Join the discussion
Add Comments
- Other Question (52q)
- Q1. To which object can time based rules be applied?...
- Q2. An administrator needs to configure their NSX-T logging to audit changes on firewall secur...
- Q3. Which of the following describes the main concept of Zero-Trust Networks for network conne...
- Q4. At which OSI Layer do Next Generation Firewalls capable of analyzing application traffic o...
- Q5. What needs to be configured on each transport node prior to using NSX-T Data Center Distri...
- Q6. An NSX administrator is trying to find the dvfilter name of the sa-web-01 virtual machine ...
- Q7. A security administrator recently enabled Guest Introspection on NSX-T Data Center. Which ...
- Q8. An organization wants to add security controls for contractor virtual desktops. Which stat...
- Q9. In a brownfield environment with NSX-T Data Center deployed and configured, a customer is ...
- Q10. Which two statements are true about NSX Intelligence? (Choose two.)...
- Q11. In a brownfield environment with NSX-T Data Center deployed and configured, acustomer is i...
- Q12. Where is a partner security virtual machine (Partner SVM) deployed to process the redirect...
- Q13. Refer to the exhibit. (Exhibit) An administrator configured a firewall rule on their Edge ...
- Q14. Which of the following describes the main concept of Zero-Trust Networks for network conne...
- Q15. Which two statements are true about IDS/IPS signatures? (Choose two.)...
- Q16. Which two are requirements for URL Analysis? (Choose two.)...
- Q17. Which two Guest OS drivers are required for the Identity Firewall to operate? (Choose two....
- Q18. An NSX administrator has been tasked with deploying a NSX Edge Virtual machine through an ...
- Q19. A security administrator is verifying the health status of an NSX Service Instance. Which ...
- Q20. An administrator is creating the first distributed firewall rules for a company's salts de...
- Q21. Which two are true of the NSX Gateway Firewall? (Choose two.)...
- Q22. Which two are requirements for URL Analysis? (Choose two.)...
- Q23. How does N5X Distributed IDS/IPS keep up to date with signatures?...
- Q24. What must an administrator deploy to provide Linux based VMs with antivirus protection?...
- Q25. What is the NSX feature that allows a user to block ICMP between 192.168.1.100 and 192.168...
- Q26. Which three criteria help to determine the severity for a Distributed IDS/IPS? (Choose thr...
- Q27. An administrator wants to use Distributed Intrusion Detection. How is this implemented in ...
- Q28. Refer to the exhibit. (Exhibit) An administrator is reviewing NSX Intelligence information...
- Q29. Which of the following are the local user accounts used to administer NSX-T Data Center?...
- Q30. What needs to be configured on each transport node prior to using NSX-T Data Center Distri...
- Q31. A security administrator has configured NSX Intelligence for discovery. They would like to...
- Q32. Which 3 CU commands ant required to configure remotelogging on an ESXI host? (Choose three...
- Q33. What component in a transport node receives the firewall configuration from the central co...
- Q34. An administrator wants to configure NSX-T Security Groups inside a distributed firewall ru...
- Q35. Which three security objects are provided as an output in a recommendation session in NSX ...
- Q36. A security administrator recently enabled Guest Introspection on NSX-T Data Center. Which ...
- Q37. A Security Administrator needs to update their NSX Distributed IDS/IPS policy to detect ne...
- Q38. Which two are true of the NSX Gateway Firewall? (Choose two.)...
- Q39. A security administrator is required to protect East-West virtual machine traffic with the...
- Q40. What component in a transport node receives the firewall configuration from the central co...
- Q41. A security administrator is verifying the health status of an NSX Service Instance. Which ...
- Q42. To which network operations does a user with the Security Engineer role have full access p...
- Q43. Refer to the exhibit. (Exhibit) Referencing the exhibit, what is the VMware recommended nu...
- Q44. Which are two use-cases for the NSX Distributed Firewall' (Choose two.)...
- Q45. Which two Guest OS drivers are required for the Identity Firewall to operate? (Choose two....
- Q46. What is the NSX feature that allows a user to block ICMP between 192.168.1.100 and 192.168...
- Q47. When using URL Analysis In NSX-T, which two services must be set in the URL rule to captur...
- Q48. Which three arerequired to configure a firewall rule on a getawayto allowtraffic from the ...
- Q49. Which esxcli command lists the firewall configuration on ESXi hosts?...
- Q50. Reference the CLI output. (Exhibit) What is the source IP address in the distributed firew...
- Q51. A security administrator is required to protect East-West virtual machine traffic with the...
- Q52. Which 3 CU commands ant required to configure remote logging on an ESXI host? (Choose thre...
