Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

VMware 2V0-41.23 VMware NSX 4.x Professional Exam Practice Test

Page: 1 / 11
Total 107 questions

VMware NSX 4.x Professional Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which two tools are used for centralized logging in VMware NSX? (Choose two.)

Options:

A.

VMware Aria Operations

B.

Syslog Server

C.

VMware Aria Automation

D.

VMware Aria Operations for Logs

E.

VMware Aria Operations for Networks

Question 2

Which troubleshooting step will resolve an error with code 1001 during the configuration of a time-based firewall rule?

Options:

A.

Reinstalling the NSX VIBs on the ESXi host.

B.

Restarting the NTPservice on the ESXi host.

C.

Changing the lime zone on the ESXi host.

D.

Reconfiguring the ESXI host with a local NTP server.

Question 3

Which two statements describe the characteristics of an Edge Cluster in NSX? (Choose two.)

Options:

A.

Can have a maximum of 10 edge nodes

B.

Can have a maximum of 8 edge nodes

C.

Can contain multiple types of edge nodes (VM or bare metal)

D.

Must contain only one type of edge nodes (VM or bare metal)

E.

Must have only active-active edge nodes

Question 4

An NSX administrator has deployed a single NSX Manager node and will be adding two additional nodes to form a 3-node NSX Management Cluster for a production environment. The administrator will deploy these two additional nodes and Cluster VIP using the NSX UI.

What two are the prerequisites for this configuration? (Choose two.)

Options:

A.

All nodes must be in separate subnets.

B.

The cluster configuration must be completed using API.

C.

NSX Manager must reside on a Windows Server.

D.

All nodes must be in the same subnet.

E.

A compute manager must be configured.

Question 5

An administrator has been tasked with implementing the SSL certificates for the NSX Manager Cluster VIP.

Which is the correct way to implement this change?

Options:

A.

Send an API call to https:// /api/v1/cluster/api-certificate? action=set_cluster_certificate&certificate_id=

B.

Send an API call to https:// /api/v1/node/services/http? action=apply_certificate&certificate_id=

C.

SSH as admin into the NSX manager with the cluster VIP IP and run nsxcli cluster certificate vip install

D.

SSH as admin into the NSX manager with the cluster VIP IP and run nsxcli cluster certificate node install

Question 6

The security administrator turns on logging for a firewall rule.

Where is the log stored on an ESXi transport node?

Options:

A.

/var/log/vmware/nsx/firewall.log

B.

/var/log/messages.log

C.

/var/log/dfwpktlogs.log

D.

/var/log/fw.log

Question 7

Which two statements are true about IDS Signatures? (Choose two.)

Options:

A.

Users can upload their own IDS signature definitions.

B.

An IDS signature contains data used to identify known exploits and vulnerabilities.

C.

An IDS signature contains data used to identify the creator of known exploits and vulnerabilities.

D.

IDS signatures can be High Risk, Suspicious, Low Risk and Trustworthy.

E.

An IDS signature contains a set of instructions that determine which traffic is analyzed.

Question 8

Which two BGP configuration parameters can be configured in the VRF Lite gateways? (Choose two.)

Options:

A.

Graceful Restart

B.

BGP Neighbors

C.

Local AS

D.

Route Distribution

E.

Route Aggregation

Question 9

Which three DHCP Services are supported by NSX? (Choose three.)

Options:

A.

Gateway DHCP

B.

Port DHCP per VNF

C.

Segment DHCP

D.

VRF DHCP Server

E.

DHCP Relay

Question 10

Which two statements are true for IPSec VPN? (Choose two.)

Options:

A.

VPNs can be configured on the command line Interface on the NSX manager.

B.

IPSec VPN services can be configured at Tler-0 and Tler-1 gateways.

C.

IPSec VPNs use the DPDK accelerated performance library.

D.

Dynamic routing Is supported for any IPSec mode In NSX.

Question 11

Which two choices are solutions offered by the VMware NSX portfolio? (Choose two.)

Options:

A.

VMware Tanzu Kubernetes Grid

B.

VMware Tanzu Kubernetes Cluster

C.

VMware NSX Advanced Load Balancer

D.

VMware NSX Distributed IDS/IPS

E.

VMware Aria Automation

Question 12

Which two of the following features are supported for the Standard NSX Application Platform Deployment? (Choose two.)

Options:

A.

NSX Intrusion Detection and Prevention

B.

NSX Intelligence

C.

NSX Network Detection and Response

D.

NSX Malware Prevention Metrics

E.

NSX Intrinsic Security

Question 13

How is the RouterLink port created between a Tier-1 Gateway and Tier-O Gateway?

Options:

A.

Automatically created when Tier-1 is connected with Tier-0 from NSX UI.

B.

Automatically created when Tier-1 is created.

C.

Manually create a Logical Switch and connect to bother Tier-1 and Tier-0 Gateways.

D.

Manually create a Segment and connect to both Tier-1 and Tier-0 Gateways.

Question 14

When a stateful service is enabled for the first lime on a Tier-0 Gateway, what happens on the NSX Edge node'

Options:

A.

SR is instantiated and automatically connected with DR.

B.

DR Is instantiated and automatically connected with SR.

C.

SR and DR Is instantiated but requites manual connection.

D.

SR and DR doesn't need to be connected to provide any stateful services.

Question 15

An NSX administrator Is treating a NAT rule on a Tler-0 Gateway configured In active-standby high availability mode. Which two NAT rule types are supported for this configuration? (Choose two.)

Options:

A.

Reflexive NAT

B.

Destination NAT

C.

1:1 NAT

D.

Port NAT

E.

Source NAT

Question 16

Where in the NSX UI would an administrator set the time attribute for a time-based Gateway Firewall rule?

Options:

A.

The option to set time-based rule is a clock Icon in the rule.

B.

The option to set time based rule is a field in the rule Itself.

C.

There Is no option in the NSX UI. It must be done via command line interface.

D.

The option to set time-based rule is a clock Icon in the policy.

Question 17

Sort the rule processing steps of the Distributed Firewall. Order responses from left to right.

Options:

Question 18

An administrator has deployed 10 Edge Transport Nodes in their NSX Environment, but has forgotten to specify an NTP server during the deployment.

What is the efficient way to add an NTP server to all 10 Edge Transport Nodes?

Options:

A.

Use Transport Node Profile

B.

Use the CU on each Edge Node

C.

Use a Node Profile

D.

Use a PowerCU script

Question 19

NSX improves the security of today's modern workloads by preventing lateral movement, which feature of NSX can be used to achieve this?

Options:

A.

Network Segmentation

B.

Virtual Security Zones

C.

Edge Firewalling

D.

Dynamic Routing

Question 20

A company security policy requires all users to log Into applications using a centralized authentication system.

Which two authentication, authorization, and accounting (AAA) systems are available when Integrating NSX with VMware Identity Manager? (Choose two.)

Options:

A.

RADII 2.0

B.

Keyoen Enterprise

C.

RSA SecurelD

D.

LDAP and OpenLDAP based on Active Directory (AD)

E.

SecureDAP

Question 21

Which command is used to set the NSX Manager's logging-level to debug mode for troubleshooting?

Options:

A.

Set service manager log-level debug

B.

Set service manager logging-level debug

C.

Set service nsx-manager log-level debug

D.

Set service nsx-manager logging-level debug

Question 22

Which two CLI commands could be used to see if vmnic link status is down? (Choose two.)

Options:

A.

esxcfg-nics -1

B.

excli network nic list

C.

esxcli network vswitch dvs wmare list

D.

esxcfg-vmknic -1

E.

esxcfg-vmsvc/get.network

Question 23

Which NSX CLI command is used to change the authentication policy for local users?

Options:

A.

Set cli-timeout

B.

Get auth-policy minimum-password-length

C.

Set hardening- policy

D.

Set auth-policy

Question 24

Refer to the exhibits.

Drag and drop the NSX graphic element icons on the left found in an NSX Intelligence visualization graph to Its correct description on the right.

Options:

Question 25

Which two steps must an NSX administrator take to integrate VMware Identity Manager in NSX to support role-based access control? (Choose two.)

Options:

A.

Create a SAML authentication in VMware Identity Manager using the NSX Manager FQDN.

B.

Enter the Identity Provider (IdP) metadata URL in NSX Manager.

C.

Create an OAuth 2.0 client in VMware Identity Manager.

D.

Add NSX Manager as a Service Provider (SP) in VMware Identity Manager.

E.

Enter the service URL, Client Secret, and SSL thumbprint in NSX Manager.

Question 26

Refer to the exhibit.

An administrator configured NSX Advanced Load Balancer to redistribute the traffic between the web servers. However, requests are sent to only one server

Which of the following pool configuration settings needs to be adjusted to resolve the problem? Mark the correct answer by clicking on the image.

Options:

Question 27

An NSX administrator would like to create an L2 segment with the following requirements:

• L2 domain should not exist on the physical switches.

• East/West communication must be maximized as much as possible.

Which type of segment must the administrator choose?

Options:

A.

VLAN

B.

Overlay

C.

Bridge

D.

Hybrid

Question 28

Which two commands does an NSX administrator use to check the IP address of the VMkernel port for the Geneve protocol on the ESXi transport node? (Choose two.)

Options:

A.

esxcfg-nics -1l

B.

esxcli network ip interface ipv4 get

C.

esxcli network nic list

D.

esxcfg-vmknic -1

E.

net-dvs

Question 29

An architect receives a request to apply distributed firewall in a customer environment without making changes to the network and vSphere environment. The architect decides to use Distributed Firewall on VDS.

Which two of the following requirements must be met in the environment? (Choose two.)

Options:

A.

vCenter 8.0 and later

B.

NSX version must be 3.2 and later

C.

NSX version must be 3.0 and later

D.

VDS version 6.6.0 and later

Question 30

Which of the following settings must be configured in an NSX environment before enabling stateful active-active SNAT?

Options:

A.

Tier-1 gateway in active-standby mode

B.

Tier-1 gateway in distributed only mode

C.

An Interface Group for the NSX Edge uplinks

D.

A Punting Traffic Group for the NSX Edge uplinks

Question 31

What are two valid options when configuring the scope of a distributed firewall rule? (Choose two.)

Options:

A.

DFW

B.

Tier-1 Gateway

C.

Segment

D.

Segment Port

E.

Group

Question 32

Which three data collection sources are used by NSX Network Detection and Response to create correlations/Intrusion campaigns? (Choose three.)

Options:

A.

Files and anti-malware (lie events from the NSX Edge nodes and the Security Analyzer

B.

East-West anti-malware events from the ESXi hosts

C.

Distributed Firewall flow data from the ESXi hosts

D.

IDS/IPS events from the ESXi hosts and NSX Edge nodes

E.

Suspicious Traffic Detection events from NSX Intelligence

Page: 1 / 11
Total 107 questions