ExamGecko
Question list
Search
Search

Related questions











Question 31 - 5V0-41.21 discussion

Report
Export

An organization wants to add security controls for contractor virtual desktops. Which statement Is true when configuring an NSX Identity firewall rule?

A.
User Identity can be used in the both the Source and the Destination sections of the firewall rule.
Answers
A.
User Identity can be used in the both the Source and the Destination sections of the firewall rule.
B.
User Identity can only be used in the Source section of the firewall rule.
Answers
B.
User Identity can only be used in the Source section of the firewall rule.
C.
User Identity cannot be used in Source or Destination sections of the firewall rule.
Answers
C.
User Identity cannot be used in Source or Destination sections of the firewall rule.
D.
User Identity can only be used in the Destination Section of the firewall rule.
Answers
D.
User Identity can only be used in the Destination Section of the firewall rule.
Suggested answer: B

Explanation:

In NSX-T, Identity firewall rules allow you to specify security controls based on the identity of the user, rather than the IP address or other network-based attributes. User identity can be used as a source in the firewall rule.

asked 16/09/2024
Misael E
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first