Which of the following API actions are not valid?
Which of the following is true regarding the VMware vDefend Distributed Firewall?
Which of the following statements are true about Distributed Malware? (Select all that apply)
In the context of Role-Based access control which of the following is NOT a built-in vDefend Role?
In the context of Network Traffic Analysis, VMs can be selectively excluded from monitoring for particular detectors.
Which NSX authentication uses cookies for subsequent API calls instead of the username and password?
You need to build a security group that references External DNS servers. Which of the following is the best way to build the Security group?
What layers of the OSI model does the vDefend Firewall provide protection?
Which of the following are valid configuration options for a VMware vDefend Distributed Firewall Policy? (Select all that apply)
Which of the following must be done in order to detect DNS anomalies with NTA? (Select all that apply)