web analytics

The fact that NSX Data Security has visibility into sensitive data provides which two benefits? (Choose two )

The fact that NSX Data Security has visibility into sensitive data provides which two benefits? (Choose two ) A. It helps address compliance and risk management requirements. B. It acts

Which three objects are supported for universal synchronization in a Cross-vCenter NSX deployment? (Choose three)

Which three objects are supported for universal synchronization in a Cross-vCenter NSX deployment? (Choose three) A. IP Pools B. IP Sets C. L2 bridges D. MAC Sets E. Transport Zones

Which term describes a situation where a bottleneck .s created when traffic is sent to a single device for security enforcement?

Which term describes a situation where a bottleneck .s created when traffic is sent to a single device for security enforcement? A. security event queueing B. hairpinning C. security looping

What command-line tool can be used to test the MTU between two hosts?

What command-line tool can be used to test the MTU between two hosts? A. netstat -1 B. esxcli network ip neighbor list C. vmkping D. traceroute Answer: B

When deploying a standalone NSX Edge as a Layer 2 VPN client, which port needs to be configured on the client vSphere Distributed Switch?

When deploying a standalone NSX Edge as a Layer 2 VPN client, which port needs to be configured on the client vSphere Distributed Switch? A. Trunk port B. Span port

Which NSX routing protocols offers the most flexible policy control when peering with the physical environment?

Which NSX routing protocols offers the most flexible policy control when peering with the physical environment? A. BGP B. OSPF C. ISIS D. EIGRP Answer: B

What are two possible causes for the communications issue? (Choose two )

Two virtual machines are unable to communicate with one another. The virtual machines are in the same distributed port group, but reside on different ESXi hosts. What are two possible

Which NSX components are needed to make this deployment functional?

A network administrator has been tasked with deploying a 3-tier application across two data centers. Tier-1 and tier-2 will be located in Datacenter-A and tier-3 will be located in Datacenter-B.

What is true when configuring vSphere Distributed Switches (vDS)?

What is true when configuring vSphere Distributed Switches (vDS)? A. All configurations are done by the vCenter Server. Each ESXi host can be part of multiple vDS. B. All configurations

What are two benefits of the NSX Distributed Firewall? (Choose two )

What are two benefits of the NSX Distributed Firewall? (Choose two ) A. VMs are protected even as they are vMotioned B. Each VM is individually protected by a L2-L4

In a Cross-vCenter implementation, where is the Universal Control Cluster deployed and configured?

In a Cross-vCenter implementation, where is the Universal Control Cluster deployed and configured? A. In each vCenter instance associated with the Cross-vCenter implementation. B. In each prepared NSX cluster associated

Which two NSX Data Security roles could be used to create security policies? (Choose two)

Which two NSX Data Security roles could be used to create security policies? (Choose two) A. Auditor B. NSX Administrator C. Enterprise Administrator D. Security Administrator Answer: CD

Which port is used for NSX REST API Requests?

Which port is used for NSX REST API Requests? A. 80 B. 443 C. 5480 D. 8443 Answer: B

Which two NSX rotes could be used to create security policies? (Choose two.)

Which two NSX rotes could be used to create security policies? (Choose two.) A. Enterprise Administrator B. Security Administrator C. NSX Administrator D. Auditor Answer: AB

Which details can an administrator verify from the Summary tab of the VMware NSX Manager? (Choose three)

Which details can an administrator verify from the Summary tab of the VMware NSX Manager? (Choose three) A. Current time B. Average MTBF C. Version D. Storage utilization E. Health

Which component automates the consumption of third-party services and provides mapping to virtual machines using a logical policy?

Which component automates the consumption of third-party services and provides mapping to virtual machines using a logical policy? A. NSX Manager B. Cloud Management Platform (CMP) C. Service Composer D.

An administrator has been asked to provide single failure redundancy. What is the minimum supported number of NSX Controllers needed to meet this requirement?

An administrator has been asked to provide single failure redundancy. What is the minimum supported number of NSX Controllers needed to meet this requirement? A. 2 B. 3 C. 1

What are two things that should be done before upgrading from vCloud Networking and Security to NSX? (Choose two.)

What are two things that should be done before upgrading from vCloud Networking and Security to NSX? (Choose two.) A. Power off vShield Manager B. Deploy NSX Manager virtualappliance C.

What is the most restrictive NSX role that can be used to create and publish security policies and install virtual appliances?

What is the most restrictive NSX role that can be used to create and publish security policies and install virtual appliances? A. Security Administrator B. NSX Administrator C. Auditor D.

Which load balancing algorithm is only available on a vSphere Distributed Switch?

Which load balancing algorithm is only available on a vSphere Distributed Switch? A. Route Based on Source MAC Hash B. Route Based on Originating Virtual Port C. Route Based on

An NSX administrator determines that routing adjacency a NSX Edge device and a top-ofrack L3 switch CANNOT be established. Which two logs would be the most useful in resolving this issue? (choose two)

An NSX administrator determines that routing adjacency a NSX Edge device and a top-ofrack L3 switch CANNOT be established. Which two logs would be the most useful in resolving this

In a Cross-vCenter NSX deployment, what are two requirements that must be met in order for an administrator to deploy both universal logical switches and local logical switches within the same vCenter instance? (Choose two )

In a Cross-vCenter NSX deployment, what are two requirements that must be met in order for an administrator to deploy both universal logical switches and local logical switches within the

Which two products will be impacted by the upgrade of VCNS to VMware NSX? (Choose two)

A Service Provider is using VMware vCloud Director with VMware vCloud Networking and Security (VCNS) on vSphere. Which two products will be impacted by the upgrade of VCNS to VMware

Which three NSX services are available for synchronization in a Cross-vCenter implementation? (Choose three.)

Which three NSX services are available for synchronization in a Cross-vCenter implementation? (Choose three.) A. Spoofguard B. Distributed Firewall C. Edge Firewall D. Logical Switch E. Transport Zone Answer: BDE

Where does an administrator configure logging for the NSX Manager?

Where does an administrator configure logging for the NSX Manager? A. In the vSphere Web Client B. In the NSX Manager GUI C. In the NSX Manager command line interface

What is the function of NSX Data Security?

What is the function of NSX Data Security? A. Prevents sensitive data in your virtualized environment from being copied B. Prevents sensitive data in your virtualized environment from being modified

Which tool will accomplish this?

A network administrator is troubleshooting an issue and needs to observe an injected packet as it passes through the physical and logical network. Which tool will accomplish this? A. Traceflow

In which VMware NSX use case would VXLAN NOT be required?

In which VMware NSX use case would VXLAN NOT be required? A. L2 Bridging physical to virtual B. NSX micro-segmentation C. Active/Active Datacenter D. Distributed Logical Routing Answer: B

When creating a new security policy how is the default weight determined?

When creating a new security policy how is the default weight determined? A. The default weight is equal to the highest defined weight plus 1000. B. The default weight is

What is required before running an Activity Monitoring report?

What is required before running an Activity Monitoring report? A. Enable data collection on the NSX Controller. B. Enable data collection on the vCenter Server. C. Enable data collection on

An administrator is deploying NSX to secure the virtual environment. NSX Manager has been deployed and register with it,. Which additional step is required before the distributed firewall is functional?

An administrator is deploying NSX to secure the virtual environment. NSX Manager has been deployed and register with it,. Which additional step is required before the distributed firewall is functional?

An application requires load balancing with minimal impact to network performance. An NSX administrator is deploying a load balancer to meet the stated requirements. Which load balancing engine should be deployed?

An application requires load balancing with minimal impact to network performance. An NSX administrator is deploying a load balancer to meet the stated requirements. Which load balancing engine should be

How many vCenter Server environments can a single NSX Manager serve at one time?

How many vCenter Server environments can a single NSX Manager serve at one time? A. 2000 vCenter Servers B. 10 vCenier Servers C. 1 vCenler Server D. 2 vCenter Servers

What needs to be deployed before configuring the identify Firewall?

What needs to be deployed before configuring the identify Firewall? A. Guest Introspection B. Data Security C. Network hit inspection D. LDAP Integration Answer: A

Winch virtual machine does VMware recommend be manually excluded from the Distributed Firewall?

Winch virtual machine does VMware recommend be manually excluded from the Distributed Firewall? A. NSX Manager B. vCenter Server C. Microsoft SQL Server D. vRealize Automation Appliance Answer: B

In a Cross-vCenter environment where is information about local logical switches and local logical routers maintained?

In a Cross-vCenter environment where is information about local logical switches and local logical routers maintained? A. Platform Services Controller B. Local transport /one C. Local Controller Cluster D. Universal

To debug this anomaly, the user will need to obtain logs from which component?

A user has configured a specific distributed firewall rule preventing VM-A (172.16.10.11) on the Web-Logical Switch to communicate to VM-B (172.16.20.11), running on the same switch. After the changes, the

Which two networking and security components are contained m the backup configuration data of an NSX Manager backup file? (Choose two )

Which two networking and security components are contained m the backup configuration data of an NSX Manager backup file? (Choose two ) A. vSphere Distributed Switch B. Resource Pools C.

Which of the following ranges would be valid for the Universal Segment ID pool?

You are creating a Unrversal Segment ID Pool for a three site Cross-vCenter environment. The three sites are designated as Site A, Site B and Site C, • Site A

What are the correct steps for connecting a virtual machine to a logical switch?

What are the correct steps for connecting a virtual machine to a logical switch? A. Select the logical switch, click the Add Virtual Machine Icon, select the VM, select the

What is the correct order of steps to configure all three data centers for this solution?

An administrator is deploying NSX in a Cross-vCenter configuration across three data centers located 100 miles apart Datacenter-1 and Datacenter-3 already have NSX deployed locally and Datacenter-2 does not have

Where can firewall rules be applied on the NSX Edge Services Gateway?

Where can firewall rules be applied on the NSX Edge Services Gateway? A. Rules can be applied on the uplink interface only. B. Rules can be applied on either the

Which two functions are provided by VMkernel ports? (Choose two)

Which two functions are provided by VMkernel ports? (Choose two) A. VXLAN Port Configuration B. vSphere vMotion C. ESXi Host Management D. 802.1Q VLAN tagging Answer: BC

What is a requirement of NSX Data Security?

What is a requirement of NSX Data Security? A. NSX manager must be configured for Active Directory integration B. The Global Flow Collection Status must be set to Enabled C.

When configuring BGP routing in NSX, what is the purpose of the Graceful Restart check box?

When configuring BGP routing in NSX, what is the purpose of the Graceful Restart check box? A. Allow packet forwarding to be paused during restart of BGP services B. Allow

Which are two uses of the NSX DLR protocol address? (Choose two.)

Which are two uses of the NSX DLR protocol address? (Choose two.) A. When configuring BGP the protocol address is used to forward traffic to peers. B. When configuringBGP the

Which three ways can membership be defined in a dynamic security group? (Choose three)

Which three ways can membership be defined in a dynamic security group? (Choose three) A. Distributed Firewall Rules B. Locale ID C. Security Tags D. Security Groups E. Regular Expressions

Which two methods does VMware NSX offer to integrate with third-party partners? (Choose two )

Which two methods does VMware NSX offer to integrate with third-party partners? (Choose two ) A. Integration Manager B. Service Chaining C. VMwareNSXAPIs D. Universal Synchronization Service Answer: BC

What are two requirements of the network infrastructure to the access layer? (Choose two )

What are two requirements of the network infrastructure to the access layer? (Choose two ) A. IPv4 connectivity among ESXi hosts provided by a spine-leaf network design. B. IPv4 connectivity

What resource must a partner security service be registered with before the service is available to a policy?

What resource must a partner security service be registered with before the service is available to a policy? A. NSX Manager B. ESXi host C. Service Composer D. vCenter Server