Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the VMware NSX-T Data Center Security Skills 2023 5V0-41.21 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam 5V0-41.21 Premium Access

View all detail and faqs for the 5V0-41.21 exam


440 Students Passed

85% Average Score

91% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

An NSX administrator has been tasked with deploying a NSX Edge Virtual machine through an ISO image.

Which virtual network interface card (vNIC) type must be selected while creating the NSX Edge VM allow participation in overlay and VLAN transport zones?

Options:

A.

e1000

B.

VMXNET2

C.

VMXNET3

D.

Flexible

Questions # 2:

An administrator needs to configure their NSX-T logging to audit changes on firewall security policy. The administrator Is using the following command from NSX-T3.1 documentation :

Question # 2

Which Message ID from the following list will allow the administrator to track changes on firewall security rules?

Options:

A.

FABRIC

B.

MONITOR

C.

SYSTEM

D.

FIREWALL

Questions # 3:

Which of the following are the local user accounts used to administer NSX-T Data Center?

Options:

A.

operator, admin, audit

B.

admin, super, read-only

C.

operator, admin, root

D.

admin, audit, root

Questions # 4:

A security administrator recently enabled Guest Introspection on NSX-T Data Center.

Which would be a reason none of the Microsoft Windows based VMs are reporting any information?

Options:

A.

Windows VMs require a reboot.

B.

VMware Tools need to be reconfigured.

C.

NSX Manager require a reboot.

D.

NSX Manager needs to be reconfigured.

Questions # 5:

An organization wants to add security controls for contractor virtual desktops. Which statement Is true when configuring an NSX Identity firewall rule?

Options:

A.

User Identity can be used in the both the Source and the Destination sections of the firewall rule.

B.

User Identity can only be used in the Source section of the firewall rule.

C.

User Identity cannot be used in Source or Destination sections of the firewall rule.

D.

User Identity can only be used in the Destination Section of the firewall rule.

Questions # 6:

An NSX administrator has turned on logging for the distributed firewall rule. On an ESXi host, where will the logs be stored?

Options:

A.

/var/log/esxupdate.log

B.

/var/log/dfwpktlogs.log

C.

/var/log/hostd.log

D.

/var/log/vmkerntl.log

Questions # 7:

At which OSI Layer do Next Generation Firewalls capable of analyzing application traffic operate?

Options:

A.

Layer 4

B.

Layer 3

C.

Layer 7

D.

Layer 2

Questions # 8:

An administrator wants to use Distributed Intrusion Detection. How is this implemented in an NSX-T Data Center?

Options:

A.

As a distributed solution across multiple ESXi hosts.

B.

As a distributed solution across multiple KVM hosts.

C.

As a distributed solution across multiple NSX Managers.

D.

As a distributed solution across multiple NSX Edge nodes.

Questions # 9:

Reference the CLI output.

Question # 9

What is the source IP address in the distributed firewall rule to accept HTTP traffic?

Options:

A.

172.16.30.11

B.

172.16.10.12

C.

172.16.10.11

D.

172.16.20.11

Questions # 10:

A company's CTO has requested that all logging should be enabled for all NSX-T Data Center Distributed Firewall rules. What should be considered prior to executing this request?

Options:

A.

Large amounts of log information can fill up the vSphere Server database.

B.

Logging can only be enabled for sections and not for single rules.

C.

Once logging is enabled for all rules it cannot be disabled afterwards.

D.

Large amounts of log information will likely affect performance.

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.