A company needs to secure their endpoints using VMware and implement multi-factor authentication. Which feature should they enable?
ASecurity Awareness Training
BDevice Control
CUser Authentication Policies
DFirewall Rules
Explanation
User Authentication Policies enables multi-factor authentication; others do not provide this function.
Q102
What happens when a security policy is set to 'block' for a specific application in VMware?
AApplication is allowed but monitored
BApplication is entirely disabled
CApplication performance is throttled
DApplication is flagged for review
Explanation
An application set to 'block' is entirely disabled; others describe different scenarios.
Q103
Which service provides real-time threat detection in VMware?
AVMware Carbon Black Cloud
BVMware vSphere
CVMware Workstation
DVMware Horizon
Explanation
VMware Carbon Black Cloud offers real-time threat detection, while the others serve different purposes like virtualization or desktop management.
Q104
A company needs to enforce endpoint compliance policies. What solution fits best?
AVMware Workspace ONE
BVMware NSX
CVMware vSAN
DVMware App Volumes
Explanation
VMware Workspace ONE is designed for endpoint compliance, while the others focus on network security, storage, and application delivery.
Q105
What happens when a file is flagged by the containment feature in VMware Carbon Black?
AFile is deleted immediately
BFile is isolated from the system
CFile becomes read-only
DFile requires admin password
Explanation
Containing a file isolates it to prevent harm, while the other options are not typical containment actions.
Q106
Which service ensures integrity of file system changes in VMware?
AFile Integrity Monitoring
BVMware vCenter Server
CApp Volume Management
DNSX-T Network Security
Explanation
File Integrity Monitoring checks changes effectively; others provide different functions.
Q107
A company needs to protect its virtual machines from ransomware. What feature should they enable?
AVMware Backup and Restore
BHost-based Intrusion Detection
CApplication Awareness
Explanation
Host-based Intrusion Detection directly protects VMs; others do not focus on active threats.
Q108
You are configuring endpoint security. What happens when a device is flagged as non-compliant?
AIt remains active without restrictions.
BIt is automatically quarantined.
CIt receives a notification only.
DIt may be subject to access restrictions.
Explanation
Non-compliant devices typically face restricted access, offering some operational oversight.
Q109
Which service does VMware Carbon Black primarily provide?
AEndpoint threat detection and response
BNetwork load balancing
CCloud storage management
DVirtual machine orchestration
Explanation
Carbon Black focuses on endpoint security, while others do not.
Q110
You are configuring endpoint security policies. What is the first step?
AAnalyze existing security risks
BDeploy agents on endpoints
CSelect compliance standards
DConfigure network settings
Explanation
Identifying risks is essential before policy creation.