The user at 192.168.150.10 can reach the physical router but CANNOT reach edge-2 or any virtual machines.
Answer : D
An NSX Administrator is examining traffic on the network shown below.
Answer : D
An administrator wants to perform Activity Monitoring on a large group of virtual machines in an NSX environment.
How would this task be accomplished with minimal administrative effort?
Answer : C
Which is a best practice to secure system traffic, ensure optimal performance and satisfy prerequisites for NSX?
Answer : B
VMware NSX is a key component in enabling enterprises to realize the full potential of their investment in which technology?
Answer : D
Explanation:
Referencehttps://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/whitepap er/products/nsx/vmware-nsx-network-virtualization-platform-white-paper.pdf
A customer has Cisco Nexus 1000V switches in their environment and is looking at deploying NSX
Which statement is correct?
Answer : A
An administrator has implemented VMware NSX on a leaf-spine underlay. They have deployed the following in the data center:
Two racks for a management cluster that is not prepared for VMware NSX
Six racks for compute clusters
Two racks for an Edge cluster which holds a DLR control VM for bridging, and
North/South Edge Service Gateways
Which three of the following are true regarding the physical and logical networking of the environment? (Choose three )
Answer : B,C,D
An NSX Edge Service Gateway has two interfaces:
Internal interface named Internal Access
-- IP address = 10.10.10.1
-- Network mask = 255.255.255.0
Uplink interface named Physical Uplink
-- IP address = 20.20.20.1
-- Network mask = 255.255.255.0
A vSphere administrator wants to add a SNAT rule to allow traffic from the internal network segment to access external resources via the uplink interface.
Which three steps should the vSphere administrator do to add the SNAT rule? (Choose three.)
Answer : C,D,E
Internet access is required from virtual machines located on any logical switch Direct access from the internet to these virtual machines is NOT permitted
Answer : D
Which NSX component can validate that security policies at your organization are being enforced correctly?
Answer : A
In which VMware NSX use case would VXLAN NOT be required?
Answer : C
An administrator needs to perform a configuration backup of NSX. From which two locations can this task be performed? (Choose two.)
Answer : A,C
Which two networking and security components are contained m the backup configuration data of an NSX Manager backup file? (Choose two )
Answer : C,D
An organization has PCI compliant application deployed as part of a larger NSX environment. Every year a team of contractors evaluates the security of the environment and recommends changes.
What NSX Role and Scope should the contractors be given to minimize access but still allow them to fulfill the staled requirement?
Answer : B
Explanation:
https://c368768.ssl.cf1.rackcdn.com/product_files/28022/original/VMware_SDDC_Validate d_Reference_Architecture_for_PCI_v3.0_June_2014b1844892b9e7e4c6aa280f5fd9df5a0f. pdf
Page 3 -
VMware NSX VMware NSX Edge, VMware NSX Firewall, VMware NSX Router,
VMware NSX Load -
Balancer, and, VMware NSX Service Composer