What is the NSX feature that allows a user to block ICMP between 192.168.1.100 and 192.168.1.101?
Refer to the exhibit.

Referencing the exhibit, what is the VMware recommended number of NSX Manager Nodes to additionally deploy to form an NSX-T Manager Cluster?
An administrator has configured a new firewall rule but needs to change the Applied-To parameter. Which two are valid options that the administrator can configure? (Choose two.)
There has been a confirmed case of virus infection on multiple VMs managed by Endpoint Protection. A security administrator wants to create a group to quarantine infected VMs in the future.
What criteria will be used to build this group?
Which 3 CU commands ant required to configure remote logging on an ESXI host? (Choose three.)
An administrator is creating the first distributed firewall rules for a company ' s salts department. What is the first object that must be created in the distributed firewall '
Which of the following are the local user accounts used to administer NSX-T Data Center?
Which dot color indicates an on-going attack of medium severity in the IDS/IPS events tab of NSX-T Data Center?
Which two are used to define dynamic groups for an NSX Distributed Firewall? (Choose two.)
Information Security Management (ISM) describes a set of controls that organizations employ to protect which properties?
When using URL Analysis In NSX-T, which two services must be set in the URL rule to capture traffic over TCP and UDP? (Choose two.)
What type of IDS/IPS system deployment allows an administrator to block a known attack?
Which two are the insertion points for North-South service insertion? (Choose two.)
A security administrator is verifying why users are blocked from sports sites but are able to access gambling websites from the corporate network. What needs to be updated In nsx-T to block the gambling websites?
An administrator needs to configure their NSX-T logging to audit changes on firewall security policy. The administrator Is using the following command from NSX-T3.1 documentation :

Which Message ID from the following list will allow the administrator to track changes on firewall security rules?
Where is a partner security virtual machine (Partner SVM) deployed to process the redirected North-South traffic in an efficient manner?