2V0-81.20試験無料問題集「VMware Professional VMware Security 認定」

When creating a new Identity Provider (IdP) in Workspace ONE Access, which two methods are used to identify users? (Choose two.)

In what order are NSX-T Distributed Firewall rules processed?

An administrator is trying to secure Workspace ONE components with firewall rules.
What port and protocol does the administrator need to allow for Secure LDAP to Active Directory?

In an NSX-T Data Center deployment, micro-segmentation via security policies is accomplished using which component?

What are two valid time limit selections when creating a Last Seen compliance policy in Workspace ONE UEM? (Choose two.)

Which would be a cause for a device being flagged as compromised in the Workspace ONE UEM dashboard?

In a Workspace ONE deployment, what two commands are available for a Windows policy when sending a command action as part of a compliance policy? (Choose two.)