New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which two are the insertion points for North-South service insertion? (Choose two.)

A.

Partner Service VM

B.

Uplink of tier-1 gateway

C.

Transport Node NIC

D.

Guest VM vNIC

E.

Uplink of tier-0 gateway

Which of the following are the local user accounts used to administer NSX-T Data Center?

A.

operator, admin, audit

B.

admin, super, read-only

C.

operator, admin, root

D.

admin, audit, root

An NSX administrator has been tasked with deploying a NSX Edge Virtual machine through an ISO image.

Which virtual network interface card (vNIC) type must be selected while creating the NSX Edge VM allow participation in overlay and VLAN transport zones?

A.

e1000

B.

VMXNET2

C.

VMXNET3

D.

Flexible

To which object can time based rules be applied?

A.

Gateway Firewall only

B.

DFW and Gateway Firewall both

C.

DFW only

D.

DFW or Gateway Firewall, but not both at the same time

At which two intervals are NSX-T IDS/IPS updates through VMware's cloud based internet service provided for threat signature files? (Choose two.)

A.

weekly periodic updates

B.

off-schedule for 0-day updates

C.

monthly periodic updates

D.

daily periodic updates

E.

bi-weekly periodic updates

A Security Administrator needs to update their NSX Distributed IDS/IPS policy to detect new attacks with critical CVSS scoring that leads to credential theft from targeted systems.

Which actions should you take?

A.

• Update Distributed IDS/IPS signature database

• Edit your profile from Security > Distributed IDS > Profiles

• Select Critical severity, filter on attack type and select Successful Credential Theft Detected

• Check the profile is applied in Distributed IDS rules

B.

• Edit your Distributed IDS rule from Security > Distributed IDS/IPS > Rules

• Filter on attack type and select Successful Credential Theft Detected

• Update Mode to detect and prevent

• Click on gear icon and change direction to OUT

C.

• Create a new profile from Security > Distributed IDS > Profiles

• Select Critical severity, filter on attack type and select Successful Credential Theft Detected

• Check the profile is applied In Distributed IDS rules

• Monitor Distributed IDS alerts to validate changes are applied

D.

• Edit your Distributed IDS rule from Security > Distributed IDS/IPS > Rules

• Filter on attack type and select Successful Credential Theft Detected

• Update Mode to detect and prevent

• Click on gear icon and change direction to IN-OUT

What type of IDS/IPS system deployment allows an administrator to block a known attack?

A.

A system deployed in SPAN port mode.

B.

A system deployed inline with ALERT and DROP action.

C.

A system deployed inline with ALERT action.

D.

A system deployed in TERM mode.

Which two criteria would an administrator use to filter firewall connection logs on NSX?

A.

FIREWALL MONITORING

B.

FIREWALL-PKTLOG

C.

FIREWALL RULE TAG

D.

FIREWALL CONNECTION

E.

FIREWALL SYSTEM

Which two statements are true about IDS/IPS signatures? (Choose two.)

A.

Users can upload their own IDS signature definitions from the NSX UI.

B.

IDS Signatures can be High Risk, Suspicious, Low Risk and Trustworthy.

C.

Users can create their own IDS signature definitions from the NSX UI.

D.

An IDS signature contains data used to identify known exploits and vulnerabilities.

E.

An IDS signature contains a set of instructions that determine which traffic is analyzed.

An administrator has configured a new firewall rule but needs to change the Applied-To parameter. Which two are valid options that the administrator can configure? (Choose two.)

A.

DFW

B.

rule

C.

services

D.

profiles

E.

groups