Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

VMware 2V0-41.24 VMware NSX 4.X Professional V2 Exam Practice Test

Page: 1 / 12
Total 115 questions

VMware NSX 4.X Professional V2 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

Which two steps must an NSX administrator take to integrate VMware Identity Manager in NSX to support role-based access control? (Choose two.)

Options:

A.

Create a SAML authentication in VMware Identity Manager using the NSX Manager FQDN.

B.

Add NSX Manager as a Service Provider (SP) in VMware Identity Manager.

C.

Enter the Identity Provider (IdP) metadata URL in NSX Manager.

D.

Enter the service URL, Client Secret, and SSL thumbprint in NSX Manager.

E.

Create an OAuth 2.0 client in VMware Identity Manager.

Question 2

Sort the rule processing steps of the Distributed Firewall. Order responses from left to right.

Options:

Question 3

Which CLI command shows syslog on NSX Manager?

Options:

A.

(show log manager follow

B.

gee log-file syslog

C.

[get log-file auch.log

D.

/var/log/syslog/syslog.log

Question 4

Which two tools are used for centralized logging in VMware NSX? (Choose two.)

Options:

A.

Sysloq Server

B.

VMware Aria Automation

C.

VMware Aria Operations for Logs

D.

VMware Aria Operations for Networks

E.

VMware Aria Operations

Question 5

Which troubleshooting step will resolve an error with code 1001 during the configuration of a time-based firewall rule?

Options:

A.

Restarting the NTPservice on the ESXi host.

B.

Reconfiguring the ESXi host with a local NTP server.

C.

Re-installing the NSX VIBs on the ESXi host.

D.

Changing the time zone on the ESXi host.

Question 6

Which two choices are solutions offered by the VMware NSX portfolio? (Choose two.)

Options:

A.

VMware Tanzu Kubernetes Grid

B.

VMware Tanzu Kubernetes Cluster

C.

VMware NSX Advanced Load Balancer

D.

VMware NSX Distributed IDS/IPS

E.

VMware Aria Automation

Question 7

Which two statements are true about IDS Signatures? (Choose two.)

Options:

A.

Users can upload their own IDS signature definitions.

B.

An IDS signature contains data used to identify known exploits and vulnerabilities.

C.

An IDS signature contains data used to identify the creator of known exploits and vulnerabilities.

D.

IDS signatures can be High Risk, Suspicious, Low Risk and Trustworthy.

E.

An IDS signature contains a set of instructions that determine which traffic is analyzed.

Question 8

A company security policy requires all users to log into applications using a centralized authentication system.

Which two authentication, authorization, and accounting (AAA) systems are available when integrating NSX with VMware Identity Manager? (Choose two.)

Options:

A.

RSA SecureID

B.

SecureDAP

C.

RADII 2.0

D.

LDAP and OpenLDAP based on Active Directory (AD)

E.

Keygen Enterprise

Question 9

Which CLI command on NSX Manager and NSX Edge is used to change NTP settings?

Options:

A.

set timezone

B.

set ntp-server

C.

get timezone

D.

get time-server

Question 10

Which of the following exist only on Tler-1 Gateway firewall configurations and not on Tier-0?

Options:

A.

Applied To

B.

Actions

C.

Profiles

D.

Sources

Question 11

What is the VMware recommended way to deploy a virtual NSX Edge Node?

Options:

A.

Through the NSX Ul

B.

Through automated or interactive mode using an ISO

C.

Through the vSphere Web Client

D.

Through the OVF command line tool

Question 12

A security administrator needs to configure a firewall rule based on the domain name of a specific application.

Which field in a distributed firewall rule does the administrator configure?

Options:

A.

Profile

B.

Service

C.

Policy

D.

Source

Question 13

What should an NSX administrator check to verify that VMware Identity Manager integration is successful?

Options:

A.

From the NSX Ul the status of the VMv/are Identity Manager Integration must be Enabled'

B.

From the NSX CLI the status of the VMware Identity Manager Integration must be Configured'

C.

From VMware Identity Manager the status of the remote access application must be green

D.

From the NSX Ul the URI in the address bar must have locaMalstf part of it.

Question 14

Which two are requirements for FQDN Analysis? (Choose two.)

Options:

A.

The NSX Edge nodes require access to the Internet to download category and reputation definitions.

B.

ESXi control panel requires access to the Internet to download category and reputation definitions.

C.

The NSX Manager requires access to the Internet to download category and reputation definitions.

D.

A layer 7 gateway firewall rule must be configured on the Tier-1 gateway uplink.

E.

A layer 7 gateway firewall rule must be configured on the Tier-0 gateway uplink.

Question 15

A customer has a network where BGP has been enabled and the BGP neighbor is configured on the Tier-0 Gateway. An NSX administrator used the get gateways command to retrieve this information:

Which two commands must be executed to check BGP neighbor status? (Choose two.)

Options:

A.

vrf 3

B.

sa-nsxedge-01(tier0_dr)> get bgp neighbor

C.

vrf 1

D.

sa-nsxedge-01(tier1_sr)> get bgp neighbor

E.

sa-nsxedge-01(tier0_sr)> get bgp neighbor

F.

vrf 4

Question 16

Which two built-in VMware tools will help identify the cause of packet loss on VLAN Segments? (Choose two.)

Which two built-in VMware tools will help identify the cause of packet loss on VLAN Segments? (Choose two.)

Options:

A.

Flow Monitoring

B.

Traceflow

C.

Live Flow

D.

Packet Capture

E.

Activity Monitoring

Question 17

Which of the following settings must be configured in an NSX environment before enabling stateful active-active SNAT?

Options:

A.

Tier-1 gateway in active-standby mode

B.

A Punting Traffic Group for the NSX Edge uplinks

C.

An Interface Group for the NSX Edge uplinks

D.

Tier-1 gateway in distributed only mode

Question 18

What are two valid BGP Attributes that can be used to influence the route path traffic will take? (Choose two.)

Options:

A.

AS-Path Prepend

B.

BFD

C.

Cost

D.

MED

Question 19

Refer to the exhibit.

Which two items must be configured to enable OSPF for the Tler-0 Gateway in the Image? Mark your answers by clicking twice on the image.

Options:

Question 20

An administrator needs to download the support bundle for NSX Manager.

Where does the administrator download the log bundle from?

Options:

A.

System > Support Bundle

B.

System > Settings

C.

System > Utilities > Tools

D.

System > Settings > Support Bundle

Question 21

Which two of the following parameters are required for deploying the NSX Application Platform? (Choose two.)

Options:

A.

Interface Name

B.

Upload XML File

C.

Cluster Format Type

D.

Interface Service Name

E.

Upload Kubernetes Configuration File

Question 22

In an NSX environment, an administrator is observing low throughput and congestion between the Tier-0 Gateway and the upstream physical routers.

Which two actions could address low throughput and congestion? (Choose two.)

Options:

A.

Configure ECMP on the Tier-0 gateway.

B.

Configure a Tier-1 gateway and connect it directly to the physical routers.

C.

Deploy Large size Edge node/s.

D.

Configure NAT on the Tier-0 gateway.

E.

Add an additional vNIC to the NSX Edge node.

Question 23

What is the most restrictive NSX built-in role which will allow a user to apply configuration changes on an NSX Edge?

Options:

A.

Network Engineer

B.

Cloud Service Administrator

C.

NSX Administrator

D.

Network Operator

Question 24

Which TraceFlow traffic type should an NSX administrator use for validating connectivity between App and DB virtual machines that reside on different segments?

Options:

A.

Anycast

B.

Multicast

C.

Broadcast

D.

Unicast

Question 25

What needs to be configured on a Tier-0 Gateway to make NSX Edge Services available to a VM on a VLAN-backed logical switch?

Options:

A.

VLAN Uplink

B.

Downlink interface

C.

Loopback Router Port

D.

Service interface

Question 26

Which three of the following describe the Border Gateway Routing Protocol (BGP) configuration on a Tier-0 Gateway? (Choose three.)

Options:

A.

It supports a 4-byte autonomous system number.

B.

Can be used as an Exterior Gateway Protocol.

C.

The network is divided into areas that are logical groups.

D.

EIGRP is disabled by default.

E.

BGP is enabled by default.

Question 27

Which of the two following characteristics about NAT64 are true? (Choose two.)

Options:

A.

NAT64 is stateless and requires gateways to be deployed in active-standby mode.

B.

NAT64 is supported on Tier-1 gateways only.

C.

NAT64 is supported on Tier-0 and Tier-1 gateways.

D.

NAT64 requires the Tier-1 gateway to be configured in active-standby mode.

E.

NAT64 requires the Tier-1 gateway to be configured in active-active mode.

Question 28

Which NSX CLI command is used to change the authentication policy for local users?

Options:

A.

set hardening-policy

B.

get auth-policy minimum-password-length

C.

set cli-timeout

D.

set auth-policy

Question 29

An NSX administrator would like to create an L2 segment with the following requirements:

• L2 domain should not exist on the physical switches.

• East/West communication must be maximized as much as possible.

Which type of segment must the administrator choose?

Options:

A.

VLAN

B.

Overlay

C.

Bridge

D.

Hybrid

Question 30

What are four NSX built-in role-based access control (RBAC) roles? (Choose four.)

Options:

A.

None

B.

Read

C.

Auditor

D.

Full Access

E.

Network Admin

F.

Enterprise Admin

G.

Operator

Question 31

An administrator has been tasked with implementing the SSL certificates for the NSX Manager Cluster VIP.

Which is the correct way to implement this change?

Options:

A.

Send an API call to https:// /api/vl/cluster/api-certificate?action=set_cluster_certificate&certificate_id=

B.

Send an API call to https:// /api/vl/node/services/http?action=apply_certificate&certificate_id=

C.

SSH as admin into the NSX manager with the cluster VIP IP and run nsxcli cluster certificate node install

D.

SSH as admin into the NSX manager with the cluster VIP IP and run nsxcli cluster certificate vip install

Question 32

Which VPN type must be configured before enabling an L2VPN?

Options:

A.

Policy-based IPSec VPN

B.

Port-based IPSec VPN

C.

SSL-based IPSec VPN

D.

Route-based IPSec VPN

Question 33

Which two statements are true for IPSec VPN? (Choose two.)

Options:

A.

IPSec VPN services can be configured at Tier-0 and Tier-1 gateways.

B.

Dynamic routing is supported for any IPSec mode in NSX.

C.

IPSec VPNs use the DPDK accelerated performance library.

D.

VPNs can be configured on the command line interface on the NSX manager.

Question 34

An NSX administrator is creating a Tier-1 Gateway configured in Active-Standby High Availability Mode. In the event of node failure, the failover policy should not allow the original failed node to become the Active node upon recovery.

Which failover policy meets this requirement?

Options:

A.

Enable Preemptive

B.

Non-Preemptive

C.

Preemptive

D.

Disable Preemptive

Page: 1 / 12
Total 115 questions