11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

5V0-41.21 Exam Dumps - VMware NSX-T Data Center 3.1 Security

Question # 4

An NSX administrator is trying to find the dvfilter name of the sa-web-01 virtual machine to capture the sa-web-01 VM traffic. What could be a reason the sa-web-01 VM dvfilter name is missing from the command output?

A.

sa-web-01 VM has the no firewall rules configured.

B.

ESXi host has 5SH disabled.

C.

sa-web-01 is powered Off on ESXi host.

D.

ESXi host has the firewall turned off.

Full Access
Question # 5

An administrator has configured a new firewall rule but needs to change the Applied-To parameter. Which two are valid options that the administrator can configure? (Choose two.)

A.

DFW

B.

rule

C.

services

D.

profiles

E.

groups

Full Access
Question # 6

Which two are used to define dynamic groups for an NSX Distributed Firewall? (Choose two.)

A.

segment

B.

physical servers

C.

machine name

D.

tags

E.

segment's port

Full Access
Question # 7

At which two intervals are NSX-T IDS/IPS updates through VMware's cloud based internet service provided for threat signature files? (Choose two.)

A.

weekly periodic updates

B.

off-schedule for 0-day updates

C.

monthly periodic updates

D.

daily periodic updates

E.

bi-weekly periodic updates

Full Access
Question # 8

Which is an insertion point for East-West service insertion?

A.

tier-1 gateway

B.

Partner SVM

C.

Guest VM vNlC

D.

transport node

Full Access
Question # 9

A Security Administrator needs to update their NSX Distributed IDS/IPS policy to detect new attacks with critical CVSS scoring that leads to credential theft from targeted systems.

Which actions should you take?

A.

• Update Distributed IDS/IPS signature database

• Edit your profile from Security > Distributed IDS > Profiles

• Select Critical severity, filter on attack type and select Successful Credential Theft Detected

• Check the profile is applied in Distributed IDS rules

B.

• Edit your Distributed IDS rule from Security > Distributed IDS/IPS > Rules

• Filter on attack type and select Successful Credential Theft Detected

• Update Mode to detect and prevent

• Click on gear icon and change direction to OUT

C.

• Create a new profile from Security > Distributed IDS > Profiles

• Select Critical severity, filter on attack type and select Successful Credential Theft Detected

• Check the profile is applied In Distributed IDS rules

• Monitor Distributed IDS alerts to validate changes are applied

D.

• Edit your Distributed IDS rule from Security > Distributed IDS/IPS > Rules

• Filter on attack type and select Successful Credential Theft Detected

• Update Mode to detect and prevent

• Click on gear icon and change direction to IN-OUT

Full Access
Question # 10

To which network operations does a user with the Security Engineer role have full access permission?

A.

Networking IP Address Pools, Networking NAT, Networking DHCP

B.

Networking Forwarding Policies, Networking NAT, Networking VPN

C.

Networking Load Balancing, Networking DNS, Networking Forwarding Policies

D.

Networking DHCP, Networking NAT, Networking Segments

Full Access