This page was exported from Latest Exam Prep [ http://certify.vceprep.com ] Export date:Sat Sep 21 11:40:23 2024 / +0000 GMT ___________________________________________________ Title: A fully updated 2022 2V0-81.20 Exam Dumps exam guide from training expert VCEPrep [Q33-Q54] --------------------------------------------------- A fully updated 2022 2V0-81.20 Exam Dumps exam guide from training expert VCEPrep Provides complete coverage of every objective on exam and exam preparation 2V0-81.20 NO.33 In a Workspace ONE environment, which two Risk Indicators are supported on the Windows 10 & MacOS platforms? (Choose two.)  Risky Setting  Compulsive App Download  App Collector  Rare App Collector  Laggard Update NO.34 Which statements is true about IPFIX (Internet Protocol Flow Information Export)?  When you enable IPFIX, all configured host transport nodes will send IPFIX messages to the IPFIX collectors using port 80.  When you enable IPFIX, all configured host transport nodes will send IPFIX messages to the IPFIX collectors using port 3389.  When you enable IPFIX, all configured host transport nodes will send IPFIX messages to the IPFIX collectors using port 443.  When you enable IPFIX, all configured host transport nodes will send IPFIX messages to the IPFIX collectors using port 4739. When you enable IPFIX, all configured host transport nodes will send IPFIX messages to the IPFIX collectors using port 3389.NO.35 Which statement is true about TraceFlow when used in an NSX-T Data Center deployment?  Traceflow mirrors a source port for inspection.  Traceflow allows you to inject a packet into the network and monitor its flow across the network.  Traceflow allows you to perform a traceroute cmd between selected hosts.  Traceflow enables IPFIX forwarding for the selected port. NO.36 What is the correct sequence of options when creating a new compliance policy in Workspace ONE UEM?  Actions, Assignment, Rules, Summary  Rules, Actions, Assignment, Summary  Assignment, Rules, Actions, Summary  Rules, Assignment, Actions, Summary NO.37 Which is true about Time-Based Firewall Policy rules?  Time-Based policy rules apply only to the NSX Distributed Firewall.  Time-Based policy rules apply to the NSX Gateway and Distributed Firewall.  Time-Based policy rules can only be used one time for NSX Gateway Firewall.  Time-Based policy rules apply only to the NSX Gateway Firewall. NO.38 Which three statements are correct for Active Directory integration with Identity Firewalls (IDFW) in an NSX-T Data Center deployment? (Choose three.)  The IDFW can be used on both physical and virtual servers as long as supported operating system is installed.  The Thin Agent must be enabled in VMWare tools as it is not enabled by default.  The IDFW can be used for Virtual Desktops (VDI) or Remote desktop sessions (RDSH support).  Identity-based groups can be used as the source or destination in DFW rules.  User identity information is provided by the NSX Guest Introspection Thin Agent. NO.39 When creating a Windows Update Policy for a Workspace ONE solution, which option allows an administrator to utilize local network traffic only for peer traffic?  use peers on same NAT only  use peers on the same local network domain  simple download mode  use internet peers NO.40 As an IT administrator, you want to prevent users from launching a protected SaaS web application when they are not connected to the internal LAN. The application is federated with Workspace ONE Access.What can be configured to prevent the application from launching?  Access Policy  IdP Response  SAML Attribute  Authentication Method NO.41 Which file can be used to validate repcli authentication was enabled for Carbon Black Cloud?  C:Program FilesConferrepcii.ini  C:Program FilesConferconfig.ini  C:Program FilesConfercfg.ini  C:Program FilesConfercli.ini NO.42 Which two are features of a hybrid cloud model for networking and security when using NSX-T Data Center and VMware NSX Cloud? (Choose two.)  NSX Data Center provides consistent logical networking and security across protected and recovery sites.  NSX Data Center supports Layer 2 VPN between an NSX Edge and a Direct Connect Gateway.  NSX Data Center and VMware NSX Cloud stretch Layer 2 domains between public clouds using the Geneve overlay.  NSX Data Center supports secure, encrypted user access to private corporate applications (SSL VPN).  NSX Data Center supports remote sites (IPsec VPN) with optional VPN gateways or hardware routers from other vendors. NO.43 You are troubleshooting a Carbon Black Cloud Sensor issue.What repcli command will gather the needed logs and package them in a .zip file?  repcli capture  repcli gather  repcli logs  repcli collect NO.44 What traffic type is used to create an NSX Transport Zone to connect to the physical infrastructure?  Trunk  Vlan  Underlay  Overlay NO.45 What is used to establish trust with an identity provider in Workspace ONE Access?  SAML Attribute  SAML Metadata  SAML Context  SAML Request NO.46 An administrator has deployed a new NSX Distributed Firewall rule that allows only TLS 1.2 and TLS 1.3 HTTPS connections. The new rule is working, but TLS 1.0 and TLS 1.1 connections are still occurring.What step is required to enforce the TLS policy restriction?  Configure a Context Profile and select DNS-TCP and DNS-UDP attributes.  Configure a Context Profile and select a FQDN attributes.  Configure a Context Profile and select TLS 1.2 and 1.3 attributes.  Configure a Context Profile and select HTTPS and HTTP attributes. NO.47 Which are two use cases for NSX Intelligence? (Choose two.)  Perform day 2 network operations and troubleshooting.  Provide end-to-end network visibility for physical, virtual, and third-party environments.  Identify security vulnerabilities and automatically quarantine affected workloads.  Gain insight about micro-segmentation traffic flows.  Simplify rule recommendation and deployment. NO.48 Which of the following statements is true about Monitor Port Mirroring Sessions in NSX-T Data Center?  This feature requires a SPAN compliant appliance.  A source mirror port can be in more than one mirror session.  A source mirror port cannot be in more than one mirror session.  This feature requires an IPFIX compliant collector. NO.49 In a Workspace ONE environment, what is the maximum number of days a Windows Feature Update (Windows 10 1703 and above) can be deferred?  7  90  365  30 NO.50 A company has deployed a new application. Users are complaining they cannot connect. The administrator suspects there is an issue with the Distributed Firewall (DFW).What three steps can be taken to troubleshoot the DFW? (Choose three.)  The administrator should confirm that SLOT 2, which is used by the DFW, is configured under the vNICs of the VMs.  The administrator should configure vRealize Log Insight using the Insight agent as the type and review the DFW rule logs in vRealize Log Insight.  The administrator should confirm if the DFW rule is set to log, and then look on the hypervisor where the VMs reside and look at logs at /var/log/dfwpktlogs.log.  The administrator should verify firewall rules exist to permit traffic and verify the hit counters are increasing.  The administrator should configure vRealize Log Insight using syslog as the type and review the DFW rule logs in vRealize Log Insight. NO.51 Where in the NSX UI does an administrator deploy NSX Intelligence?  Go to Plan & Troubleshoot > Configuration > ADD NSX INTELLIGENCE APPLIANCE  Go to Security > Configuration > Appliances > ADD NSX INTELLIGENCE APPLIANCE  Go to System > Configuration > Appliances > ADD NSX INTELLIGENCE APPLIANCE  Go to Home > Configuration > Appliances > ADD NSX INTELLIGENCE APPLIANCE NO.52 A company has just implemented new security guidelines in regards to device management. All iOS devices must now require a passcode to unlock the device.An administrator must implement these requirements:all iOS devices must have a passcodeminimum passcode length of 6 numeralsauto-lock after 2 minutesWhat type of profile in Workspace ONE UEM would the administrator create to accomplish this task?  Compliance Profile  User Profile  Device Profile  Access Profile NO.53 Refer to the exhibit.What command was run on the NSX Edge node to pull this information?  get tunnel-ID  show vteps  get vteps  list vteps NO.54 Which three tasks are completed during the installation of NSX-T Data Center Workflow for vSphere? (Choose three.)  install NSX Edges, then create an NSX Edge cluster  create transport zones and set type to Overlay and VLAN; create host transport nodes and standard or enhanced N-VDS/VDS as needed  install the NSX Manager, configure a compute manager, deploy additional NSX Manager nodes to form a cluster  install NSX Tier-0 or Tier-1 gateways, then create an NSX Edge cluster  create transport zones and set type to VXLAN and VLAN; create host transport nodes and standard or enhanced N-VDS/VDS as needed  Loading … VMware 2V0-81.20 Exam Syllabus Topics: TopicDetailsTopic 1Troubleshoot common physical infrastructure issues Configure access policies in Workspace ONE AccessTopic 2Configure and manage security groups and security policies in NSX-T Configure compliance policies and profiles in Workspace ONE UEMTopic 3Compare and contrast tools available for troubleshooting (vRNI vs NSX Intelligence) Configure and administer identity providers in Workspace ONE AccessTopic 4Administrative and Operational Tasks Deploy CB Defense sensors to endpoints Troubleshoot common Carbon Black issuesTopic 5Troubleshoot common NSX firewall policy issues Configure and manage firewalls rules for NSX-TTopic 6Install and configure Guest Introspection agent components in VMTools Troubleshoot Workspace ONE issues around endpoint security   Tested Material Used To 2V0-81.20: https://www.vceprep.com/2V0-81.20-latest-vce-prep.html --------------------------------------------------- Images: https://certify.vceprep.com/wp-content/plugins/watu/loading.gif https://certify.vceprep.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2022-06-01 23:13:39 Post date GMT: 2022-06-01 23:13:39 Post modified date: 2022-06-01 23:13:39 Post modified date GMT: 2022-06-01 23:13:39