Pass the VMware VMware NSX-T Data Center Security Skills 2023 5V0-41.21 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

In a brownfield environment with NSX-T Data Center deployed and configured, a customer is interested in Endpoint Protection integrations. What recommendation should be provided to the customer when it comes to their existing virtual machines?

Options:

A.

Virtual machine must be protected by vSphere HA.


B.

Virtual machine hardware should be version 10 or higher.


C.

A minimum installation of VMware tools is required.


D.

A custom install of VMware tools is required to select the drivers.


Questions # 2:

What type of IDS/IPS system deployment allows an administrator to block a known attack?

Options:

A.

A system deployed in SPAN port mode.


B.

A system deployed inline with ALERT and DROP action.


C.

A system deployed inline with ALERT action.


D.

A system deployed in TERM mode.


Questions # 3:

Which two statements are true about IDS/IPS signatures? (Choose two.)

Options:

A.

Users can upload their own IDS signature definitions from the NSX UI.


B.

IDS Signatures can be High Risk, Suspicious, Low Risk and Trustworthy.


C.

Users can create their own IDS signature definitions from the NSX UI.


D.

An IDS signature contains data used to identify known exploits and vulnerabilities.


E.

An IDS signature contains a set of instructions that determine which traffic is analyzed.


Questions # 4:

Which two Guest OS drivers are required for the Identity Firewall to operate? (Choose two.)

Options:

A.

NSX Network Introspection


B.

vmxnet3


C.

NSX File Introspection


D.

Guest Introspection


E.

e1000e


Questions # 5:

Which of the following describes the main concept of Zero-Trust Networks for network connected devices?

Options:

A.

Network connected devices should only be trusted if they are issued by the organization.


B.

Network connected devices should only be trusted if the user can be successfully authenticated.


C.

Network connected devices should only be trusted if their identity and integrity can be verified continually.


D.

Network connected devices should only be trusted if they are within the organizational boundary.


Questions # 6:

An administrator wants to configure NSX-T Security Groups inside a distributed firewall rule. Which menu item would the administrator select to configure the Security Groups?

Options:

A.

System


B.

Inventory


C.

Security


D.

Networking


Questions # 7:

What is an unprotected traffic flow in NSX Intelligence?

Options:

A.

A traffic flow that matches the default distributed firewall rule.


B.

A traffic flow that matches an allow rule more granular than the default.


C.

A traffic flow that matches a drop rule more granular than the default.


D.

A traffic flow that matches a reject rule more granular than the default.


Questions # 8:

Refer to the exhibit.

Question # 8

An administrator is reviewing NSX Intelligence information as shown in the exhibit.

What does the red dashed line for the UDP:137 flow represent?

Options:

A.

Discovered communication


B.

Allowed communication


C.

Blocked communication


D.

Unprotected communication


Questions # 9:

An NSX administrator is trying to find the dvfilter name of the sa-web-01 virtual machine to capture the sa-web-01 VM traffic. What could be a reason the sa-web-01 VM dvfilter name is missing from the command output?

Options:

A.

sa-web-01 VM has the no firewall rules configured.


B.

ESXi host has 5SH disabled.


C.

sa-web-01 is powered Off on ESXi host.


D.

ESXi host has the firewall turned off.


Questions # 10:

Which vCenter component is used by the NSX Manager to deploy the Partner Service VM on every host of a cluster configured for guest introspection?

Options:

A.

ESXi Agent Manager (EAM)


B.

Auto Deploy


C.

Update Manager (VUM)


D.

Component Manager


Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions