NSX Set 8 Flashcards
What is the purpose of a DHCP Relay Agent in an NSX Edge configuration?
A. Configures virtual machine interfaces to which DHCP messages are relayed.
B. Configures Edge interfaces from which DHCP messages are relayed.
C. Configures Edge interfaces to which DHCP messages are relayed.
D. Configures virtual machine interfaces from which DHCP messages are relayed.
B. Configures Edge interfaces from which DHCP messages are relayed.
When configuration BGP routing in NSX, what is the purpose of the Graceful Restart check box?
A.
Automatically restart the peer router when BGP session is established.
B.
Allow packet forwarding to be uninterrupted during restart of BGP services.
C.
Automatically restart the local router when BGP session is established.
D.
Allow packet forwarding to be paused during restart of BGP services.
B.
Allow packet forwarding to be uninterrupted during restart of BGP services.
An application requires load balancing with minimal impact to network performance. An NSX administrator is
deploying a load balancer to meet the stated requirements.
Which load balancing engine should be deployed?
A.
Layer 5
B.
Layer 6
C.
Layer 7
D.
Layer 4
D.
Layer 4
Which three changes to a distributed switch configuration could trigger a rollback?
A.
Blocking all ports in the distributed port group containing the management VMkernel network adapter.
B.
Configure the virtual machine system traffic to enable bandwidth allocation using Network I/O Control.
C.
Adding a new host with a previous vDS configuration.
D.
Changing the MTU.
E.
Changing the VLAN settings in the distributed port group of the management VMkernel adapter.
A.
Blocking all ports in the distributed port group containing the management VMkernel network adapter.
D.
Changing the MTU.
E.
Changing the VLAN settings in the distributed port group of the management VMkernel adapter.
How is high availability of the NSX Edge Gateway accomplished?
A.
HA Application Monitoring on the Edge Gateway sends a heartbeat to the ESXi host.
B.
VMware Tools on the Edge Gateway sends a heartbeat to the ESXi host.
C.
The Edge appliance sends a heartbeat through an uplink interface.
D.
The Edge appliance sends a heartbeat through an internal interface.
D.
The Edge appliance sends a heartbeat through an internal interface.
Where can firewall rules be applied on the NSX Edge Services Gateway?
A.
Rules can be applied on the uplink interface only.
B.
Rules can be applied on either the uplink interface or internal interface.
C.
Rules can be on either the uplink, internal, or management interfaces.
D.
Rules can be applied on the management and uplink interfaces only.
B.
Rules can be applied on either the uplink interface or internal interface.
An administrator creates a SpoofGuard policy for specific networks.
Which two modes are associated with this type of policy?
A.
Automatically trust IP assignments on their first use
B.
Manually inspect and approve all IP assignments before use
C.
Manually approve IP assignments listed in the Host file before use
D.
Automatically inspect and trust IP assignments on every use
A.
Automatically trust IP assignments on their first use
B.
Manually inspect and approve all IP assignments before use
When creating a new security policy how is the default weight determined?
A.
The default weight is equal to the highest defined weight minus 1000.
B.
The default weight is equal to the highest defined weight plus 1000.
C.
The default weight is equal to the highest defined weight.
D.
The default weight is incremented by 100, starting at 0.
B.
The default weight is equal to the highest defined weight plus 1000.
In a Cross-vCenter environment, where is information about local logical switches and local logical routers
maintained?
A.
Local Controller Cluster
B.
Platform Services Controller
C.
Universal Controller Cluster
D.
Local Transport Zone
C.
Universal Controller Cluster
An organization has a PCI compliant application deployed as part of a larger NSX environment. Every year a
team of contractors evaluates the security of the environment and recommends changes.
What NSX Role and Scope should the contractors be given to minimize access but still allow them to fulfill the
stated requirement?
A.
NSX Administrator, Limit access scope
B.
Enterprise Administrator, Limit access scope
C.
Auditor, Limit access scope
D.
Security Administrator, No restrictions
B.
Enterprise Administrator, Limit access scope
Which two are accurate statements with regards to Guest Introspection installation?
A.
The service virtual machine performs data security and activity monitoring.
B.
The installation deploys a virtual machine to hosts prepared for VMware NSX.
C.
A security policy weight of 4300 is assigned to hosts prepared to Guest Introspection.
D.
Guest Introspection is deployed with NSX Data Security by default.
A.
The service virtual machine performs data security and activity monitoring.
D.
Guest Introspection is deployed with NSX Data Security by default.
What are two requirements of the network infrastructure to virtualize the access layer? (Choose two.)
A.
IPv4 connectivity among ESXi hosts provided by a spine-leaf network design.
B.
IPv4 connectivity among ESXi hosts.
C.
Increased MTU if the virtual machines are using the default MTU size of 1500.
D.
A Redundant, Layer 3, Top-of-Rack network design to provide high availability to ESX hosts.
A.
IPv4 connectivity among ESXi hosts provided by a spine-leaf network design.
C.
Increased MTU if the virtual machines are using the default MTU size of 1500.
Which two network services are abstracted from the underlying hardware by NSX?
A.
Virtual Private Networks
B.
Multiprotocol Label Switching
C.
Load Balancing
D.
Overlay Transport Virtualizations
A.
Virtual Private Networks
C.
Load Balancing
What are two things that should be done before upgrading from vCloud Networking and Security to NSX?
A.
Power off vShield Manager
B.
Deploy NSX Manager virtual appliance
C.
Uninstall vShield Data Security
D.
Ensure that forward and reverse DNS is functional
C.
Uninstall vShield Data Security
D.
Ensure that forward and reverse DNS is functional
A group of users needs secured access to a set of web-based applications in a SDDC.
Which VPN option is best suited for this?
A.
IPSec VPN
B.
SSL VPN-Plus
C.
L2VPN
D.
Application VPN
B.
SSL VPN-Plus