ExamGecko
Question list
Search
Search

Related questions

Question 31 - 2V0-41.23 discussion

Report
Export

Which three data collection sources are used by NSX Network Detection and Response to create correlations/Intrusion campaigns? (Choose three.)

A.
Files and anti-malware (lie events from the NSX Edge nodes and the Security Analyzer
Answers
A.
Files and anti-malware (lie events from the NSX Edge nodes and the Security Analyzer
B.
East-West anti-malware events from the ESXi hosts
Answers
B.
East-West anti-malware events from the ESXi hosts
C.
Distributed Firewall flow data from the ESXi hosts
Answers
C.
Distributed Firewall flow data from the ESXi hosts
D.
IDS/IPS events from the ESXi hosts and NSX Edge nodes
Answers
D.
IDS/IPS events from the ESXi hosts and NSX Edge nodes
E.
Suspicious Traffic Detection events from NSX Intelligence
Answers
E.
Suspicious Traffic Detection events from NSX Intelligence
Suggested answer: A, D, E

Explanation:

The correct answers are A. Files and anti-malware (file) events from the NSX Edge nodes and the Security Analyzer, D. IDS/IPS events from the ESXi hosts and NSX Edge nodes, and E. Suspicious Traffic Detection events from NSX Intelligence.According to the VMware NSX Documentation3, these are the three data collection sources that are used by NSX Network Detection and Response to create correlations/intrusion campaigns.

The other options are incorrect or not supported by NSX Network Detection and Response.East-West anti-malware events from the ESXi hosts are not collected by NSX Network Detection and Response3.Distributed Firewall flow data from the ESXi hosts are not used for correlation/intrusion campaigns by NSX Network Detection and Response3.

https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.2/administration/GUID-14BBE50D-9931-4719-8FA7-884539C0D277.html

asked 16/09/2024
alain giansily
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first