In Workspace ONE Intelligence, which two are default components of the security risk dashboard? (Choose two.)
A. Compromised Devices
B. Threats Summary
C. Web Apps
D. Desktop Apps
E. OS Updates
What are the four valid options for a Windows compliance rule based on firewall status in a Workspace ONE environment? (Choose four.)
A. Good
B. Snoozed
C. Not Monitored
D. Deferred
E. Bad
F. Poor
When you share a report in Workspace One Intelligence with a specified user, how is the report shared?
A. Desktop Notification
B. Console Message
C. SMS
D. Email
When considering the Device Details page in Workspace ONE UEM, what three sub menus can you check for changes in compliance? (Choose three.)
A. Profiles
B. Troubleshooting
C. Updates
D. Status History
E. Compliance
What types of hosts are supported for hosting both NSX-T Data Center managers and host transport nodes?
A. vSphere ESXi 6.7U1 or higher, KVM on CentOS Linux
B. vSphere ESXi 6.7U1 or higher, KVM on RHEL 7.6, Ubuntu 18.04.2 LTS
C. vSphere ESXi 6.5, KVM on RHEL 7.6, Ubuntu 18.04.2 LTS
D. vSphere ESXi 6.7U1 or higher, CentOS KVM 7.6, RHEL KVM
When using VMware Carbon Black Live Response, what command will show all active processes?
A. dir
B. list
C. ls
D. ps
What are three core characteristics of VMware's Intrinsic Security solution? (Choose three.)
A. integrated
B. extensible
C. unified
D. content-centric
E. centrally managed
F. built-in
What is the safe course of action for a USB disk of unknown ownership and origin?
A. Do not connect the USB to any computer as it may be a USB Killer device
B. Connect the USB device to your computer and allow the DLP software to protect it
C. Connect the USB to a non-Windows device and examine it
D. Connect the USB to an air gapped system and examine it
Which three are key features of VMware Carbon Black Cloud Enterprise EDR? (Choose three.)
A. self-service security remediation
B. continuous and centralized recording
C. attack chain visualization and search
D. live response for remote remediation
E. frequent Antivirus pattern updates
Which would require a Layer 7 Firewall?
A. block a specific port
B. block a subnet range
C. block a host
D. block a specific application
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only VMware exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 1V0-81.20 exam preparations and VMware certification application, do not hesitate to visit our Vcedump.com to find your solutions here.