What is the default user’s network range when creating a new access policy rule in Workspace ONE Access?
What is the default user’s network range when creating a new access policy rule in Workspace ONE Access?A . 10.0.0.0/8B . ALL RANGESC . 192.168.0.0/16D . LOCAL SUBNETView AnswerAnswer: B Explanation: Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-Access/20.01/ws1_access_authentication/GUID-3D7AB065-E2ED-4525-B575-2A576BAA3CC3.html
In Workspace ONE UEM, from which menu would you access Workspace ONE Intelligence?
In Workspace ONE UEM, from which menu would you access Workspace ONE Intelligence?A . Apps & BooksB . General SettingsC . DeviceD . MonitorView AnswerAnswer: D Explanation: Reference: https://docs.vmware.com/en/VMware-Workspace-ONE/services/intelligence-documentation/GUID-01_intel_intro.html#:~:text=Access%20Workspace%20ONE%20Intelligence&text=Access %20the%20reports%20by%20navigating,console%2C%20follow%20the%20required%20st eps
Which three default connectors are available in Workspace ONE Intelligence to execute automation actions? (Choose three.)
Which three default connectors are available in Workspace ONE Intelligence to execute automation actions? (Choose three.)A . ServiceNowB . vRealize Operations ManagerC . SlackD . Log InsightE . Workspace ONE UEMView AnswerAnswer: A,C,E Explanation: Reference: https://docs.vmware.com/en/VMware-Workspace-ONE/services/intelligence-documentation/GUID-21_intel_automations.html
Which option would be considered an example of aHardware Based Exploit?
Which option would be considered an example of aHardware Based Exploit?A . SQL InjectionB . Social EngineeringC . Jail BreakingD . Denial of ServiceView AnswerAnswer: C Explanation: Reference: https://www.kaspersky.com/resource-center/definitions/what-is-jailbreaking
In Workspace ONE Intelligence, which of the following is a role that can be assigned to an administrator account?
In Workspace ONE Intelligence, which of the following is a role that can be assigned to an administrator account?A . Super UserB . HelpdeskC . Read-onlyD . AutomaterView AnswerAnswer: A
Which three Workspace ONE UEM capabilities are used to configure security policies on Windows 10 desktops? (Choose three.)
Which three Workspace ONE UEM capabilities are used to configure security policies on Windows 10 desktops? (Choose three.)A . Application ProfilesB . Custom XMLC . Custom AttributesD . BaselinesE . Native ProfilesView AnswerAnswer: B,C,D Explanation: Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/Windows_Desktop_Device_Management/GUID-uemWindeskProfiles.html
Which three are components of the NSX-T Software-defined Firewall? (Choose three.)
Which three are components of the NSX-T Software-defined Firewall? (Choose three.)A . NSX Distributed IDSB . NSX Identity FirewallC . NSX Edge FirewallD . NSX IntelligenceE . NSX Distributed FirewallF . NSX Identity ManagerView AnswerAnswer: A,D,E Explanation: Reference: https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/products/nsx/vmware-nsx-datasheet.pdf
Whichstatement is true about the firewall rule?
Refer to the exhibit. Whichstatement is true about the firewall rule?A . It is a gateway firewall applied to a Tier-0 gateway that drops traffic on port 22B . It is a distributed firewall applied to App-Services, DB-Servers and Web-Servers that rejects traffic on port 22C . It is adistributed...
What is the safe course of action for a USB disk of unknown ownership and origin?
What is the safe course of action for a USB disk of unknown ownership and origin?A . Do not connect the USB to any computer as it may be a USB Killer deviceB . Connect the USB device to your computer and allow the DLP software to protect itC ....
Which three common mitigations for social engineering attacks? (Choose three.)
Which three common mitigations for social engineering attacks? (Choose three.)A . user trainingB . filtering Email attachmentsC . update Antivirus softwareD . remove applicationsE . blocking execution of suspicious filesView AnswerAnswer: A,C,E