New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Selected 2V0-41.23 VMware Certification Questions Answers

Page: 7 / 8
Total 107 questions

VMware NSX 4.x Professional Questions and Answers

Question 25

Which two of the following are used to configure Distributed Firewall on VDS? (Choose two.)

Options:

A.

vSphere API

B.

NSX API

C.

NSX CU

D.

vCenter API

E.

NSX UI

Question 26

Which two statements are true about IDS Signatures? (Choose two.)

Options:

A.

Users can upload their own IDS signature definitions.

B.

An IDS signature contains data used to identify known exploits and vulnerabilities.

C.

An IDS signature contains data used to identify the creator of known exploits and vulnerabilities.

D.

IDS signatures can be High Risk, Suspicious, Low Risk and Trustworthy.

E.

An IDS signature contains a set of instructions that determine which traffic is analyzed.

Question 27

Which three data collection sources are used by NSX Network Detection and Response to create correlations/Intrusion campaigns? (Choose three.)

Options:

A.

Files and anti-malware (lie events from the NSX Edge nodes and the Security Analyzer

B.

East-West anti-malware events from the ESXi hosts

C.

Distributed Firewall flow data from the ESXi hosts

D.

IDS/IPS events from the ESXi hosts and NSX Edge nodes

E.

Suspicious Traffic Detection events from NSX Intelligence

Question 28

Which VPN type must be configured before enabling a L2VPN?

Options:

A.

Route-based IPSec VPN

B.

Policy based IPSec VPN

C.

SSL-bosed IPSec VPN

D.

Port-based IPSec VPN

Page: 7 / 8
Total 107 questions