VMware vDefend Security for VCF 5.x Administrator 認定 6V0-21.25 試験問題:
1. Which two techniques are fundamental to securing private cloud infrastructure from lateral threat movement within the data center?
(Choose two)
Response:
A) Implementing storage tiering for sensitive data
B) Applying context-aware DFW rules
C) Enabling east-west micro-segmentation policies
D) Utilizing network traffic mirroring tools only at the edge
E) Consolidating all VMs to a single cluster
2. In VMware's vDefend firewall architecture, which two constructs are primarily used to group workloads for security policy application?
(Choose three)
Response:
A) Physical NIC Uplinks
B) VM Tags
C) Custom Host Profiles
D) Logical Switches
E) NSX Security Groups
3. Which two tools are used to troubleshoot connectivity and rule enforcement issues within a vDefend environment?
(Choose 2)
Response:
A) NSX Manager Packet Capture
B) Log Insight Collector
C) Traceflow
D) vSAN Disk Group Monitor
E) ESXi Configuration Assist
4. Which approach best ensures accurate application dependency mapping for micro-segmentation?
Response:
A) Review VM snapshot history and deploy generic policies
B) Analyze vSphere health check reports
C) Create rules based on MAC address whitelisting
D) Use NSX flow analytics to monitor traffic over time
5. Which two actions can a Gateway Firewall rule perform when evaluating network traffic?
(Choose two)
Response:
A) Encrypt the payload before delivery
B) Modify subnet masks dynamically
C) Log the traffic flow for auditing purposes
D) Allow or deny traffic based on source/destination criteria
E) Redirect traffic to a Distributed Firewall
質問と回答:
質問 # 1 正解: B、C | 質問 # 2 正解: B、E | 質問 # 3 正解: A、C | 質問 # 4 正解: D | 質問 # 5 正解: C、D |