What is the default user’s network range when creating a new access policy rule in Workspace ONE Access?

What is the default user’s network range when creating a new access policy rule in Workspace ONE Access?A . 10.0.0.0/8B . ALL RANGESC . 192.168.0.0/16D . LOCAL SUBNETView AnswerAnswer: B Explanation: Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-Access/20.01/ws1_access_authentication/GUID-3D7AB065-E2ED-4525-B575-2A576BAA3CC3.html

January 10, 2022 No Comments READ MORE +

In Workspace ONE UEM, from which menu would you access Workspace ONE Intelligence?

In Workspace ONE UEM, from which menu would you access Workspace ONE Intelligence?A . Apps & BooksB . General SettingsC . DeviceD . MonitorView AnswerAnswer: D Explanation: Reference: https://docs.vmware.com/en/VMware-Workspace-ONE/services/intelligence-documentation/GUID-01_intel_intro.html#:~:text=Access%20Workspace%20ONE%20Intelligence&text=Access %20the%20reports%20by%20navigating,console%2C%20follow%20the%20required%20st eps

January 10, 2022 No Comments READ MORE +

Which three default connectors are available in Workspace ONE Intelligence to execute automation actions? (Choose three.)

Which three default connectors are available in Workspace ONE Intelligence to execute automation actions? (Choose three.)A . ServiceNowB . vRealize Operations ManagerC . SlackD . Log InsightE . Workspace ONE UEMView AnswerAnswer: A,C,E Explanation: Reference: https://docs.vmware.com/en/VMware-Workspace-ONE/services/intelligence-documentation/GUID-21_intel_automations.html

January 9, 2022 No Comments READ MORE +

Which option would be considered an example of aHardware Based Exploit?

Which option would be considered an example of aHardware Based Exploit?A . SQL InjectionB . Social EngineeringC . Jail BreakingD . Denial of ServiceView AnswerAnswer: C Explanation: Reference: https://www.kaspersky.com/resource-center/definitions/what-is-jailbreaking

January 7, 2022 No Comments READ MORE +

In Workspace ONE Intelligence, which of the following is a role that can be assigned to an administrator account?

In Workspace ONE Intelligence, which of the following is a role that can be assigned to an administrator account?A . Super UserB . HelpdeskC . Read-onlyD . AutomaterView AnswerAnswer: A

January 6, 2022 No Comments READ MORE +

Which three Workspace ONE UEM capabilities are used to configure security policies on Windows 10 desktops? (Choose three.)

Which three Workspace ONE UEM capabilities are used to configure security policies on Windows 10 desktops? (Choose three.)A . Application ProfilesB . Custom XMLC . Custom AttributesD . BaselinesE . Native ProfilesView AnswerAnswer: B,C,D Explanation: Reference: https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/Windows_Desktop_Device_Management/GUID-uemWindeskProfiles.html

January 3, 2022 No Comments READ MORE +

Which three are components of the NSX-T Software-defined Firewall? (Choose three.)

Which three are components of the NSX-T Software-defined Firewall? (Choose three.)A . NSX Distributed IDSB . NSX Identity FirewallC . NSX Edge FirewallD . NSX IntelligenceE . NSX Distributed FirewallF . NSX Identity ManagerView AnswerAnswer: A,D,E Explanation: Reference: https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/products/nsx/vmware-nsx-datasheet.pdf

January 3, 2022 No Comments READ MORE +

Whichstatement is true about the firewall rule?

Refer to the exhibit. Whichstatement is true about the firewall rule?A . It is a gateway firewall applied to a Tier-0 gateway that drops traffic on port 22B . It is a distributed firewall applied to App-Services, DB-Servers and Web-Servers that rejects traffic on port 22C . It is adistributed...

January 3, 2022 No Comments READ MORE +

What is the safe course of action for a USB disk of unknown ownership and origin?

What is the safe course of action for a USB disk of unknown ownership and origin?A . Do not connect the USB to any computer as it may be a USB Killer deviceB . Connect the USB device to your computer and allow the DLP software to protect itC ....

January 1, 2022 No Comments READ MORE +

Which three common mitigations for social engineering attacks? (Choose three.)

Which three common mitigations for social engineering attacks? (Choose three.)A . user trainingB . filtering Email attachmentsC . update Antivirus softwareD . remove applicationsE . blocking execution of suspicious filesView AnswerAnswer: A,C,E

December 31, 2021 No Comments READ MORE +