New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which three data collection sources are used by NSX Network Detection and Response to create correlations/Intrusion campaigns? (Choose three.)

A.

Files and anti-malware (lie events from the NSX Edge nodes and the Security Analyzer

B.

East-West anti-malware events from the ESXi hosts

C.

Distributed Firewall flow data from the ESXi hosts

D.

IDS/IPS events from the ESXi hosts and NSX Edge nodes

E.

Suspicious Traffic Detection events from NSX Intelligence

Sort the rule processing steps of the Distributed Firewall. Order responses from left to right.

Which field in a Tier-1 Gateway Firewall would be used to allow access for a collection of trustworthy web sites?

A.

Source

B.

Profiles -> Context Profiles

C.

Destination

D.

Profiles -> L7 Access Profile

Which two are supported by L2 VPN clients? (Choose two.)

A.

NSX Autonomous Edge

B.

NSX Edge

C.

NSX for vSphere Edge

D.

3rd party Hardware VPN Device

What is the most restrictive NSX built-in role which will allow a user to apply configuration changes on an NSX Edge?

A.

Network Engineer

B.

Cloud Service Administrator

C.

NSX Administrator

D.

Network Operator

When a stateful service is enabled for the first time on a Tier-0 Gateway, what happens on the NSX Edge node?

A.

DR is instantiated and automatically connected with SR.

B.

SR is instantiated and automatically connected with DR.

C.

SR and DR doesn’t need to be connected to provide any stateful services.

D.

SR and DR is instantiated but requires manual connection.

Which NSX feature can be leveraged to achieve consistent policy configuration and simplicity across sites?

A.

VRF Lite

B.

Ethernet VPN

C.

NSX MTML5 UI

D.

NSX Federation

Which three DHCP Services are supported by NSX? (Choose three.)

A.

Gateway DHCP

B.

Segment DHCP

C.

DHCP Relay

D.

Port DHCP per VNF

E.

VRF DHCP Server

Which two choices are use cases for Distributed Intrusion Detection? (Choose two.)

A.

Use agentless antivirus with Guest Introspection.

B.

Quarantine workloads based on vulnerabilities.

C.

Identify risk and reputation of accessed websites.

D.

Gain Insight about micro-segmentation traffic flows.

E.

Identify security vulnerabilities in the workloads.

An NSX administrator has deployed a single NSX Manager node and will be adding two additional nodes to form a 3-node NSX Management Cluster for a production environment. The administrator will deploy these two additional nodes and Cluster VIP using the NSX UI.

What two are the prerequisites for this configuration? (Choose two.)

A.

The cluster configuration must be completed using API.

B.

All nodes must be in the same subnet.

C.

All nodes must be in separate subnets.

D.

A compute manager must be configured.

E.

NSX Manager must reside on a Windows Server.