In a Workspace ONE deployment, Per App Tunnel uses the Native Platform API for which platforms?
A
Explanation:
Reference:
https://techzone.vmware.com/deploying-vmware-workspace-one-tunnel-workspace-
one-operational-tutorial#_1223703
If the Compromised Protection switch is enabled in Workspace ONE UEM, what is the expected
behavior on compromised devices in the environment?
D
In VMware Carbon Black Cloud, which reputations have the highest priority during analysis?
B
What is one of the limitations of traditional Antivirus when compared to Next Generation Antivirus?
B
Explanation:
Reference:
https://cipher.com/blog/next-generation-antivirus-ngav-vs-traditional-subscription-
antivirus/
Which three are components of the NSX-T Software-defined Firewall? (Choose three.)
A, D, E
Reference:
https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/products/nsx/vmware-
nsx-datasheet.pdf
An organization using VMware Carbon Black makes use of an unsigned third party application that is
critical to business function. Unfortunately, the application has a reputation of Potentially Unwanted
Program and is prevented from running based on the policy.
What Approved list mechanism will allow this application to run in your environment while
maintaining the most secure posture?
D
Reference:
https://community.carbonblack.com/gbouw27325/attachments/gbouw27325/product-
docs-news/3221/1/VMware%20Carbon%20Black%20App%20Control%20User%20Guide%20v8.6.pdf
Which NSX functionality allows technology partners to integrate third-party solutions to examine
North-South and East-West network traffic?
B
Which VMware Carbon Black Cloud function allows an administrator to remotely run commands on
protected endpoints?
A
Reference:
https://docs.vmware.com/en/VMware-Carbon-Black-Cloud/services/carbon-black-cloud-
user-guide.pdf
(26)
Least Privilege is a common method for minimizing the risk of what kind of threat?
A
Reference:
https://www.beyondtrust.com/blog/entry/what-is-least-privilege
Which VMware application enrolls an endpoint into Workspace ONE?
D
Explanation:
Reference:
https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/Windows_Desktop_Device_Management/GUID-uemWindeskDeviceEnrollment.html
In Workspace ONE UEM, from which menu would you access Workspace ONE Intelligence?
D
Explanation:
Reference:
https://docs.vmware.com/en/VMware-Workspace-ONE/services/intelligence-documentation/GUID-01_intel_intro.html#:~:text=Access%20Workspace%20ONE%20Intelligence&text=Access%20the%20
reports%20by%20navigating,console%2C%20follow%20the%20required%20steps
In Workspace ONE Intelligence, which of the following is a role that can be assigned to an
administrator account?
A
Which three common mitigations for social engineering attacks? (Choose three.)
A, C, E
Network Security teams can leverage Micro-Segmentation for which purpose?
B
Which option would be considered an example of a Hardware Based Exploit?
C
Reference:
https://www.kaspersky.com/resource-center/definitions/what-is-jailbreaking