Which of the following are maintained by the vDefend Distributed Firewall on a per vnic basis? (Select all that apply)
Which feature is available when using IDS on the Edge Gateway and not available on distributed IDS?
Which of the following statements are true about Distributed Malware? (Select all that apply)
You need to control traffic between the different zones of your IT infrastructure (I.E. Production, Dev, and DMZ). How should you build the respective security tags to be able to easily refer to all of them in your orchestration tool?
In the context of Role-Based access control which of the following is NOT a built-in vDefend Role?
You want to create a VMware vDefend Distributed Firewall policy to allow traffic to a specific virtual machine, but only for certain hours of the day. What should you do?
What is the recommended Gateway Firewall edge size for production environments?
Which statements are true for DFW and Rule processing order based on the information shown in the image? (Select all that apply)
[root@vesxi-nsxt-10:~] vsipioctl getconfig -f nic-2292571-ethO-vmware-sfw.2
ruleset mains {
# generation number: 0
# realization time : 2020-05-21T13:01:48
# FILTER rules
rule 1596 at 1 inout protocol tcp from addrset e70a9a79-c346-48c4-8b9d- 402e97e38a7c to addrset be665396-14d9-4ee4-98b9- 9c21ebfl27a port 464 accept;
rule 1596 at 2 inout protocol udp from addrset e70a9a79-c346-48c4-8b9d- 402e97e38a7c to addrset be665396-14d9-4ee4-98b9- 9c21ebfl27a port 464 accept;
rule 1595 at 3 inout protocol udp from addrset e70a9a79-c346-48c4-8b9d- 402e97e38a7c to addrset 9edl2e5f-36f4-42a9-a79b- 87efc243alef port 53 accept;
rule 1594 at 4 inout protocol udp from addrset e70a9a79-c346-48c4-8b9d- 402e97e38a7c to addrset 59e6aa90-e360-4341-9fb3- b312772b79fb port 123 accept;
rule 2 at 5 inout protocol any from any to any accept;
}
Which one of the following is NOT one of the use-cases of Distributed Intrusion Detection and Prevention?
Which of the following are advantages of VMware vDefend versus using legacy security tools? (Select all that apply)
Which of the following components can enforce Layer 7 Context Firewall Rules? (Select all that apply)
Which of the following are valid logon detection methods for IDFW? (Select all that apply)