Which three protocols could an NSX administrator use to transfer log messages to a remote log server? (Choose three.)
What are two valid options when configuring the scope of a distributed firewall rule? (Choose two.)
Which CLI command is used for packet capture on the ESXi Node?
When collecting support bundles through NSX Manager, which files should be excluded for potentially containing sensitive information?
How does the Traceflow tool identify issues in a network?
Which two statements are correct about East-West Malware Prevention? (Choose two.)
An NSX administrator wants to create a Tler-0 Gateway to support equal cost multi-path (ECMP) routing. Which failover detection protocol must be used to meet this requirement?
Which two choices are use cases for Distributed Intrusion Detection? (Choose two.)
Which CLI command shows syslog on NSX Manager?
Which steps are required to activate Malware Prevention on the NSX Application Platform?