VMware 2V0-81.20 Exam Questions
Professional VMware Security (Page 2 )

Updated On: 24-Feb-2026

Which file can be used to validate repcli authentication was enabled for Carbon Black Cloud?

  1. C:\Program Files\Confer\repcii.ini
  2. C:\Program Files\Confer\config.ini
  3. C:\Program Files\Confer\cfg.ini
  4. C:\Program Files\Confer\cli.ini

Answer(s): A


Reference:

https://community.carbonblack.com/t5/Knowledge-Base/Carbon-Black-Cloud-How-to-Enable-RepCLI-Authentication-on/ta-p/70393



Which is the correct Distinguished Name for connecting NSX-T Data Center to Active Directory, if your directory name is corp. local?

  1. corp. local
  2. DC=corp. local
  3. DC=corp, DC=local
  4. DC=local, DC=corp

Answer(s): C


Reference:

https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-8B60D22B-3119-48F6-AEAE-AE27A9372189.html



What are two valid time limit selections when creating a Last Seen compliance policy in Workspace ONE UEM? (Choose two.)

  1. Hours
  2. Minutes
  3. Days
  4. Weeks
  5. Months

Answer(s): B,C


Reference:

https://www.niap-ccevs.org/MMO/Product/st_vid11026-aar.pdf (47)



Which is true about Time-Based Firewall Policy rules?

  1. Time-Based policy rules apply only to the NSX Distributed Firewall.
  2. Time-Based policy rules apply to the NSX Gateway and Distributed Firewall.
  3. Time-Based policy rules can only be used one time for NSX Gateway Firewall.
  4. Time-Based policy rules apply only to the NSX Gateway Firewall.

Answer(s): B


Reference:

https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID- 8572496EA60E-48C3-A016-4A081AC80BE7.html



An administrator found an unwanted/untrusted application running in their environment.
What is the most efficient way of preventing the unwanted application from running and stopping any existing instances in Carbon Black Cloud?

  1. Mark the file as a PUP (Potentially Unwanted Program).
  2. Add a rule to each policy for unwanted.exe runs or if running terminate.
  3. Send a delete application request to each machine.
  4. Add the unwanted files hash to the company banned list.

Answer(s): D


Reference:

https://community.carbonblack.com/gbouw27325/attachments/gbouw27325/product-docsnews/ 3221/1/VMware%20Carbon%20Black%20App%20Control%20User%20Guide%20v8.6.pdf (77)






Post your Comments and Discuss VMware 2V0-81.20 exam dumps with other Community members:

Join the 2V0-81.20 Discussion