VMware 2V0-81.20 Exam
Professional VMware Security (Page 4 )

Updated On: 1-Feb-2026

Which three options are valid unattended installation options for Carbon Black Cloud Sensors? (Choose three.)

  1. UPDATESOURCE=
  2. GROUP_NAME=
  3. LICENSE_CODE=
  4. COMPANY_CODE=
  5. AUTO_UPDATE=

Answer(s): B,D,E


Reference:

https://community.carbonblack.com/t5/Knowledge-Base/Carbon-Black-Cloud-How-to-Perform-an-Unattended-Installation-of/ta-p/65874



Which two are features of a hybrid cloud model for networking and security when using NSX-T Data Center and VMware NSX Cloud? (Choose two.)

  1. NSX Data Center provides consistent logical networking and security across protected and recovery sites.
  2. NSX Data Center supports Layer 2 VPN between an NSX Edge and a Direct Connect Gateway.
  3. NSX Data Center and VMware NSX Cloud stretch Layer 2 domains between public clouds using the Geneve overlay.
  4. NSX Data Center supports secure, encrypted user access to private corporate applications (SSL VPN).
  5. NSX Data Center supports remote sites (IPsec VPN) with optional VPN gateways or hardware routers from other vendors.

Answer(s): A,E


Reference:

https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/products/nsx/vmware- nsxdatasheet.pdf



In a Workspace ONE deployment, which three are valid pre-configured sources for creating a baseline with the Baseline Wizard? (Choose three.)

  1. GPO Connector
  2. Registry File Import
  3. Windows Security Baseline
  4. CIS Benchmarks
  5. Custom Baseline

Answer(s): C,D,E


Reference:

https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/Windows_Desktop_Device_Management/GUID-uemWindeskUsingBaselines.html



A company has deployed a new application. Users are complaining they cannot connect. The administrator suspects there is an issue with the Distributed Firewall (DFW).
What three steps can be taken to troubleshoot the DFW? (Choose three.)

  1. The administrator should confirm that SLOT 2, which is used by the DFW, is configured under the vNICs of the VMs.
  2. The administrator should configure vRealize Log Insight using the Insight agent as the type and review the DFW rule logs in vRealize Log Insight.
  3. The administrator should confirm if the DFW rule is set to log, and then look on the hypervisor where the VMs reside and look at logs at /var/log/dfwpktlogs.log.
  4. The administrator should verify firewall rules exist to permit traffic and verify the hit counters are increasing.
  5. The administrator should configure vRealize Log Insight using syslog as the type and review the DFW rule logs in vRealize Log Insight.

Answer(s): C,D,E



A consulting security firm was hired to inspect your infrastructure for vulnerabilities. The firm inspected these items:

-badge readers to enter the datacenter locks on server racks
-security cameras in the datacenter

What type of infrastructure are they inspecting?

  1. Virtual Infrastructure
  2. Physical Infrastructure
  3. Personnel Infrastructure
  4. Logical Infrastructure

Answer(s): B


Reference:

https://nces.ed.gov/pubs98/safetech/chapter5.asp



Viewing page 4 of 15
Viewing questions 16 - 20 out of 70 questions



Post your Comments and Discuss VMware 2V0-81.20 exam prep with other Community members:

Join the 2V0-81.20 Discussion