Which two NSX Data Security roles could be assigned to view configured policies and violation reports?
A. Security Administrator
B. NSX...
What is the most restrictive NSX role that can be used to create and publish security policies and install virtual appliances?
What is the most restrictive NSX role that can be used to create and publish security policies and install virtual appliances?
A. Security...
Which action is not an option for adding Virtual Machines to a Security Group?
Which action is not an option for adding Virtual Machines to a Security Group?
A. Adding Virtual Machines to a Security Group and nesting...
An administrator wants to perform Activity Monitoring on a large group of virtual machines in an NSX environment. How would this task be accomplished with minimal administrative effort?
An administrator wants to perform Activity Monitoring on a large group of virtual machines in an NSX environment. How would this task be accomplished...
An administrator has deployed NSX in an environment containing a mix of vSphere 5 hosts. The implementation includes the Distributed Firewall Service, but the administrator finds that rules are not being applied to all affected virtual machines. What two conditions would cause this behavior?
An administrator has deployed NSX in an environment containing a mix of vSphere 5 hosts. The implementation includes the Distributed Firewall Service,...
An administrator wishes to control traffic flow between two virtual machines. The virtual machines are in the same subnet, but are located on separate ESXi hosts. The administrator deploys an Edge Firewall to one of the hosts and verifies the default firewall rule is set to deny, but the two virtual machines can still communicate with each other. What task will correct this issue?
An administrator wishes to control traffic flow between two virtual machines. The virtual machines are in the same subnet, but are located on separate...
How are Logical Firewall rules applied to affected virtual machines?
How are Logical Firewall rules applied to affected virtual machines?
A. They are pushed by the NSX Controllers into all the ESXi hosts in the same...
Where does the Distributed Logical Firewall enforce firewall rules?
Where does the Distributed Logical Firewall enforce firewall rules?
A. At the Virtual Machine's virtual Network Interface Card (vNIC).
B....
Which two statements are true regarding NSX High Availability?
Which two statements are true regarding NSX High Availability?
A. NSX HA is configured as Active-Active.
B. NSX HA is configured as Active-Standby.
C....
Which two actions take place when an active NSX Edge instance fails?
Which two actions take place when an active NSX Edge instance fails?
A. Once the original NSX Edge instance is recovered, it preempts the...
An administrator manages a TFTP server virtual machine that is connected to a Logical Switch with a VNI of 7321. The TFTP server has been configured to use port 1069. An NSX Edge Service Gateway is connected to VNI 7321 and has an uplink interface with access to the physical network. Assume external users can reach the Service Gateway. What should the administrator configure to ensure external connections to the TFTP server are successful?
An administrator manages a TFTP server virtual machine that is connected to a Logical Switch with a VNI of 7321. The TFTP server has been configured...
Which statement is true regarding an NSX Edge gateway device configured with a DNS Server?
Which statement is true regarding an NSX Edge gateway device configured with a DNS Server?
A. The NSX Edge will forward all DNS requests...
A vSphere administrator wants to setup an NSX Edge Service Gateway to provide traveling employees secure access to company servers located in specific network segments within the corporate Data Centers. The solution has to be as scalable as possible. Which Virtual Private Network solution will satisfy the administrator's requirements?
A vSphere administrator wants to setup an NSX Edge Service Gateway to provide traveling employees secure access to company servers located in specific...
A company has augmented its Data Center infrastructure by using vCloud Hybrid Service during peak hours. The company wants to extend their existing subnets into the cloud while workloads retain their existing IP addresses. The virtual machines in these subnets use an NSX Edge Gateway as their default gateway. Which solution should this company use?
A company has augmented its Data Center infrastructure by using vCloud Hybrid Service during peak hours. The company wants to extend their existing...
A vSphere administrator wants to setup an NSX Edge Service Gateway to provide traveling employees secure access to company servers located in specific network segments within the corporate Data Center. The remote access solution must provide a method to authenticate the users. Which two methods can be used with the NSX Edge Service Gateway?
A vSphere administrator wants to setup an NSX Edge Service Gateway to provide traveling employees secure access to company servers located in specific...
Which two statements are true regarding Layer 2 VPNs?
Which two statements are true regarding Layer 2 VPNs?
A. Layer 2 VPNs are used to securely extend Ethernet segments over an untrusted...
A company hosts an internal website on multiple virtual machines attached to a Logical Switch with VNI 7321. A Distributed Router serves as the virtual machines' default gateway. When an user resolves the URL for the website, the internal DNS server responds with the IP address of one of the virtual machine's IP addresses in a round robin fashion. This approach results in some virtual machines having a much higher number of user sessions than others. The company wants to deploy a NSX Edge Service Load Balancer to improve on this situation. Which distribution method can be configured on the NSX Edge Load Balancer to meet the company's needs?
A company hosts an internal website on multiple virtual machines attached to a Logical Switch with VNI 7321. A Distributed Router serves as the virtual...
A vSphere administrator deployed an NSX Edge Load Balancer in HP mode. What happens in the event the Load Balancer has a failure?
A vSphere administrator deployed an NSX Edge Load Balancer in HP mode. What happens in the event the Load Balancer has a failure?
A. The...
Which two options are valid distribution methods used by the NSX Edge Load Balancer?
Which two options are valid distribution methods used by the NSX Edge Load Balancer?
A. Destination IP Hash
B. Least Load
C. URI
D. Round...
You are tasked with designing a data center architecture that should maximize the use of vMotion within your environment. You must use these VMware best practices: - The network must utilize widely offered layer 2 switching and layer 3 switching services - Purchase of new equipment should be minimized Which two network design architectures will provide the requirements for vMotion in your data center?
You are tasked with designing a data center architecture that should maximize the use of vMotion within your environment. You must use these VMware...
Which NSX service or feature provides optimized management of virtual machine broadcast (ARP) traffic?
Which NSX service or feature provides optimized management of virtual machine broadcast (ARP) traffic?
A. NSX Controller
B. NSX Manager
C....
A vSphere administrator added a new interface to a Distributed Router with a subnet of 172.16.10.0/24 and wants to make this subnet reachable to the rest of the network. How can the vSphere administrator achieve this?
A vSphere administrator added a new interface to a Distributed Router with a subnet of 172.16.10.0/24 and wants to make this subnet reachable to the...
A vSphere administrator wants to add a VLAN LIF to a Distributed Router. What must the vSphere administrator do for the VLAN LIF to be added successfully?
A vSphere administrator wants to add a VLAN LIF to a Distributed Router. What must the vSphere administrator do for the VLAN LIF to be added successfully?
A....
Which two are valid types of authentication for an OSPF area?
Which two are valid types of authentication for an OSPF area?
A. Password authentication
B. MD5 authentication
C. SHA1 authentication
D....
Which components are required to enable layer 2 bridging?
Which components are required to enable layer 2 bridging?
A. Distributed firewall rule to allow layer 2 traffic in the bridge.
B. Deployed...
Which two options are use cases of Layer 2 bridging in NSX for vSphere?
Which two options are use cases of Layer 2 bridging in NSX for vSphere?
A. Extend the network security to physical devices in the physical...
How is the Bridge Instance chosen?
How is the Bridge Instance chosen?
A. It is chosen based on the ESXi host where the Logical Router Control VM is running.
B. It is manually...
An administrator consults with the network team and decides that Transport Zones will be configured with Hybrid Replication Mode for a new NSX for vSphere deployment. Which statement is true?
An administrator consults with the network team and decides that Transport Zones will be configured with Hybrid Replication Mode for a new NSX for vSphere...
Which component provides for installation of NSX hypervisor kernel components and user world agents?
Which component provides for installation of NSX hypervisor kernel components and user world agents?
A. NSX Controller
B. NSX Edge Virtual...
What is determined when an NSX Administrator creates a Segment ID Pool?
What is determined when an NSX Administrator creates a Segment ID Pool?
A. The range of VXLAN Network Identifiers (VNIs) that can be assigned...
A new ESXi 5.5 host is deployed in a vSphere environment with VMware NSX for vSphere. How can the host be prepared for VMware NSX for vSphere?
A new ESXi 5.5 host is deployed in a vSphere environment with VMware NSX for vSphere. How can the host be prepared for VMware NSX for vSphere?
A....
Which statement is correct when upgrading vShield Data Security to NSX Data Security?
Which statement is correct when upgrading vShield Data Security to NSX Data Security?
A. NSX Data Security does not support a direct upgrade.
B....
Using VMware's best practices, choose two statements that define the best solution for scaling layer 2 services for the virtual network.
Using VMware's best practices, choose two statements that define the best solution for scaling layer 2 services for the virtual network.
A....
After deploying NSX, an administrator does not see the Networking & Security tab when connecting to the vCenter Server using the vSphere Web Client. What should the administrator do?
After deploying NSX, an administrator does not see the Networking & Security tab when connecting to the vCenter Server using the vSphere Web Client.What...
In a data center using a leaf and spine architecture, which two statements define the connectivity between the leaf and spine tiers required to provide optimal network connectivity for NSX?
In a data center using a leaf and spine architecture, which two statements define the connectivity between the leaf and spine tiers required to provide...
Which two characteristics of the underlying physical network does VMware NSX require for robust IP transport?
Which two characteristics of the underlying physical network does VMware NSX require for robust IP transport?
A. The physical network should...
Your data center is made up of two VMware vCenter Server instances. Each vCenter Server manages three clusters with 16 hosts per cluster. In preparing for your VMware NSX deployment, how many vShield Endpoint instances will you have?
Your data center is made up of two VMware vCenter Server instances. Each vCenter Server manages three clusters with 16 hosts per cluster.In preparing...
If unicast mode is configured for the overlay transport in an NSX deployment, which two statements correctly define the network support that is required?
If unicast mode is configured for the overlay transport in an NSX deployment, which two statements correctly define the network support that is required?...
A company wants to deploy VMware NSX for vSphere with no PIM and no IGMP configured in the underlying physical network. This company also must ensure that non-ESXi hosts do not receive broadcast, unknown unicast or multicast (BUM) traffic. Which replication mode should the logical switches be deployed with?
A company wants to deploy VMware NSX for vSphere with no PIM and no IGMP configured in the underlying physical network. This company also must ensure...
What is the minimum MTU size recommended by VMware for the physical network when deploying NSX for vSphere?
What is the minimum MTU size recommended by VMware for the physical network when deploying NSX for vSphere?
A. 1550
B. 1600
C. 2148
D. 9000
Answer:...
Which two vSphere components are required for NSX?
Which two vSphere components are required for NSX?
A. Standard vSwitch
B. Network I/O Control
C. Distributed Port Group
D. VMkernel port
Answer:...
Which three network policy settings can only be configured on a vSphere 5.5 Distributed Switch?
Which three network policy settings can only be configured on a vSphere 5.5 Distributed Switch?
A. Access Control Lists (ACLs)
B. Network...
You have deployed a two-tiered application using four virtual machines: - Two virtual machines are web application servers - Two virtual machines providing a clustered database service What feature can you configure to provide the most accurate account for only the traffic between the web servers and the clustered database?
You have deployed a two-tiered application using four virtual machines:- Two virtual machines are web application servers- Two virtual machines providing...
What are three switch features found only on vSphere Distributed Switches?
What are three switch features found only on vSphere Distributed Switches?
A. Network I/O Control
B. CDP
C. LLDP
D. SR-IOV
E. Port Mirroring
Answer:...
A network security administrator wants to monitor traffic on several VLANs configured on a vSphere Distributed Switch. The traffic will be sent to another distributed port. What type of port mirroring session must be configured to meet these requirements?
A network security administrator wants to monitor traffic on several VLANs configured on a vSphere Distributed Switch. The traffic will be sent to another...
What are two valid methods of configuring virtual machines to use a vSphere Distributed Switch (vDS) that are currently using a vSphere Standard Switch (vSS)?
What are two valid methods of configuring virtual machines to use a vSphere Distributed Switch (vDS) that are currently using a vSphere Standard Switch...
On a vSS, how does teaming two or more physical network adapters provide load balancing when using the Load Balancing feature Route based on the originating virtual port ID?
On a vSS, how does teaming two or more physical network adapters provide load balancing when using the Load Balancing feature Route based on the originating...
Which two statements describe the network connectivity provided by a vSphere Standard Switch (vSS)?
Which two statements describe the network connectivity provided by a vSphere Standard Switch (vSS)?
A. A vSS provides a direct and logical...
How does NSX simplify the underlying physical network?
How does NSX simplify the underlying physical network?
A. All configuration and state information is available via the REST APIs to automate...
Which two statements are true regarding NSX?
Which two statements are true regarding NSX?
A. Workloads can be placed and moved independently of physical topology.
B. Operational efficiency...
Subscribe to:
Posts (Atom)