有利的6V0-21.25認證,最新的學習資料幫助妳快速通過6V0-21.25考試如果你是找考試資料或學習書籍?試試我們的免費的 VMware 的 6V0-21.25 考題吧!這是一個免費試用考試PDF測試版本的考題,你可以類比真實的考試情景,可以快速讓你掌握 VMware 的基礎知識。我們的 6V0-21.25 權威考試題庫軟體是 VMware 認證廠商的授權產品。正確率100%,讓你一次性輕松通過 VMware 6V0-21.25 考試。 最新的 VMware Certified Professional 6V0-21.25 免費考試真題 (Q12-Q17):問題 #12
Which three types of malware can be detected and blocked by NSX Malware Prevention?
(Choose three)
Response:
A. Keyloggers
B. Ransomware
C. DNS cache corruption
D. Botnet droppers
E. Data deduplication anomalies
答案:A,B,D
問題 #13
In a large-scale deployment, how can administrators reduce firewall rule sprawl and improve manageability?
Response:
A. Leverage security groups and tagging for policy abstraction
B. Create a rule for every individual VM
C. Disable rule logging for all policies
D. Use physical IP addresses in every rule
答案:A
問題 #14
Which two factors are typically used to create distributed firewall policies that protect lateral workload communication?
(Choose two)
Response:
A. Storage policy affinity
B. MAC address of the source VM
C. VM Tag or Security Group membership
D. Disk capacity of the destination VM
E. Disk capacity of the destination VM
答案:C,E
問題 #15
In the context of securing a private cloud, which two are considered best practices when designing workload isolation strategies?
(Choose two)
Response:
A. Group workloads by function and apply role-based security policies
B. Allow all traffic within a cluster to avoid unnecessary latency
C. Use VLANs as the only method of segmentation
D. Employ security groups tied to VM tags or attributes
E. Disable logging on security rule sets for performance reasons
答案:A,D
問題 #16
Which two methods can be used to monitor the hit count for vDefend firewall rules?
(Choose two)
Response: