What can the administrator use to identify overlay segments in an NSX environment if troubleshooting is required?
An NSX administrator is using ping to check connectivity between VM1 running on ESXi1 to VM2 running on ESXi2. The ping tests fails. The administrator knows the maximum transmission unit size on the physical switch is 1600.
Which command does the administrator use to check the VMware kernel ports for tunnel end point communication?
A customer is preparing to deploy a VMware Kubernetes solution in an NSX environment.
What is the minimum MTU size for the UPLINK profile?
Which two BGP configuration parameters can be configured in the VRF Lite gateways? (Choose two.)
Which three protocols could an NSX administrator use to transfer log messages to a remote log server? (Choose three.)
How is the RouterLink port created between a Tier-1 Gateway and Tler-0 Gateway?
Which two choices are solutions offered by the VMware NSX portfolio? (Choose two.)
A company Is deploying NSX micro-segmentation in their vSphere environment to secure a simple application composed of web. app, and database tiers.
The naming convention will be:
• WKS-WEB-SRV-XXX
• WKY-APP-SRR-XXX
• WKI-DB-SRR-XXX
What is the optimal way to group them to enforce security policies from NSX?
Sort the rule processing steps of the Distributed Firewall. Order responses from left to right.
When a stateful service is enabled for the first lime on a Tier-0 Gateway, what happens on the NSX Edge node'
Which three data collection sources are used by NSX Network Detection and Response to create correlations/Intrusion campaigns? (Choose three.)
Which CLI command would an administrator use to allow syslog on an ESXi transport node when using the esxcli utility?
Which three of the following describe the Border Gateway Routing Protocol (BGP) configuration on a Tier-0 Gateway? (Choose three.)
Which two statements describe the characteristics of an Edge Cluster in NSX? (Choose two.)
A security administrator needs to configure a firewall rule based on the domain name of a specific application.
Which field in a distributed firewall rule does the administrator configure?
NSX improves the security of today's modern workloads by preventing lateral movement, which feature of NSX can be used to achieve this?
Which of the following exist only on Tler-1 Gateway firewall configurations and not on Tier-0?
Which two of the following will be used for Ingress traffic on the Edge node supporting a Single Tier topology? (Choose two.)
Which table on an ESXi host is used to determine the location of a particular workload for a frame-forwarding decision?
When configuring OSPF on a Tler-0 Gateway, which three of the following must match in order to establish a neighbor relationship with an upstream router? (Choose three.)
How does the Traceflow tool identify issues in a network?
Which two statements are correct about East-West Malware Prevention? (Choose two.)
What must be configured on Transport Nodes for encapsulation and decapsulation of Geneve protocol?
Which three NSX Edge components are used for North-South Malware Prevention? (Choose three.)
How is the RouterLink port created between a Tier-1 Gateway and Tier-O Gateway?
An NSX administrator has deployed a single NSX Manager node and will be adding two additional nodes to form a 3-node NSX Management Cluster for a production environment. The administrator will deploy these two additional nodes and Cluster VIP using the NSX UI.
What two are the prerequisites for this configuration? (Choose two.)
The security administrator turns on logging for a firewall rule.
Where is the log stored on an ESXi transport node?
What are the four types of role-based access control (RBAC) permissions? (Choose four.)
As part of an organization's IT security compliance requirement, NSX Manager must be configured for 2FA (two-factor authentication).
What should an NSX administrator have ready before the integration can be configured? O
Refer to the exhibit.
Which two items must be configured to enable OSPF for the Tler-0 Gateway in the Image? Mark your answers by clicking twice on the image.
Which of the two following characteristics about NAT64 are true? (Choose two.)
Where in the NSX UI would an administrator set the time attribute for a time-based Gateway Firewall rule?