Associate VMware Security Certification Tests

best practice Tests for Associate VMware Security Certification



Platform: Udemy
Status: Available
Duration: 3 Practice Tests

Price: $54.99 $0.00


Note: Udemy FREE coupon codes are valid for maximum 3 days only. Look for "Get Coupon" orange button at the end of Description. This post may have affiliate link & we may get small commission if you make a purchase.

Notice for Our Visitors in INDIA:
If Udemy Coupon is 100% OFF but it is not FREE when you go to Udemy Website, please follow the below instructions to make it work. This is mainly affecting visitors that has INDIA as a Country of Residence in their profile in Udemy.

Steps:
1. Use VPN (Virtual Private Network) & Select Another Country like USA.
2. Clear udemy.com website cookies from your browser or You can also use incognito mode or different browser like Opera which has inbuilt VPN.
3. After making a VPN Connection, Create a new Udemy Account.
4. Then go to your desired Course Page & Apply Coupon.
5. If the Coupon is successfully applied, then Continue the process & Enter the VPN Country.
6. Enjoy your Free Course!

Included in This Course

  • 54 questions
  • Practice Test 1
  • 20 questions
  • Practice Test 2
  • 20 questions
  • Practice Test 3
  • 14 questions
Description
Exam Details

The Associate Security exam (1V0-81.20) which leads to VMware Certified Technical Associate – Security 2021 certification is a 55-item exam,with a passing score of 300 using a scaled scoring method. Candidates are given 120 minutes to complete the exam, which includes adequate time to complete the exam for non-native English speakers

Exam Sections VMware exam blueprint sections are now standardized to the seven sections below, some of which may NOT be included in the final exam blueprint depending on the exam objectives.

Section 1 – Architecture and Technologies

Section 2 – Products and Solutions

Section 3 – Planning and Designing

Section 4 – Installing, Configuring, and Setup

Section 5 – Performance-tuning, Optimization, and Upgrades

Section 6 – Troubleshooting and Repairing

Section 7 – Administrative and Operational Tasks

Section 1 – VMware vSphere Architectures and Technologies

Objective 1.1 – Describe the anatomy and attack surfaces of a cyber attack

Objective 1.1.1 – Describe network based attacks

Objective 1.1.2 – Describe social engineering based attacks

Objective 1.1.3 – Describe hardware based attacks

Objective 1.1.4 – Describe software based attacks

Objective 1.2 – Identify common vulnerabilities of enterprise systems

Objective 1.3 – Explain common cyber-attack mitigation strategies

Objective 1.4 – Explain NSX high level architecture

Section 2 – VMware Products and Solutions

Objective 2.1 – Describe the VMware security vision

Objective 2.2 – Explain Zero-Trust User and device access

Objective 2.3 – Explain Zero-Trust for network security

Objective 2.4 – Describe Service-Defined Firewall

Objective 2.5 - Identify physical and virtual requirements for a defense-in-depth security deployment

Objective 2.5.1 - Identify network security requirements

Objective 2.5.2 - Identify application security requirements

Objective 2.5.3 - Identify endpoint security requirements (Audit & Remediation, EDR, NGAV)

Objective 2.6 - Describe the functionalities of VMware's security vision

Objective 2.6.1 - Explain the functionality of NSX gateway firewall and distributed firewall

Objective 2.6.2 - Explain the device posture based on network

Objective 2.6.3 - Explain the secure tunnel capabilities with Workspace ONE

Objective 2.6.4 - Explain the endpoint security capabilities of Carbon Black

Objective 2.6.5 - Explain CloudHealth and its role in multi-cloud security solution

Objective 2.7 - Describe the functions of edge firewall, internal firewall, and endpoint protection security mechanisms

Objective 2.8 - Differentiate between Layer 3 firewalls and Layer 7 firewalls

Objective 2.9 - Explain how Workspace ONE UEM facilitates endpoint security

Objective 2.10 - Describe how conditional access and modern authentication enforces security

Objective 2.11 - Explain how Workspace ONE Intelligence can be used to enforce endpoint security

Objective 2.12 - List the features of Workspace ONE Intelligence: RIsk Score, CVE patch remediation, User experience, Intelligence SDK

Objective 2.13 - Differentiate between NGAV and traditional AV

Objective 2.14 - Describe the benefits and use case for Next Generation Anti-virus

Objective 2.15 - Describe the benefits and use case for VMware Carbon Black Cloud Enterprise EDR

Objective 2.16 - Explain the use case for Audit and Remediation

Objective 2.17 -Describe the different response capabilities in the VMware Carbon Black Cloud

Objective 2.18 - Differentiate between the types of reputations seen in the VMware Carbon Black Cloud

Section 3 – There are no testable objectives for this section.

Section 4 – There are no testable objectives for this section.

Section 5 – – There are no testable objectives for this section.

Section 6 – –Administrative and Operational Tasks

Objective 7.1 - Run compliance evaluation in Workspace ONE UEM against enrolled devices

Objective 7.2 - Examine the security violations for enrolled devices

Objective 7.3 - Examine compliance policies in Workspace ONE UEM console

Objective 7.4 - Identify the security factors configured in the access policies from Workspace ONE Access console

Objective 7.5 - Navigate the Workspace ONE Intelligence portal

Objective 7.6 - Interpret the dashboards and widgets in Workspace ONE Intelligence

Objective 7.7 - Use endpoint data collected in Workspace ONE Intelligence to investigate security issues

Objective 7.8 - Navigate the VMware Carbon Black Cloud

Objective 7.9 - Create watchlists in the VMware Carbon Black Cloud to detect threats

Objective 7.10 - Identify appropriate searches in the VMware Carbon Black Cloud

Objective 7.11 - Investigate an alert and describe appropriate response actions in the VMware Carbon Black Cloud

Objective 7.12 - Interpret and explain the impact of Rules in the VMware Carbon Black Cloud

Objective 7.13 - Perform recommended queries in the VMware Carbon Black Cloud

Objective 7.14 - Describe the different mechanisms to Allow-list applications to meet business requirements

Objective 7.15 - Perform device activation/enrollment for VMware devices and applications

Objective 7.16 - Identify preconfigured firewall rules for the NSX Security Tab

Objective 7.17 - Determine firewall rules action

Objective 7.18 - Verify validity of firewall rules

Who this course is for:

  • ALL Levels