Question 19

Which steps are required to activate Malware Prevention on the NSX Application Platform?

Correct Answer:D
To activate Malware Prevention on the NSX Application Platform, the steps are:
2V0-41.23 dumps exhibit In the NSX Manager UI, select System and in the Configuration section, select NSX Application Platform.
2V0-41.23 dumps exhibit Navigate to the Features section, locate the NSX Malware Prevention feature card, and click Activate or anywhere in the card.
2V0-41.23 dumps exhibit In the NSX Malware Prevention activation window, select one of the available cloud regions from which you can access the NSX Advanced Threat Prevention cloud service.
2V0-41.23 dumps exhibit Click Run Prechecks. This precheck process can take some time as the system validates that the minimum license requirement is met and that it is eligible for use with the NSX Advanced Threat Prevention cloud service. The system also validates that the selected cloud region is reachable.
2V0-41.23 dumps exhibit Click Activate. This step can take some time1. Therefore, the correct answer is D. The other options are incorrect because they involve activating or deploying NSX Network Detection and Response, which is
a different feature from Malware Prevention. References: Activate NSX Malware Prevention

Question 20

What are two valid options when configuring the scope of a distributed firewall rule? (Choose two.)

Correct Answer:CE
* C. Segment. This is correct. A segment is a logical construct that represents a layer 2 broadcast domain and a layer 3 subnet in NSX. A segment can be used to group and connect virtual machines, containers, or bare metal hosts that belong to the same application or service. A segment can also be used as the scope of a distributed firewall rule, which means that the rule will apply to all the traffic that enters or exits the segment12
* E. Group. This is correct. A group is a logical construct that represents a collection of objects in NSX, such as segments, segment ports, virtual machines, IP addresses, MAC addresses, tags, or security policies. A group can be used to define dynamic membership criteria based on various attributes or filters. A group can also be used as the scope of a distributed firewall rule, which means that the rule will apply to all the traffic that matches the group membership criteria32

START 2V0-41.23 EXAM