An administrator found an unwanted/untrusted application running in their environment.
What is the most efficient way of preventing the unwanted application from running and stopping any
existing instances in Carbon Black Cloud?
A. Mark the file as a PUP (Potentially Unwanted Program).
B. Add a rule to each policy for unwanted.exe runs or if running terminate.
C. Send a delete application request to each machine.
D. Add the unwanted files hash to the company banned list.
When creating a firewall rule in NSX-T Data Center, what are the three valid options in the action column? (Choose three.)
A. Drop
B. Log
C. Allow
D. Isolate
E. Reject
An administrator is trying to secure Workspace ONE components with firewall rules.
What port does the administrator need to allow for communication between the UEM Console Server and
the UEM Database Server?
A. 443
B. 3389
C. 445
D. 1433
In a Workspace ONE deployment, which three are valid pre-configured sources for creating a baseline with the Baseline Wizard? (Choose three.)
A. GPO Connector
B. Registry File Import
C. Windows Security Baseline
D. CIS Benchmarks
E. Custom Baseline
A company has deployed a new application. Users are complaining they cannot connect. The
administrator suspects there is an issue with the Distributed Firewall (DFW).
What three steps can be taken to troubleshoot the DFW? (Choose three.)
A. The administrator should confirm that SLOT 2, which is used by the DFW, is configured under the vNICs of the VMs.
B. The administrator should configure vRealize Log Insight using the Insight agent as the type and review the DFW rule logs in vRealize Log Insight.
C. The administrator should confirm if the DFW rule is set to log, and then look on the hypervisor where the VMs reside and look at logs at /var/log/dfwpktlogs.log.
D. The administrator should verify firewall rules exist to permit traffic and verify the hit counters are increasing.
E. The administrator should configure vRealize Log Insight using syslog as the type and review the DFW rule logs in vRealize Log Insight.
A security administrator receives an error with code 1001 while configuring a time-based firewall rule on an
ESXi host.
Which two actions can resolve the problem? (Choose two.)
A. restarting the NSX firewall kernel module on the ESXi host
B. restarting the NTP service on the ESXi host
C. configuring the ESXi host with a remote NTP server
D. configuring the ESXi host with a local NTP server
E. reinstalling the NSX modules on the ESXi host
What are the three types of NSX-T Data Center installation workflows? (Choose three. )
A. NSX-T for Bare Metal
B. NSX-T for OpenBox
C. NSX-T for VxRail
D. NSX-T for Hyper-V
E. NSX-T for KVM
F. NSX-T for vSphere
What traffic type is used to create an NSX Transport Zone to connect to the physical infrastructure?
A. Trunk
B. Vlan
C. Underlay
D. Overlay
Which are two use cases for NSX Intelligence? (Choose two.)
A. Perform day 2 network operations and troubleshooting.
B. Provide end-to-end network visibility for physical, virtual, and third-party environments.
C. Identify security vulnerabilities and automatically quarantine affected workloads.
D. Gain insight about micro-segmentation traffic flows.
E. Simplify rule recommendation and deployment.
What is the number of NSX managers that can be deployed in a NSX-T Data Center production environment?
A. a single NSX Manager and three NSX Controllers
B. a NSX Management Cluster of three Managers and a NSX Controllers Cluster of three Controllers
C. a single NSX Management Cluster of three Managers which includes the NSX Controller function
D. a single NSX Manager and a single NSX Controller