Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium VMware 1V0-81.20 Dumps Questions Answers

Page: 1 / 2
Total 55 questions

Associate VMware Security Questions and Answers

Question 1

What are three core characteristics of VMware’s Intrinsic Security solution? (Choose three.)

Options:

A.

integrated

B.

extensible

C.

unified

D.

content-centric

E.

centrally managed

F.

built-in

Buy Now
Question 2

Which is a common solution to implement for inbound network attacks?

Options:

A.

Load Balancer

B.

Firewall

C.

Proxy

D.

Reverse Proxy

Question 3

Drag and drop the Cyber Kill events on the left into their proper sequential order on the right.

Options:

Question 4

Which Workspace ONE feature incorporates network range, device platform, and authentication method into decision making when evaluating an access request from a user?

Options:

A.

Sensors

B.

Compliance Policies

C.

Access Policies

D.

Restriction Profiles

Question 5

Refer to the exhibit.

Whichstatement is true about the firewall rule?

Options:

A.

It is a gateway firewall applied to a Tier-0 gateway that drops traffic on port 22

B.

It is a distributed firewall applied to App-Services, DB-Servers and Web-Servers that rejects traffic on port 22

C.

It is adistributed firewall applied to App-Services, DB-Servers and Web-Servers that drops traffic on port 22

D.

It is a gateway firewall applied to a Tier-0 gateway that rejects traffic on port 22

Question 6

Which three are industry best practices of Zero Trust framework? (Choose three.)

Options:

A.

Employee machines need to have a passcode profile setup

B.

Employee machines onInternal network are trusted and have access to all internal resources

C.

Employee machines are checked for compliance before they get access to applications

D.

Employees are not required to provide MFA to access internal resources over VPN

E.

Employees get access to only the required resources to get their job done

Question 7

Which of the following is true about VMware Carbon Black Cloud Enterprise EDR watchlists?

Options:

A.

They onlyupdate annually

B.

You cannot customize them

C.

They are made up of reports

D.

Each watchlist is user specific

Question 8

When filtering firewall rules after selecting an object to filter by,which four columns does the filter search? (Choose four.)

Options:

A.

Services

B.

Action

C.

Protocol

D.

Log

E.

Applied To

F.

Source

G.

Destinations

Exam Detail
Vendor: VMware
Exam Code: 1V0-81.20
Last Update: Mar 31, 2025
1V0-81.20 Question Answers
Page: 1 / 2
Total 55 questions