Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

VMware 5V0-41.21 VMware NSX-T Data Center 3.1 Security Exam Practice Test

Page: 1 / 7
Total 70 questions

VMware NSX-T Data Center 3.1 Security Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

Refer to the exhibit.

An administrator is reviewing NSX Intelligence information as shown in the exhibit.

What does the red dashed line for the UDP:137 flow represent?

Options:

A.

Discovered communication

B.

Allowed communication

C.

Blocked communication

D.

Unprotected communication

Question 2

Where is a partner security virtual machine (Partner SVM) deployed to process the redirected North-South traffic in an efficient manner?

Options:

A.

Deployed close to the Partner Manager.

B.

Deployed close to the NSX Edge nodes.

C.

Deployed close to the VMware vCenter Server.

D.

Deployed close to the compute nodes.

Question 3

At which OSI Layer do Next Generation Firewalls capable of analyzing application traffic operate?

Options:

A.

Layer 4

B.

Layer 3

C.

Layer 7

D.

Layer 2

Question 4

A security administrator recently enabled Guest Introspection on NSX-T Data Center.

Which would be a reason none of the Microsoft Windows based VMs are reporting any information?

Options:

A.

Windows VMs require a reboot.

B.

VMware Tools need to be reconfigured.

C.

NSX Manager require a reboot.

D.

NSX Manager needs to be reconfigured.

Question 5

Refer to the exhibit.

Referencing the exhibit, what is the VMware recommended number of NSX Manager Nodes to additionally deploy to form an NSX-T Manager Cluster?

Options:

A.

4

B.

3

C.

2

D.

5

Question 6

A customer has deployed NSX Intelligence appliance with an incorrect IP address.

What should the customer do to correct the IP address?

Options:

A.

Add a new network interface to the appliance and replace the old one.

B.

Shutdown the appliance and change the vApp IP properties.

C.

In the CU, update intelligence manager node host-ip-addr.

D.

Redeploy the appliance with the correct parameters.

Question 7

Which two are the insertion points for North-South service insertion? (Choose two.)

Options:

A.

Partner Service VM

B.

Uplink of tier-1 gateway

C.

Transport Node NIC

D.

Guest VM vNIC

E.

Uplink of tier-0 gateway

Question 8

An administrator is creating the first distributed firewall rules for a company's salts department. What is the first object that must be created in the distributed firewall'

Options:

A.

firewall policy

B.

firewall file

C.

firewall folder

D.

firewall service

Question 9

Information Security Management (ISM) describes a set of controls that organizations employ to protect which properties?

Options:

A.

confidentiality, integrity, and availability

B.

confidentiality, interoperability, and availability

C.

configuration. Integrity, and availability

D.

confidentiality. Integrity, and accessibility

Question 10

What is one of the main use-cases of NSX-T Endpoint Protection?

Options:

A.

Use Network Security Services of a third party vendor

B.

Agentless Antivirus

C.

East-West Firewalling

D.

North-South Firewalling

Page: 1 / 7
Total 70 questions