A security policy is a collection of security services of firewall rules, or both. Which security service is applied to virtual machines to ensure data security?
A. Virtual machine
B. Guest Introspection
C. Network Introspection
Which setback is NOT related to the hardware-centric legacy of networking?
A. Unpredicted downtime occurrences.
B. Insufficient and weak perimeter security.
C. Increased capital and operational costs.
D. Complexity in service deployment.
How do virtual networks that are natively isolated from each other provide support for overlapping IP address in a multi-tenant environment?
A. By enabling isolation without using access control lists and firewall rules.
B. By enabling isolation with the help of Active Directory (AD).
C. By employing the spanning tree protocol.
D. By implementing load balancing.
Which of these allows static or dynamic grouping based on inclusion and exclusion of objects such as virtual machines, vNICs, cSphere clusters, and logical switches?
B. Active Directory (AD)
D. Security group
One of the advantages of using VXLAN over VLAN is its high scalability. What is the maximum number of logical network IDs that is handled by VXLAN?
A. 16 million
B. 10 million
D. 12 million
An administrator decides to implement logical switching to establish connectivity between virtual machines that reside on the same host Which layer is used by logical switching to provide this connectivity?
A. Layer 4
B. Layer 5
C. Layer 3
D. Layer 2
Which three statements are true about Transport Zone? (Choose three.)
A. it defines the VXLAN tunnel endpoint (VTEP) members of the VXLAN overlay.
B. It controls the hosts that a logical switch can reach and can span one or more vSphere clusters.
C. It is a solution of ESXi hosts that can communicate with each other across a physical network infrastructure.
D. it extends across one or more ESXi clusters and commonly defines a span of a logical switch.
E. it does not dictate the clusters and virtual machines within the clusters in a particular network.
Which component of NSX logical firewall, offered by the NSX Edge Services Gateway (ESG), focuses on North-South traffic enforcement perimeter or tenant pen meter?
A. Distributed firewall
B. Centralized NSX Edge firewall
C. NSX controller cluster
D. Distributed logical router
Which is NOT a benefit of virtualized compute over traditional physical hardware for server deployments?
B. Deployment time
Which domain does vSphere/ESXi virtualize for the Software-Defined Data Center (SDDC)?