VMware NSX-T Data Center 3.1 Security 認定 5V0-41.21 試験問題 (Q58-Q63):
質問 # 58 A security administrator is verifying why users are blocked from sports sites but are able to access gambling websites from the corporate network. What needs to be updated In nsx-T to block the gambling websites?
A. URL Analysis Attributes
B. Endpoint Protection Rules
C. Network Introspection Policy
D. vSphere Firewall Policy
正解:A
解説: In order to block the gambling websites, the security administrator needs to update the URL Analysis Attributes in NSX-T. URL Analysis Attributes are used to control access to web content, and can be configured to deny access to certain web destinations based on domain names or categories. For more information on URL Analysis Attributes and how to configure them, please refer to the NSX-T Data Center documentation [1]: https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.0/nsx-t-3.0-url-profile/GUID-F8BA3F3F-4A27-4B4F-8D2A-A013F68E1619.html https://docs.vmware.com/en/VMware-vSphere/7.0/rn/vsphere-vcenter-server-703-release-notes.html 1. VMware vCenter Server 7.0 Update 3 Release Notes https://docs.vmware.com/en/VMware-vSphere/7.0/rn/vsphere-vcenter-server-703-release-notes.html 質問 # 59 To which network operations does a user with the Security Engineer role have full access permission?
A. Networking Load Balancing, Networking DNS, Networking Forwarding Policies
B. Networking IP Address Pools, Networking NAT, Networking DHCP
C. Networking DHCP, Networking NAT, Networking Segments
D. Networking Forwarding Policies, Networking NAT, Networking VPN
正解:D 質問 # 60 Which two statements are true about IDS/IPS signatures? (Choose two.)
A. Users can upload their own IDS signature definitions from the NSX UI.
B. An IDS signature contains a set of instructions that determine which traffic is analyzed.
C. Users can create their own IDS signature definitions from the NSX UI.
D. An IDS signature contains data used to identify known exploits and vulnerabilities.
E. IDS Signatures can be High Risk, Suspicious, Low Risk and Trustworthy.
正解:B、D
解説: (https://pubs.vmware.com/NSX-T-Data-Center/index.html#com.vmware.nsxt.admin.doc/GUID-AFAF58DB-E661-4A7D-A8C9-70A3F3A3A3D3.html) 質問 # 61 A Security Administrator needs to update their NSX Distributed IDS/IPS policy to detect new attacks with critical CVSS scoring that leads to credential theft from targeted systems. Which actions should you take?
A. * Create a new profile from Security > Distributed IDS > Profiles * Select Critical severity, filter on attack type and select Successful Credential Theft Detected * Check the profile is applied In Distributed IDS rules * Monitor Distributed IDS alerts to validate changes are applied
B. * Edit your Distributed IDS rule from Security > Distributed IDS/IPS > Rules * Filter on attack type and select Successful Credential Theft Detected * Update Mode to detect and prevent * Click on gear icon and change direction to OUT
C. * Update Distributed IDS/IPS signature database * Edit your profile from Security > Distributed IDS > Profiles * Select Critical severity, filter on attack type and select Successful Credential Theft Detected * Check the profile is applied in Distributed IDS rules
D. * Edit your Distributed IDS rule from Security > Distributed IDS/IPS > Rules * Filter on attack type and select Successful Credential Theft Detected * Update Mode to detect and prevent * Click on gear icon and change direction to IN-OUT
正解:C
解説: https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/nsxt31ids_ips/GUID-B2D6A7F6- 質問 # 62 When using URL Analysis In NSX-T, which two services must be set in the URL rule to capture traffic over TCP and UDP? (Choose two.)