List of questions
Related questions
Question 12 - 5V0-41.21 discussion
A Security Administrator needs to update their NSX Distributed IDS/IPS policy to detect new attacks with critical CVSS scoring that leads to credential theft from targeted systems.
Which actions should you take?
A.
• Update Distributed IDS/IPS signature database• Edit your profile from Security > Distributed IDS > Profiles• Select Critical severity, filter on attack type and select Successful Credential Theft Detected• Check the profile is applied in Distributed IDS rules
B.
• Edit your Distributed IDS rule from Security > Distributed IDS/IPS > Rules• Filter on attack type and select Successful Credential Theft Detected• Update Mode to detect and prevent• Click on gear icon and change direction to OUT
C.
• Create a new profile from Security > Distributed IDS > Profiles• Select Critical severity, filter on attack type and select Successful Credential Theft Detected• Check the profile is applied In Distributed IDS rules• Monitor Distributed IDS alerts to validate changes are applied
D.
• Edit your Distributed IDS rule from Security > Distributed IDS/IPS > Rules• Filter on attack type and select Successful Credential Theft Detected• Update Mode to detect and prevent• Click on gear icon and change direction to IN-OUT
Your answer:
0 comments
Sorted by
Leave a comment first