Which two of the following are used to configure Distributed Firewall on VDS? (Choose two.)
Answer : B, E
According to the VMware NSX Documentation, these are two of the ways that you can use to configure Distributed Firewall on VDS:
NSX API: This is a RESTful API that allows you to programmatically configure and manage Distributed Firewall on VDS using HTTP methods and JSON payloads. You can use tools such as Postman or curl to send API requests to the NSX Manager node.
NSX UI: This is a graphical user interface that allows you to configure and manage Distributed Firewall on VDS using menus, tabs, buttons, and forms. You can access the NSX UI by logging in to the NSX Manager node using a web browser.
What are two valid BGP Attributes that can be used to influence the route path traffic will take? (Choose two.)
Answer : A, D
AS-Path Prepend: This attribute allows you to prepend one or more AS numbers to the AS path of a route, making it appear longer and less preferable to other BGP routers. You can use this attribute to manipulate the inbound traffic from your BGP peers by advertising a longer AS path for some routes and a shorter AS path for others.
MED: This attribute stands for Multi-Exit Discriminator and allows you to specify a preference value for a route among multiple exit points from an AS. You can use this attribute to manipulate the outbound traffic to your BGP peers by advertising a lower MED value for some routes and a higher MED value for others.
Which of the two following characteristics about NAT64 are true? (Choose two.)
Which two are requirements for FQDN Analysis? (Choose two.)
What are four NSX built-in rote-based access control (RBAC) roles? (Choose four.)
Which of the following exist only on Tler-1 Gateway firewall configurations and not on Tier-0?
Answer : C
NSX improves the security of today's modern workloads by preventing lateral movement, which feature of NSX can be used to achieve this?
Answer : A
According to the web search results, network segmentation is a feature of NSX that improves the security of today's modern workloads by preventing lateral movement. Lateral movement is a technique used by attackers to move from one compromised system to another within a network, exploiting vulnerabilities or credentials . Network segmentation prevents lateral movement by dividing a network into smaller segments or zones, each with its own security policies and controls. This way, if one segment is compromised, the attacker cannot access other segments or resources . NSX enables network segmentation by using micro-segmentation, which applies granular firewall rules at the virtual machine level, regardless of the physical network topology .