Black Friday Biggest Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

VMware 2V0-41.24 Dumps

Page: 1 / 12
Total 115 questions

VMware NSX 4.X Professional V2 Questions and Answers

Question 1

What are four NSX built-in rote-based access control (RBAC) roles? (Choose four.)

Options:

A.

Network Admin

B.

Enterprise Admin

C.

Full Access

D.

Read

E.

LB Operator

F.

None

G.

Auditor

Question 2

In an NSX environment, an administrator is observing low throughput and congestion between the Tier-0 Gateway and the upstream physical routers.

Which two actions could address low throughput and congestion? (Choose two.)

Options:

A.

Configure ECMP on the Tier-0 gateway.

B.

Configure a Tier-1 gateway and connect it directly to the physical routers.

C.

Deploy Large size Edge node/s.

D.

Configure NAT on the Tier-0 gateway.

E.

Add an additional vNIC to the NSX Edge node.

Question 3

Which three selections are capabilities of Network Topology? (Choose three.)

Options:

A.

Display how the different NSX components are interconnected.

B.

Display the VMs connected to Segments.

C.

Display how the Physical components are interconnected.

D.

Display the uplinks configured on the Tier-1 Gateways.

E.

Display the uplinks configured on the Tier-0 Gateways.

Question 4

Which three DHCP Services are supported by NSX? (Choose three.)

Options:

A.

Gateway DHCP

B.

Segment DHCP

C.

DHCP Relay

D.

Port DHCP per VNF

E.

VRF DHCP Server

Question 5

An NSX administrator wants to create a Tier-0 Gateway to support equal cost multi-path (ECMP) routing.

Which failover detection protocol must be used to meet this requirement?

Options:

A.

Host Standby Router Protocol (HSRP)

B.

Beacon Probing (BP)

C.

Virtual Router Redundancy Protocol (VRRP)

D.

Bidirectional Forwarding Detection (BFD)

Question 6

Which of the following settings must be configured in an NSX environment before enabling stateful active-active SNAT?

Options:

A.

Tier-1 gateway in active-standby mode

B.

A Punting Traffic Group for the NSX Edge uplinks

C.

An Interface Group for the NSX Edge uplinks

D.

Tier-1 gateway in distributed only mode

Question 7

What are two valid BGP Attributes that can be used to influence the route path traffic will take? (Choose two.)

Options:

A.

AS-Path Prepend

B.

BFD

C.

Cost

D.

MED

Question 8

Which TraceFlow traffic type should an NSX administrator use for validating connectivity between App and DB virtual machines that reside on different segments?

Options:

A.

Anycast

B.

Multicast

C.

Broadcast

D.

Unicast

Question 9

What are two supported host switch modes? (Choose two.)

Options:

A.

Overlay Datapath

B.

Secure Datapath

C.

Standard Datapath

D.

Enhanced Datapath

E.

DPDK Datapath

Question 10

What can the administrator use to identify overlay segments in an NSX environment if troubleshooting is required?

Options:

A.

Geneve ID

B.

VMI ID

C.

Segment ID

D.

VLANID

Question 11

What is the most restrictive NSX built-in role which will allow a user to apply configuration changes on an NSX Edge?

Options:

A.

Network Engineer

B.

Cloud Service Administrator

C.

NSX Administrator

D.

Network Operator

Question 12

An administrator has deployed 10 Edge Transport Nodes in their NSX Environment, but has forgotten to specify an NTP server during the deployment.

What is the efficient way to add an NTP server to all 10 Edge Transport Nodes?

Options:

A.

Use a Node Profile

B.

Use Transport Node Profile

C.

Use the CLI on each Edge Node

D.

Use a PowerCLI script

Question 13

Which of the two following characteristics about NAT64 are true? (Choose two.)

Options:

A.

NAT64 requires the Tier-1 gateway to be configured in active-active mode.

B.

NAT64 is stateless and requires gateways to be deployed in active-standby mode.

C.

NAT64 is supported on Tier-0 and Tier-1 gateways.

D.

NAT64 is supported on Tier-1 gateways only.

E.

NAT64 requires the Tier-1 gateway to be configured in active-standby mode.

Question 14

A company security policy requires all users to log into applications using a centralized authentication system.

Which two authentication, authorization, and accounting (AAA) systems are available when integrating NSX with VMware Identity Manager? (Choose two.)

Options:

A.

RSA SecureID

B.

SecureDAP

C.

RADII 2.0

D.

LDAP and OpenLDAP based on Active Directory (AD)

E.

Keygen Enterprise

Question 15

Which two of the following parameters are required for deploying the NSX Application Platform? (Choose two.)

Options:

A.

Interface Name

B.

Upload XML File

C.

Cluster Format Type

D.

Interface Service Name

E.

Upload Kubernetes Configuration File

Question 16

Which three data collection sources are used by NSX Network Detection and Response to create correlations/Intrusion campaigns? (Choose three.)

Options:

A.

Files and anti-malware (lie events from the NSX Edge nodes and the Security Analyzer

B.

East-West anti-malware events from the ESXi hosts

C.

Distributed Firewall flow data from the ESXi hosts

D.

IDS/IPS events from the ESXi hosts and NSX Edge nodes

E.

Suspicious Traffic Detection events from NSX Intelligence

Question 17

Refer to the exhibits.

Drag and drop the NSX graphic element icons on the left found in an NSX Intelligence visualization graph to Its correct description on the right.

as

Options:

Question 18

Which three NSX Edge components are used for North-South Malware Prevention? (Choose three.)

Options:

A.

Thin Agent

B.

RAPID

C.

Security Hub

D.

IDS/IPS

E.

Security Analyzer

F.

Reputation Service

Question 19

An administrator has a requirement to have consistent policy configuration and enforcement across NSX instances.

What feature of NSX fulfills this requirement?

Options:

A.

Multi-hvpervisor support

B.

Federation

C.

Load balancer

D.

Policy-driven configuration

Question 20

An NSX administrator is using ping to check connectivity between VM1 running on ESXi1 to VM2 running on ESXi2. The ping tests fail. The administrator knows the maximum transmission unit size on the physical switch is 1600.

Which command does the administrator use to check the VMware kernel ports for tunnel end point communication?

Options:

A.

vmkping ++netstack=geneve -d -s 1572

B.

vmkping ++netstack=vxlan -d -s 1572

C.

esxcli network diag ping –H

D.

esxcli network diag ping -I vmk0 -H

Question 21

How is the RouterLink port created between a Tier-1 Gateway and Tier-0 Gateway?

Options:

A.

Automatically created when Tier-1 is created.

B.

Manually create a Logical Switch and connect to bother Tier-1 and Tier-0 Gateways.

C.

Manually create a Segment and connect to both Tier-1 and Tier-0 Gateways.

D.

Automatically created when Tier-1 is connected with Tier-0 from NSX Ul.

Question 22

Which CLI command does an NSX administrator run on the NSX Manager to generate support bundle logs if the NSX UI is inaccessible?

Options:

A.

esxcli system syslog config logger set --id=nsxmanager

B.

get support-bundle file vcpnv.tgz

C.

vm-support

D.

set support-bundle file vcpnv.tgz

Question 23

A company Is deploying NSX micro-segmentation in their vSphere environment to secure a simple application composed of web. app, and database tiers.

The naming convention will be:

• WKS-WEB-SRV-XXX

• WKY-APP-SRR-XXX

• WKI-DB-SRR-XXX

What is the optimal way to group them to enforce security policies from NSX?

Options:

A.

Use Edge as a firewall between tiers.

B.

Do a service insertion to accomplish the task.

C.

Group all by means of tags membership.

D.

Create an Ethernet based security policy.

Question 24

Refer to the exhibit.

An administrator configured NSX Advanced Load Balancer to redistribute the traffic between the web servers. However, requests are sent to only one server

Which of the following pool configuration settings needs to be adjusted to resolve the problem? Mark the correct answer by clicking on the image.

as

Options:

Question 25

Which tool could be used to configure BGP on a Tier-0 Gateway?

Options:

A.

ESX CLI

B.

NSX CLI

C.

API

D.

iPerf3

Question 26

A customer has a network where BGP has been enabled and the BGP neighbor is configured on the Tier-0 Gateway. An NSX administrator used the get gateways command to retrieve this information:

as

Which two commands must be executed to check BGP neighbor status? (Choose two.)

Options:

A.

vrf 3

B.

sa-nsxedge-01(tier0_dr)> get bgp neighbor

C.

vrf 1

D.

sa-nsxedge-01(tier1_sr)> get bgp neighbor

E.

sa-nsxedge-01(tier0_sr)> get bgp neighbor

F.

vrf 4

Question 27

Which of the following exist only on Tler-1 Gateway firewall configurations and not on Tier-0?

Options:

A.

Applied To

B.

Actions

C.

Profiles

D.

Sources

Question 28

Which statement is true about an alarm in a Suppressed state?

Options:

A.

An alarm can be suppressed for a specific duration in hours.

B.

An alarm can be suppressed for a specific duration in seconds.

C.

An alarm can be suppressed for a specific duration in days.

D.

An alarm can be suppressed for a specific duration in minutes

Question 29

Which VPN type must be configured before enabling an L2VPN?

Options:

A.

Policy-based IPSec VPN

B.

Port-based IPSec VPN

C.

SSL-based IPSec VPN

D.

Route-based IPSec VPN

Question 30

Which two commands does an NSX administrator use to check the IP address of the VMkernel port for the Geneve protocol on the ESXi transport node? (Choose two.)

Options:

A.

net-dvs

B.

esxcfg-nics -l

C.

esxcli network ip interface ipv4 get

D.

esxcfg-vmknic -l

E.

esxcli network nic list

Question 31

Refer to the exhibit.

Which two items must be configured to enable OSPF for the Tler-0 Gateway in the Image? Mark your answers by clicking twice on the image.

as

Options:

Question 32

Which two statements are correct about East-West Malware Prevention? (Choose two.)

Options:

A.

A SVM is deployed on every ESXi host.

B.

NSX Application Platform must have Internet access.

C.

An agent must be installed on every ESXi host.

D.

An agent must be installed on every NSX Edge node.

E.

NSX Edge nodes must have Internet access.

Question 33

Which CLI command shows syslog on NSX Manager?

Options:

A.

(show log manager follow

B.

gee log-file syslog

C.

[get log-file auch.log

D.

/var/log/syslog/syslog.log

Question 34

Which two of the following will be used for ingress traffic on the Edge node supporting a Single Tier topology? (Choose two.)

Options:

A.

Tier-1 SR Router Port

B.

Tier-0 Uplink interface

C.

Downlink Interface for the Tier-0 DR

D.

Downlink Interface for the Tier-1 DR

E.

Inter-Tier interface on the Tier-0 gateway

Page: 1 / 12
Total 115 questions