An administrator has added a new ESXi host to a vCenter Server Cluster with NSX-T Data Center
already working. The administrator installed NSX-T Data Center components in the new ESXi. When
the administrator deploys a new VM in the host, connectivity tests good with ping, but SSH session
traffic is erratic. The VDS and NSX-T Data Center configuration is the same as each ESXI in the Cluster,
but only VMs in the new ESXI are having problems.
What should the administrator do to address the problem?
B
Reference:
https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.0/nsxt_30_install.pdf
(144)
Where in the NSX UI does an administrator deploy NSX Intelligence?
C
Reference:
https://docs.vmware.com/en/VMware-NSX-Intelligence/1.2/installation/GUID-45906AC9-7FD7-441E-83F9-E83CC68E8148.html
What is the number of NSX managers that can be deployed in a NSX-T Data Center production
environment?
B
Reference:
https://virtualg.uk/how-to-install-nsx-t-manager-3-
x/#:~:text=Recall%20that%203%20NSX%20Managers,not%20require%20a%20supported%20configu
ration
Users on iOS and Android devices are being prompted for their credentials when accessing an
application protected by Workspace ONE Access.
The current configuration includes:
Workspace ONE UEM is integrated with Workspace ONE Access
Workspace ONE UEM has a Certificate Authority configured
Single sign-on has been enabled through device profiles
What authentication method can be used to allow iOS and Android devices to launch an application
without being prompted for credentials?
C
Reference:
https://darrylmiles.blog/2019/03/16/setting-up-workspace-one-single-sign-on-sso-and-
conditional-access/
When creating a compliance policy in Workspace ONE UEM, which three of the following options are
valid Notify actions? (Choose three.)
A, B, D
Reference:
https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/UEM_Managing_Devices/GUID-CompliancePolicies.html
An administrator has created a security policy from the NSX UI, but the firewall rules are not being
applied to the traffic in the datapath.
Which two actions could be carried out by the administrator to resolve the problem? (Choose two.)
B, C
When creating an NSX-T Data Center Firewall rule to prevent all communication between same
scope objects, what must be true of the first firewall rule?
B
What is used to establish trust with an identity provider in Workspace ONE Access?
B
Reference:
https://docs.vmware.com/en/VMware-Workspace-ONE-Access/20.01/ws1_access_authentication/GUID-0C459D5A-A0FF-4893-87A0-10ADDC4E1B8D.html
In a Workspace ONE environment, what is the maximum number of days a Windows Feature Update
(Windows 10 1703 and above) can be deferred?
C
Reference:
https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/2011/Windows_Desktop_Device_Management/GUID-AWT-PROFILE-WAU-CONFIGWD.html#:~:text=The%20maximum%20number%20of%20days,defer%20up%20to%20365%
20days
A company has just implemented new security guidelines in regards to device management. All iOS
devices must now require a passcode to unlock the device.
An administrator must implement these requirements:
all iOS devices must have a passcode
minimum passcode length of 6 numerals
auto-lock after 2 minutes
What type of profile in Workspace ONE UEM would the administrator create to accomplish this task?
C
Reference:
https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/iOS_Platform/GUID-DeviceMgmtOverview.html
In an NSX-T Data Center deployment, micro-segmentation via security policies is accomplished using
which component?
D
Reference:
https://infohub.delltechnologies.com/l/vmware-cloud-foundation-on-dell-emc-
vxrail/vmware-sddc-vision-
6#:~:text=NSX%20micro%2Dsegmentation%20is%20a,all%20hosts%20in%20the%20environment
Which are two use cases for NSX Intelligence? (Choose two.)
C, D
As an IT administrator, you want to prevent users from launching a protected SaaS web application
when they are not connected to the internal LAN. The application is federated with Workspace ONE
Access.
What can be configured to prevent the application from launching?
A
Reference:
https://docs.vmware.com/en/VMware-Workspace-ONE-Access/19.03/com.vmware.wsp-resource/GUID-57B66680-A118-47DD-B3A3-81EAD6D6CAA7.html
In what order are NSX-T Distributed Firewall rules processed?
D
Reference:
https://docs.vmware.com/en/VMware-NSX-T-Data-Center/2.3/com.vmware.nsxt.admin.doc/GUID-22DF2616-8B3F-4E13-8116-B7501D2A8E6D.html
An administrator works for a company that supplies iOS devices to its employees. The administrator
is notified there is a security vulnerability with the latest version of iOS. The administrator must
prevent users from updating devices immediately. The administrator implements a device profile to
configure the updates payload and prevent the devices from detecting the update.
How long can devices be prevented from accessing the update from Apple?
A
Reference:
https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/iOS_Platform/GUID-OSMgmt.html