In a Workspace ONE deployment, Per App Tunnel uses the Native Platform API for which platforms?
If the Compromised Protection switch is enabled in Workspace ONE UEM, what is the expected
behavior on compromised devices in the environment?
In VMware Carbon Black Cloud, which reputations have the highest priority during analysis?
What is one of the limitations of traditional Antivirus when compared to Next Generation Antivirus?
Which three are components of the NSX-T Software-defined Firewall? (Choose three.)
A, D, E
An organization using VMware Carbon Black makes use of an unsigned third party application that is
critical to business function. Unfortunately, the application has a reputation of Potentially Unwanted
Program and is prevented from running based on the policy.
What Approved list mechanism will allow this application to run in your environment while
maintaining the most secure posture?
Which NSX functionality allows technology partners to integrate third-party solutions to examine
North-South and East-West network traffic?
Which VMware Carbon Black Cloud function allows an administrator to remotely run commands on
Least Privilege is a common method for minimizing the risk of what kind of threat?
Which VMware application enrolls an endpoint into Workspace ONE?
In Workspace ONE UEM, from which menu would you access Workspace ONE Intelligence?
In Workspace ONE Intelligence, which of the following is a role that can be assigned to an
Which three common mitigations for social engineering attacks? (Choose three.)
A, C, E
Network Security teams can leverage Micro-Segmentation for which purpose?
Which option would be considered an example of a Hardware Based Exploit?