10/200 questions · Unlock full access
Q1

A financial services firm is deploying a new three-tier application within a VMware Cloud Foundation workload domain. To comply with PCI-DSS requirements, the security team must implement a zero-trust security model using vDefend Distributed Firewall. The initial goal is to understand all traffic flows without blocking legitimate communication before moving to a full enforcement model. Which vDefend feature should the administrator use to achieve this initial goal, and what is the correct state for the firewall rule section containing the micro-segmentation policy?

Q2

A security administrator is troubleshooting a connectivity issue where a web server VM cannot communicate with its database server VM. Both VMs are in the same workload domain and logical switch. A vDefend Distributed Firewall rule is in place to explicitly allow TCP port 1433 from the web server's security group to the database server's security group. However, traffic is being dropped. The administrator has verified that both VMs are in the correct security groups. Which of the following is the MOST likely cause of this issue?

Q3Multiple answers

An organization is deploying a vDefend Gateway Firewall in a high-availability (HA) active/standby configuration to protect north-south traffic. To ensure seamless failover and stateful connection persistence, which TWO mechanisms must be configured? (Select TWO)

Q4

True or False: The vDefend Distributed Firewall (DFW) is deployed as a series of virtual appliances on a dedicated management cluster and inspects traffic that is routed to it from workload ESXi hosts.

Q5

A security operations team observes a significant increase in DNS queries for known malicious domains originating from multiple VMs in the developer workload domain. The vDefend NTA/NDR system has generated a high-severity alert correlating these events. What is the primary function of the NDR component in this scenario?

Q6

A DevOps team wants to manage vDefend security policies as code using Terraform. They need to create a new security group for a set of Kubernetes pods identified by a specific label. Which vDefend component must they interact with via the Terraform provider to accomplish this?

Q7

When securing a Kubernetes environment with vDefend, what is the primary purpose of creating security policies based on Kubernetes labels and namespaces?

Q8

An administrator needs to tune vDefend IDPS performance and reduce the number of false positive alerts. The IDPS is generating a high volume of alerts for legitimate application traffic that uses a custom protocol over TCP port 8443. Which action would be the MOST effective first step to address this issue without weakening the overall security posture?

Q9Multiple answers

A healthcare organization is subject to HIPAA regulations and must implement robust security controls for its patient data management application running on VCF. The security architect has designed a multi-layered defense strategy using vDefend Advanced Threat Prevention (ATP). Which THREE of the following vDefend components work together as part of the ATP solution to detect and block zero-day and sophisticated malware? (Select THREE)

Q10

A university implements a Virtual Desktop Infrastructure (VDI) environment on VCF for its students. The security policy requires that students can only access a specific set of academic application servers from their VDI sessions, and access should be based on their enrollment in the 'Engineering' Active Directory group. Which vDefend feature is specifically designed to enforce this type of user-based access control?