Pre-Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

6V0-21.25 Questions and Answers

Question # 6

Which of the following API call actions are associated with Creation in the CRUD operations? (Select all that apply)

A.

POST

B.

GET

C.

PUT

D.

PATCH

E.

DELETE

Full Access
Question # 7

Which of the following are advantages of VMware vDefend versus using legacy security tools? (Select all that apply)

A.

No network changes are required to implement security policies

B.

Tapless network visibility

C.

Centralized Intrusion Detection and Intrusion Prevention

D.

IP/Subnet based policy creation

Full Access
Question # 8

What features does NSX Live Traffic Analysis tool provide? (Select all that apply)

A.

Live Traffic Trace

B.

Packet Capture

C.

Performance

D.

Packet Count

Full Access
Question # 9

Which of the following regular expressions can be used to define a custom FQDN or URL in the vDefend Firewall Context Profiles?

A.

*eng*.vmware.com

B.

eng*.vmware.com

C.

eng.*vmware.com

D.

*eng.vmware.com

Full Access
Question # 10

VMware vDefend Security Services Platform (SSP) is required for which of the following security features? (Select all that apply)

A.

Security Intelligence

B.

Network Detection and Response

C.

Network Traffic Analysis

D.

Malware Protection

E.

Distributed Firewall Security Policy

F.

Gateway Firewall Security Policy

Full Access
Question # 11

Which component is responsible for maintaining the flow state table for active traffic flows?

A.

Management Plane

B.

Data Plane

C.

Central Control Plane

D.

Local Control Plane

Full Access
Question # 12

Which one of the following are the ICMP Timer Variables that can be customized within the vDefend Distributed Firewall?

A.

First Packet, Open, Established, Closing, Fin Wait, and Closed

B.

First Packet, Single, and Multiple

C.

First Packet, and Error Reply

D.

Last Packet, and Static and Dynamic Errors

Full Access
Question # 13

You need to control traffic between the different zones of your IT infrastructure (I.E. Production, Dev, and DMZ). How should you build the respective security tags to be able to easily refer to all of them in your orchestration tool?

A.

Define each zone with a unique tag and a unique scope

B.

Define each zone with a unique tag, use the same scope for all tags

C.

Define each zone with a unique scope, use the same tag for all zones

D.

Define each zone with the same tag, use a unique scope for each tag

Full Access
Question # 14

You are building a VMware vDefend Distributed Firewall policy to protect an application. You want to be sure that the policy cannot be modified by two different users simultaneously. What should you do?

A.

Set the Locked option of the firewall policy to Yes

B.

Move the policy so that it is the first policy in the list

C.

Define the policy action as Block

D.

Use role-based access control to make all other users read-only users

Full Access
Question # 15

What three components feed their events into NDR?

A.

Intelligence, Distributed Firewall and Distributed IDPS

B.

NTA, Anti-Malware and IDPS

C.

Intelligence, Gateway Firewall and Distributed Firewall

D.

NTA, Distributed Firewall and Distributed IDPS

Full Access
Question # 16

By default, vDefend Malware Detection and Prevention blocks which of the following file types?

A.

Benign File

B.

Corrupted File

C.

Malicious File

D.

Suspicious File

Full Access
Question # 17

Which NSX authentication uses cookies for subsequent API calls instead of the username and password?

A.

HTTP Basic authentication

B.

Principal Identity authentication

C.

Certificate based authentication

D.

Session based authentication

Full Access
Question # 18

Which of the following is a benefit of combining Distributed IDS/IPS with Gateway IDS/IPS?

A.

Enhancing detection coverage for North/South and East/West traffic

B.

Eliminating the need for intrusion detection on virtual machines

C.

Reducing the reliance on NSX for security enforcement

D.

Allowing NSX-T to function without Service Routers

Full Access
Question # 19

Which of the following is NOT one of the advantages of Distributed Malware Detection and Prevention?

A.

Full system-emulation cloud sandbox enables detection of evasive malware

B.

All the traffic is hair-pinned to a centralized appliance for malware detection

C.

Support both Windows and Linux VMs

D.

Sees every malware interaction, not just those with the OS

Full Access
Question # 20

Which of the following VMware vDefend architecture components is responsible for providing API access?

A.

Management plane

B.

Control plane

C.

Data plane

D.

Orchestration plane

Full Access
Question # 21

What would best describe DGA activity?

A.

Trying to connect to randomly generated domains to obfuscate C2 traffic

B.

Intercepting packets to steal sensitive data

C.

Logging keystrokes to capture user credentials

D.

Exploiting vulnerabilities in web applications through SQL injection

Full Access
Question # 22

vDefend firewall provides support to VMs connected to which of the following?

A.

VMs connected to Overlay Networks

B.

VMs connected to VLAN Networks

C.

VMs connected to DvPG Networks

D.

All of the above

Full Access