Which would be a cause for a device being flagged as compromised in the Workspace ONE UEM dashboard?
A. Device was stolen.
B. Device was lost.
C. Device was damaged.
D. Device was jailbroken.
Where in the NSX UI does an administrator add an Active Directory Domain?
A. Go to System > Configuration > Identity Firewall AD > ADD ACTIVE DIRECTORY
B. Go to Inventory > Configuration > Identity Firewall AD > ADD ACTIVE DIRECTORY
C. Go to Home > Configuration > Identity Firewall AD > ADD ACTIVE DIRECTORY
D. Go to Security > Configuration > Identity Firewall AD > ADD ACTIVE DIRECTORY
An administrator is updating NSX Distributed Firewall rules. The administrator did the Publish a few
minutes ago and is now receiving calls about lost connections. The administrator has decided to roll-back
the configuration.
Where can the administrator see past saved configurations to perform the rollback?
A. Go to System > Distributed Firewall > Configurations > View
B. Go to Security > Distributed Firewall > ACTIONS > Configurations - View
C. Go to System > Distributed Firewall > Rolling back > View
D. Go to Inventory > Distributed Firewall > ACTIONS > Configurations - View
An administrator is trying to secure Workspace ONE components with firewall rules.
What port and protocol does the administrator need to allow for Secure LDAP to Active Directory?
A. 389/TCP
B. 3389/TCP
C. 636/TCP
D. 1433/TCP
Which three statements are correct for Active Directory integration with Identity Firewalls (IDFW) in an NSX-T Data Center deployment? (Choose three.)
A. The IDFW can be used on both physical and virtual servers as long as supported operating system is installed.
B. The Thin Agent must be enabled in VMWare tools as it is not enabled by default.
C. The IDFW can be used for Virtual Desktops (VDI) or Remote desktop sessions (RDSH support).
D. Identity-based groups can be used as the source or destination in DFW rules.
E. User identity information is provided by the NSX Guest Introspection Thin Agent.
In a Workspace ONE deployment, what two commands are available for a Windows policy when sending a command action as part of a compliance policy? (Choose two.)
A. Device Wipe
B. Enterprise Wipe
C. Apply Baseline
D. Apply Profile
E. Request Device Checkin
Which two options are available for Windows Update Source when creating a Windows Profile for patch management in a Workspace ONE deployment? (Choose two.)
A. VMware Update Manager
B. Microsoft Update Service
C. VMware Update Service
D. Cloud Update Service
E. WSUS
When creating a firewall rule in NSX-T Data Center, what are the three valid options in the action column? (Choose three.)
A. Drop
B. Log
C. Allow
D. Isolate
E. Reject
An administrator is trying to create a new access policy rule in Workspace ONE Access. Which two options are available when creating this new access policy rule. (Choose two.)
A. Device OS Version
B. Network Range
C. Compliance State
D. Device Ownership
E. Authentication Method
What is the purpose of Flow Statistics in an NSX-T Data Center firewall rule?
A. It is a toggle for turning on NETFLOW monitoring for a particular firewall rule.
B. It is a read-only field that displays the byte, packet count, and sessions.
C. It is a toggle for disabling display of the byte, packet count, and sessions.
D. It is a read-only field that displays any NETFLOW traffic analysis.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only VMware exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 2V0-81.20 exam preparations and VMware certification application, do not hesitate to visit our Vcedump.com to find your solutions here.