Which of the following API call actions are associated with Creation in the CRUD operations? (Select all that apply)
What features does NSX Live Traffic Analysis tool provide? (Select all that apply)
You want to create a VMware vDefend Distributed Firewall policy to allow traffic to a specific virtual machine, but only for certain hours of the day. What should you do?
Which type of firewall enforcement point is NOT supported on the Gateway Firewall?
The VMware vDefend Management cluster is deployed by default with how many nodes?
Which of the following are valid configuration options for a VMware vDefend Distributed Firewall Policy? (Select all that apply)
Which of the following in NOT true in regard to the custom FQDN leveraged in FQDN filtering for vDefend Firewall?
In vDefend Malware Detection and Prevention, when does local file analysis occur?
vDefend Malware Detection can be enforced on which of the following? (Select all that apply)
Which of the following is NOT one of the advantages of Distributed Malware Detection and Prevention?
Which statements are true for DFW and Rule processing order based on the information shown in the image? (Select all that apply)
[root@vesxi-nsxt-10:~] vsipioctl getconfig -f nic-2292571-ethO-vmware-sfw.2
ruleset mains {
# generation number: 0
# realization time : 2020-05-21T13:01:48
# FILTER rules
rule 1596 at 1 inout protocol tcp from addrset e70a9a79-c346-48c4-8b9d- 402e97e38a7c to addrset be665396-14d9-4ee4-98b9- 9c21ebfl27a port 464 accept;
rule 1596 at 2 inout protocol udp from addrset e70a9a79-c346-48c4-8b9d- 402e97e38a7c to addrset be665396-14d9-4ee4-98b9- 9c21ebfl27a port 464 accept;
rule 1595 at 3 inout protocol udp from addrset e70a9a79-c346-48c4-8b9d- 402e97e38a7c to addrset 9edl2e5f-36f4-42a9-a79b- 87efc243alef port 53 accept;
rule 1594 at 4 inout protocol udp from addrset e70a9a79-c346-48c4-8b9d- 402e97e38a7c to addrset 59e6aa90-e360-4341-9fb3- b312772b79fb port 123 accept;
rule 2 at 5 inout protocol any from any to any accept;
}
Which of the following are valid logon detection methods for IDFW? (Select all that apply)
Which of the following are advantages of VMware vDefend versus using legacy security tools? (Select all that apply)
Which one of the following is NOT one of the use-cases of Distributed Intrusion Detection and Prevention?