Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium VMware 6V0-21.25 Dumps Questions Answers

Page: 1 / 6
Total 75 questions

VMware vDefend Security for VCF 5.x Administrator Questions and Answers

Question 1

Which of the following NTA (Network Traffic Analysis) detector does NOT require Learning mode?

Options:

A.

Destination IP Profiler

B.

Horizontal Port Scan

C.

LLMNR/NBT-NS Poisoning and Relay

D.

Unusual Network Traffic Pattern

Buy Now
Question 2

Which of the following are valid Network Traffic Analysis detectors in vDefend ATP? (Select all that apply)

Options:

A.

DNS tunneling

B.

Unusual traffic pattern

C.

Password brute force

D.

Vertical port scan

Question 3

In the context of Network Traffic Analysis, VMs can be selectively excluded from monitoring for particular detectors.

Options:

A.

True

B.

False

Question 4

Which of the following must be done in order to detect DNS anomalies with NTA? (Select all that apply)

Options:

A.

Do nothing, it works out of the box

B.

Configure a L4 TCP/UDP port 53 allow rule

C.

Configure a L7 APPID DNS rule allow rule

D.

Enable the DNS Tunneling and DGA detectors

Question 5

What is the recommended Gateway Firewall edge size for production environments?

Options:

A.

Small

B.

Medium

C.

Large or X-Large

D.

Any size

Question 6

Which of the following API call actions are associated with Update in the CRUD operations? (Select all that apply)

Options:

A.

POST

B.

GET

C.

PUT

D.

PATCH

E.

DELETE

Question 7

Which of the following is NOT a feature of the VMware vDefend Gateway Firewall?

Options:

A.

Implemented on Edge Node

B.

Layer 7 APP-ID

C.

Guest Introspection

D.

TLS Decryption

Question 8

Which of the following represent operational inefficiencies for application owners when it comes to security implementation? (Select all that apply)

Options:

A.

Lack of visibility in hybrid cloud environments

B.

Lack of automation across tools and platforms

C.

Lack of communication between infrastructure and application teams

D.

Lack of application awareness for network-based security policies

Question 9

Which of the following statements are true about Distributed Malware? (Select all that apply)

Options:

A.

Offers Detection

B.

Offers Detection and Prevention

C.

Supports Windows and Linux

D.

Sends events to NDR

E.

All of the above

Question 10

Which of the following are important components to cyber security design? (Select all that apply)

Options:

A.

Proactive protection

B.

Deep visibility

C.

Recovery

D.

Kernel remediation and upgrade

Question 11

VMware vDefend Security Services Platform (SSP) is required for which of the following security features? (Select all that apply)

Options:

A.

Security Intelligence

B.

Network Detection and Response

C.

Network Traffic Analysis

D.

Malware Protection

E.

Distributed Firewall Security Policy

F.

Gateway Firewall Security Policy

Question 12

Which one of the following is NOT one of the use-cases of Distributed Intrusion Detection and Prevention?

Options:

A.

Provide routing capability for an air-gapped network to securely access the internet

B.

Enable software-based IDS/IPS for Critical applications

C.

Prevent lateral movement of attackers by blocking vulnerabilities

D.

Achieve regulatory compliance requirements for PCI-DSS, HIPAA, SOX

Question 13

Which of the following are optional CNI Plugin functionalities? (Select all that apply)

Options:

A.

East-West service load balancing

B.

Pod network connectivity

C.

NetworkPolicy enforcement

D.

IP address management (IPAM)

Question 14

Which of the following are advantages of VMware vDefend versus using legacy security tools? (Select all that apply)

Options:

A.

No network changes are required to implement security policies

B.

Tapless network visibility

C.

Centralized Intrusion Detection and Intrusion Prevention

D.

IP/Subnet based policy creation

Question 15

Which of these are NOT a grouping criteria when creating a dynamic group? (Select all that apply)

Options:

A.

IncludeAll

B.

ExcludeAll

C.

StartsWith

D.

Contains

Question 16

Which of the following accurately reflects the way security policies are processed by VMware vDefend Firewall?

Options:

A.

Security policies are processed top-to-bottom across Ethernet, Emergency, Infrastructure, Environment, and Application

B.

Security policies are processed top-to-bottom across Application, Environment, Infrastructure, Emergency, and Ethernet

C.

Security policies are processed bottom-to-top across Ethernet, Emergency, Infrastructure, Environment, and Application

D.

Security policies are processed bottom-to-top across Application, Environment, Infrastructure, Emergency, and Ethernet

Question 17

vDefend firewall provides support to VMs connected to which of the following?

Options:

A.

VMs connected to Overlay Networks

B.

VMs connected to VLAN Networks

C.

VMs connected to DvPG Networks

D.

All of the above

Question 18

Which of the following is not an available option for membership criteria selection when creating group of type Antrea?

Options:

A.

K8s Namespace

B.

Antrea Egress

C.

K8s NetworkPolicy

D.

K8s Service

Question 19

Which of the following are true regarding Antrea? (Select all that apply)

Options:

A.

Antrea Agent runs on every Worker Node

B.

Antrea integration allows support of mixed rules of Virtual Machines and Kubernetes objects

C.

Antrea Agent computes NetworkPolicies from K8s and publishes the results to the Antrea Controller

D.

Antrea Agent runs on every node of the management cluster

Question 20

Which of the following are vDefend Advanced Threat Prevention capabilities? (Select all that apply)

Options:

A.

Intrusion Detection/Protection Systems (IDS/IPS)

B.

Network Traffic Analysis (NTA)

C.

Gateway Firewall

D.

Network Detection and Response (NDR)

E.

Malware Analysis/Sandboxing

Question 21

Which of the following is true regarding the vDefend Gateway Firewall?

Options:

A.

Supported only on the T0 Gateway

B.

Supported only on the T1 Gateway

C.

Supported on both T0 and T1 Gateway

D.

Supported only when IPSec VPN is configured

Question 22

In the context of Role-Based access control which of the following is NOT a built-in vDefend Role?

Options:

A.

Privileged Admin

B.

Auditor

C.

Network Admin

D.

Security Admin

Page: 1 / 6
Total 75 questions