Which three security features are dependent on the NSX Application Platform? (Choose three.)
Correct Answer:ACF
https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.2/nsx-application-platform/GUID-42EDE0AD-CD65-41AC-9694-AD0CCEC35969.html
Which two statements are true for IPSec VPN? (Choose two.)
Correct Answer:AC
IPSec VPN services can be configured at Tier-0 and Tier-1 gateways: In NSX, IPSec VPN services can be applied to both Tier-0 and Tier-1 gateways, allowing secure site-to-site connections from these gateway levels.
IPSec VPNs use the DPDK accelerated performance library: NSX leverages the Data Plane Development Kit (DPDK) for optimized performance, which accelerates packet processing for IPSec VPNs and improves throughput.
What are two functions of the Service Engines in NSX Advanced Load Balancer? (Choose two.)
Correct Answer:AC
Reference: https://docs.vmware.com/en/VMware-NSX-Advanced-Load- Balancer/22.1/Administration_Guide/GUID-84139C37-0129-40A7-A7AB- 5A93E1F65B6D.html
A company security policy requires all users to log into applications using a centralized authentication system.
Which two authentication, authorization, and accounting (AAA) systems are available when integrating NSX with VMware Identity Manager? (Choose two.)
Correct Answer:AD
RSA SecureID: RSA SecureID is a commonly used two-factor authentication (2FA) system that can integrate with VMware Identity Manager for enhanced security during authentication, making it a suitable AAA system for user authentication.
LDAP and OpenLDAP based on Active Directory (AD): VMware Identity Manager can integrate with LDAP and OpenLDAP directories, including Active Directory (AD), for
centralized user authentication. This allows users to authenticate against an organization's directory service.
DRAG DROP
Match the NSX Intelligence recommendations with their correct purpose.
Solution:
✑ Security policy recommendations: Are East-West distributed firewall (DFW) security policies in the application category12.
✑ Security group recommendations: Are VMs or physical servers whose traffic flows were analyzed for the time period and the boundary you had specified12.
✑ Service recommendations: Are service objects that were used by applications in the VMs or physical servers that you had specified, but the services are not yet defined in the NSX inventory12.
https://docs.vmware.com/en/VMware-NSX-Intelligence/4.1/user-guide/GUID-BA3B0D67- 4AA8-439E-A845-4598DAD6B9D0.html
Does this meet the goal?
Correct Answer:A