Labour Day Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

Note! The 2V0-81.20 Exam is no longer available.

2V0-81.20 Professional VMware Security Questions and Answers

Questions 4

When creating a firewall rule in NSX-T Data Center, what are the three valid options in the action column? (Choose three.)

Options:

A.

Drop

B.

Log

C.

Allow

D.

Isolate

E.

Reject

Buy Now
Questions 5

When creating a compliance policy in Workspace ONE UEM, which three of the following options are valid Notify actions? (Choose three.)

Options:

A.

Send SMS to Device

B.

Send Push Notification to Device

C.

Voice Call to User

D.

Send Email to User

E.

SMS to Manager

Buy Now
Questions 6

As an IT administrator, you want to prevent users from launching a protected SaaS web application when they are not connected to the internal LAN. The application is federated with Workspace ONE Access.

What can be configured to prevent the application from launching?

Options:

A.

Access Policy

B.

IdP Response

C.

SAML Attribute

D.

Authentication Method

Buy Now
Questions 7

What is the correct sequence of options when creating a new compliance policy in Workspace ONE UEM?

Options:

A.

Actions, Assignment, Rules, Summary

B.

Rules, Actions, Assignment, Summary

C.

Assignment, Rules, Actions, Summary

D.

Rules, Assignment, Actions, Summary

Buy Now
Questions 8

Which is true about Time-Based Firewall Policy rules?

Options:

A.

Time-Based policy rules apply only to the NSX Distributed Firewall.

B.

Time-Based policy rules apply to the NSX Gateway and Distributed Firewall.

C.

Time-Based policy rules can only be used one time for NSX Gateway Firewall.

D.

Time-Based policy rules apply only to the NSX Gateway Firewall.

Buy Now
Questions 9

What is the purpose of Flow Statistics in an NSX-T Data Center firewall rule?

Options:

A.

It is a toggle for turning on NETFLOW monitoring for a particular firewall rule.

B.

It is a read-only field that displays the byte, packet count, and sessions.

C.

It is a toggle for disabling display of the byte, packet count, and sessions.

D.

It is a read-only field that displays any NETFLOW traffic analysis.

Buy Now
Questions 10

Which three statements are correct for Active Directory integration with Identity Firewalls (IDFW) in an NSX-T Data Center deployment? (Choose three.)

Options:

A.

The IDFW can be used on both physical and virtual servers as long as supported operating system is installed.

B.

The Thin Agent must be enabled in VMWare tools as it is not enabled by default.

C.

The IDFW can be used for Virtual Desktops (VDI) or Remote desktop sessions (RDSH support).

D.

Identity-based groups can be used as the source or destination in DFW rules.

E.

User identity information is provided by the NSX Guest Introspection Thin Agent.

Buy Now
Exam Code: 2V0-81.20
Exam Name: Professional VMware Security
Last Update: Dec 11, 2023
Questions: 70