Which two of the following are used to configure Distributed Firewall on VDS? (Choose two.)
What is the most restrictive NSX built-in role which will allow a user to apply configuration changes on an NSX Edge?
Which three protocols could an NSX administrator use to transfer log messages to a remote log server? (Choose three.)
A security administrator needs to configure a firewall rule based on the domain name of a specific application.
Which field in a distributed firewall rule does the administrator configure?
Which of the two following characteristics about NAT64 are true? (Choose two.)