Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

VMware 2V0-41.24 - VMware NSX 4.X Professional V2

Page: 3 / 4
Total 115 questions

When a stateful service is enabled for the first time on a Tier-0 Gateway, what happens on the NSX Edge node?

A.

DR is instantiated and automatically connected with SR.

B.

SR is instantiated and automatically connected with DR.

C.

SR and DR doesn’t need to be connected to provide any stateful services.

D.

SR and DR is instantiated but requires manual connection.

Which troubleshooting step will resolve an error with code 1001 during the configuration of a time-based firewall rule?

A.

Restarting the NTPservice on the ESXi host.

B.

Reconfiguring the ESXi host with a local NTP server.

C.

Re-installing the NSX VIBs on the ESXi host.

D.

Changing the time zone on the ESXi host.

What are four NSX built-in role-based access control (RBAC) roles? (Choose four.)

A.

None

B.

Read

C.

Auditor

D.

Full Access

E.

Network Admin

F.

Enterprise Admin

G.

Operator

Where does an administrator configure the VLANs used in VRF Lite? (Choose two.)

A.

uplink interface of the VRF gateway

B.

uplink interface of the default Tier-0 gateway

C.

uplink trunk segment

D.

segment connected to the Tier-1 gateway

Which steps are required to activate Malware Prevention on the NSX Application Platform?

A.

Select Cloud Region and Deploy Network Detection and Response.

B.

Activate NSX Network Detection and Response and run Pre-checks.

C.

Activate NSX Network Detection and Response and Deploy Malware Prevention.

D.

Select Cloud Region and run Pre-checks.

Which choice is a valid insertion point for North-South network introspection?

A.

Host Physical NIC

B.

Tier-0 gateway

C.

Guest VM vNIC

D.

Partner SVM

In which VPN type are the Virtual Tunnel interfaces (VTI) used?

A.

SSL-based VPN

B.

Route & SSL based VPNs

C.

Policy & Route based VPNs

D.

Route-based VPN

When collecting support bundles through NSX Manager, which files should be excluded for potentially containing sensitive information?

A.

Core Files

B.

Controller Files

C.

Audit Files

D.

Management Files

A customer has a network where BGP has been enabled and the BGP neighbor is configured on the Tier-0 Gateway. An NSX administrator used the get gateways command to retrieve this information:

Which two commands must be executed to check BGP neighbor status? (Choose two.)

A.

vrf 3

B.

sa-nsxedge-01(tier0_dr)> get bgp neighbor

C.

vrf 1

D.

sa-nsxedge-01(tier1_sr)> get bgp neighbor

E.

sa-nsxedge-01(tier0_sr)> get bgp neighbor

F.

vrf 4

Which CLI command is used for packet capture on the ESXi Node?

A.

tcpdump

B.

set capture

C.

pktcap-uw

D.

debug