VMware NSX-T Data Center 3.1 Security 認定 5V0-41.21 試験問題 (Q21-Q26):
質問 # 21 An NSX administrator has been tasked with deploying a NSX Edge Virtual machine through an ISO image. Which virtual network interface card (vNIC) type must be selected while creating the NSX Edge VM allow participation in overlay and VLAN transport zones?
A. e1000
B. VMXNET2
C. Flexible
D. VMXNET3
正解:D 質問 # 22 Which three criteria help to determine the severity for a Distributed IDS/IPS? (Choose three.)
A. The Common Vulnerability Scoring System score specified in the signature.
B. The severity specified in the signature itself
C. The load balancer deployment type.
D. The Distributed Intrusion Detection and Intrusion Prevention rules.
E. The type-rating associated with the classification type.
正解:A、B、E
解説: For further reading, see the VMware NSX-T Data Center Administration Guide (https://pubs.vmware.com/NSX-T-Data-Center/index.html#com.vmware.nsxt.admin.doc/GUID-E6B25C6F-1F25-4B0F-B8AF-6B8C00F9C3A3.html) for more information on configuring the Distributed IDS/IPS. 質問 # 23 An NSX administrator has been tasked with configuring a remote logging server (192.168.110.60) to send FW connections and packets logs to a remote logging server. The administrator is using this command syntax found in the NSX-T 3.1 documentation:
Which of the following commands does the administrator use to complete the configuration task?
A. set logging-server 192.168.110.60 proto udp level info facility syslog message Id FIREWALL-CONNECTION
B. set logging-server 192.168.110.60 proto udp level info facility syslog message!-monitor. Firewall
C. set logging-server 192.168.110.60 proto udp level info facility syslog message Id FIREWALL-PKTLOG
D. set logging-server 192.168.110.60 proto udp levelinfo facility syslog message Id system,fabric
正解:C 質問 # 24 A security administrator is required to protect East-West virtual machine traffic with the NSX Distributed Firewall. What must be completed with the virtual machine's vNIC before applying the rules?
A. It must be connected to a vSphere Standard Switch.
B. It is connected to a transport zone.
C. It is connected to the underlay.
D. It is connected to an NSX managed segment.
正解:D
解説: In order to apply the rules, the vNIC of the virtual machine must be connected to an NSX managed segment. The NSX managed segment is a logical representation of the virtual network, and all rules are applied at this level. For more information on NSX Distributed Firewall and how to configure it, please refer to the NSX-T Data Center documentation: https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.0/nsx-t-3.0-firewall/GUID-B6B835F2-B6F2-4468-8F8E-6F7B9B9D6E91.html 質問 # 25 A Security Administrator needs to update their NSX Distributed IDS/IPS policy to detect new attacks with critical CVSS scoring that leads to credential theft from targeted systems. Which actions should you take?
A. * Edit your Distributed IDS rule from Security > Distributed IDS/IPS > Rules * Filter on attack type and select Successful Credential Theft Detected * Update Mode to detect and prevent * Click on gear icon and change direction to OUT
B. * Create a new profile from Security > Distributed IDS > Profiles * Select Critical severity, filter on attack type and select Successful Credential Theft Detected * Check the profile is applied In Distributed IDS rules * Monitor Distributed IDS alerts to validate changes are applied
C. * Update Distributed IDS/IPS signature database * Edit your profile from Security > Distributed IDS > Profiles * Select Critical severity, filter on attack type and select Successful Credential Theft Detected * Check the profile is applied in Distributed IDS rules
D. * Edit your Distributed IDS rule from Security > Distributed IDS/IPS > Rules * Filter on attack type and select Successful Credential Theft Detected * Update Mode to detect and prevent * Click on gear icon and change direction to IN-OUT