Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 2V0-41.23 All Questions

View all questions & answers for the 2V0-41.23 exam

Exam 2V0-41.23 topic 1 question 32 discussion

Actual exam question from VMware's 2V0-41.23
Question #: 32
Topic #: 1
[All 2V0-41.23 Questions]

Which two statements are true about IDS Signatures? (Choose two.)

  • A. Users can upload their own IDS signature definitions.
  • B. An IDS signature contains data used to identify the creator of known exploits and vulnerabilities.
  • C. IDS signatures can be High Risk, Suspicious, Low Risk and Trustworthy.
  • D. An IDS signature contains data used to identify known exploits and vulnerabilities.
  • E. An JDS signature contains a set of instructions that determine which traffic is analyzed.
Show Suggested Answer Hide Answer
Suggested Answer: DE 🗳️

Comments

Chosen Answer:
This is a voting comment (?).
Switch to a voting comment New
descentguy2021
Highly Voted 1 year, 1 month ago
Selected Answer: DE
DE are correct options D. An IDS signature contains data used to identify known exploits and vulnerabilities. E. An IDS signature contains a set of instructions that determine which traffic is analyzed.
upvoted 7 times
...
fvilbar
Most Recent 8 months ago
D and E. Supposed a typo error on E. https://docs.vmware.com/en/VMware-SD-WAN/5.4/VMware-SD-WAN-Administration-Guide/GUID-0BB81F8D-70EB-42D4-ABAF-F80C8F77A4CB.html
upvoted 1 times
...
avid_researcher
9 months ago
c: Trustworthy is not valid
upvoted 1 times
...
TenaciousD
9 months, 2 weeks ago
Trick question, E says JDS, not IDS, or is that just a typo?
upvoted 2 times
...
stjwh1
11 months, 2 weeks ago
DE correct
upvoted 1 times
...
Sharkman2123
1 year ago
Selected Answer: DE
I vote for D and E (have assumed JDS is a typo). A is not correct, while you can upload signatures, they are not your own, they are from vmware that you downloaded eleswhere because NSX manager does not have internet access.
upvoted 1 times
...
Szyplak
1 year ago
Selected Answer: AD
A: You can also upload your own signatures. Reference: Hoogendoorn, Iwan. Multi-Site Network and Security Services with NSX-T: Implement Network Security, Stateful Services, and Operations (p. 80). D: An IDS/IPS signature contains metadata that is used to identify an attacker's attempt to exploit a known operating system or application vulnerability. Such metadata provides context about the attempt, such as the affected product, attack target, and so on. Reference ICM 8-11 page 395
upvoted 2 times
...
Selected Answer: DE
Saw in the ICM 4.0 chapter 8 : For the D answer : An IDS/IPS signature contains metadata that is used to identify an attacker's attempt to exploit a known operating system or application vulnerability. Such metadata provides context about the attempt, such as the affected product, attack target, and so on For the E answer : An IDS/IPS policy is a collection of IDS/IPS rules. An IDS/IPS rule contains a set of instructions that determine which traffic is analyzed, including values for the following parameters: • Sources and Destinations • Services • Security Profiles (IDS/IPS profile) • Applied to • Mode
upvoted 4 times
...
zelele
1 year, 1 month ago
Selected Answer: DE
Reference: Chapter 8 CIM
upvoted 1 times
...
ImDOS
1 year, 1 month ago
AD is the answer. Users are allowed to upload their own signature
upvoted 2 times
...
descentguy2021
1 year, 1 month ago
DE are correct options D. An IDS signature contains data used to identify known exploits and vulnerabilities. E. An IDS signature contains a set of instructions that determine which traffic is analyzed.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...