New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium VMware 2V0-41.24 Dumps Questions Answers

Page: 1 / 9
Total 115 questions

VMware NSX 4.X Professional V2 Questions and Answers

Question 1

An NSX administrator wants to create a Tier-0 Gateway to support equal cost multi-path (ECMP) routing.

Which failover detection protocol must be used to meet this requirement?

Options:

A.

Host Standby Router Protocol (HSRP)

B.

Beacon Probing (BP)

C.

Virtual Router Redundancy Protocol (VRRP)

D.

Bidirectional Forwarding Detection (BFD)

Buy Now
Question 2

Which two built-in VMware tools will help identify the cause of packet loss on VLAN Segments? (Choose two.)

Which two built-in VMware tools will help identify the cause of packet loss on VLAN Segments? (Choose two.)

Options:

A.

Flow Monitoring

B.

Traceflow

C.

Live Flow

D.

Packet Capture

E.

Activity Monitoring

Question 3

What are the four types of role-based access control (RBAC) permissions? (Choose four.)

Options:

A.

Auditor

B.

Full access

C.

Enterprise Admin

D.

None

E.

Execute

F.

Read

G.

Network Admin

Question 4

A security administrator needs to configure a firewall rule based on the domain name of a specific application.

Which field in a distributed firewall rule does the administrator configure?

Options:

A.

Profile

B.

Service

C.

Policy

D.

Source

Question 5

Where in the NSX UI would an administrator set the time attribute for a time-based Gateway Firewall rule?

Options:

A.

The option to set time-based rule is a clock Icon in the rule.

B.

The option to set time based rule is a field in the rule Itself.

C.

There Is no option in the NSX UI. It must be done via command line interface.

D.

The option to set time-based rule is a clock Icon in the policy.

Question 6

An NSX administrator is using ping to check connectivity between VM1 running on ESXi1 to VM2 running on ESXi2. The ping tests fail. The administrator knows the maximum transmission unit size on the physical switch is 1600.

Which command does the administrator use to check the VMware kernel ports for tunnel end point communication?

Options:

A.

vmkping ++netstack=geneve -d -s 1572

B.

vmkping ++netstack=vxlan -d -s 1572

C.

esxcli network diag ping –H

D.

esxcli network diag ping -I vmk0 -H

Question 7

An administrator is configuring service insertion for Network Introspection.

Which two places can the Network Introspection be configured? (Choose two.)

Options:

A.

Edge Node

B.

Host pNIC

C.

Tier-0 gateway

D.

Tier-1 gateway

E.

Partner SVM

Question 8

Which of the following settings must be configured in an NSX environment before enabling stateful active-active SNAT?

Options:

A.

Tier-1 gateway in active-standby mode

B.

A Punting Traffic Group for the NSX Edge uplinks

C.

An Interface Group for the NSX Edge uplinks

D.

Tier-1 gateway in distributed only mode

Question 9

An architect receives a request to apply distributed firewall in a customer environment without making changes to the network and vSphere environment. The architect decides to use Distributed Firewall on VDS.

Which two of the following requirements must be met in the environment? (Choose two.)

Options:

A.

vCenter 8.0 and later

B.

NSX version must be 3.2 and later

C.

NSX version must be 3.0 and later

D.

VDS version 6.6.0 and later

Question 10

A company security policy requires all users to log into applications using a centralized authentication system.

Which two authentication, authorization, and accounting (AAA) systems are available when integrating NSX with VMware Identity Manager? (Choose two.)

Options:

A.

RSA SecureID

B.

SecureDAP

C.

RADII 2.0

D.

LDAP and OpenLDAP based on Active Directory (AD)

E.

Keygen Enterprise

Question 11

An NSX administrator has deployed a single NSX Manager node and will be adding two additional nodes to form a 3-node NSX Management Cluster for a production environment. The administrator will deploy these two additional nodes and Cluster VIP using the NSX UI.

What two are the prerequisites for this configuration? (Choose two.)

Options:

A.

The cluster configuration must be completed using API.

B.

All nodes must be in the same subnet.

C.

All nodes must be in separate subnets.

D.

A compute manager must be configured.

E.

NSX Manager must reside on a Windows Server.

Question 12

Which CLI command would an administrator use to allow syslog on an ESXi transport node when using the esxcli utility?

Options:

A.

esxcli network firewall ruleset set -a -e false

B.

esxcli network firewall ruleset set -r syslog -e false

C.

esxcli network firewall ruleset -e syslog

D.

esxcli network firewall ruleset set -r syslog -e true

Question 13

Refer to the exhibit.

Which two items must be configured to enable OSPF for the Tler-0 Gateway in the Image? Mark your answers by clicking twice on the image.

Options:

Question 14

An NSX administrator noticed that the nsxcli command times out after 600 secs of idle time.

Which CLI command disables the nsxcli time out value on NSX Manager?

Options:

A.

set cli-timeout 1

B.

set cli-timeout enabled

C.

set cli-timeout disabled

D.

set cli-timeout 0

Question 15

An NSX administrator is creating a NAT rule on a Tier-0 Gateway configured in active-standby high availability mode.

Which two NAT rule types are supported for this configuration? (Choose two.)

Options:

A.

Port NAT

B.

1:1 NAT

C.

Destination NAT

D.

Reflexive NAT

E.

Source NAT

Question 16

Refer to the exhibit.

An administrator configured NSX Advanced Load Balancer to load balance the production web server traffic, but the end users are unable to access the production website by using the VIP address.

Which of the following Tier-1 gateway route advertisement settings needs to be enabled to resolve the problem? Mark the correct answer by clicking on the image.

Options:

Question 17

Which three NSX Edge components are used for North-South Malware Prevention? (Choose three.)

Options:

A.

Thin Agent

B.

RAPID

C.

Security Hub

D.

IDS/IPS

E.

Security Analyzer

F.

Reputation Service

Question 18

Which two are supported by L2 VPN clients? (Choose two.)

Options:

A.

NSX Autonomous Edge

B.

NSX Edge

C.

NSX for vSphere Edge

D.

3rd party Hardware VPN Device

Question 19

Which TraceFlow traffic type should an NSX administrator use for validating connectivity between App and DB virtual machines that reside on different segments?

Options:

A.

Anycast

B.

Multicast

C.

Broadcast

D.

Unicast

Question 20

Which statement is true about an alarm in a Suppressed state?

Options:

A.

An alarm can be suppressed for a specific duration in hours.

B.

An alarm can be suppressed for a specific duration in seconds.

C.

An alarm can be suppressed for a specific duration in days.

D.

An alarm can be suppressed for a specific duration in minutes

Question 21

Which field in a Tier-1 Gateway Firewall would be used to allow access for a collection of trustworthy web sites?

Options:

A.

Source

B.

Profiles -> Context Profiles

C.

Destination

D.

Profiles -> L7 Access Profile

Question 22

An NSX administrator would like to create an L2 segment with the following requirements:

• L2 domain should not exist on the physical switches.

• East/West communication must be maximized as much as possible.

Which type of segment must the administrator choose?

Options:

A.

VLAN

B.

Overlay

C.

Bridge

D.

Hybrid

Question 23

Which of the following exist only on Tler-1 Gateway firewall configurations and not on Tier-0?

Options:

A.

Applied To

B.

Actions

C.

Profiles

D.

Sources

Question 24

A company Is deploying NSX micro-segmentation in their vSphere environment to secure a simple application composed of web. app, and database tiers.

The naming convention will be:

• WKS-WEB-SRV-XXX

• WKY-APP-SRR-XXX

• WKI-DB-SRR-XXX

What is the optimal way to group them to enforce security policies from NSX?

Options:

A.

Use Edge as a firewall between tiers.

B.

Do a service insertion to accomplish the task.

C.

Group all by means of tags membership.

D.

Create an Ethernet based security policy.

Question 25

Which two of the following parameters are required for deploying the NSX Application Platform? (Choose two.)

Options:

A.

Interface Name

B.

Upload XML File

C.

Cluster Format Type

D.

Interface Service Name

E.

Upload Kubernetes Configuration File

Question 26

What must be configured on Transport Nodes for encapsulation and decapsulation of Geneve protocol?

Options:

A.

TEP

B.

STT

C.

VXLAN

D.

UDP

Question 27

Which two BGP configuration parameters can be configured in the VRF Lite gateways? (Choose two.)

Options:

A.

Route Aggregation

B.

Route Distribution

C.

BGP Neighbors

D.

Graceful Restart

E.

Local AS

Question 28

What is VMware’s recommendation for the minimum MTU requirements when planning an NSX deployment?

Options:

A.

MTU should be set to 1700 or greater across the data center network including inter-data center connections.

B.

MTU should be set to 1500 or less only on inter-data center connections.

C.

Configure Path MTU Discovery and rely on fragmentation.

D.

MTU should be set to 1550 or less across the data center network including inter-data center connections.

Question 29

Which two steps must an NSX administrator take to integrate VMware Identity Manager in NSX to support role-based access control? (Choose two.)

Options:

A.

Create a SAML authentication in VMware Identity Manager using the NSX Manager FQDN.

B.

Add NSX Manager as a Service Provider (SP) in VMware Identity Manager.

C.

Enter the Identity Provider (IdP) metadata URL in NSX Manager.

D.

Enter the service URL, Client Secret, and SSL thumbprint in NSX Manager.

E.

Create an OAuth 2.0 client in VMware Identity Manager.

Question 30

Which three selections are capabilities of Network Topology? (Choose three.)

Options:

A.

Display how the different NSX components are interconnected.

B.

Display the VMs connected to Segments.

C.

Display how the Physical components are interconnected.

D.

Display the uplinks configured on the Tier-1 Gateways.

E.

Display the uplinks configured on the Tier-0 Gateways.

Question 31

Which three data collection sources are used by NSX Network Detection and Response to create correlations/Intrusion campaigns? (Choose three.)

Options:

A.

Files and anti-malware (lie events from the NSX Edge nodes and the Security Analyzer

B.

East-West anti-malware events from the ESXi hosts

C.

Distributed Firewall flow data from the ESXi hosts

D.

IDS/IPS events from the ESXi hosts and NSX Edge nodes

E.

Suspicious Traffic Detection events from NSX Intelligence

Question 32

Which is the only supported mode in NSX Global Manager when using Federation?

Options:

A.

Proxy

B.

Policy

C.

Controller

D.

Proton

Question 33

An NSX administrator would like to export syslog events that capture messages related to NSX host preparation events.

Which message ID (msgid) should be used in the syslog export configuration command as a filter?

Options:

A.

FABRIC

B.

SYSTEM

C.

GROUPING

D.

MONITORING

Question 34

What is the VMware recommended way to deploy a virtual NSX Edge Node?

Options:

A.

Through the NSX Ul

B.

Through automated or interactive mode using an ISO

C.

Through the vSphere Web Client

D.

Through the OVF command line tool

Page: 1 / 9
Total 115 questions