In an NSX-T Data Center deployment, micro-segmentation via security policies is accomplished using
Which are two use cases for NSX Intelligence? (Choose two.)
As an IT administrator, you want to prevent users from launching a protected SaaS web application
when they are not connected to the internal LAN. The application is federated with Workspace ONE
What can be configured to prevent the application from launching?
In what order are NSX-T Distributed Firewall rules processed?
An administrator works for a company that supplies iOS devices to its employees. The administrator
is notified there is a security vulnerability with the latest version of iOS. The administrator must
prevent users from updating devices immediately. The administrator implements a device profile to
configure the updates payload and prevent the devices from detecting the update.
How long can devices be prevented from accessing the update from Apple?
Which three tasks are completed during the installation of NSX-T Data Center Workflow for vSphere?
A, B, C
In an NSX-T Data Center deployment, when assigning user rights, what right would an administrator
assign to a user to administer security compliance policies?
When creating a new Identity Provider (IdP) in Workspace ONE Access, which two methods are used
to identify users? (Choose two.)
What traffic type is used to create an NSX Transport Zone to connect to the physical infrastructure?
Which three options are used to automate patch remediation based on CVEs for Windows devices
using Workspace ONE Intelligence? (Choose three.)
C, D, E
An administrator has been asked to install Guest Introspection Thin Agent using VMware Tools on a
Windows 10 VDI solution.
Which statement is correct for enabling the Identity Firewall feature?
Which statements is true about IPFIX (Internet Protocol Flow Information Export)?
When you enable IPFIX, all configured host transport nodes will send IPFIX messages to the IPFIX
collectors using port 3389.
What are the three types of NSX-T Data Center installation workflows? (Choose three. )
A, E, F
A security administrator receives an error with code 1001 while configuring a time-based firewall
rule on an ESXi host.
Which two actions can resolve the problem? (Choose two.)
A consulting security firm was hired to inspect your infrastructure for vulnerabilities.
The firm inspected these items:
badge readers to enter the datacenter
locks on server racks
security cameras in the datacenter
What type of infrastructure are they inspecting?