Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

2V0-41.23 Exam Dumps - VMware NSX 4.x Professional

Go to page:
Question # 25

Which command is used to display the network configuration of the Tunnel Endpoint (TEP) IP on a bare metal transport node?

A.

tepconfig

B.

ifconfig

C.

tcpdump

D.

debug

Full Access
Question # 26

An NSX administrator is creating a Tier-1 Gateway configured In Active-Standby High Availability Mode. In the event of node failure, the failover policy should not allow the original tailed node to become the Active node upon recovery.

Which failover policy meets this requirement?

A.

Non-Preemptive

B.

Preemptive

C.

Enable Preemptive

D.

Disable Preemptive

Full Access
Question # 27

Which CLI command on NSX Manager and NSX Edge is used to change NTP settings?

A.

get timezone

B.

get time-server

C.

set timezone

D.

set ntp-server

Full Access
Question # 28

Match the NSX Intelligence recommendations with their correct purpose.

Full Access
Question # 29

Which of the two following characteristics about NAT64 are true? (Choose two.)

A.

NAT64 is stateless and requires gateways to be deployed in active-standby mode.

B.

NAT64 is supported on Tier-1 gateways only.

C.

NAT64 is supported on Tier-0 and Tier-1 gateways.

D.

NAT64 requires the Tier-1 gateway to be configured in active-standby mode.

E.

NAT64 requires the Tier-1 gateway to be configured in active-active mode.

Full Access
Question # 30

Which VMware GUI tool is used to identify problems in a physical network?

A.

VMware Aria Automation

B.

VMware Aria Orchestrator

C.

VMware Site Recovery Manager

D.

VMware Aria Operations Networks

Full Access
Question # 31

Which Is the only supported mode In NSX Global Manager when using Federation?

A.

Controller

B.

Policy

C.

Proxy

D.

Proton

Full Access
Question # 32

NSX improves the security of today's modern workloads by preventing lateral movement, which feature of NSX can be used to achieve this?

A.

Network Segmentation

B.

Virtual Security Zones

C.

Edge Firewalling

D.

Dynamic Routing

Full Access
Go to page: