Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

VMware 2V0-41.23 Dumps

Page: 1 / 8
Total 107 questions

VMware NSX 4.x Professional Questions and Answers

Question 1

Which NSX feature can be leveraged to achieve consistent policy configuration and simplicity across sites?

Options:

A.

VRF Lite

B.

Ethernet VPN

C.

NSX MTML5 UI

D.

NSX Federation

Question 2

Which two logical router components span across all transport nodes? (Choose two.)

Options:

A.

SFRVICE_ROUTER_TJER0

B.

TIERO_DISTRI BUTE D_ ROUTER

C.

DISTRIBUTED_R0UTER_TIER1

D.

DISTRIBUTED_ROUTER_TIER0

E.

SERVICE_ROUTER_TIERl

Question 3

How is the RouterLink port created between a Tier-1 Gateway and Tier-O Gateway?

Options:

A.

Automatically created when Tier-1 is connected with Tier-0 from NSX UI.

B.

Automatically created when Tier-1 is created.

C.

Manually create a Logical Switch and connect to bother Tier-1 and Tier-0 Gateways.

D.

Manually create a Segment and connect to both Tier-1 and Tier-0 Gateways.

Question 4

Which three NSX Edge components are used for North-South Malware Prevention? (Choose three.)

Options:

A.

Thin Agent

B.

RAPID

C.

Security Hub

D.

IDS/IPS

E.

Security Analyzer

F.

Reputation Service

Question 5

Which two choices are use cases for Distributed Intrusion Detection? (Choose two.)

Options:

A.

Use agentless antivirus with Guest Introspection.

B.

Quarantine workloads based on vulnerabilities.

C.

Identify risk and reputation of accessed websites.

D.

Gain Insight about micro-segmentation traffic flows.

E.

Identify security vulnerabilities in the workloads.

Question 6

Which CLI command on NSX Manager and NSX Edge is used to change NTP settings?

Options:

A.

get timezone

B.

get time-server

C.

set timezone

D.

set ntp-server

Question 7

In which VPN type are the Virtual Tunnel interfaces (VTI) used?

Options:

A.

Route & SSL based VPNs

B.

Route-based VPN

C.

Policy & Route based VPNs

D.

SSL-based VPN

Question 8

Match the NSX Intelligence recommendations with their correct purpose.

Options:

Question 9

What should an NSX administrator check to verify that VMware Identity Manager Integration Is successful?

Options:

A.

From VMware Identity Manager the status of the remote access application must be green.

B.

From the NSX UI the status of the VMware Identity Manager Integration must be "Enabled".

C.

From the NSX CLI the status of the VMware Identity Manager Integration must be "Configured".

D.

From the NSX UI the URI in the address bar must have "locaNfatse" part of it.

Question 10

An architect receives a request to apply distributed firewall in a customer environment without making changes to the network and vSphere environment. The architect decides to use Distributed Firewall on VDS.

Which two of the following requirements must be met in the environment? (Choose two.)

Options:

A.

vCenter 8.0 and later

B.

NSX version must be 3.2 and later

C.

NSX version must be 3.0 and later

D.

VDS version 6.6.0 and later

Question 11

An administrator needs to download the support bundle for NSX Manager. Where does the administrator download the log bundle from?

Options:

A.

System > Utilities > Tools

B.

System > Support Bundle

C.

System > Settings > Support Bundle

D.

System > Settings

Question 12

An NSX administrator has deployed a single NSX Manager node and will be adding two additional nodes to form a 3-node NSX Management Cluster for a production environment. The administrator will deploy these two additional nodes and Cluster VIP using the NSX UI.

What two are the prerequisites for this configuration? (Choose two.)

Options:

A.

All nodes must be in separate subnets.

B.

The cluster configuration must be completed using API.

C.

NSX Manager must reside on a Windows Server.

D.

All nodes must be in the same subnet.

E.

A compute manager must be configured.

Question 13

Which two are supported by L2 VPN clients? (Choose two.)

Options:

A.

NSX for vSphere Edge

B.

3rd party Hardware VPN Device

C.

NSX Autonomous Edge

D.

NSX Edge

Question 14

What needs to be configured on a Tler-0 Gateway lo make NSX Edge Services available to a VM on a VLAN-backed logical switch?

Options:

A.

Downlink Interface

B.

VLAN Uplink

C.

Loopback Router Port

D.

Service Interface

Question 15

Which two statements are correct about East-West Malware Prevention? (Choose two.)

Options:

A.

A SVM is deployed on every ESXi host.

B.

NSX Application Platform must have Internet access.

C.

An agent must be installed on every ESXi host.

D.

An agent must be installed on every NSX Edge node.

E.

NSX Edge nodes must have Internet access.

Question 16

Which three security features are dependent on the NSX Application Platform? (Choose three.)

Options:

A.

NSX Intelligence

B.

NSX Firewall

C.

NSX Network Detection and Response

D.

NSX TLS Inspection

E.

NSX Distributed IDS/IPS

F.

NSX Malware Prevention

Question 17

Which two steps must an NSX administrator take to integrate VMware Identity Manager in NSX to support role-based access control? (Choose two.)

Options:

A.

Create a SAML authentication in VMware Identity Manager using the NSX Manager FQDN.

B.

Enter the Identity Provider (IdP) metadata URL in NSX Manager.

C.

Create an OAuth 2.0 client in VMware Identity Manager.

D.

Add NSX Manager as a Service Provider (SP) in VMware Identity Manager.

E.

Enter the service URL, Client Secret, and SSL thumbprint in NSX Manager.

Question 18

What are three NSX Manager roles? (Choose three.)

Options:

A.

master

B.

cloud

C.

zookeepet

D.

manager

E.

policy

F.

controller

Question 19

When a stateful service is enabled for the first lime on a Tier-0 Gateway, what happens on the NSX Edge node'

Options:

A.

SR is instantiated and automatically connected with DR.

B.

DR Is instantiated and automatically connected with SR.

C.

SR and DR Is instantiated but requites manual connection.

D.

SR and DR doesn't need to be connected to provide any stateful services.

Question 20

What are two supported host switch modes? (Choose two.)

Options:

A.

DPDK Datapath

B.

Enhanced Datapath

C.

Overlay Datapath

D.

Secure Datapath

E.

Standard Datapath

Question 21

When collecting support bundles through NSX Manager, which files should be excluded for potentially containing sensitive information?

Options:

A.

Controller Files

B.

Management Files

C.

Core Files

D.

Audit Files

Question 22

Where does an administrator configure the VLANs used In VRF Lite? (Choose two.)

Options:

A.

segment connected to the Tler-1 gateway

B.

uplink trunk segment

C.

downlink interface of the default Tier-0 gateway

D.

uplink Interface of the VRF gateway

E.

uplink interface of the default Tier-0 gateway

Question 23

An administrator wants to validate the BGP connection status between the Tier-O Gateway and the upstream physical router.

What sequence of commands could be used to check this status on NSX Edge node?

Options:

A.

set vrf

show logical-routers

show bgp

B.

show logical-routers

get vrf

show ip route bgp

C.

get gateways

vrf

get bgp neighbor

D.

enable

get vrf

show bgp neighbor

Question 24

Which field in a Tier-1 Gateway Firewall would be used to allow access for a collection of trustworthy web sites?

Options:

A.

Source

B.

Profiles -> Context Profiles

C.

Destination

D.

Profiles -> L7 Access Profile

Question 25

Which two of the following are used to configure Distributed Firewall on VDS? (Choose two.)

Options:

A.

vSphere API

B.

NSX API

C.

NSX CU

D.

vCenter API

E.

NSX UI

Question 26

Which two statements are true about IDS Signatures? (Choose two.)

Options:

A.

Users can upload their own IDS signature definitions.

B.

An IDS signature contains data used to identify known exploits and vulnerabilities.

C.

An IDS signature contains data used to identify the creator of known exploits and vulnerabilities.

D.

IDS signatures can be High Risk, Suspicious, Low Risk and Trustworthy.

E.

An IDS signature contains a set of instructions that determine which traffic is analyzed.

Question 27

Which three data collection sources are used by NSX Network Detection and Response to create correlations/Intrusion campaigns? (Choose three.)

Options:

A.

Files and anti-malware (lie events from the NSX Edge nodes and the Security Analyzer

B.

East-West anti-malware events from the ESXi hosts

C.

Distributed Firewall flow data from the ESXi hosts

D.

IDS/IPS events from the ESXi hosts and NSX Edge nodes

E.

Suspicious Traffic Detection events from NSX Intelligence

Question 28

Which VPN type must be configured before enabling a L2VPN?

Options:

A.

Route-based IPSec VPN

B.

Policy based IPSec VPN

C.

SSL-bosed IPSec VPN

D.

Port-based IPSec VPN

Question 29

Which of the following exist only on Tler-1 Gateway firewall configurations and not on Tier-0?

Options:

A.

Applied To

B.

Actions

C.

Profiles

D.

Sources

Question 30

An NSX administrator is troubleshooting a connectivity issue with virtual machines running on an FSXi transport node. Which feature in the NSX Ul shows the mapping between the virtual NIC and the host's physical adapter?

Options:

A.

Port Mirroring

B.

Switch Visualization

C.

Activity Monitoring

D.

IPFIX

Question 31

Refer to the exhibit.

Which two items must be configured to enable OSPF for the Tler-0 Gateway in the Image? Mark your answers by clicking twice on the image.

Options:

Question 32

Which VMware GUI tool is used to identify problems in a physical network?

Options:

A.

VMware Aria Automation

B.

VMware Aria Orchestrator

C.

VMware Site Recovery Manager

D.

VMware Aria Operations Networks

Page: 1 / 8
Total 107 questions