Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

VMware 2V0-41.23 Dumps

Page: 1 / 11
Total 107 questions

VMware NSX 4.x Professional Questions and Answers

Question 1

What is the VMware recommended way to deploy a virtual NSX Edge Node?

Options:

A.

Through the OVF command line tool

B.

Through the vSphere Web Client

C.

Through automated or Interactive mode using an ISO

D.

Through the NSXUI

Question 2

An NSX administrator would like to export syslog events that capture messages related to NSX host preparation events. Which message ID (msgld) should be used in the syslog export configuration command as a filler?

Options:

A.

MONISTORING

B.

SYSTEM

C.

GROUPING

D.

FABRIC

Question 3

Which three NSX Edge components are used for North-South Malware Prevention? (Choose three.)

Options:

A.

Thin Agent

B.

RAPID

C.

Security Hub

D.

IDS/IPS

E.

Security Analyzer

F.

Reputation Service

Question 4

Which of the following exist only on Tler-1 Gateway firewall configurations and not on Tier-0?

Options:

A.

Applied To

B.

Actions

C.

Profiles

D.

Sources

Question 5

Which field in a Tier-1 Gateway Firewall would be used to allow access for a collection of trustworthy web sites?

Options:

A.

Source

B.

Profiles -> Context Profiles

C.

Destination

D.

Profiles -> L7 Access Profile

Question 6

Which three data collection sources are used by NSX Network Detection and Response to create correlations/Intrusion campaigns? (Choose three.)

Options:

A.

Files and anti-malware (lie events from the NSX Edge nodes and the Security Analyzer

B.

East-West anti-malware events from the ESXi hosts

C.

Distributed Firewall flow data from the ESXi hosts

D.

IDS/IPS events from the ESXi hosts and NSX Edge nodes

E.

Suspicious Traffic Detection events from NSX Intelligence

Question 7

Which statement is true about an alarm in a Suppressed state?

Options:

A.

An alarm can be suppressed for a specific duration in seconds.

B.

An alarm can be suppressed for a specific duration in days.

C.

An alarm can be suppressed for a specific duration in minutes.

D.

An alarm can be suppressed for a specific duration in hours.

Question 8

Refer to the exhibit.

An administrator would like to change the private IP address of the NAT VM I72.l6.101.il to a public address of 80.80.80.1 as the packets leave the NAT-Segment network.

Which type of NAT solution should be implemented to achieve this?

as

Options:

A.

DNAT

B.

SNAT

C.

Reflexive NAT

D.

NAT64

Question 9

A security administrator needs to configure a firewall rule based on the domain name of a specific application.

Which field in a distributed firewall rule does the administrator configure?

Options:

A.

Profile

B.

Service

C.

Policy

D.

Source

Question 10

Which table on an ESXi host is used to determine the location of a particular workload for a frame-forwarding decision?

Options:

A.

TEP Table

B.

MAC Table

C.

ARP Table

D.

Routing Table

Question 11

Where is the insertion point for East-West network introspection?

Options:

A.

Tier-0 router

B.

Partner SVM

C.

Guest VM vNIC

D.

Host Physical NIC

Question 12

What should an NSX administrator check to verify that VMware Identity Manager Integration Is successful?

Options:

A.

From VMware Identity Manager the status of the remote access application must be green.

B.

From the NSX UI the status of the VMware Identity Manager Integration must be "Enabled".

C.

From the NSX CLI the status of the VMware Identity Manager Integration must be "Configured".

D.

From the NSX UI the URI in the address bar must have "locaNfatse" part of it.

Question 13

What are four NSX built-in rote-based access control (RBAC) roles? (Choose four.)

Options:

A.

Network Admin

B.

Enterprise Admin

C.

Full Access

D.

Read

E.

LB Operator

F.

None

G.

Auditor

Question 14

Which two choices are solutions offered by the VMware NSX portfolio? (Choose two.)

Options:

A.

VMware Tanzu Kubernetes Grid

B.

VMware Tanzu Kubernetes Cluster

C.

VMware NSX Advanced Load Balancer

D.

VMware NSX Distributed IDS/IPS

E.

VMware Aria Automation

Question 15

What must be configured on Transport Nodes for encapsulation and decapsulation of Geneve protocol?

Options:

A.

VXIAN

B.

UDP

C.

STT

D.

TEP

Question 16

An NSX administrator is troubleshooting a connectivity issue with virtual machines running on an FSXi transport node. Which feature in the NSX Ul shows the mapping between the virtual NIC and the host's physical adapter?

Options:

A.

Port Mirroring

B.

Switch Visualization

C.

Activity Monitoring

D.

IPFIX

Question 17

An administrator needs to download the support bundle for NSX Manager. Where does the administrator download the log bundle from?

Options:

A.

System > Utilities > Tools

B.

System > Support Bundle

C.

System > Settings > Support Bundle

D.

System > Settings

Question 18

How is the RouterLink port created between a Tier-1 Gateway and Tier-O Gateway?

Options:

A.

Automatically created when Tier-1 is connected with Tier-0 from NSX UI.

B.

Automatically created when Tier-1 is created.

C.

Manually create a Logical Switch and connect to bother Tier-1 and Tier-0 Gateways.

D.

Manually create a Segment and connect to both Tier-1 and Tier-0 Gateways.

Question 19

A customer is preparing to deploy a VMware Kubernetes solution in an NSX environment.

What is the minimum MTU size for the UPLINK profile?

Options:

A.

1500

B.

1550

C.

1700

D.

1650

Question 20

Which two logical router components span across all transport nodes? (Choose two.)

Options:

A.

SFRVICE_ROUTER_TJER0

B.

TIERO_DISTRI BUTE D_ ROUTER

C.

DISTRIBUTED_R0UTER_TIER1

D.

DISTRIBUTED_ROUTER_TIER0

E.

SERVICE_ROUTER_TIERl

Question 21

How is the RouterLink port created between a Tier-1 Gateway and Tler-0 Gateway?

Options:

A.

Manually create a Logical Switch and connect to bother Tler-1 and Tier-0 Gateways.

B.

Automatically created when Tler-1 is created.

C.

Manually create a Segment and connect to both Titrr-1 and Tier-0 Gateways.

D.

Automatically created when Tier-t Is connected with Tier-0 from NSX UI.

Question 22

Which NSX CLI command is used to change the authentication policy for local users?

Options:

A.

Set cli-timeout

B.

Get auth-policy minimum-password-length

C.

Set hardening- policy

D.

Set auth-policy

Question 23

What can the administrator use to identify overlay segments in an NSX environment if troubleshooting is required?

Options:

A.

VNI ID

B.

Segment ID

C.

Geneve ID

D.

VIAN ID

Question 24

Which troubleshooting step will resolve an error with code 1001 during the configuration of a time-based firewall rule?

Options:

A.

Reinstalling the NSX VIBs on the ESXi host.

B.

Restarting the NTPservice on the ESXi host.

C.

Changing the lime zone on the ESXi host.

D.

Reconfiguring the ESXI host with a local NTP server.

Question 25

Which CLI command would an administrator use to allow syslog on an ESXi transport node when using the esxcli utility?

Options:

A.

esxcli network firewall ruleset set -r syslog -e true

B.

esxcli network firewall ruleset -e syslog

C.

esxcli network firewall ruleset set -r syslog -e false

D.

esxcli network firewall ruleset set -a -e false

Question 26

Which is an advantages of a L2 VPN In an NSX 4.x environment?

Options:

A.

Enables Multi-Cloud solutions

B.

Achieve better performance

C.

Enables VM mobility with re-IP

D.

Use the same broadcast domain

Question 27

Which command on ESXI is used to verify the Local Control Plane connectivity with Central Control Plane?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 28

Refer to the exhibit.

Which two items must be configured to enable OSPF for the Tler-0 Gateway in the Image? Mark your answers by clicking twice on the image.

as

Options:

Question 29

What are three NSX Manager roles? (Choose three.)

Options:

A.

master

B.

cloud

C.

zookeepet

D.

manager

E.

policy

F.

controller

Question 30

Which two tools are used for centralized logging in VMware NSX? (Choose two.)

Options:

A.

VMware Aria Operations

B.

Syslog Server

C.

VMware Aria Automation

D.

VMware Aria Operations for Logs

E.

VMware Aria Operations for Networks

Question 31

What are two valid BGP Attributes that can be used to influence the route path traffic will take? (Choose two.)

Options:

A.

AS-Path Prepend

B.

BFD

C.

Cost

D.

MED

Question 32

Which command is used to set the NSX Manager's logging-level to debug mode for troubleshooting?

Options:

A.

Set service manager log-level debug

B.

Set service manager logging-level debug

C.

Set service nsx-manager log-level debug

D.

Set service nsx-manager logging-level debug

Page: 1 / 11
Total 107 questions