• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back
Before installing vShield Zones, you must have:
1. vShield Manager and vShield OVF files.

2.A PC with the vSphere Client.

3. Permissions to add and power on virtual machines.

4. A system running vCenter Server 4.0 or later.
Which components comprise the vShield zones solution:
1. vShield Manager.

2. vShield.
Which syntax is seen in the CLI setup wizard for vShield zones
1. manager> setup
What is the definition of a vShield:
1. The active security component of vShield Zones that inspects traffic flow and provides firewall protection.
You can add vShields to the vCenter Server and vShield Zones inventories by:
1. Log in to the vShield Manager.

2. From the inventory tree, click the ESX host that you want to protect.

3. Click the Install vShield tab that appears above the right frame.

4. Click Configure install parameters
What are valid vShield Configuration install parameters.
1. Select a vSwitch to shield

2. Select from available vShields

3. Select a datastore to place clone

4. Specify IP Mask for vShield
After vShield Manager and vShield are installed, and your vShield communicates with your vShield Manager, what must be enabled to continuously discover the virtual machines for vShield to protect.
1. Log in to the vShield Manager.

2. Click the vShield instance from the inventory tree.

3. Click the VM Discovery tab.

4. Click the Automated subhead.

5. In the Scheduled Discovery Status drop‐down menu, select Continuous.
Do not complete any other fields in the form.

6. Click OK.

7. Go to VM Discovery > Results to view the discovery output.
What must be performed after installation of each vShield Zones component.
If you have enabled the VMware HA or VMware DRS features, you must disable movement of vShield Zones virtual appliances.
Select the correct options available when powering off vShield Zones Virtual Machines.
1. You can power off vShield Zones virtual machines at any time.


2. When you power off a vShield Zones virtual
machine, the last saved configuration is used when the virtual machine is powered on
When installed from a referenced template, the vShield installation process performs which of the following steps:
1. Creates a clone of the vSwitch host.

2. Creates a unprotected/protected zone port group, VSprot_vShield‐name, and attaches this port group to the vSwitch host.

3. Creates a management port group, VSmgmt_vShield‐name, on the vSwitch host for the vShield instance's management interface.

4. Creates an unprotected/protected zone port group, VSunprot_vShield‐name, and attaches this port group to the vSwitch clone.

5. Connects and powers on the vShield instance.

6. Attaches the virtual interfaces on the vShield to the protected and unprotected port groups.

7. Moves the virtual machines from the vSwitch host to the vSwitch clone.
vShield installation requires the creation of which two port groups.
1. protected

2. unprotected
Identify vShield Zones components
vShield manager-management center for all distributed
vShield instances. Provides monitoring, configuration, and software updating for your

vShields.
•vShield-The active security component of vShield zones. A vShield is installed on each ESX host you want to protect. It will monitor traffic between hosts as well as between virtual machines on the host.
Identify the four CLI command modes
Basic: Basic mode is a read‐only mode.

Privileged: Privileged mode commands allow support‐level options such as debugging and system diagnostics. Privileged mode configurations are not saved upon reboot.

Configuration: Configuration mode commands allow you to change the current configuration of utilities on a vShield Zones virtual machine. You can access Configuration mode from Privileged mode.

Interface Configuration: Interface Configuration mode commands allow you to change the configuration of virtual machine interfaces. For example, you can change the IP address and IP route for the management port of the vShield Manager.