Refer to the exhibit.
From the VMware Carbon Black Cloud console, what page do you go to after clicking the Non-Malware bar in the Potentially Suspicious Activity chart?
A. Notifications page with the selected alert filtered
B. Reputations page with the selected reputation filtered
C. Investigate page with the selected reputation filtered
D. Alerts page with the selected alert filtered
Which three Workspace ONE UEM capabilities are used to configure security policies on Windows 10 desktops? (Choose three.)
A. Application Profiles
B. Custom XML
C. Custom Attributes
D. Baselines
E. Native Profiles
Which two choices are advantages for using baselines in Workspace ONE UEM? (Choose two.)
A. ability to apply a network security standard to a device
B. ability to use industry standard settings to a device
C. ability to apply drive updates to a device
D. ability to apply Windows Update patches to a device
E. ability to audit network security compliance to a device
Refer to the exhibit.
When attempting to run the recommended query for all Authorized SSH Keys in an organization, you see this view in the console.
Why are you not able to run the query?
A. You must schedule the query first, before you can run the query
B. The policy Windows Endpoints have no devices
C. You need the ‘Use Recommended Query
Network Security teams can leverage Micro-Segmentation for which purpose?
A. deny attackers the possibility to breach the data center perimeter
B. deny attackers the opportunity to move laterally within the internal network
C. replace the need to leverage traditional network segmentation
D. prevent a successful attack to any of the systems attached to the network
Which three common mitigations for social engineering attacks? (Choose three.)
A. user training
B. filtering Email attachments
C. update Antivirus software
D. remove applications
E. blocking execution of suspicious files
In Workspace ONE Intelligence, which of the following is a role that can be assigned to an administrator account?
A. Super User
B. Helpdesk
C. Read-only
D. Automater
Which three are components of the NSX-T Software-defined Firewall? (Choose three.)
A. NSX Distributed IDS
B. NSX Identity Firewall
C. NSX Edge Firewall
D. NSX Intelligence
E. NSX Distributed Firewall
F. NSX Identity Manager
Which three are VMware Workspace ONE SDK capabilities? (Choose three.)
A. data loss prevention
B. find my device
C. single sign-on
D. geofencing
E. application blacklist
Which shell command line syntax represents less suspicious danger than the others?
A. sc create
B. -Enc
C. clear
D. net user