tabs name into the correct box.
In a Workspace ONE deployment, Per App Tunnel uses the Native Platform API for which platforms?
A
Explanation:
Reference:
https://techzone.vmware.com/deploying-vmware-workspace-one-tunnel-workspace-
one-operational-tutorial#_1223703
If the Compromised Protection switch is enabled in Workspace ONE UEM, what is the expected
behavior on compromised devices in the environment?
D
In VMware Carbon Black Cloud, which reputations have the highest priority during analysis?
B
What is one of the limitations of traditional Antivirus when compared to Next Generation Antivirus?
B
Explanation:
Reference:
https://cipher.com/blog/next-generation-antivirus-ngav-vs-traditional-subscription-
antivirus/
Which three are components of the NSX-T Software-defined Firewall? (Choose three.)
A, D, E
Reference:
https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/products/nsx/vmware-
nsx-datasheet.pdf