Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

5V0-41.21 VMware NSX-T Data Center 3.1 Security Free Practice Exam Questions (2025 Updated)

Prepare effectively for your VMware 5V0-41.21 VMware NSX-T Data Center 3.1 Security certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 70 questions

Which dot color indicates an on-going attack of medium severity in the IDS/IPS events tab of NSX-T Data Center?

A.

blinking yellow dot

B.

solid red dot

C.

solid orange dot

D.

blinking orange dot

An NSX administrator has turned on logging for the distributed firewall rule. On an ESXi host, where will the logs be stored?

A.

/var/log/esxupdate.log

B.

/var/log/dfwpktlogs.log

C.

/var/log/hostd.log

D.

/var/log/vmkerntl.log

In a brownfield environment with NSX-T Data Center deployed and configured, a customer is interested in Endpoint Protection integrations. What recommendation should be provided to the customer when it comes to their existing virtual machines?

A.

Virtual machine must be protected by vSphere HA.

B.

Virtual machine hardware should be version 10 or higher.

C.

A minimum installation of VMware tools is required.

D.

A custom install of VMware tools is required to select the drivers.

Which is the port number used by transport nodes to export firewall statistics to NSX Manager?

A.

1235

B.

4789

C.

6081

D.

1234

A security administrator has configured NSX Intelligence for discovery. They would like to get recommendations based on the changes in the scope of the input entities every hour.

What needs to be configured to achieve the requirement?

A.

Start a new recommendation.

B.

Publish the recommendations.

C.

Toggle the monitoring option on.

D.

Adjust the time range to 1 hour.

How does N5X Distributed IDS/IPS keep up to date with signatures?

A.

NSX Edge uses manually uploaded signatures by the security administrator.

B.

NSX-T Data Center is using a cloud based database to download the IDS/IPS signatures.

C.

NSX Manager has a local IDS/IPS signatures database that does not need to be updated.

D.

NSX Distributed IDS/IPS signatures are retrieved from updates.vmware.com.

At which two intervals are NSX-T IDS/IPS updates through VMware's cloud based internet service provided for threat signature files? (Choose two.)

A.

weekly periodic updates

B.

off-schedule for 0-day updates

C.

monthly periodic updates

D.

daily periodic updates

E.

bi-weekly periodic updates

What needs to be configured on each transport node prior to using NSX-T Data Center Distributed Firewall time-based rule publishing?

A.

DNS

B.

NTP

C.

PAT

D.

NAT

An administrator needs to configure their NSX-T logging to audit changes on firewall security policy. The administrator Is using the following command from NSX-T3.1 documentation :

Which Message ID from the following list will allow the administrator to track changes on firewall security rules?

A.

FABRIC

B.

MONITOR

C.

SYSTEM

D.

FIREWALL

An administrator wants to use Distributed Intrusion Detection. How is this implemented in an NSX-T Data Center?

A.

As a distributed solution across multiple ESXi hosts.

B.

As a distributed solution across multiple KVM hosts.

C.

As a distributed solution across multiple NSX Managers.

D.

As a distributed solution across multiple NSX Edge nodes.

Information Security Management (ISM) describes a set of controls that organizations employ to protect which properties?

A.

confidentiality, integrity, and availability

B.

confidentiality, interoperability, and availability

C.

configuration. Integrity, and availability

D.

confidentiality. Integrity, and accessibility

A security administrator recently enabled Guest Introspection on NSX-T Data Center.

Which would be a reason none of the Microsoft Windows based VMs are reporting any information?

A.

Windows VMs require a reboot.

B.

VMware Tools need to be reconfigured.

C.

NSX Manager require a reboot.

D.

NSX Manager needs to be reconfigured.

As part of an audit, an administrator is required to demonstrate that measures have been taken to prevent critical vulnerabilities from being exploited. Which Distributed IDS/IPS event filter can the administrator show as proof?

A.

Attack Type

B.

CVSS

C.

CVE

D.

Signature ID

To which object can time based rules be applied?

A.

Gateway Firewall only

B.

DFW and Gateway Firewall both

C.

DFW only

D.

DFW or Gateway Firewall, but not both at the same time

A Security Administrator needs to update their NSX Distributed IDS/IPS policy to detect new attacks with critical CVSS scoring that leads to credential theft from targeted systems.

Which actions should you take?

A.

• Update Distributed IDS/IPS signature database

• Edit your profile from Security > Distributed IDS > Profiles

• Select Critical severity, filter on attack type and select Successful Credential Theft Detected

• Check the profile is applied in Distributed IDS rules

B.

• Edit your Distributed IDS rule from Security > Distributed IDS/IPS > Rules

• Filter on attack type and select Successful Credential Theft Detected

• Update Mode to detect and prevent

• Click on gear icon and change direction to OUT

C.

• Create a new profile from Security > Distributed IDS > Profiles

• Select Critical severity, filter on attack type and select Successful Credential Theft Detected

• Check the profile is applied In Distributed IDS rules

• Monitor Distributed IDS alerts to validate changes are applied

D.

• Edit your Distributed IDS rule from Security > Distributed IDS/IPS > Rules

• Filter on attack type and select Successful Credential Theft Detected

• Update Mode to detect and prevent

• Click on gear icon and change direction to IN-OUT

A security administrator is required to protect East-West virtual machine traffic with the NSX Distributed Firewall. What must be completed with the virtual machine's vNIC before applying the rules?

A.

It is connected to the underlay.

B.

It must be connected to a vSphere Standard Switch.

C.

It is connected to an NSX managed segment.

D.

It is connected to a transport zone.

Refer to the exhibit.

An administrator is reviewing NSX Intelligence information as shown in the exhibit.

What does the red dashed line for the UDP:137 flow represent?

A.

Discovered communication

B.

Allowed communication

C.

Blocked communication

D.

Unprotected communication

An NSX administrator is trying to find the dvfilter name of the sa-web-01 virtual machine to capture the sa-web-01 VM traffic. What could be a reason the sa-web-01 VM dvfilter name is missing from the command output?

A.

sa-web-01 VM has the no firewall rules configured.

B.

ESXi host has 5SH disabled.

C.

sa-web-01 is powered Off on ESXi host.

D.

ESXi host has the firewall turned off.

Which is an insertion point for East-West service insertion?

A.

tier-1 gateway

B.

Partner SVM

C.

Guest VM vNlC

D.

transport node

What is the default action of the Default Layer 3 distributed firewall rule?

A.

Drop

B.

Allow

C.

Forward

D.

Reject

Page: 1 / 2
Total 70 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved