Questions : 18
Which component of VMware Horizon acts as a broker for client connections, providing authentication to users and directing incoming desktop requests from users to View virtualized desktops?
A. View Client
B. View Administrator
C. View Composer
D. View Connection Server
What are the two main limitations of a vSphere Standard Switch? (Choose two.)
A. Centralized management
B. Virtual machines per host
C. Complex installation procedure
Answer: A, D
Which characteristic of VMware NSX enables secure intra-data center network traffic?
B. Cloud pod architecture
D. Multi-tenant manageability
How do virtual networks support physical infrastructure Quality of Service (QoS)?
A. By receiving the help of the NSX gateway.
B. By marking the packets in the encapsulated header.
C. By employing East-West traffic.
D. By restricting the access of VLANs to specific pods.
An organization has not yet implemented network virtualization in their IT infrastructure. What are the two common management challenges organizations meet in their day-to-day administration? (Choose two.)
A. Be susceptible to malware and virus vulnerabilities in the network.
B. Update physical network manually each time a new application is deployed.
C. Spend more time in provisioning and decommissioning lab environments.
D. Manage frequently occurring network requests manually.
Answer: B, C
What is the common practice that I followed when a new application is deployed in legacy networking?
A. The application is mapped to users upfront.
B. The physical network is updated by the network team each time.
C. Recourse allocation is reconfigured based on the application requirement.
D. Firewall and Intrusion Prevention System (IPS) solutions are switched off during the first deployment cycle.
A security policy is a collection of security services of firewall rules, or both. Which security service is applied to virtual machines to ensure data security?
A. Virtual machine
B. Guest Introspection
C. Network Introspection
Which setback is NOT related to the hardware-centric legacy of networking?
A. Unpredicted downtime occurrences.
B. Insufficient and weak perimeter security.
C. Increased capital and operational costs.
D. Complexity in service deployment.
How do virtual networks that are natively isolated from each other provide support for overlapping IP address in a multi-tenant environment?
A. By enabling isolation without using access control lists and firewall rules.
B. By enabling isolation with the help of Active Directory (AD).
C. By employing the spanning tree protocol.
D. By implementing load balancing.
Which of these allows static or dynamic grouping based on inclusion and exclusion of objects such as virtual machines, vNICs, cSphere clusters, and logical switches?
B. Active Directory (AD)
D. Security group