Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > VMware > VCP-PCS Admin > 6V0-21.25

6V0-21.25 VMware vDefend Security for VCF 5.x Administrator Question and Answers

Question # 4

Which of the following API call actions are associated with Creation in the CRUD operations? (Select all that apply)

A.

POST

B.

GET

C.

PUT

D.

PATCH

E.

DELETE

Full Access
Question # 5

What features does NSX Live Traffic Analysis tool provide? (Select all that apply)

A.

Live Traffic Trace

B.

Packet Capture

C.

Performance

D.

Packet Count

Full Access
Question # 6

Malware Detection/Prevention is enforced ONLY at Distributed level.

A.

True

B.

False

Full Access
Question # 7

You want to create a VMware vDefend Distributed Firewall policy to allow traffic to a specific virtual machine, but only for certain hours of the day. What should you do?

A.

Create a time-based firewall policy

B.

Create an URL filter

C.

Create a script and use the API to execute the script on a schedule

D.

Create the rule in the Emergency section of the Distributed Firewall

Full Access
Question # 8

What of the following is true regarding Distributed Firewall logging?

A.

Broadcom recommends logging all the DFW rules, as it does not have any CPU overhead

B.

VMware Cloud Foundation logging tools are the only supported remote log server supported

C.

The Firewall logs are first sent to the management plane to sanitize any Personally Identifiable Information

D.

Logging can be enabled on per rule basis

Full Access
Question # 9

Which type of firewall enforcement point is NOT supported on the Gateway Firewall?

A.

Uplink/External Interfaces on Tier-0/1

B.

Service Interfaces on Tier-0/1

C.

Downlinks on Tier-0/1

D.

Bare Metal Interfaces

Full Access
Question # 10

The VMware vDefend Management cluster is deployed by default with how many nodes?

A.

One

B.

Two

C.

Three

D.

Four

Full Access
Question # 11

Which of the following are valid configuration options for a VMware vDefend Distributed Firewall Policy? (Select all that apply)

A.

TCP Strict

B.

Stateful

C.

Locked

D.

Open

Full Access
Question # 12

Which of the following in NOT true in regard to the custom FQDN leveraged in FQDN filtering for vDefend Firewall?

A.

Supports full FQDN name

B.

Supports Partial regex at the beginning of the FQDN

C.

Supports complete wild card mask for FQDN

D.

Does not support any type of partial regex

Full Access
Question # 13

In vDefend Malware Detection and Prevention, when does local file analysis occur?

A.

After Cloud file analysis and before hash comparison

B.

Before Cloud file analysis and after hash comparison

C.

After Cloud file analysis and after hash comparison

D.

Before Cloud file analysis and before hash comparison

Full Access
Question # 14

Which of the following is true regarding private IP ranges in NTA?

A.

Private IP ranges are added manually

B.

Private IP ranges are automatically in scope based on RFC1918

C.

Private IP ranges are automatically in scope based on RFC1918 and manually added

D.

Private IP ranges are based on user-defined IP pools

Full Access
Question # 15

Which vDefend Gateway Firewall feature is ONLY supported on T1 Gateways?

A.

Gateway IDRS

B.

Stateful Services on A/A Gateways

C.

Gateway IDFW

D.

L3/L4 Gateway Firewall

Full Access
Question # 16

vDefend Malware Detection can be enforced on which of the following? (Select all that apply)

A.

T1 Uplinks

B.

T1 Downlinks

C.

T0 Downlinks

D.

T1 Service Interfaces

Full Access
Question # 17

Which of the following is NOT one of the advantages of Distributed Malware Detection and Prevention?

A.

Full system-emulation cloud sandbox enables detection of evasive malware

B.

All the traffic is hair-pinned to a centralized appliance for malware detection

C.

Support both Windows and Linux VMs

D.

Sees every malware interaction, not just those with the OS

Full Access
Question # 18

Which statements are true for DFW and Rule processing order based on the information shown in the image? (Select all that apply)

[root@vesxi-nsxt-10:~] vsipioctl getconfig -f nic-2292571-ethO-vmware-sfw.2

ruleset mains {

# generation number: 0

# realization time : 2020-05-21T13:01:48

# FILTER rules

rule 1596 at 1 inout protocol tcp from addrset e70a9a79-c346-48c4-8b9d- 402e97e38a7c to addrset be665396-14d9-4ee4-98b9- 9c21ebfl27a port 464 accept;

rule 1596 at 2 inout protocol udp from addrset e70a9a79-c346-48c4-8b9d- 402e97e38a7c to addrset be665396-14d9-4ee4-98b9- 9c21ebfl27a port 464 accept;

rule 1595 at 3 inout protocol udp from addrset e70a9a79-c346-48c4-8b9d- 402e97e38a7c to addrset 9edl2e5f-36f4-42a9-a79b- 87efc243alef port 53 accept;

rule 1594 at 4 inout protocol udp from addrset e70a9a79-c346-48c4-8b9d- 402e97e38a7c to addrset 59e6aa90-e360-4341-9fb3- b312772b79fb port 123 accept;

rule 2 at 5 inout protocol any from any to any accept;

}

A.

Rule 1595 will be processed before rule 1596

B.

Rule 1594 will be processed after 1595 and 1596

C.

Rule 1596 will be the first one to be processed

D.

Rule 2 will only be processed if the conditions for the above rules are not met

Full Access
Question # 19

What three components feed their events into NDR?

A.

Intelligence, Distributed Firewall and Distributed IDPS

B.

NTA, Anti-Malware and IDPS

C.

Intelligence, Gateway Firewall and Distributed Firewall

D.

NTA, Distributed Firewall and Distributed IDPS

Full Access
Question # 20

Which of the following are valid logon detection methods for IDFW? (Select all that apply)

A.

Guest Introspection

B.

Event Log Scrapping

C.

Identity Access Management

D.

Single Sign On (SSO)

Full Access
Question # 21

Which of the following are advantages of VMware vDefend versus using legacy security tools? (Select all that apply)

A.

No network changes are required to implement security policies

B.

Tapless network visibility

C.

Centralized Intrusion Detection and Intrusion Prevention

D.

IP/Subnet based policy creation

Full Access
Question # 22

Which one of the following is NOT one of the use-cases of Distributed Intrusion Detection and Prevention?

A.

Provide routing capability for an air-gapped network to securely access the internet

B.

Enable software-based IDS/IPS for Critical applications

C.

Prevent lateral movement of attackers by blocking vulnerabilities

D.

Achieve regulatory compliance requirements for PCI-DSS, HIPAA, SOX

Full Access