VMware2V0-642-121Q_V1.pdf 题库全覆盖,稳!
易错题:
30、Whichcomponent automates the consumption of third-party services and providesmapping to virtual machines using alogical policy? A. NSX Manager B. Cloud Management Platform (CMP) C. Service Composer D. NSX Data Security 47、Whatresource must a partner security service be registered with before the serviceis available to a security policy? A. NSX Manager B. ESXi host C. Service Composer D. vCenter Server 119、Which virtual machine does VMware recommended be manually excluded from the Distributed Firewall? A. NSX Manager B. Microsoft SQL Server C. vRealize Automation Appliance D. vCenter Server ========================================================================= 6、Which two NSX Data Security roles could be assigned to view configured policies and violationreports? (Choose two.) A. Security Administrator B. NSX Administrator C. Auditor D. Enterprise Administrator 21、What isthe most restrictive NSX role that can be used to create and publish securitypolicies and install virtual appliances? A. Security Administrator B. NSX Administrator C. Auditor D. Enterprise Administrator 76、What is theminimum NSX role necessary for a user to edit the firewall on anEdge Services Gateway (ESG)? A. Auditor B. NSX Administrator C. Enterprise Administrator D. Security Administrator 86、Whichtwo NSX roles could be used to create security policies? (Choose two.) A. Enterprise Administrator B. Security Administrator C. NSX Administrator D. Auditor 121、Whichtwo NSX Data Security roles could be used to create security policies?(Choose two) A. Auditor B. NSX Administrator C. Enterprise Administrator D. Security Administrator ======================================================================== 7、Whichtool is used to detect rogue services? A. NSX Logical Firewall B. NSX Logical Router C. Activity Monitoring D. Flow Monitoring 17、WhichNSX component can validate that security policies at your organization arebeing enforced correctly? A. Activity Monitoring B. Flow Monitoring C. ERSPAN D. Distributed firewalls 55、Anetwork administrator is troubleshooting an issue and needs to observe aninjected packet as it passes through the physical and logical network. Whichtool will accomplish this? A. Traceflow B. NetFlow C. Flow Monitoring D. Activity Monitoring 66、Whatcan be enabled on the vSphereDistributed Switch to monitor IP packets that are passing through a distributed port group? A. Traffic Marking B. TraceFlow C. Traffic Filtering D. NetFlow ======================================================================== 98、Whichtype of VPN should be configured to ensure application mobility between datacenters? A. Application VPN B. L2VPN C. IPSec VPN D. SSL VPN-Plus 117、A groupof users needs secured access to a set of web-based applications in a SDDC.Which VPN option is best suited for this? A. IPSec VPN B. SSL VPN-Plus C. L2VPN D. Application VPN
|