What must be completed with the virtual machine's vNIC before applying the rules?

A security administrator is required to protect East-West virtual machine traffic with the NSX Distributed Firewall. What must be completed with the virtual machine's vNIC before applying the rules?A . It is connected to the underlay. B. It must be connected to a vSphere Standard Switch. C. It is connected...

February 23, 2023 No Comments READ MORE +

Which three are required by URL Analysis? (Choose three.)

Which three are required by URL Analysis? (Choose three.) A. NSX Enterprise or higher license key B. Tier-1 gateway C. Tier-0 gateway D. OFW rule allowing traffic OUT to Internet E. Medium-sized edge node (or higher), or a physical form factor edge F. Layer 7 DNS firewall rule on NSX...

February 23, 2023 No Comments READ MORE +

What needs to be configured on each transport node prior to using NSX-T Data Center Distributed Firewall time-based rule publishing?

What needs to be configured on each transport node prior to using NSX-T Data Center Distributed Firewall time-based rule publishing?A . DNS B. NTP C. PAT D. NATView AnswerAnswer: B Explanation: In order to use NSX-T Data Center Distributed Firewall time-based rule publishing, the NTP (Network Time Protocol) needs to...

February 23, 2023 No Comments READ MORE +

What could be a reason the sa-web-01 VM dvfilter name is missing from the command output?

An NSX administrator is trying to find the dvfilter name of the sa-web-01 virtual machine to capture the sa-web-01 VM traffic. What could be a reason the sa-web-01 VM dvfilter name is missing from the command output?A . sa-web-01 VM has the no firewall rules configured. B. ESXi host has...

February 22, 2023 No Comments READ MORE +

Which two parameters must be functioning for the health status to show as Up?

A security administrator is verifying the health status of an NSX Service Instance. Which two parameters must be functioning for the health status to show as Up? (Choose two.)A . VMs must have at least one vNIC. B. VMs must not have existing endpoint protection rules. C. VMs must have...

February 22, 2023 No Comments READ MORE +

What could be causing the issue?

An administrator has enabled the "logging" option on a specific firewall rule. The administrator does not see messages on the Logging Server related to this firewall rule. What could be causing the issue?A . The logging on the firewall policy needs to be enabled. B. Firewall Rule Logging is only...

February 21, 2023 No Comments READ MORE +

What does the red dashed line for the UDP: 137 flow represent?

Refer to the exhibit. An administrator is reviewing NSX Intelligence information as shown in the exhibit. What does the red dashed line for the UDP: 137 flow represent?A . Discovered communication B. Allowed communication C. Blocked communication D. Unprotected communicationView AnswerAnswer: C Explanation: The red dashed line for the UDP:137...

February 19, 2023 No Comments READ MORE +

Which virtual network interface card (vNIC) type must be selected while creating the NSX Edge VM allow participation in overlay and VLAN transport zones?

An NSX administrator has been tasked with deploying a NSX Edge Virtual machine through an ISO image. Which virtual network interface card (vNIC) type must be selected while creating the NSX Edge VM allow participation in overlay and VLAN transport zones?A . e1000 B. VMXNET2 C. VMXNET3 D. FlexibleView AnswerAnswer:...

February 17, 2023 No Comments READ MORE +

Which are two use-cases for the NSX Distributed Firewall'(Choose two.)

Which are two use-cases for the NSX Distributed Firewall'(Choose two.)A . Zero-Trust with segmentation B. Security Analytics C. Lateral Movement of Attacks prevention D. Software defined networking E. Network VisualizationView AnswerAnswer: A,C Explanation: Zero-Trust with segmentation is a security strategy that uses micro-segmentation to protect a network from malicious actors....

February 16, 2023 No Comments READ MORE +

Which two statements are true about IDS/IPS signatures? (Choose two.)

Which two statements are true about IDS/IPS signatures? (Choose two.)A . Users can upload their own IDS signature definitions from the NSX UI. B. IDS Signatures can be High Risk, Suspicious, Low Risk and Trustworthy. C. Users can create their own IDS signature definitions from the NSX UI. D. An...

February 16, 2023 No Comments READ MORE +