Which security technology is used by User World Agent (UWA) to communicate with VMware NSX Controller on the control planed
A. Tunneled Transport Layer Security (TTLS)
B. Transport Layer Security (TLS)
C. Secure Sockets Layer (SSL)
D. iPsec
What are three common problems for administrators when managing application with network security models that are not virtualized? (Choose three.)
A. Lack of Interoperability and automation creates error-prone manual work.
B. Integration of third-party security products with home products is not possible.
C. Deploying and managing third-party security products become difficult.
D. Load balancing by vMotion is not possible.
E. There is limited visibility into a workload's security posture and policies.
Which setback is NOT related to the hardware-centric legacy of networking?
A. Unpredicted downtime occurrences.
B. Insufficient and weak perimeter security.
C. Increased capital and operational costs.
D. Complexity in service deployment.
Which component of VMware Horizon acts as a broker for client connections, providing authentication to users and directing incoming desktop requests from users to View virtualized desktops?
A. View Client
B. View Administrator
C. View Composer
D. View Connection Server
An administrator decides to implement logical switching to establish connectivity between virtual machines that reside on the same host Which layer is used by logical switching to provide this connectivity?
A. Layer 4
B. Layer 5
C. Layer 3
D. Layer 2
How do virtual networks that are natively isolated from each other provide support for overlapping IP address in a multi-tenant environment?
A. By enabling isolation without using access control lists and firewall rules.
B. By enabling isolation with the help of Active Directory (AD).
C. By employing the spanning tree protocol.
D. By implementing load balancing.
A security policy is a collection of security services of firewall rules, or both. Which security service is applied to virtual machines to ensure data security?
A. Virtual machine
B. Guest Introspection
C. Network Introspection
D. SpoofGuard
In a Software-Defined Data Center (SDDC) that has a distributed firewall, where are the firewall policies enforced?
A. Guest operating system
B. Uplink ports
C. Virtual machine's virtual interface
D. Host
What are the three functional planes of the VMware NSX architecture? (Choose three.)
A. Routing
B. Control
C. Data
D. Integration
E. Management
Which plane of the VMware NSX architecture provides a single point of configuration and Representational State Transfer (REST) API entry points?
A. Management
B. Control
C. Integration
D. Data