What is the default user’s network range when creating a new access policy rule in Workspace ONE Access?

What is the default user’s network range when creating a new access policy rule in Workspace ONE Access?
A . 10.0.0.0/8
B . ALL RANGES
C . 192.168.0.0/16
D . LOCAL SUBNET

Answer: B

Explanation:

Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-Access/20.01/ws1_access_authentication/GUID-3D7AB065-E2ED-4525-B575-2A576BAA3CC3.html

In Workspace ONE UEM, from which menu would you access Workspace ONE Intelligence?

In Workspace ONE UEM, from which menu would you access Workspace ONE Intelligence?
A . Apps & Books
B . General Settings
C . Device
D . Monitor

Answer: D

Explanation:

Reference: https://docs.vmware.com/en/VMware-Workspace-ONE/services/intelligence-documentation/GUID-01_intel_intro.html#:~:text=Access%20Workspace%20ONE%20Intelligence&text=Access %20the%20reports%20by%20navigating,console%2C%20follow%20the%20required%20st eps

Which three default connectors are available in Workspace ONE Intelligence to execute automation actions? (Choose three.)

Which three default connectors are available in Workspace ONE Intelligence to execute automation actions? (Choose three.)
A . ServiceNow
B . vRealize Operations Manager
C . Slack
D . Log Insight
E . Workspace ONE UEM

Answer: A,C,E

Explanation:

Reference: https://docs.vmware.com/en/VMware-Workspace-ONE/services/intelligence-documentation/GUID-21_intel_automations.html

Which three Workspace ONE UEM capabilities are used to configure security policies on Windows 10 desktops? (Choose three.)

Which three Workspace ONE UEM capabilities are used to configure security policies on Windows 10 desktops? (Choose three.)
A . Application Profiles
B . Custom XML
C . Custom Attributes
D . Baselines
E . Native Profiles

Answer: B,C,D

Explanation:

Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/Windows_Desktop_Device_Management/GUID-uemWindeskProfiles.html

Which three are components of the NSX-T Software-defined Firewall? (Choose three.)

Which three are components of the NSX-T Software-defined Firewall? (Choose three.)
A . NSX Distributed IDS
B . NSX Identity Firewall
C . NSX Edge Firewall
D . NSX Intelligence
E . NSX Distributed Firewall
F . NSX Identity Manager

Answer: A,D,E

Explanation:

Reference: https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/products/nsx/vmware-nsx-datasheet.pdf

Whichstatement is true about the firewall rule?

Refer to the exhibit.

Whichstatement is true about the firewall rule?
A . It is a gateway firewall applied to a Tier-0 gateway that drops traffic on port 22
B . It is a distributed firewall applied to App-Services, DB-Servers and Web-Servers that rejects traffic on port 22
C . It is adistributed firewall applied to App-Services, DB-Servers and Web-Servers that drops traffic on port 22
D . It is a gateway firewall applied to a Tier-0 gateway that rejects traffic on port 22

Answer: A

What is the safe course of action for a USB disk of unknown ownership and origin?

What is the safe course of action for a USB disk of unknown ownership and origin?
A . Do not connect the USB to any computer as it may be a USB Killer device
B . Connect the USB device to your computer and allow the DLP software to protect it
C . Connect the USB to a non-Windows device and examine it
D . Connect the USB to an air gapped system and examine it

Answer: D

Explanation:

Reference: https://blogs.vmware.com/vsphere/2020/02/good-security-thrives-in-simplicity.html