Which four alert filters are available in the VMware Carbon Black Cloud Investigate page? (Choose four.)
A. Watchlist
B. Target Value
C. Policy
D. Security Alert List
E. Effective Reputation
F. Alert Severity
Which two are true about a VMware Service-defined Firewall? (Choose two.)
A. A firewall that allows you to use 3rd party features like IDS/IPS, threat protection, anti-bot, and anti-virus solutions
B. A firewall that blocks external access into your internal network based on IP services
C. A firewall that enforces policy for North-South traffic
D. A firewall that is auto scalable as new workloads are deployed
E. A firewall that provides East-West protection between internal applications
Which three Workspace ONE UEM capabilities are used to configure security policies on Windows 10 desktops? (Choose three.)
A. Application Profiles
B. Custom XML
C. Custom Attributes
D. Baselines
E. Native Profiles
What is the safe course of action for a USB disk of unknown ownership and origin?
A. Do not connect the USB to any computer as it may be a USB Killer device
B. Connect the USB device to your computer and allow the DLP software to protect it
C. Connect the USB to a non-Windows device and examine it
D. Connect the USB to an air gapped system and examine it
When considering the Device Details page in Workspace ONE UEM, what three sub menus can you check for changes in compliance? (Choose three.)
A. Profiles
B. Troubleshooting
C. Updates
D. Status History
E. Compliance
What is a unique benefit of Next Generation Antivirus over standard Antivirus?
A. signature based heuristics
B. predictive analytics
C. file based heuristics
D. reactive analytics
In Workspace ONE Intelligence, which of the following is a role that can be assigned to an administrator account?
A. Super User
B. Helpdesk
C. Read-only
D. Automater
In Workspace ONE UEM, from which menu would you access Workspace ONE Intelligence?
A. Apps and Books
B. General Settings
C. Device
D. Monitor
An organization using VMware Carbon Black makes use of an unsigned third party application that is critical to business function. Unfortunately, the application has a reputation of Potentially Unwanted Program and is prevented from running based on the policy.
What Approved list mechanism will allow this application to run in your environment while maintaining the most secure posture?
A. MD5 Hash based
B. Certs based
C. IT Tools based
D. SHA-256 Hash based
When filtering firewall rules after selecting an object to filter by, which four columns does the filter search? (Choose four.)
A. Services
B. Action
C. Protocol
D. Log
E. Applied To
F. Source
G. Destinations