A security administrator needs to configure a firewall rule based on the domain name of a specific application.
Which field in a distributed firewall rule does the administrator configure?
A. Source
B. Policy
C. Profile
D. Service
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
When running nsxcli on an ESXi host, which command will show the Replication mode?
A. get logical-switch <Local-Switch-UUID> status
B. get logical-switches
C. get logical-switch status
D. get logical-switch <Logical-Switch-UUID>
正解:B
質問 3:
What must be configured on Transport Nodes for encapsulation and decapsulation of Geneve protocol?
A. TEP
B. UDP
C. VXLAN
D. STT
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
An administrator has deployed 10 Edge Transport Nodes in their NSX Environment, but has forgotten to specify an NTP server during the deployment.
What is the efficient way to add an NTP server to all 10 Edge Transport Nodes?
A. Use the CLI on each Edge Node
B. Use Transport Node Profile
C. Use a PowerCLI script
D. Use a Node Profile
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
The security administrator turns on logging for a firewall rule.
Where is the log stored on an ESXi transport node?
A. /var/log/fw.log
B. /var/log/dfwpktlogs.log
C. /var/log/messages.log
D. /var/log/vmware/nsx/firewall.log
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 6:
How does the Traceflow tool identify issues in a network?
A. Compares the management plane configuration states containing control plane traffic and error reporting from transport node agents.
B. Injects synthetic traffic into the data plane and observes the results in the control plane.
C. Injects ICMP traffic into the data plane and observes the results in the control plane.
D. Compares intended network state in the control plane with Tunnel End Point (TEP) keepalives in the data plane.
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 7:
Drag and Drop Question
Sort the rule processing steps of the Distributed Firewall. Order responses from left to right.

正解:

Explanation:
The correct order of the rule processing steps of the Distributed Firewall is as follows:
- Packet arrives at vfilter connection table. If matching entry in the table, process the packet.
- If connection table has no match, compare the packet to the rule table.
- If the packet matches source, destination, service, profile and applied to fields, apply the action defined.
- If the rule table action is allow, create an entry in the connection table and forward the packet.
- If the rule table action is reject or deny, take that action.
This order is based on the description of how the Distributed Firewall works in the web search results. The first step is to check if there is an existing connection entry for the packet in the vfilter connection table, which is a cache of flow entries for rules with an allow action. If there is a match, the packet is processed according to the connection entry. If there is no match, the packet is compared to the rule table, which contains all the security policy rules. The rules are evaluated from top to bottom until a match is found. The match criteria include source, destination, service, profile and applied to fields. The action defined by the matching rule is applied to the packet. The action can be allow, reject or deny. If the action is allow, a new connection entry is created for the packet and the packet is forwarded to its destination. If the action is reject or deny, the packet is dropped and an ICMP message or a TCP reset message is sent back to the source.
响*姫 -
社会人になり、教室に通いつめることも難しくなったので、この2V0-41.24問題集を買って勉強をしようと考えました。
内容はとにかくわかりやすく、初心者に優しい問題集になっており、無事、試験に合格することができました。