Which two statements are true about NSX Data Security support? (Choose two )
A. It supports HIPAA and PCI-DSS compliance policies as well as U.S. Driver License and Social Security numbers.
B. It supports both Windows and Linux-based virtual machines.
C. It only supports HIPAA and PCI-DSS compliance policies.
D. It only supports Windows-based virtual machines.
A virtualized application needs access to a physical database. Both servers are on the 22.214.171.124/24 subnet. NSX has been deployed across the entire virtual environment. What method can be used to allow access between the servers?
A. Configure a DLR with an L2 bridge instance for 126.96.36.199/24 VXLAN to VLAN traffic.
B. Route 188.8.131.52/24 to the NSX Edge where the logical switch of the applicationexists.
C. Configure a NAT rule for 172.177.13/024 for the database physical router.
D. Configure the logical switch to bridge 184.108.40.206/24 to the physical router of the database.
Which three statements ore valid methods of Link Aggregation Control Protocol negotiation? (Choose three.)
A. Switches activate one of the blocked paths and negotiate the forwarding path upon failure.
B. Every other switch on the LAN negotiates only one data path back to the root bridge.
C. Switches wait until they receive an aggregation request,negotiate the status of the links, and proceed.
D. One switch sends repeated requests to the other switch that is requesting the port aggregation status. The two switches negotiate the status of the links and proceed.
E. Switches with links enabled for port aggregation do the port aggregation themselves and must be manually configured to be compatible at each end of that link
Questions : 10
What are two roles of vmnics? (Choose two)
A. ESXi hosts reach the physical network through vmnics.
B. Virtual machines require vmnics to communicate with their host
C. ESXi hosts are segmented using vmnics, also called virtual trunk ports
D. Virtual machines require vmnics to communicate with physical networks
An administrator creates a Spoof Guard policy for specific networks. Which two modes are associated with this type of policy? (Choose two.)
A. Automatically trust IP assignments on their first use
B. Manually inspect and approve all IP assignments before use
C. Manually approve IP assignments listed in the Host file before use
D. Automatically inspect and trust IP assignments on every use
Answer: A, B
What is the effect on NSX Edge virtual machines when NSX Edge high availability is configured but vSphere HA is NOT configured?
A. The active-standby NSX Edge pair will survive one failure. However, the virtual machines must reside on the same host to prevent NSX Edge availability from being compromised.
B. The active-standby NSX Edge HA pair will survive multiple failures.
C. The active-standby NSX Edge HA pair will survive one failure. However, if another failure happens before the second Edge appliance is restored, NSX Edge
availability can be compromised.
D. The active-standby NSX Edge HA pair will survive two failures. However, the virtual machines must reside on two different hosts.
An application requires load balancing with minimal impact to network performance. An NSX administrator is deploying a load balancer to meet the stated
requirements. Which load balancing engine should be deployed?
A. Layer 5
B. Layer 6
C. Layer 7
D. Layer 4
When creating a new security policy how is the default weight determined?
A. The default weight is equal to the highest defined weight minus 1000.
B. The default weight is equal to the highest defined weight plus 1000.
C. The default weight is equal to the highest defined weight.
D. The default weight is incremented by 100, starting at 0.
What is the common practice that I followed when a new application is deployed in legacy networking?
A. The application is mapped to users upfront.
B. The physical network is updated by the network team each time.
C. Recourse allocation is reconfigured based on the application requirement.
D. Firewall and Intrusion Prevention System (IPS) solutions are switched off during the first deployment cycle.
Which three objects are supported for universal synchronization in a Cross-vCenter NSX deployment? (Choose three.)
A. IP Pools
B. IP Sets
C. L2 bridges
D. MAC Sets
E. Transport Zones
Answer: B, D, E