A security policy is a collection of security services of firewall rules, or both. Which security service is applied to virtual machines to ensure data security?
Correct Answer:
B
🗳️
Reference:
http://blogs.vmware.com/consulting/2015/01/automating-security-policy-enforcement-nsx-service-composer.html
Which NSX component enforces security rules between two virtual machines that are on the same Layer 2 segment?
Correct Answer:
(page 3)C
🗳️
Reference:
http://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/whitepaper/products/nsx/vmware-nsx-network-virtualization-platform-white- paper.pdf
How do virtual networks that are natively isolated from each other provide support for overlapping IP address in a multi-tenant environment?
Correct Answer:
A
🗳️
Network virtualization eliminates the need for IT to change IP addresses. With virtual networks natively isolated from each other and from the underlying physical hardware, network virtualization supports overlapping IP addresses in a multi-tenant environment. That means the same IP addresses can be used in separate enterprise networks that run over the same physical infrastructure.
Reference:
https://www.vmware.com/ciovantage/article/the-virtues-of-network-virtualization
An administrator has deployed Distributed Firewall to protect their infrastructure from security threats. Due to extreme loads on the network the CPU is saturated and the memory becomes full.
In this scenario, which mode does the Distributed Firewall enter?
Correct Answer:
B
🗳️
Reference:
http://www.infosecurityeurope.com/__novadocuments/90945?v=635709318795000000
(slide 7)