Which two statements are true about IDS Signatures? (Choose two.)
A company security policy requires all users to log into applications using a centralized authentication system.Which two authentication, authorization, and accounting (AAA) systems are available when integrating NSX with VMware Identity Manager? (Choose two.)
Which three of the following describe the Border Gateway Routing Protocol (BGP) configuration on a Tier-0 Gateway? (Choose three.)
Which is an advantages of a L2 VPN in an NSX 4.x environment?
Which NSX feature can be leveraged to achieve consistent policy configuration and simplicity across sites?
An NSX administrator is troubleshooting a connectivity issue with virtual machines running on an ESXi transport node.Which feature in the NSX UI shows the mapping between the virtual NIC and the host's physical adapter?