Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

VMware 5V0-41.21 - VMware NSX-T Data Center 3.1 Security

Page: 1 / 3
Total 70 questions

An administrator has configured a new firewall rule but needs to change the Applied-To parameter. Which two are valid options that the administrator can configure? (Choose two.)

A.

DFW

B.

rule

C.

services

D.

profiles

E.

groups

Which two are used to define dynamic groups for an NSX Distributed Firewall? (Choose two.)

A.

segment

B.

physical servers

C.

machine name

D.

tags

E.

segment's port

Which two statements are true about NSX Intelligence? (Choose two.)

A.

NSX Intelligence assists to build service insertion with Partner SVM.

B.

NSX Intelligence supports planning of distributed firewall rules and policy.

C.

NSX Intelligence can help to visualize network physical infrastructure.

D.

NSX Intelligence can be used in conjunction with vRealize Network Insight.

E.

NSX Intelligence supports planning of NSX-T Edge Firewall rules and policy.

Refer to the exhibit.

An administrator configured a firewall rule on their Edge Gateway to allow access to web servers.

What is missing in the Gateway Firewall policy to have the firewall rule applied?

A.

Firewall service needs to be enabled on gateway.

B.

Firewall rule needs to be moved to Default category.

C.

Firewall rule needs to be enabled.

D.

Firewall rule needs to be published

Refer to the exhibit.

An administrator needs to configure a security policy with a firewall rule allowing a group of applications to retrieve the correct time from an NTP server. Which is the category to configure this security policy and firewall rule?

A.

Emergency

B.

Application

C.

Infrastructure

D.

Environment

An NSX administrator has been tasked with deploying a NSX Edge Virtual machine through an ISO image.

Which virtual network interface card (vNIC) type must be selected while creating the NSX Edge VM allow participation in overlay and VLAN transport zones?

A.

e1000

B.

VMXNET2

C.

VMXNET3

D.

Flexible

Which of the following describes the main concept of Zero-Trust Networks for network connected devices?

A.

Network connected devices should only be trusted if they are issued by the organization.

B.

Network connected devices should only be trusted if the user can be successfully authenticated.

C.

Network connected devices should only be trusted if their identity and integrity can be verified continually.

D.

Network connected devices should only be trusted if they are within the organizational boundary.

A security administrator is verifying why users are blocked from sports sites but are able to access gambling websites from the corporate network. What needs to be updated In nsx-T to block the gambling websites?

A.

vSphere Firewall Policy

B.

Endpoint Protection Rules

C.

Network Introspection Policy

D.

URL Analysis Attributes

Which esxcli command lists the firewall configuration on ESXi hosts?

A.

esxcli network firewall ruleset list

B.

vsipioct1 getrules -filter

C.

esxcli network firewall rules

D.

vsipioct1 getrules -f

A Security Administrator needs to update their NSX Distributed IDS/IPS policy to detect new attacks with critical CVSS scoring that leads to credential theft from targeted systems.

Which actions should you take?

A.

• Update Distributed IDS/IPS signature database

• Edit your profile from Security > Distributed IDS > Profiles

• Select Critical severity, filter on attack type and select Successful Credential Theft Detected

• Check the profile is applied in Distributed IDS rules

B.

• Edit your Distributed IDS rule from Security > Distributed IDS/IPS > Rules

• Filter on attack type and select Successful Credential Theft Detected

• Update Mode to detect and prevent

• Click on gear icon and change direction to OUT

C.

• Create a new profile from Security > Distributed IDS > Profiles

• Select Critical severity, filter on attack type and select Successful Credential Theft Detected

• Check the profile is applied In Distributed IDS rules

• Monitor Distributed IDS alerts to validate changes are applied

D.

• Edit your Distributed IDS rule from Security > Distributed IDS/IPS > Rules

• Filter on attack type and select Successful Credential Theft Detected

• Update Mode to detect and prevent

• Click on gear icon and change direction to IN-OUT