Which statement is true regarding an NSX Edge gateway device configured with a DNS
Server?
Answer : A
An NSX Edge Service Gateway has two interfaces:
Internal interface named Internal Access
-- IP address = 10.10.10.1
-- Network mask = 255.255.255.0
Uplink interface named Physical Uplink
-- IP address = 20.20.20.1
-- Network mask = 255.255.255.0
A vSphere administrator wants to add a SNAT rule to allow traffic from the internal network segment to access external resources via the uplink interface.
Which three steps should the vSphere administrator do to add the SNAT rule? (Choose three)
Answer : C,D,E
An administrator manages a TFTP server virtual machine that is connected to a Logical
Switch with a VNI of 7321. The TFTP server has been configured to use port 1069. An
NSX Edge Service Gateway is connected to VNI 7321 and has an uplink interface with access to the physical network. Assume external users can reach the Service Gateway.
What should the administrator configure to ensure external connections to the TFTP server are successful?
Answer : A
Which two actions take place when an active NSX Edge instance fails? (Choose two.)
Answer : C,D
Which two statements are true regarding NSX High Availability? (Choose two.)
Answer : B,C
Where does the Distributed Logical Firewall enforce firewall rules?
Answer : A
How are Logical Firewall rules applied to affected virtual machines?
Answer : B
An administrator wishes to control traffic flow between two virtual machines. The virtual machines are in the same subnet, but are located on separate ESXi hosts.
The administrator deploys an Edge Firewall to one of the hosts and verifies the default firewall rule is set to deny, but the two virtual machines can still communicate with each other.
What task will correct this issue?
Answer : D
An administrator has deployed NSX in an environment containing a mix of vSphere 5 hosts. The implementation includes the Distributed Firewall Service, but the administrator finds that rules are not being applied to all affected virtual machines.
What two conditions would cause this behavior? (Choose two.)
Answer : A,C
An administrator wants to perform Activity Monitoring on a large group of virtual machines in an NSX environment. How would this task be accomplished with minimal administrative effort?
Answer : C
Which action is not an option for adding Virtual Machines to a Security Group?
Answer : C
What is the most restrictive NSX role that can be used to create and publish security policies and install virtual appliances?
Answer : D
Which two NSX Data Security roles could be assigned to view configured policies and violation reports? (Choose two.)
Answer : A,C