VMware 1V0-81.20 Associate VMware Security Exam

Posted by

EXAM NUMBER : 1V0-81.20
PRODUCT : NSX-T Data Center 3.0, Workspace ONE 20.X, VMware Carbon Black Cloud
EXAM LANGUAGE : English
Associated Certification : VCTA-SEC 2021

EXAM OVERVIEW
The Associate VMware Security exam tests a candidate’s awareness of VMware’s security solution and the candidate’s ability to provide entry level support for the security features of NSX-T Data Center, Workspace ONE, and Carbon Black Cloud.

SCHEDULE EXAM $125

EXAM INFO :
Duration : 120 minutes
Number of Questions : 55
Passing Score : 300
Format: Multiple Choice, Multiple Choice Multiple Selection, Drag and Drop, Matching, Proctored

Passing Score Learn More
*Your exam may contain unscored questions in addition to the scored questions, this is a standard testing practice. You will not know which questions are unscored, your exam results will reflect your performance on the scored questions only.
*VMware exams are scaled on a range from 100-500, with the determined raw cut score scaled to a value of 300.
*Scaled scoring allows for raw scores from different VMware exams to be scaled to a consistent value.
*Raw passing scores differ between VMware exams based on different technologies or different levels of competency.
*A scaled score provides a standard range for test takers and permits direct and fair comparisons of results from one exam form to another.

If a section does not have testable objectives in this version of the exam, it will be noted below, accordingly. The objective numbering may be referenced in your score report at the end of your testing event for further preparation should a retake of the exam be necessary.

Sections Included in this Exam
Section 1 – VMware vSphere Architectures and Technologies
Objective 1.1 – Describe the anatomy and attack surfaces of a cyber attack
Objective 1.1.1 – Describe network based attacks
Objective 1.1.2 – Describe social engineering based attacks
Objective 1.1.3 – Describe hardware based attacks
Objective 1.1.4 – Describe software based attacks
Objective 1.2 – Identify common vulnerabilities of enterprise systems
Objective 1.3 – Explain common cyber-attack mitigation strategies
Objective 1.4 – Explain NSX high level architecture

Section 2 – VMware Products and Solutions

Objective 2.1 – Describe the VMware security vision
Objective 2.2 – Explain Zero-Trust User and device access
Objective 2.3 – Explain Zero-Trust for network security
Objective 2.4 – Describe Service-Defined Firewall
Objective 2.5 – Identify physical and virtual requirements for a defense-in-depth security deployment
Objective 2.5.1 – Identify network security requirements
Objective 2.5.2 – Identify application security requirements
Objective 2.5.3 – Identify endpoint security requirements (Audit & Remediation, EDR, NGAV)
Objective 2.6 – Describe the functionalities of VMware’s security vision
Objective 2.6.1 – Explain the functionality of NSX gateway firewall and distributed firewall
Objective 2.6.2 – Explain the device posture based on network
Objective 2.6.3 – Explain the secure tunnel capabilities with Workspace ONE
Objective 2.6.4 – Explain the endpoint security capabilities of Carbon Black
Objective 2.6.5 – Explain CloudHealth and its role in multi-cloud security solution
Objective 2.7 – Describe the functions of edge firewall, internal firewall, and endpoint protection security mechanisms
Objective 2.8 – Differentiate between Layer 3 firewalls and Layer 7 firewalls
Objective 2.9 – Explain how Workspace ONE UEM facilitates endpoint security
Objective 2.10 – Describe how conditional access and modern authentication enforces security
Objective 2.11 – Explain how Workspace ONE Intelligence can be used to enforce endpoint security
Objective 2.12 – List the features of Workspace ONE Intelligence: RIsk Score, CVE patch remediation, User experience, Intelligence SDK
Objective 2.13 – Differentiate between NGAV and traditional AV
Objective 2.14 – Describe the benefits and use case for Next Generation Anti-virus
Objective 2.15 – Describe the benefits and use case for VMware Carbon Black Cloud Enterprise EDR
Objective 2.16 – Explain the use case for Audit and Remediation
Objective 2.17 -Describe the different response capabilities in the VMware Carbon Black Cloud
Objective 2.18 – Differentiate between the types of reputations seen in the VMware Carbon Black Cloud

Section 3 – There are no testable objectives for this section.
Section 4 – There are no testable objectives for this section.
Section 5 – – There are no testable objectives for this section.
Section 6 – – Administrative and Operational Tasks

Objective 7.1 – Run compliance evaluation in Workspace ONE UEM against enrolled devices
Objective 7.2 – Examine the security violations for enrolled devices
Objective 7.3 – Examine compliance policies in Workspace ONE UEM console
Objective 7.4 – Identify the security factors configured in the access policies from Workspace ONE Access console
Objective 7.5 – Navigate the Workspace ONE Intelligence portal
Objective 7.6 – Interpret the dashboards and widgets in Workspace ONE Intelligence
Objective 7.7 – Use endpoint data collected in Workspace ONE Intelligence to investigate security issues
Objective 7.8 – Navigate the VMware Carbon Black Cloud
Objective 7.9 – Create watchlists in the VMware Carbon Black Cloud to detect threats
Objective 7.10 – Identify appropriate searches in the VMware Carbon Black Cloud
Objective 7.11 – Investigate an alert and describe appropriate response actions in the VMware Carbon Black Cloud
Objective 7.12 – Interpret and explain the impact of Rules in the VMware Carbon Black Cloud
Objective 7.13 – Perform recommended queries in the VMware Carbon Black Cloud
Objective 7.14 – Describe the different mechanisms to Allow-list applications to meet business requirements
Objective 7.15 – Perform device activation/enrollment for VMware devices and applications
Objective 7.16 – Identify preconfigured firewall rules for the NSX Security Tab
Objective 7.17 – Determine firewall rules action
Objective 7.18 – Verify validity of firewall rules

Recommended Courses

VMware Virtual Cloud Network: Core Technical Skills (Coming Soon!)
VMware Digital Workspace: Self-Paced (Coming Soon!)
VMware Carbon Black Cloud Audit and Remediation
VMware Carbon Black Cloud Endpoint Standard
VMware Carbon Black Cloud Enterprise EDR

References*

In addition to the recommended courses, item writers used the following references for information when writing exam questions. It is recommended that you study the reference content as you prepare to take the exam, in addition to any recommended training.

QUESTION 1
Which VMware product allows you to query an endpoint like a database?

A. VMware NSX-T Data Center
B. VMware Carbon Black Audit & Remediation
C. VMware Workspace ONE UEM
D. VMware Carbon Black Endpoint Standard

Answer: C

QUESTION 2
Which three are industry best practices of Zero Trust framework? (Choose three.)

A. Employee machines need to have a passcode profile setup
B. Employee machines on Internal network are trusted and have access to all internal resources
C. Employee machines are checked for compliance before they get access to applications
D. Employees are not required to provide MFA to access internal resources over VPN
E. Employees get access to only the required resources to get their job done

Answer: A,C,E

QUESTION 3
Which four alert filters are available in the VMware Carbon Black Cloud Investigate page? (Choose four.)

A. Watchlist
B. Target Value
C. Policy
D. Security Alert List
E. Effective Reputation
F. Alert Severity

Answer: A,B,C,F

Examkingdom VMware 1V0-81.20 Exam pdf, Certkingdom VMware 1V0-81.20 PDF

MCTS Training, MCITP Trainnig

Best VMware 1V0-81.20 Certification, VMware 1V0-81.20 Training at certkingdom.com

Click to rate this post!
[Total: 0 Average: 0]