Which VMware product allows you to query an endpoint like a database?
C
Which three are industry best practices of Zero Trust framework? (Choose three.)
A, C, E
Which three default connectors are available in Workspace ONE Intelligence to execute automation
actions? (Choose three.)
A, C, E
Explanation:
Reference:
https://docs.vmware.com/en/VMware-Workspace-ONE/services/intelligence-documentation/GUID-21_intel_automations.html
Refer to the exhibit.
Which statement is true about the firewall rule?
A
Refer to the exhibit.
From the VMware Carbon Black Cloud console, what page do you go to after clicking the Non-
Malware bar in the Potentially Suspicious Activity chart?
D
Reference:
https://docs.vmware.com/en/VMware-Carbon-Black-Cloud/services/carbon-black-cloud-
user-guide.pdf
(15)
Which four alert filters are available in the VMware Carbon Black Cloud Investigate page? (Choose
four.)
A, B, C, F
Which is a common solution to implement for inbound network attacks?
B
Which two are true about a VMware Service-defined Firewall? (Choose two.)
A, E
Which of the following is true about VMware Carbon Black Cloud Enterprise EDR watchlists?
D
Reference:
https://docs.vmware.com/en/VMware-Carbon-Black-
EDR/7.5/VMware%20Carbon%20Black%20EDR%207.5%20User%20Guide.pdf
A technician has been asked to confirm a specific browser extension does not exist on any endpoint
in their environment.
Which is the VMware Carbon Black tool to use for this task?
A