A. To prevent data loss during VM snapshot operations
B. To restrict access to NSX-T Manager via VPN
C. To enforce bandwidth throttling policies
D. To control and restrict east-west traffic between workloads
A. Source
B. Service
C. Uplink Type
D. Log Level
E. Destination
A. Hadoop
B. Ansible Playbooks for storage arrays
C. Chef
D. Python with REST API
A. Enhances compliance by segmenting sensitive environments
B. Limits lateral movement by enforcing workload isolation
C. Requires centralized inspection points
D. Reduces unnecessary resource reservations for firewall appliances
E. Enables fine-grained control at the VM level
A. Management traffic from vCenter
B. Internal application tier traffic
C. North-south traffic to/from external clients
D. East-west inter-VM traffic
E. vMotion traffic between hosts
A. To detect and prevent both known and unknown cyber threats using behavioral analysis and sandboxing
B. To replicate VMs across availability zones for backup
C. To enforce compliance for vSphere hardware compatibility
D. To reduce storage IO latency during high-load operations
A. DNS cache corruption
B. Ransomware
C. Data deduplication anomalies
D. Keyloggers
E. Botnet droppers
A. NAT and VPN rule enforcement
B. Cluster-level backup operations
C. Stateful packet inspection
D. L2 switching between VMs
E. North-south traffic segmentation
A. The more permissive rule overrides the restrictive one
B. The rule with the longer name takes precedence
C. Both rules are ignored, and traffic is dropped
D. The topmost rule in the section is applied first
A. It incorporates user identity, device posture, and application context
B. It applies policies at the switch uplink level
C. It uses only static IP ranges for access control
D. It only filters DNS and ICMP traffic