Refer to the exhibit.
An administrator configured NSX Advanced Load Balancer to redistribute the traffic between the web servers. However, requests are sent to only one server
Which of the following pool configuration settings needs to be adjusted to resolve the problem? Mark the correct answer by clicking on the image.
Which two commands does an NSX administrator use to check the IP address of the VMkernel port for the Geneve protocol on the ESXi transport node? (Choose two.)
What are two valid options when configuring the scope of a distributed firewall rule? (Choose two.)
Which VPN type must be configured before enabling an L2VPN?
An NSX administrator has deployed a single NSX Manager node and will be adding two additional nodes to form a 3-node NSX Management Cluster for a production environment. The administrator will deploy these two additional nodes and Cluster VIP using the NSX UI.
What two are the prerequisites for this configuration? (Choose two.)
Which steps are required to activate Malware Prevention on the NSX Application Platform?
Which field in a Tier-1 Gateway Firewall would be used to allow access for a collection of trustworthy web sites?
Which is an advantage of an L2 VPN in an NSX 4.x environment?
An administrator wants to validate the BGP connection status between the Tier-0 Gateway and the upstream physical router.
What sequence of commands could be used to check this status on NSX Edge node?
When running nsxcli on an ESXi host, which command will show the Replication mode?
Match the NSX Intelligence recommendations with their correct purpose.
An NSX administrator noticed that the nsxcli command times out after 600 secs of idle time.
Which CLI command disables the nsxcli time out value on NSX Manager?
A company security policy requires all users to log into applications using a centralized authentication system.
Which two authentication, authorization, and accounting (AAA) systems are available when integrating NSX with VMware Identity Manager? (Choose two.)
Which two BGP configuration parameters can be configured in the VRF Lite gateways? (Choose two.)
An architect receives a request to apply distributed firewall in a customer environment without making changes to the network and vSphere environment. The architect decides to use Distributed Firewall on VDS.
Which two of the following requirements must be met in the environment? (Choose two.)
Which three data collection sources are used by NSX Network Detection and Response to create correlations/Intrusion campaigns? (Choose three.)
Which of the following exist only on Tler-1 Gateway firewall configurations and not on Tier-0?
Which CLI command does an NSX administrator run on the NSX Manager to generate support bundle logs if the NSX UI is inaccessible?
Which NSX CLI command is used to change the authentication policy for local users?
A company Is deploying NSX micro-segmentation in their vSphere environment to secure a simple application composed of web. app, and database tiers.
The naming convention will be:
• WKS-WEB-SRV-XXX
• WKY-APP-SRR-XXX
• WKI-DB-SRR-XXX
What is the optimal way to group them to enforce security policies from NSX?
Which two of the following parameters are required for deploying the NSX Application Platform? (Choose two.)
When deploying an NSX Edge Transport Node, what two valid IP address assignment options should be specified for the TEP IP addresses? (Choose two.)
Which two are supported by L2 VPN clients? (Choose two.)
What must be configured on Transport Nodes for encapsulation and decapsulation of Geneve protocol?
Which three DHCP Services are supported by NSX? (Choose three.)
An administrator has deployed 10 Edge Transport Nodes in their NSX Environment, but has forgotten to specify an NTP server during the deployment.
What is the efficient way to add an NTP server to all 10 Edge Transport Nodes?
Which statement is true about an alarm in a Suppressed state?
In which VPN type are the Virtual Tunnel interfaces (VTI) used?
Which two logical router components span across all transport nodes? (Choose two.)
Refer to the exhibits.
Drag and drop the NSX graphic element icons on the left found in an NSX Intelligence visualization graph to Its correct description on the right.
Which two are requirements for FQDN Analysis? (Choose two.)
The security administrator turns on logging for a firewall rule.
Where is the log stored on an ESXi transport node?
What can the administrator use to identify overlay segments in an NSX environment if troubleshooting is required?
Which NSX feature can be leveraged to achieve consistent policy configuration and simplicity across sites?