ExamGecko
Home Home / VMware / 5V0-41.21

VMware 5V0-41.21 Practice Test - Questions Answers, Page 3

Question list
Search
Search

Related questions











What must an administrator deploy to provide Linux based VMs with antivirus protection?

A.
Antivirus Agent in NSX
A.
Antivirus Agent in NSX
Answers
B.
Antivirus Agent in vCenter
B.
Antivirus Agent in vCenter
Answers
C.
Guest Introspection Thin Agent
C.
Guest Introspection Thin Agent
Answers
D.
Guest Customization Agent
D.
Guest Customization Agent
Answers
Suggested answer: C

Explanation:

NSX provides a feature called Guest Introspection that allows administrators to provide security services to virtual machines, including antivirus protection. One of the components of Guest Introspection is the Guest Introspection Thin Agent, which must be deployed to provide Linux-based VMs with antivirus protection. The Thin Agent is a lightweight agent that runs inside the guest operating system of virtual machines and communicates with the NSX Manager to provide security services.

Once the Guest Introspection Thin Agent is deployed, the administrator can configure the antivirus service to scan virtual machines for malware and take action on any threats that are detected.

Reference:

VMware NSX Guest Introspection documentation https://docs.vmware.com/en/VMware-NSX-TData-Center/3.1/com.vmware.nsxt.guest_introspection.doc/GUID-A86FBAF1-A8D9-4E12-8F3D-04B3D89B8F7E.html

VMware NSX Guest Introspection Thin Agent documentation https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/com.vmware.nsxt.guest_introspection.doc/GUID-A86FBAF1-A8D9-4E12-8F3D-04B3D89B8F7E.html

A company's CTO has requested that all logging should be enabled for all NSX-T Data Center Distributed Firewall rules. What should be considered prior to executing this request?

A.
Large amounts of log information can fill up the vSphere Server database.
A.
Large amounts of log information can fill up the vSphere Server database.
Answers
B.
Logging can only be enabled for sections and not for single rules.
B.
Logging can only be enabled for sections and not for single rules.
Answers
C.
Once logging is enabled for all rules it cannot be disabled afterwards.
C.
Once logging is enabled for all rules it cannot be disabled afterwards.
Answers
D.
Large amounts of log information will likely affect performance.
D.
Large amounts of log information will likely affect performance.
Answers
Suggested answer: A

An administrator has configured a new firewall rule but needs to change the Applied-To parameter.

Which two are valid options that the administrator can configure? (Choose two.)

A.
DFW
A.
DFW
Answers
B.
rule
B.
rule
Answers
C.
services
C.
services
Answers
D.
profiles
D.
profiles
Answers
E.
groups
E.
groups
Answers
Suggested answer: A, D

Explanation:

For further reading, see the VMware NSX-T Data Center Administration Guide

(https://pubs.vmware.com/NSX-T-Data-Center/index.html#com.vmware.nsxt.admin.doc/GUID-704E1B2F-1E43-4E7F-97F2-59BBF8F6C9F6.html) for more information on configuring firewall rules.

Which of the following are the local user accounts used to administer NSX-T Data Center?

A.
operator, admin, audit
A.
operator, admin, audit
Answers
B.
admin, super, read-only
B.
admin, super, read-only
Answers
C.
operator, admin, root
C.
operator, admin, root
Answers
D.
admin, audit, root
D.
admin, audit, root
Answers
Suggested answer: A

Explanation:

For further reading, see the VMware NSX-T Data Center Administration Guide

(https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/com.vmware.nsxt.admin.doc/GUID-4A4E9FBE-50B3-4F8F-B6C4-8527E7A08A67.html) for more information on user accounts andpermissions in NSX-T Data Center.

As part of an audit, an administrator is required to demonstrate that measures have been taken to prevent critical vulnerabilities from being exploited. Which Distributed IDS/IPS event filter can the administrator show as proof?

A.
Attack Type
A.
Attack Type
Answers
B.
CVSS
B.
CVSS
Answers
C.
CVE
C.
CVE
Answers
D.
Signature ID
D.
Signature ID
Answers
Suggested answer: C

Explanation:

For further reading, see the VMware NSX-T Data Center Administration Guide

(https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/com.vmware.nsxt.admin.doc/GUIDA1A7F233-5F9F-4B2E-B3D3-0F8B593032F6.html) for more information on configuring theas the CVE filter can be used to filter out any events which are related to a specific vulnerability

Which two are used to define dynamic groups for an NSX Distributed Firewall? (Choose two.)

A.
segment
A.
segment
Answers
B.
physical servers
B.
physical servers
Answers
C.
machine name
C.
machine name
Answers
D.
tags
D.
tags
Answers
E.
segment's port
E.
segment's port
Answers
Suggested answer: C, D

Explanation:

For further reading, see the VMware NSX-T Data Center Administration Guide

(https://pubs.vmware.com/NSX-T-Data-Center/index.html#com.vmware.nsxt.admin.doc/GUIDBEDA8D9F-ACBC-42B1-B7F5-FEEF0E0D899C.html) for more information on configuring dynamicgroups.

What type of IDS/IPS system deployment allows an administrator to block a known attack?

A.
A system deployed in SPAN port mode.
A.
A system deployed in SPAN port mode.
Answers
B.
A system deployed inline with ALERT and DROP action.
B.
A system deployed inline with ALERT and DROP action.
Answers
C.
A system deployed inline with ALERT action.
C.
A system deployed inline with ALERT action.
Answers
D.
A system deployed in TERM mode.
D.
A system deployed in TERM mode.
Answers
Suggested answer: B

Explanation:

(https://pubs.vmware.com/NSX-T-Data-Center/index.html#com.vmware.nsxt.admin.doc/GUIDQuestionsand Answers PDF 16/38D9A6B1E7-FFCD-47A7-8E0C-FDD3DE6AC2B6.html) for more information on configuring an IDS/IPS system.

A security administrator is verifying the health status of an NSX Service Instance.

Which two parameters must be functioning for the health status to show as Up? (Choose two.)

A.
VMs must have at least one vNIC.
A.
VMs must have at least one vNIC.
Answers
B.
VMs must not have existing endpoint protection rules.
B.
VMs must not have existing endpoint protection rules.
Answers
C.
VMs must have virtual hardware version 9 or higher.
C.
VMs must have virtual hardware version 9 or higher.
Answers
D.
VMs must be available on the host.
D.
VMs must be available on the host.
Answers
E.
VMs must be powered on.
E.
VMs must be powered on.
Answers
Suggested answer: D, E

Explanation:

The health status of an NSX Service Instance is an indicator of the overall health and functionality of the service.

For an NSX Service Instance to show as Up, the following two parameters must be functioning:

D. VMs must be available on the host - The VMs that are associated with the service must be present on the host and able to communicate with the NSX Manager. If a VM is not available on the host, the service will not be able to function properly.

E. VMs must be powered on - The VMs that are associated with the service must be powered on and running. If a VM is not powered on, the service will not be able to function properly.

Which vCenter component is used by the NSX Manager to deploy the Partner Service VM on every host of a cluster configured for guest introspection?

A.
ESXi Agent Manager (EAM)
A.
ESXi Agent Manager (EAM)
Answers
B.
Auto Deploy
B.
Auto Deploy
Answers
C.
Update Manager (VUM)
C.
Update Manager (VUM)
Answers
D.
Component Manager
D.
Component Manager
Answers
Suggested answer: D

Explanation:

Component Manager is used to deploy the Partner Service VM on every host of a cluster configured for guest introspection.

For further reading, see the VMware NSX-T Data Center Administration Guide

(https://pubs.vmware.com/NSX-T-Data-Center/index.html#com.vmware.nsxt.admin.doc/GUIDACB4CE1E-4F6E-4B4F-96BF-9FA9DFFF9229.html) for more information on configuring guestintrospection.

To which object can time based rules be applied?

A.
Gateway Firewall only
A.
Gateway Firewall only
Answers
B.
DFW and Gateway Firewall both
B.
DFW and Gateway Firewall both
Answers
C.
DFW only
C.
DFW only
Answers
D.
DFW or Gateway Firewall, but not both at the same time
D.
DFW or Gateway Firewall, but not both at the same time
Answers
Suggested answer: C

Explanation:

For further reading, see the VMware NSX-T Data Center Administration Guide

(https://pubs.vmware.com/NSX-T-Data-Center/index.html#com.vmware.nsxt.admin.doc/GUID-8F9C6E9E-9C83-4CAD-BB3A-F4E4A25C6FE7.html) for more information on configuring time basedrules.

Total 70 questions
Go to page: of 7