Which two tools are used for centralized logging in VMware NSX? (Choose two.)
An administrator needs to download the support bundle for NSX Manager.
Where does the administrator download the log bundle from?
Which three of the following describe the Border Gateway Routing Protocol (BGP) configuration on a Tier-0 Gateway? (Choose three.)
Which two commands does an NSX administrator use to check the IP address of the VMkernel port for the Geneve protocol on the ESXi transport node? (Choose two.)
What can the administrator use to identify overlay segments in an NSX environment if troubleshooting is required?
What are two functions of the Service Engines in NSX Advanced Load Balancer? (Choose two.)
Refer to the exhibit.
An administrator configured NSX Advanced Load Balancer to load balance the production web server traffic, but the end users are unable to access the production website by using the VIP address.
Which of the following Tier-1 gateway route advertisement settings needs to be enabled to resolve the problem? Mark the correct answer by clicking on the image.
A customer is preparing to deploy a VMware Kubernetes solution in an NSX environment.
What is the minimum MTU size for the UPLINK profile?
Which three protocols could an NSX administrator use to transfer log messages to a remote log server? (Choose three.)
What is the VMware recommended way to deploy a virtual NSX Edge Node?
A security administrator needs to configure a firewall rule based on the domain name of a specific application.
Which field in a distributed firewall rule does the administrator configure?
Where is the insertion point for East-West network introspection?
Which statement is true about an alarm in a Suppressed state?
Where in the NSX UI would an administrator set the time attribute for a time-based Gateway Firewall rule?
Which of the two following characteristics about NAT64 are true? (Choose two.)
An administrator is configuring service insertion for Network Introspection.
Which two places can the Network Introspection be configured? (Choose two.)
Which choice is a valid insertion point for North-South network introspection?
Which two statements are true for IPSec VPN? (Choose two.)
A company Is deploying NSX micro-segmentation in their vSphere environment to secure a simple application composed of web. app, and database tiers.
The naming convention will be:
• WKS-WEB-SRV-XXX
• WKY-APP-SRR-XXX
• WKI-DB-SRR-XXX
What is the optimal way to group them to enforce security policies from NSX?
A customer has a network where BGP has been enabled and the BGP neighbor is configured on the Tier-0 Gateway. An NSX administrator used the get gateways command to retrieve this information:
Which two commands must be executed to check BGP neighbor status? (Choose two.)
What are two valid BGP Attributes that can be used to influence the route path traffic will take? (Choose two.)
Refer to the exhibit.
An administrator configured NSX Advanced Load Balancer to redistribute the traffic between the web servers. However, requests are sent to only one server
Which of the following pool configuration settings needs to be adjusted to resolve the problem? Mark the correct answer by clicking on the image.
Which two steps must an NSX administrator take to integrate VMware Identity Manager in NSX to support role-based access control? (Choose two.)
An NSX administrator wants to create a Tier-0 Gateway to support equal cost multi-path (ECMP) routing.
Which failover detection protocol must be used to meet this requirement?
Which of the two following characteristics about NAT64 are true? (Choose two.)
Which table on an ESXi host is used to determine the location of a particular workload for a frame-forwarding decision?
An administrator has a requirement to have consistent policy configuration and enforcement across NSX instances.
What feature of NSX fulfills this requirement?
Which three DHCP Services are supported by NSX? (Choose three.)
What must be configured on Transport Nodes for encapsulation and decapsulation of Geneve protocol?
Which two statements are correct about East-West Malware Prevention? (Choose two.)
Which two built-in VMware tools will help identify the cause of packet loss on VLAN Segments? (Choose two.)
Which two built-in VMware tools will help identify the cause of packet loss on VLAN Segments? (Choose two.)
An NSX administrator is using ping to check connectivity between VM1 running on ESXi1 to VM2 running on ESXi2. The ping tests fail. The administrator knows the maximum transmission unit size on the physical switch is 1600.
Which command does the administrator use to check the VMware kernel ports for tunnel end point communication?
What are two valid options when configuring the scope of a distributed firewall rule? (Choose two.)
An NSX administrator is troubleshooting a connectivity issue with virtual machines running on an ESXi transport node.
Which feature in the NSX UI shows the mapping between the virtual NIC and the host’s physical adapter?