Pre-Summer Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

VMware 6V0-21.25 Dumps

Page: 1 / 8
Total 75 questions

VMware vDefend Security for VCF 5.x Administrator Questions and Answers

Question 1

Which component is responsible for maintaining the flow state table for active traffic flows?

Options:

A.

Management Plane

B.

Data Plane

C.

Central Control Plane

D.

Local Control Plane

Question 2

Which of the following is NOT a feature of the VMware vDefend Gateway Firewall?

Options:

A.

Implemented on Edge Node

B.

Layer 7 APP-ID

C.

Guest Introspection

D.

TLS Decryption

Question 3

Which of the following are important components to cyber security design? (Select all that apply)

Options:

A.

Proactive protection

B.

Deep visibility

C.

Recovery

D.

Kernel remediation and upgrade

Question 4

Which of the following API call actions are associated with Creation in the CRUD operations? (Select all that apply)

Options:

A.

POST

B.

GET

C.

PUT

D.

PATCH

E.

DELETE

Question 5

Which following roles are pre-configured in roles and cannot be modified? (Select all that apply)

Options:

A.

Principal Identity Users

B.

External Users

C.

Local Users

D.

Admin

E.

Guest Users

F.

Audit

G.

Analyst

Question 6

Which of these are NOT a grouping criteria when creating a dynamic group? (Select all that apply)

Options:

A.

IncludeAll

B.

ExcludeAll

C.

StartsWith

D.

Contains

Question 7

When viewing the details of a Network Traffic Analysis detection event, what makes up the Impact Score? (Select all that apply)

Options:

A.

Confidence

B.

Campaign

C.

Detector

D.

Severity

Question 8

In the context of Role-Based access control which of the following is NOT a built-in vDefend Role?

Options:

A.

Privileged Admin

B.

Auditor

C.

Network Admin

D.

Security Admin

Question 9

What of the following is true regarding Distributed Firewall logging?

Options:

A.

Broadcom recommends logging all the DFW rules, as it does not have any CPU overhead

B.

VMware Cloud Foundation logging tools are the only supported remote log server supported

C.

The Firewall logs are first sent to the management plane to sanitize any Personally Identifiable Information

D.

Logging can be enabled on per rule basis

Question 10

What would best describe DGA activity?

Options:

A.

Trying to connect to randomly generated domains to obfuscate C2 traffic

B.

Intercepting packets to steal sensitive data

C.

Logging keystrokes to capture user credentials

D.

Exploiting vulnerabilities in web applications through SQL injection

Question 11

vDefend Malware Detection can be enforced on which of the following? (Select all that apply)

Options:

A.

T1 Uplinks

B.

T1 Downlinks

C.

T0 Downlinks

D.

T1 Service Interfaces

Question 12

In vDefend Malware Detection and Prevention, what technology is the sandbox built on?

Options:

A.

VMware virtualization

B.

Full System Emulation

C.

KVM virtualization

D.

Dedicated physical hardware

Question 13

Which of the following NTA (Network Traffic Analysis) detector does NOT require Learning mode?

Options:

A.

Destination IP Profiler

B.

Horizontal Port Scan

C.

LLMNR/NBT-NS Poisoning and Relay

D.

Unusual Network Traffic Pattern

Question 14

The VMware vDefend Management cluster is deployed by default with how many nodes?

Options:

A.

One

B.

Two

C.

Three

D.

Four

Question 15

VMware vDefend Security Services Platform (SSP) is required for which of the following security features? (Select all that apply)

Options:

A.

Security Intelligence

B.

Network Detection and Response

C.

Network Traffic Analysis

D.

Malware Protection

E.

Distributed Firewall Security Policy

F.

Gateway Firewall Security Policy

Question 16

Which vDefend Gateway Firewall feature is ONLY supported on T1 Gateways?

Options:

A.

Gateway IDRS

B.

Stateful Services on A/A Gateways

C.

Gateway IDFW

D.

L3/L4 Gateway Firewall

Question 17

Which of the following components can enforce Layer 7 Context Firewall Rules? (Select all that apply)

Options:

A.

Distributed Firewall

B.

Tier 1 Gateway

C.

Tier 0 Gateway

D.

VMK Interface

Question 18

For Distributed IDS/IPS to work, a Distributed firewall must be enabled.

Options:

A.

True

B.

False

Question 19

Which of the following must be done in order to detect DNS anomalies with NTA? (Select all that apply)

Options:

A.

Do nothing, it works out of the box

B.

Configure a L4 TCP/UDP port 53 allow rule

C.

Configure a L7 APPID DNS rule allow rule

D.

Enable the DNS Tunneling and DGA detectors

Question 20

Which of the following are valid Network Traffic Analysis detectors in vDefend ATP? (Select all that apply)

Options:

A.

DNS tunneling

B.

Unusual traffic pattern

C.

Password brute force

D.

Vertical port scan

Question 21

Which of the following does the Applied To field impact?

Options:

A.

Per VM vNIC rule count

B.

System wide rule count

C.

ESX host rule count

D.

NSX Manager rule count

Question 22

Which of the following API actions are not valid?

Options:

A.

GET

B.

POST

C.

UPDATE

D.

DELETE

Page: 1 / 8
Total 75 questions