Which two of the following are used to configure Distributed Firewall on VDS? (Choose two.)
Which two statements are true about IDS Signatures? (Choose two.)
Which three data collection sources are used by NSX Network Detection and Response to create correlations/Intrusion campaigns? (Choose three.)
Which VPN type must be configured before enabling a L2VPN?