Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 2V0-41.20 topic 1 question 12 discussion

Actual exam question from VMware's 2V0-41.20
Question #: 12
Topic #: 1
[All 2V0-41.20 Questions]

Which two choices are use cases for Distributed Intrusion Detection? (Choose two.)

  • A. Identify security vulnerabilities in the workloads.
  • B. Use agentless antivirus with Guest Introspection.
  • C. Quarantine workloads based on vulnerabilities.
  • D. Identify risk and reputation of accessed websites.
  • E. Gain insight about micro-segmentation traffic flows.
Show Suggested Answer Hide Answer
Suggested Answer: AC 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Gaffer71
Highly Voted 3 years, 4 months ago
A & C are correct. Please refer to page 455 section 7-58 of the ICM training guide.
upvoted 10 times
PortgasDLuis13
2 years, 11 months ago
Verified!. On ICM v3.1 is pg 453 but also section 7-58
upvoted 5 times
...
...
nithinp
Highly Voted 2 years, 11 months ago
Correct Answer : A & C ... NSX T3.0 Study guide 7-58 Distributed Intrusion Detection enables security administrators to: • Identify security vulnerabilities in the workloads • Quarantine and increase the security based on the detected vulnerabilities
upvoted 6 times
...
secdaddy
Most Recent 1 year, 6 months ago
Can someone share the URL for this ICM training guide please ?
upvoted 1 times
...
scotty_p
1 year, 9 months ago
A & C Lecture guide 7-58 "Use Cases for Distributed Intrusion Detection Distributed Intrusion Detection enables security administrators to: • Identify security vulnerabilities in the workloads • Quarantine and increase the security based on the detected vulnerabilities"
upvoted 1 times
...
Lazylinux
2 years, 2 months ago
Selected Answer: AC
AS per others comments
upvoted 1 times
...
michaelc10
2 years, 2 months ago
Selected Answer: AC
A,C - NSX-T Training course (2021): Use Cases for DID - Identify security vulnerabilities in the workloads; Quarantine and increase the security based on detected vulnerabilities.
upvoted 4 times
...
SScott
3 years, 4 months ago
A - Seems correct B - Not applicable C - Not a primary function of the Distributed IDS which logs, generates an alert which will then likely activate a rule to drop, block, quarantine the signature in the traffic from the firewall device D - CVSS applies but not to websites, we are talking workloads E - The signature and classification of the workflows is applicable A & E seem the best two choices here https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.0/administration/GUID-E1BCED36-F875-49A8-8622-10B63E904B0F.html https://virtual-llew.com/nsx-t-3-0-ids-what-makes-it-different-from-other-ids-solutions-and-how-do-i-configure-it/ https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.0/administration/GUID-986B7490-A87D-4CDD-84C0-CF8C4AE2B93C.html
upvoted 3 times
Zippy12
3 years, 4 months ago
I think that last link is evidence that E is not a correct answer. To do classification well, third party services are needed.
upvoted 1 times
...
...
RevanT
3 years, 5 months ago
A & C: Are correct.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...