Free 1V0-81.20 Exam Braindumps (page: 5)

Page 4 of 14

VMware’s Intrinsic Security layer includes functionality for which control points?

  1. networks, workloads, endpoints, identity, and clouds
  2. applications, workloads, devices, identity, virtual infrastructure
  3. networks, containers, devices, users, and VMware Cloud
  4. applications, users, networks, data center perimeter, vSphere

Answer(s): A


Reference:

https://www.globalknowledge.com/en-gb/resources/articles/what-is-intrinsic-security



Which three are key features of VMware Carbon Black Cloud Enterprise EDR? (Choose three.)

  1. self-service security remediation
  2. continuous and centralized recording
  3. attack chain visualization and search
  4. live response for remote remediation
  5. frequent Antivirus pattern updates

Answer(s): B,C,D


Reference:

https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmwcb-enterprise-edr-datasheet.pdf (2)



What are three core characteristics of VMware’s Intrinsic Security solution? (Choose three.)

  1. integrated
  2. extensible
  3. unified
  4. content-centric
  5. centrally managed
  6. built-in

Answer(s): A,C,F



What is the safe course of action for a USB disk of unknown ownership and origin?

  1. Do not connect the USB to any computer as it may be a USB Killer device
  2. Connect the USB device to your computer and allow the DLP software to protect it
  3. Connect the USB to a non-Windows device and examine it
  4. Connect the USB to an air gapped system and examine it

Answer(s): D


Reference:

https://blogs.vmware.com/vsphere/2020/02/good-security-thrives-in-simplicity.html






Post your Comments and Discuss VMware 1V0-81.20 exam with other Community members:

1V0-81.20 Exam Discussions & Posts