3 Months Free Update
3 Months Free Update
3 Months Free Update
Which two of the following are used to configure Distributed Firewall on VDS? (Choose two.)
Which TraceFlow traffic type should an NSX administrator use for validating connectivity between App and DB virtual machines that reside on different segments?
Which two of the following parameters are required for deploying the NSX Application Platform? (Choose two.)
Which of the following settings must be configured in an NSX environment before enabling stateful active-active SNAT?
What are the four types of role-based access control (RBAC) permissions? (Choose four.)
Which CLI command would an administrator use to allow syslog on an ESXi transport node when using the esxcli utility?
An administrator has deployed 10 Edge Transport Nodes in their NSX Environment, but has forgotten to specify an NTP server during the deployment.
What is the efficient way to add an NTP server to all 10 Edge Transport Nodes?
Which three NSX Edge components are used for North-South Malware Prevention? (Choose three.)
Which NSX feature can be leveraged to achieve consistent policy configuration and simplicity across sites?
Where can an administrator see a visual overview of network connections between different VMs and different networks, within the NSX domain?
An NSX administrator would like to create an L2 segment with the following requirements:
• L2 domain should not exist on the physical switches.
• East/West communication must be maximized as much as possible.
Which type of segment must the administrator choose?
How is the RouterLink port created between a Tier-1 Gateway and Tier-0 Gateway?
In an NSX environment, an administrator is observing low throughput and congestion between the Tier-0 Gateway and the upstream physical routers.
Which two actions could address low throughput and congestion? (Choose two.)
Which command on ESXi is used to verify the Local Control Plane connectivity with Central Control Plane?
What are four NSX built-in role-based access control (RBAC) roles? (Choose four.)
What can the administrator use to identify overlay segments in an NSX environment if troubleshooting is required?
An NSX administrator would like to export syslog events that capture messages related to NSX host preparation events.
Which message ID (msgid) should be used in the syslog export configuration command as a filter?
What are two functions of the Service Engines in NSX Advanced Load Balancer? (Choose two.)
Refer to the exhibits.
Drag and drop the NSX graphic element icons on the left found in an NSX Intelligence visualization graph to Its correct description on the right.
Which CLI command does an NSX administrator run on the NSX Manager to generate support bundle logs if the NSX UI is inaccessible?
An architect receives a request to apply distributed firewall in a customer environment without making changes to the network and vSphere environment. The architect decides to use Distributed Firewall on VDS.
Which two of the following requirements must be met in the environment? (Choose two.)
An administrator has been tasked with implementing the SSL certificates for the NSX Manager Cluster VIP.
Which is the correct way to implement this change?
What are two valid BGP Attributes that can be used to influence the route path traffic will take? (Choose two.)
Which table on an ESXi host is used to determine the location of a particular workload for a frame-forwarding decision?
When deploying an NSX Edge Transport Node, what two valid IP address assignment options should be specified for the TEP IP addresses? (Choose two.)