DRAG DROP
Drag and drop the Cyber Kill events on the left into their proper sequential order on the right.
Select and Place:
Refer to the exhibit.
From the VMware Carbon Black Cloud console, what page do you go to after clicking the Non-Malware bar in the Potentially Suspicious Activity chart?
A. Notifications page with the selected alert filtered
B. Reputations page with the selected reputation filtered
C. Investigate page with the selected reputation filtered
D. Alerts page with the selected alert filtered
Which four alert filters are available in the VMware Carbon Black Cloud Investigate page? (Choose four.)
A. Watchlist
B. Target Value
C. Policy
D. Security Alert List
E. Effective Reputation
F. Alert Severity
What types of hosts are supported for hosting both NSX-T Data Center managers and host transport nodes?
A. vSphere ESXi 6.7U1 or higher, KVM on CentOS Linux
B. vSphere ESXi 6.7U1 or higher, KVM on RHEL 7.6, Ubuntu 18.04.2 LTS
C. vSphere ESXi 6.5, KVM on RHEL 7.6, Ubuntu 18.04.2 LTS
D. vSphere ESXi 6.7U1 or higher, CentOS KVM 7.6, RHEL KVM
What are the four valid options for a Windows compliance rule based on firewall status in a Workspace ONE environment? (Choose four.)
A. Good
B. Snoozed
C. Not Monitored
D. Deferred
E. Bad
F. Poor
Refer to the exhibit.
When attempting to run the recommended query for all Authorized SSH Keys in an organization, you see this view in the console.
Why are you not able to run the query?
A. You must schedule the query first, before you can run the query
B. The policy Windows Endpoints have no devices
C. You need the ‘Use Recommended Query
What is the default user's network range when creating a new access policy rule in Workspace ONE Access?
A. 10.0.0.0/8
B. ALL RANGES
C. 192.168.0.0/16
D. LOCAL SUBNET
In VMware Carbon Black Cloud Endpoint Standard, which items are available in the Event view?
A. Hashes, Reputations
B. Emails, Policies, OS, Locations
C. Connection, IP/Port
D. IDs, Indicators/TTPs
In Workspace ONE UEM, from which menu would you access Workspace ONE Intelligence?
A. Apps and Books
B. General Settings
C. Device
D. Monitor
Which NSX functionality allows technology partners to integrate third-party solutions to examine North-South and East-West network traffic?
A. Guest Introspection
B. Network Introspection
C. Gateway Firewall
D. Distributed Firewall