In an NSX-T Data Center deployment, micro-segmentation via security policies is accomplished using
which component?
D
Reference:
https://infohub.delltechnologies.com/l/vmware-cloud-foundation-on-dell-emc-
vxrail/vmware-sddc-vision-
6#:~:text=NSX%20micro%2Dsegmentation%20is%20a,all%20hosts%20in%20the%20environment
Which are two use cases for NSX Intelligence? (Choose two.)
C, D
As an IT administrator, you want to prevent users from launching a protected SaaS web application
when they are not connected to the internal LAN. The application is federated with Workspace ONE
Access.
What can be configured to prevent the application from launching?
A
Reference:
https://docs.vmware.com/en/VMware-Workspace-ONE-Access/19.03/com.vmware.wsp-resource/GUID-57B66680-A118-47DD-B3A3-81EAD6D6CAA7.html
In what order are NSX-T Distributed Firewall rules processed?
D
Reference:
https://docs.vmware.com/en/VMware-NSX-T-Data-Center/2.3/com.vmware.nsxt.admin.doc/GUID-22DF2616-8B3F-4E13-8116-B7501D2A8E6D.html
An administrator works for a company that supplies iOS devices to its employees. The administrator
is notified there is a security vulnerability with the latest version of iOS. The administrator must
prevent users from updating devices immediately. The administrator implements a device profile to
configure the updates payload and prevent the devices from detecting the update.
How long can devices be prevented from accessing the update from Apple?
A
Reference:
https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/iOS_Platform/GUID-OSMgmt.html
Which three tasks are completed during the installation of NSX-T Data Center Workflow for vSphere?
(Choose three.)
A, B, C
Reference:
https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/installation/GUID-414C33B3-674F-44E0-94B8-BFC0B9056B33.html
In an NSX-T Data Center deployment, when assigning user rights, what right would an administrator
assign to a user to administer security compliance policies?
D
Reference:
https://docs.vmware.com/en/VMware-NSX-Data-Center-for-vSphere/6.4/com.vmware.nsx.admin.doc/GUID-79F9067D-2F29-45DA-85C7-09EFC31549EA.html
When creating a new Identity Provider (IdP) in Workspace ONE Access, which two methods are used
to identify users? (Choose two.)
A, B
Reference:
https://docs.vmware.com/en/VMware-Workspace-ONE-Access/19.03/idm-administrator/GUID-0C459D5A-A0FF-4893-87A0-10ADDC4E1B8D.html
What traffic type is used to create an NSX Transport Zone to connect to the physical infrastructure?
B
Reference:
https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/installation/GUID-F739DC79-4358-49F4-9C58-812475F33A66.html
Which three options are used to automate patch remediation based on CVEs for Windows devices
using Workspace ONE Intelligence? (Choose three.)
C, D, E
Reference:
https://techzone.vmware.com/meeting-security-slas-through-intelligent-patch-
automation-vmware-workspace-one-operational-tutorial#_1089620
An administrator has been asked to install Guest Introspection Thin Agent using VMware Tools on a
Windows 10 VDI solution.
Which statement is correct for enabling the Identity Firewall feature?
B
Reference:
https://docs.vmware.com/en/VMware-NSX-T-Data-Center/2.4/administration/GUID-756EF955-F2C1-47DD-946B-1B5E6DDC7BDA.html
Which statements is true about IPFIX (Internet Protocol Flow Information Export)?
D
Explanation:
When you enable IPFIX, all configured host transport nodes will send IPFIX messages to the IPFIX
collectors using port 3389.
What are the three types of NSX-T Data Center installation workflows? (Choose three. )
A, E, F
A security administrator receives an error with code 1001 while configuring a time-based firewall
rule on an ESXi host.
Which two actions can resolve the problem? (Choose two.)
B, E
Reference:
https://arabitnetwork.files.wordpress.com/2018/12/nsx_64_troubleshooting-
update4.pdf
A consulting security firm was hired to inspect your infrastructure for vulnerabilities.
The firm inspected these items:
badge readers to enter the datacenter
locks on server racks
security cameras in the datacenter
What type of infrastructure are they inspecting?
B
Reference:
https://nces.ed.gov/pubs98/safetech/chapter5.asp