Which two statements are true about IDS/IPS signatures? (Choose two.)
Users can upload their own IDS signature definitions from the NSX UI.
IDS Signatures can be High Risk, Suspicious, Low Risk and Trustworthy.
Users can create their own IDS signature definitions from the NSX UI.
An IDS signature contains data used to identify known exploits and vulnerabilities.
An IDS signature contains a set of instructions that determine which traffic is analyzed.
(https://pubs.vmware.com/NSX-T-Data-Center/index.html#com.vmware.nsxt.admin.doc/GUID-AFAF58DB-E661-4A7D-A8C9-70A3F3A3A3D3.html)
Submit