An organization has a PCI compliant application deployed as part of a larger NSX environment. Every year a team of contractors evaluates the security of the environment and recommends changes. What NSX Role and Scope should the contractors be given to minimize access but still allow them to fulfill the stated requirement?
A. NSX Administrator, Limit access scope
B. Enterprise Administrator, Limit access scope
C. Auditor, Limit access scope
D. Security Administrator, No restrictions
Which service cannot be included in a Security Policy using Service Composer?
A. Endpoint Services
B. Firewall Rules
C. Virtual Private Network Services
D. Network Introspection Services
Which is required to support unicast mode in NSX?
A. Hardware VTEP
B. Distributed Logical Router
C. NSX Controller
D. NSX Edge
When running the NSX Control Plane in Hybrid Mode what are the minimum physical network requirements? (Choose three.)
A. MTU 1500
B. NSX Controller connectivity
C. IGMP Snooping
D. Multicast Routing with PIM
E. Unicast L3 Routing
Which term describes a situation where a bottleneck is created when traffic is sent to a single device for security enforcement?
A. security event queueing
C. security looping
D. enforcement degradation
Which load balancing algorithm is only available on a vSphere Distributed Switch?
A. Route Based on Source MAC Hash
B. Route Based on Originating Virtual Port
C. Route Based on IP Hash
D. Route Based on Physical NIC Load
How is high availability of the NSX Edge Gateway accomplished?
A. HA Application Monitoring on the Edge Gateway sends a heartbeat to the ESXi host.
B. VMware Tools on the Edge Gateway sends a heartbeat to the ESXi host.
C. The Edge appliance sends a heartbeat through an uplink interface.
D. The Edge appliance sends a heartbeat through an internal interface.
Which two statements are true about NSX Data Security support? (Choose two )
A. It supports HIPAA and PCI-DSS compliance policies as well as U.S. Driver License and Social Security numbers.
B. It supports both Windows and Linux-based virtual machines.
C. It only supports HIPAA and PCI-DSS compliance policies.
D. It only supports Windows-based virtual machines.
A virtualized application needs access to a physical database. Both servers are on the 184.108.40.206/24 subnet. NSX has been deployed across the entire virtual environment. What method can be used to allow access between the servers?
A. Configure a DLR with an L2 bridge instance for 220.127.116.11/24 VXLAN to VLAN traffic.
B. Route 18.104.22.168/24 to the NSX Edge where the logical switch of the applicationexists.
C. Configure a NAT rule for 172.177.13/024 for the database physical router.
D. Configure the logical switch to bridge 22.214.171.124/24 to the physical router of the database.
Which three statements ore valid methods of Link Aggregation Control Protocol negotiation? (Choose three.)
A. Switches activate one of the blocked paths and negotiate the forwarding path upon failure.
B. Every other switch on the LAN negotiates only one data path back to the root bridge.
C. Switches wait until they receive an aggregation request,negotiate the status of the links, and proceed.
D. One switch sends repeated requests to the other switch that is requesting the port aggregation status. The two switches negotiate the status of the links and proceed.
E. Switches with links enabled for port aggregation do the port aggregation themselves and must be manually configured to be compatible at each end of that link