List of questions
Related questions
Question 31 - 2V0-41.23 discussion
Which three data collection sources are used by NSX Network Detection and Response to create correlations/Intrusion campaigns? (Choose three.)
A.
Files and anti-malware (lie events from the NSX Edge nodes and the Security Analyzer
B.
East-West anti-malware events from the ESXi hosts
C.
Distributed Firewall flow data from the ESXi hosts
D.
IDS/IPS events from the ESXi hosts and NSX Edge nodes
E.
Suspicious Traffic Detection events from NSX Intelligence
Your answer:
0 comments
Sorted by
Leave a comment first