Which four alertfilters are available in the VMware Carbon Black Cloud Investigate page? (Choose four.)
Which three are components of the NSX-T Software-defined Firewall? (Choose three.)
An organization using VMware Carbon Black makes use of an unsigned third party application that is critical to business function. Unfortunately, the application has a reputation of Potentially Unwanted
Program and is prevented from running based on the policy.
What Approved list mechanism will allow thisapplication to run in your environment while maintaining the most secure posture?
Which network virtualization technologies can be used with an Ethernet VPN (EVPN) deployment in NSX-T Data Center? (Choose two.)
What is the term used to describe a type of social engineering attack aimed at a specific person or specific type of person?