ExamGecko
Home / VMware / 5V0-41.21 / List of questions
Ask Question

VMware 5V0-41.21 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

An NSX administrator has turned on logging for the distributed firewall rule. On an ESXi host, where will the logs be stored?

/var/log/esxupdate.log
/var/log/esxupdate.log
/var/log/dfwpktlogs.log
/var/log/dfwpktlogs.log
/var/log/hostd.log
/var/log/hostd.log
/var/log/vmkerntl.log
/var/log/vmkerntl.log
Suggested answer: B
Explanation:

The NSX administrator has enabled logging for the distributed firewall rule, and the logs are stored in the /var/log/dfwpktlogs.log file on the ESXi host. This log file stores the packet logs for the distributed firewall rules, and the logs can be used for auditing and troubleshooting the distributed firewall.

Reference: https://docs.vmware.com/en/VMware-NSX-T-Data-Center/2.5/nsxt_25_admin_guide/GUID-E0CC7D8A-F9E6-4A6F-A6F8-6A3D7B3DC3EF.html#GUIDE0CC7D8A- F9E6-4A6F-A6F8-6A3D7B3DC3EF

asked 16/09/2024
Joe Moore
46 questions

Question 12

Report Export Collapse

A Security Administrator needs to update their NSX Distributed IDS/IPS policy to detect new attacks with critical CVSS scoring that leads to credential theft from targeted systems.

Which actions should you take?

β€’ Update Distributed IDS/IPS signature databaseβ€’ Edit your profile from Security > Distributed IDS > Profilesβ€’ Select Critical severity, filter on attack type and select Successful Credential Theft Detectedβ€’ Check the profile is applied in Distributed IDS rules
β€’ Update Distributed IDS/IPS signature databaseβ€’ Edit your profile from Security > Distributed IDS > Profilesβ€’ Select Critical severity, filter on attack type and select Successful Credential Theft Detectedβ€’ Check the profile is applied in Distributed IDS rules
β€’ Edit your Distributed IDS rule from Security > Distributed IDS/IPS > Rulesβ€’ Filter on attack type and select Successful Credential Theft Detectedβ€’ Update Mode to detect and preventβ€’ Click on gear icon and change direction to OUT
β€’ Edit your Distributed IDS rule from Security > Distributed IDS/IPS > Rulesβ€’ Filter on attack type and select Successful Credential Theft Detectedβ€’ Update Mode to detect and preventβ€’ Click on gear icon and change direction to OUT
β€’ Create a new profile from Security > Distributed IDS > Profilesβ€’ Select Critical severity, filter on attack type and select Successful Credential Theft Detectedβ€’ Check the profile is applied In Distributed IDS rulesβ€’ Monitor Distributed IDS alerts to validate changes are applied
β€’ Create a new profile from Security > Distributed IDS > Profilesβ€’ Select Critical severity, filter on attack type and select Successful Credential Theft Detectedβ€’ Check the profile is applied In Distributed IDS rulesβ€’ Monitor Distributed IDS alerts to validate changes are applied
β€’ Edit your Distributed IDS rule from Security > Distributed IDS/IPS > Rulesβ€’ Filter on attack type and select Successful Credential Theft Detectedβ€’ Update Mode to detect and preventβ€’ Click on gear icon and change direction to IN-OUT
β€’ Edit your Distributed IDS rule from Security > Distributed IDS/IPS > Rulesβ€’ Filter on attack type and select Successful Credential Theft Detectedβ€’ Update Mode to detect and preventβ€’ Click on gear icon and change direction to IN-OUT
Suggested answer: A
Explanation:

https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/nsxt_31_ids_ips/GUID-B2D6A7F6-

asked 16/09/2024
Amirouche Rahani
50 questions

Question 13

Report Export Collapse

Which is an insertion point for East-West service insertion?

tier-1 gateway
tier-1 gateway
Partner SVM
Partner SVM
Guest VM vNlC
Guest VM vNlC
transport node
transport node
Suggested answer: C
Explanation:

East-West service insertion refers to the ability to insert security services, such as firewall and intrusion detection and prevention, between virtual machines (VMs) that are communicating within the same logical network.

One of the insertion points for East-West service insertion is the virtual network interface card (vNIC) of the guest VM. The vNIC is the virtual representation of a physical NIC on a VM, and it connects the VM to the virtual network. By inserting security services at the vNIC level, traffic between VMs can be inspected and secured before it reaches the virtual switch.

VMware NSX-T Data Center documentation https://docs.vmware.com/en/VMware-NSX-T-Data-Center/index.html

VMware NSX-T Data Center Security documentation

https://docs.vmware.com/en/VMware-NSX-TData-Center/3.1/com.vmware.nsxt.security.doc/GUID-8F7C8B70-F1A6-4F31-8D6CA0A9B9C9A9D3.html

asked 16/09/2024
Kingsley Tibs
47 questions

Question 14

Report Export Collapse

An NSX administrator has been tasked with configuring a remote logging server (192.168.110.60) to send FW connections and packets logs to a remote logging server. The administrator is using this command syntax found in the NSX-T 3.1 documentation:

VMware 5V0-41.21 image Question 14 10713 09162024012854000000

Which of the following commands does the administrator use to complete the configuration task?

Become a Premium Member for full access
  Unlock Premium Member

Question 15

Report Export Collapse

Which dot color indicates an on-going attack of medium severity in the IDS/IPS events tab of NSX-T Data Center?

Become a Premium Member for full access
  Unlock Premium Member

Question 16

Report Export Collapse

An administrator needs to send FW connections logs to a remote server.

Which sequence of commands does the administrator need to apply on their ESXi Host?

A)

VMware 5V0-41.21 image Question 16 10715 09162024012854000000

B)

VMware 5V0-41.21 image Question 16 10715 09162024012854000000

C)

VMware 5V0-41.21 image Question 16 10715 09162024012854000000

D)

VMware 5V0-41.21 image Question 16 10715 09162024012854000000

Become a Premium Member for full access
  Unlock Premium Member

Question 17

Report Export Collapse

There has been a confirmed case of virus infection on multiple VMs managed by Endpoint Protection. A security administrator wants to create a group to quarantine infected VMs in the future.

What criteria will be used to build this group?

Become a Premium Member for full access
  Unlock Premium Member

Question 18

Report Export Collapse

A security administrator has configured NSX Intelligence for discovery. They would like to get recommendations based on the changes in the scope of the input entities every hour.

What needs to be configured to achieve the requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 19

Report Export Collapse

Which of the following describes the main concept of Zero-Trust Networks for network connected devices?

Become a Premium Member for full access
  Unlock Premium Member

Question 20

Report Export Collapse

Which three security objects are provided as an output in a recommendation session in NSX Intelligence? (Choose three.)

Become a Premium Member for full access
  Unlock Premium Member
Total 70 questions
Go to page: of 7
Search

Related questions