Which file can be used to validate repcli authentication was enabled for Carbon Black Cloud?
A. C:\Program Files\Confer\repcii.ini
B. C:\Program Files\Confer\config.ini
C. C:\Program Files\Confer\cfg.ini
D. C:\Program Files\Confer\cli.ini
What are two valid time limit selections when creating a Last Seen compliance policy in Workspace ONE UEM? (Choose two.)
A. Hours
B. Minutes
C. Days
D. Weeks
E. Months
In a Carbon Black Cloud deployment, which two are recommended troubleshooting steps for Live Response not working? (Choose two.)
A. Restart the Live Response Service three times to autocorrect.
B. Ensure a duplicate Live Response session does not exist.
C. Confirm Live Response is enabled in Sensor Policy settings.
D. Ensure the account has RBAC permission for Live Response.
E. Confirm the Live Response timeline spans the search window.
Which is the built-in two factor authentication method in Workspace ONE Access?
A. VMware Verify
B. VMware SMS
C. VMware Auth
D. VMware Push
Refer to the exhibit.
What command was run on the NSX Edge node to pull this information?
A. get tunnel-ID
B. show vteps
C. get vteps
D. list vteps
When designing NSX-T for high availability with Layer 2 adjacency, what is the recommended number of NSX Managers that should be deployed?
A. 2 NSX Managers deployed using a load balancer
B. 1 NSX Manager using vSphere for high availability
C. 3 NSX Managers using a VIP address for Management
D. 2 NSX Managers using a VIP address for Management
When creating a firewall rule in NSX-T Data Center, what are the three valid options in the action column? (Choose three.)
A. Drop
B. Log
C. Allow
D. Isolate
E. Reject
In a Workspace ONE deployment, what two commands are available for a Windows policy when sending a command action as part of a compliance policy? (Choose two.)
A. Device Wipe
B. Enterprise Wipe
C. Apply Baseline
D. Apply Profile
E. Request Device Checkin
Which three options are used to automate patch remediation based on CVEs for Windows devices using Workspace ONE Intelligence? (Choose three.)
A. Use Workspace ONE UEM console to approve patches.
B. Create Automated remediation based on Risk score.
C. Create automated remediation based on CVE vulnerabilities.
D. Identify vulnerable devices across the entire environment based on CVE information.
E. Create a dashboard to track CVE remediation.
What traffic type is used to create an NSX Transport Zone to connect to the physical infrastructure?
A. Trunk
B. Vlan
C. Underlay
D. Overlay