11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

2V0-41.23 Exam Dumps - VMware NSX 4.x Professional

Question # 4

An administrator has connected two virtual machines on the same overlay segment. Ping between both virtual machines is successful. What type of network boundary does this represent?

A.

Layer 2 VPN

B.

Layer 2 bridge

C.

Layer 2 broadcast domain

D.

Layer 3 route

Full Access
Question # 5

A company security policy requires all users to log Into applications using a centralized authentication system.

Which two authentication, authorization, and accounting (AAA) systems are available when Integrating NSX with VMware Identity Manager? (Choose two.)

A.

RADII 2.0

B.

Keyoen Enterprise

C.

RSA SecurelD

D.

LDAP and OpenLDAP based on Active Directory (AD)

E.

SecureDAP

Full Access
Question # 6

Which troubleshooting step will resolve an error with code 1001 during the configuration of a time-based firewall rule?

A.

Reinstalling the NSX VIBs on the ESXi host.

B.

Restarting the NTPservice on the ESXi host.

C.

Changing the lime zone on the ESXi host.

D.

Reconfiguring the ESXI host with a local NTP server.

Full Access
Question # 7

What are two valid options when configuring the scope of a distributed firewall rule? (Choose two.)

A.

DFW

B.

Tier-1 Gateway

C.

Segment

D.

Segment Port

E.

Group

Full Access
Question # 8

Which of the following exist only on Tler-1 Gateway firewall configurations and not on Tier-0?

A.

Applied To

B.

Actions

C.

Profiles

D.

Sources

Full Access
Question # 9

An administrator has deployed 10 Edge Transport Nodes in their NSX Environment, but has forgotten to specify an NTP server during the deployment.

What is the efficient way to add an NTP server to all 10 Edge Transport Nodes?

A.

Use Transport Node Profile

B.

Use the CU on each Edge Node

C.

Use a Node Profile

D.

Use a PowerCU script

Full Access
Question # 10

Which two choices are use cases for Distributed Intrusion Detection? (Choose two.)

A.

Use agentless antivirus with Guest Introspection.

B.

Quarantine workloads based on vulnerabilities.

C.

Identify risk and reputation of accessed websites.

D.

Gain Insight about micro-segmentation traffic flows.

E.

Identify security vulnerabilities in the workloads.

Full Access
Question # 11

Which VPN type must be configured before enabling a L2VPN?

A.

Route-based IPSec VPN

B.

Policy based IPSec VPN

C.

SSL-bosed IPSec VPN

D.

Port-based IPSec VPN

Full Access
Question # 12

Which table on an ESXi host is used to determine the location of a particular workload for a frame-forwarding decision?

A.

TEP Table

B.

MAC Table

C.

ARP Table

D.

Routing Table

Full Access
Question # 13

Which two are requirements for FQDN Analysis? (Choose two.)

A.

The NSX Edge nodes require access to the Internet to download category and reputation definitions.

B.

ESXi control panel requires access to the Internet to download category and reputation definitions.

C.

The NSX Manager requires access to the Internet to download category and reputation definitions.

D.

A layer 7 gateway firewall rule must be configured on the Tier-1 gateway uplink.

E.

A layer 7 gateway firewall rule must be configured on the Tier-0 gateway uplink.

Full Access
Question # 14

Which two BGP configuration parameters can be configured in the VRF Lite gateways? (Choose two.)

A.

Graceful Restart

B.

BGP Neighbors

C.

Local AS

D.

Route Distribution

E.

Route Aggregation

Full Access
Question # 15

Which two choices are solutions offered by the VMware NSX portfolio? (Choose two.)

A.

VMware Tanzu Kubernetes Grid

B.

VMware Tanzu Kubernetes Cluster

C.

VMware NSX Advanced Load Balancer

D.

VMware NSX Distributed IDS/IPS

E.

VMware Aria Automation

Full Access
Question # 16

Which two CLI commands could be used to see if vmnic link status is down? (Choose two.)

A.

esxcfg-nics -1

B.

excli network nic list

C.

esxcli network vswitch dvs wmare list

D.

esxcfg-vmknic -1

E.

esxcfg-vmsvc/get.network

Full Access
Question # 17

An NSX administrator is reviewing syslog and notices that Distributed Firewall Rules hit counts are not being logged.

What could cause this issue?

A.

Syslog is not configured on the ESXi transport node.

B.

Zero Trust Security is not enabled.

C.

Syslog is not configured on the NSX Manager.

D.

Distributed Firewall Rule logging is not enabled.

Full Access
Question # 18

Which two are supported by L2 VPN clients? (Choose two.)

A.

NSX for vSphere Edge

B.

3rd party Hardware VPN Device

C.

NSX Autonomous Edge

D.

NSX Edge

Full Access
Question # 19

What must be configured on Transport Nodes for encapsulation and decapsulation of Geneve protocol?

A.

VXIAN

B.

UDP

C.

STT

D.

TEP

Full Access
Question # 20

Which NSX feature can be leveraged to achieve consistent policy configuration and simplicity across sites?

A.

VRF Lite

B.

Ethernet VPN

C.

NSX MTML5 UI

D.

NSX Federation

Full Access
Question # 21

When running nsxcli on an ESXi host, which command will show the Replication mode?

A.

get logical-switch status

B.

get logical-switch

C.

get logical-switches

D.

get logical-switch status

Full Access
Question # 22

Which is an advantages of a L2 VPN In an NSX 4.x environment?

A.

Enables Multi-Cloud solutions

B.

Achieve better performance

C.

Enables VM mobility with re-IP

D.

Use the same broadcast domain

Full Access
Question # 23

An administrator has a requirement to have consistent policy configuration and enforcement across NSX instances.

What feature of NSX fulfills this requirement?

A.

Load balancer

B.

Federation

C.

Multi-hypervisor support

D.

Policy-driven configuration

Full Access
Question # 24

What should an NSX administrator check to verify that VMware Identity Manager Integration Is successful?

A.

From VMware Identity Manager the status of the remote access application must be green.

B.

From the NSX UI the status of the VMware Identity Manager Integration must be "Enabled".

C.

From the NSX CLI the status of the VMware Identity Manager Integration must be "Configured".

D.

From the NSX UI the URI in the address bar must have "locaNfatse" part of it.

Full Access
Question # 25

Which command is used to display the network configuration of the Tunnel Endpoint (TEP) IP on a bare metal transport node?

A.

tepconfig

B.

ifconfig

C.

tcpdump

D.

debug

Full Access
Question # 26

An NSX administrator is creating a Tier-1 Gateway configured In Active-Standby High Availability Mode. In the event of node failure, the failover policy should not allow the original tailed node to become the Active node upon recovery.

Which failover policy meets this requirement?

A.

Non-Preemptive

B.

Preemptive

C.

Enable Preemptive

D.

Disable Preemptive

Full Access
Question # 27

Which CLI command on NSX Manager and NSX Edge is used to change NTP settings?

A.

get timezone

B.

get time-server

C.

set timezone

D.

set ntp-server

Full Access
Question # 28

Match the NSX Intelligence recommendations with their correct purpose.

Full Access
Question # 29

Which of the two following characteristics about NAT64 are true? (Choose two.)

A.

NAT64 is stateless and requires gateways to be deployed in active-standby mode.

B.

NAT64 is supported on Tier-1 gateways only.

C.

NAT64 is supported on Tier-0 and Tier-1 gateways.

D.

NAT64 requires the Tier-1 gateway to be configured in active-standby mode.

E.

NAT64 requires the Tier-1 gateway to be configured in active-active mode.

Full Access
Question # 30

Which VMware GUI tool is used to identify problems in a physical network?

A.

VMware Aria Automation

B.

VMware Aria Orchestrator

C.

VMware Site Recovery Manager

D.

VMware Aria Operations Networks

Full Access
Question # 31

Which Is the only supported mode In NSX Global Manager when using Federation?

A.

Controller

B.

Policy

C.

Proxy

D.

Proton

Full Access
Question # 32

NSX improves the security of today's modern workloads by preventing lateral movement, which feature of NSX can be used to achieve this?

A.

Network Segmentation

B.

Virtual Security Zones

C.

Edge Firewalling

D.

Dynamic Routing

Full Access