Which NSX component can validate that security policies at your organization are being enforced correctly?
Answer : A
When preparing a vSphere host cluster to work with VMware NSX, which two options show
VIBs that are installed and registered with all hosts within the prepared cluster? (Choose two.)
Answer : A,B
Which two statements describe the benefits provided by firewall services deployed by
NSX? (Choose two.)
Answer : B,C
A vSphere administrator wants to add a VLAN LIF to a Distributed Router. What must the vSphere administrator do for the VLAN LIF to be added successfully?
Answer : A
You want to use an existing NSX Manager to extend logical networks to the ESXi hosts of a new cluster.
What should you do?
Answer : A
What are three switch features found only on vSphere Distributed Switches? (Choose three.)
Answer : A,C,E
A company has augmented its Data Center infrastructure by using vCloud Hybrid Service during peak hours. The company wants to extend their existing subnets into the cloud while workloads retain their existing IP addresses. The virtual machines in these subnets use an
NSX Edge Gateway as their default gateway.
Which solution should this company use?
Answer : A
A new ESXi 5.5 host is deployed in a vSphere environment with VMware NSX for vSphere.
How can the host be prepared for VMware NSX for vSphere?
Answer : A
Which statement is true regarding deploying NSX over a physical network?
Answer : B
What two statements correctly describe the way NSX provides integration with Cloud
Management Platforms (CMPs)? (Choose two.)
Answer : B,D
Which statement describes proper packet processing of layer 3 traffic in an NSX for vSphere topology?
Answer : A
Layer 2 Multipathing (L2MP) and Multi-chassis Etherchannel (MEC) features have distinct scaling differences with the network switching and routing services provided by NSX.
Which two statements provide a proper contrast of these services? (Choose two.)
Answer : A,D
Which two components are required to enable layer 2 bridging? (Choose two.)
Answer : A,C
An administrator wishes to control traffic flow between two virtual machines. The virtual machines are in the same subnet, but are located on separate ESXi hosts.
The administrator deploys an Edge Firewall to one of the hosts and verifies the default firewall rule is set to deny, but the two virtual machines can still communicate with each other.
What task will correct this issue?
Answer : D
After consulting with the network team, it is decided that Transport Zones will be configured with Unicast Replication Mode for a new NSX for vSphere deployment.
Which statement is true regarding the function of the VXLAN Tunnel End Points (VTEPs)?
Answer : D