DRAG DROP
Match each Workspace ONE Intelligence Security Risk Module tab on the left with its description on the right by dragging the tab's name into the correct box.
Select and Place:
Refer to the exhibit.
Which statement is true about the firewall rule?
A. It is a gateway firewall applied to a Tier-0 gateway that drops traffic on port 22
B. It is a distributed firewall applied to App-Services, DB-Servers and Web-Servers that rejects traffic on port 22
C. It is a distributed firewall applied to App-Services, DB-Servers and Web-Servers that drops traffic on port 22
D. It is a gateway firewall applied to a Tier-0 gateway that rejects traffic on port 22
Which would require a Layer 7 Firewall?
A. block a specific port
B. block a subnet range
C. block a host
D. block a specific application
What is the safe course of action for a USB disk of unknown ownership and origin?
A. Do not connect the USB to any computer as it may be a USB Killer device
B. Connect the USB device to your computer and allow the DLP software to protect it
C. Connect the USB to a non-Windows device and examine it
D. Connect the USB to an air gapped system and examine it
When considering the Device Details page in Workspace ONE UEM, what three sub menus can you check for changes in compliance? (Choose three.)
A. Profiles
B. Troubleshooting
C. Updates
D. Status History
E. Compliance
In VMware Carbon Black Cloud Endpoint Standard, which items are available in the Event view?
A. Hashes, Reputations
B. Emails, Policies, OS, Locations
C. Connection, IP/Port
D. IDs, Indicators/TTPs
Which VMware application enrolls an endpoint into Workspace ONE?
A. Workspace ONE Web
B. CB Defense Sensor
C. VMware Horizon Client
D. Workspace ONE Intelligent Hub
Which three are components of the NSX-T Software-defined Firewall? (Choose three.)
A. NSX Distributed IDS
B. NSX Identity Firewall
C. NSX Edge Firewall
D. NSX Intelligence
E. NSX Distributed Firewall
F. NSX Identity Manager
What is one of the limitations of traditional Antivirus when compared to Next Generation Antivirus?
A. Traditional AV does not need a client installed on the machines to function
B. Traditional AV focuses on signature or definition based threats
C. Traditional AV requires integration with a SIEM to use the next generation features
D. Traditional AV does not provide a dashboard
Which three are VMware Workspace ONE SDK capabilities? (Choose three.)
A. data loss prevention
B. find my device
C. single sign-on
D. geofencing
E. application blacklist