An organization has a PCI compliant application deployed as part of a larger NSX environment. Every year a team of contractors evaluates the security of the environment and recommends changes. What NSX Role and Scope should the contractors be given to minimize access but still allow them to fulfill the stated requirement?
A. NSX Administrator, Limit access scope
B. Enterprise Administrator, Limit access scope
C. Auditor, Limit access scope
D. Security Administrator, No restrictions
Which service cannot be included in a Security Policy using Service Composer?
A. Endpoint Services
B. Firewall Rules
C. Virtual Private Network Services
D. Network Introspection Services
Which is required to support unicast mode in NSX?
A. Hardware VTEP
B. Distributed Logical Router
C. NSX Controller
D. NSX Edge
When running the NSX Control Plane in Hybrid Mode what are the minimum physical network requirements? (Choose three.)
A. MTU 1500
B. NSX Controller connectivity
C. IGMP Snooping
D. Multicast Routing with PIM
E. Unicast L3 Routing
Which term describes a situation where a bottleneck is created when traffic is sent to a single device for security enforcement?
A. security event queueing
C. security looping
D. enforcement degradation
Which load balancing algorithm is only available on a vSphere Distributed Switch?
A. Route Based on Source MAC Hash
B. Route Based on Originating Virtual Port
C. Route Based on IP Hash
D. Route Based on Physical NIC Load
How is high availability of the NSX Edge Gateway accomplished?
A. HA Application Monitoring on the Edge Gateway sends a heartbeat to the ESXi host.
B. VMware Tools on the Edge Gateway sends a heartbeat to the ESXi host.
C. The Edge appliance sends a heartbeat through an uplink interface.
D. The Edge appliance sends a heartbeat through an internal interface.
Which two statements are true about NSX Data Security support? (Choose two )
A. It supports HIPAA and PCI-DSS compliance policies as well as U.S. Driver License and Social Security numbers.
B. It supports both Windows and Linux-based virtual machines.
C. It only supports HIPAA and PCI-DSS compliance policies.
D. It only supports Windows-based virtual machines.
A virtualized application needs access to a physical database. Both servers are on the 188.8.131.52/24 subnet. NSX has been deployed across the entire virtual environment. What method can be used to allow access between the servers?
A. Configure a DLR with an L2 bridge instance for 184.108.40.206/24 VXLAN to VLAN traffic.
B. Route 220.127.116.11/24 to the NSX Edge where the logical switch of the applicationexists.
C. Configure a NAT rule for 172.177.13/024 for the database physical router.
D. Configure the logical switch to bridge 18.104.22.168/24 to the physical router of the database.
A network administrator has been tasked with deploying a 3-tier application across two data centers. Tier-1 and tier-2 will be located in Datacenter-A and tier-3 will be located in Datacenter-B. Which NSX components are needed to make this deployment functional?
A. A universal transport zone deployed with a universal distributed logical router (UDLR), a universal logical switch and two local logical switches connected to the UDLR.
B. A universal transport zone deployed with a universal distributed logical router (UDLR), two universal logical switches and a single logical switch connected to the UDLR.
C. A universal transport zone deployed with a universal distributed logical router (UDLR) and three universal logical switches connected to the UDLR.
D. A universal transport zone, a universal distributed logical router (UDLR) and three local switches in each data center connected to the UDLR