Refer to the exhibit.
What command was run on the NSX Edge node to pull this information?
A. get tunnel-ID
B. show vteps
C. get vteps
D. list vteps
What is the purpose of Flow Statistics in an NSX-T Data Center firewall rule?
A. It is a toggle for turning on NETFLOW monitoring for a particular firewall rule.
B. It is a read-only field that displays the byte, packet count, and sessions.
C. It is a toggle for disabling display of the byte, packet count, and sessions.
D. It is a read-only field that displays any NETFLOW traffic analysis.
In a Workspace ONE deployment, what two commands are available for a Windows policy when sending a command action as part of a compliance policy? (Choose two.)
A. Device Wipe
B. Enterprise Wipe
C. Apply Baseline
D. Apply Profile
E. Request Device Checkin
Which three statements are correct for Active Directory integration with Identity Firewalls (IDFW) in an NSX-T Data Center deployment? (Choose three.)
A. The IDFW can be used on both physical and virtual servers as long as supported operating system is installed.
B. The Thin Agent must be enabled in VMWare tools as it is not enabled by default.
C. The IDFW can be used for Virtual Desktops (VDI) or Remote desktop sessions (RDSH support).
D. Identity-based groups can be used as the source or destination in DFW rules.
E. User identity information is provided by the NSX Guest Introspection Thin Agent.
Where in the NSX UI does an administrator add an Active Directory Domain?
A. Go to System > Configuration > Identity Firewall AD > ADD ACTIVE DIRECTORY
B. Go to Inventory > Configuration > Identity Firewall AD > ADD ACTIVE DIRECTORY
C. Go to Home > Configuration > Identity Firewall AD > ADD ACTIVE DIRECTORY
D. Go to Security > Configuration > Identity Firewall AD > ADD ACTIVE DIRECTORY
In a Workspace ONE environment, which two Risk Indicators are supported on the Windows 10 and MacOS platforms? (Choose two.)
A. Risky Setting
B. Compulsive App Download
C. App Collector
D. Rare App Collector
E. Laggard Update
Which two options are needed to configure NSX-T Data Center to access the Active Directory? (Choose two.)
A. Domain Controller Name
B. Distinguished Name
C. username
D. Port
E. netBIOS name
Which two are features of a hybrid cloud model for networking and security when using NSX-T Data Center and VMware NSX Cloud? (Choose two.)
A. NSX Data Center provides consistent logical networking and security across protected and recovery sites.
B. NSX Data Center supports Layer 2 VPN between an NSX Edge and a Direct Connect Gateway.
C. NSX Data Center and VMware NSX Cloud stretch Layer 2 domains between public clouds using the Geneve overlay.
D. NSX Data Center supports secure, encrypted user access to private corporate applications (SSL VPN).
E. NSX Data Center supports remote sites (IPsec VPN) with optional VPN gateways or hardware routers from other vendors.
In an NSX-T Data Center deployment, micro-segmentation via security policies is accomplished using which component?
A. NSX Bridge Firewall
B. NSX Gateway Firewall
C. NSX Logical Router
D. NSX Distributed Firewall
Where in the NSX UI does an administrator deploy NSX Intelligence?
A. Go to Plan and Troubleshoot > Configuration > ADD NSX INTELLIGENCE APPLIANCE
B. Go to Security > Configuration > Appliances > ADD NSX INTELLIGENCE APPLIANCE
C. Go to System > Configuration > Appliances > ADD NSX INTELLIGENCE APPLIANCE
D. Go to Home > Configuration > Appliances > ADD NSX INTELLIGENCE APPLIANCE