Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

2V0-41.23 Questions and Answers

Question # 6

Which three security features are dependent on the NSX Application Platform? (Choose three.)

A.

NSX Intelligence

B.

NSX Firewall

C.

NSX Network Detection and Response

D.

NSX TLS Inspection

E.

NSX Distributed IDS/IPS

F.

NSX Malware Prevention

Full Access
Question # 7

Where is the insertion point for East-West network introspection?

A.

Tier-0 router

B.

Partner SVM

C.

Guest VM vNIC

D.

Host Physical NIC

Full Access
Question # 8

Which Is the only supported mode In NSX Global Manager when using Federation?

A.

Controller

B.

Policy

C.

Proxy

D.

Proton

Full Access
Question # 9

An architect receives a request to apply distributed firewall in a customer environment without making changes to the network and vSphere environment. The architect decides to use Distributed Firewall on VDS.

Which two of the following requirements must be met in the environment? (Choose two.)

A.

vCenter 8.0 and later

B.

NSX version must be 3.2 and later

C.

NSX version must be 3.0 and later

D.

VDS version 6.6.0 and later

Full Access
Question # 10

In an NSX environment, an administrator is observing low throughput and congestion between the Tier-O Gateway and the upstream physical routers.

Which two actions could address low throughput and congestion? (Choose two.)

A.

Configure NAT on the Tier-0 gateway.

B.

Configure ECMP on the Tier-0 gateway.

C.

Deploy Large size Edge node/s.

D.

Add an additional vNIC to the NSX Edge node.

E.

Configure a Tier-1 gateway and connect it directly to the physical routers.

Full Access
Question # 11

Which three DHCP Services are supported by NSX? (Choose three.)

A.

Gateway DHCP

B.

Port DHCP per VNF

C.

Segment DHCP

D.

VRF DHCP Server

E.

DHCP Relay

Full Access
Question # 12

Refer to the exhibits.

Drag and drop the NSX graphic element icons on the left found in an NSX Intelligence visualization graph to Its correct description on the right.

Full Access
Question # 13

What are two valid BGP Attributes that can be used to influence the route path traffic will take? (Choose two.)

A.

AS-Path Prepend

B.

BFD

C.

Cost

D.

MED

Full Access
Question # 14

Which of the following exist only on Tler-1 Gateway firewall configurations and not on Tier-0?

A.

Applied To

B.

Actions

C.

Profiles

D.

Sources

Full Access
Question # 15

Which CLI command is used for packet capture on the ESXi Node?

A.

tcpdump

B.

debug

C.

pktcap-uw

D.

set capture

Full Access
Question # 16

An NSX administrator Is treating a NAT rule on a Tler-0 Gateway configured In active-standby high availability mode. Which two NAT rule types are supported for this configuration? (Choose two.)

A.

Reflexive NAT

B.

Destination NAT

C.

1:1 NAT

D.

Port NAT

E.

Source NAT

Full Access
Question # 17

Which CLI command shows syslog on NSX Manager?

A.

get log-file auth.lag

B.

/var/log/syslog/syslog.log

C.

show log manager follow

D.

get log-file syslog

Full Access
Question # 18

Which NSX feature can be leveraged to achieve consistent policy configuration and simplicity across sites?

A.

VRF Lite

B.

Ethernet VPN

C.

NSX MTML5 UI

D.

NSX Federation

Full Access
Question # 19

How is the RouterLink port created between a Tier-1 Gateway and Tler-0 Gateway?

A.

Manually create a Logical Switch and connect to bother Tler-1 and Tier-0 Gateways.

B.

Automatically created when Tler-1 is created.

C.

Manually create a Segment and connect to both Titrr-1 and Tier-0 Gateways.

D.

Automatically created when Tier-t Is connected with Tier-0 from NSX UI.

Full Access
Question # 20

An administrator has a requirement to have consistent policy configuration and enforcement across NSX instances.

What feature of NSX fulfills this requirement?

A.

Load balancer

B.

Federation

C.

Multi-hypervisor support

D.

Policy-driven configuration

Full Access
Question # 21

When a stateful service is enabled for the first lime on a Tier-0 Gateway, what happens on the NSX Edge node'

A.

SR is instantiated and automatically connected with DR.

B.

DR Is instantiated and automatically connected with SR.

C.

SR and DR Is instantiated but requites manual connection.

D.

SR and DR doesn't need to be connected to provide any stateful services.

Full Access
Question # 22

What are two valid options when configuring the scope of a distributed firewall rule? (Choose two.)

A.

DFW

B.

Tier-1 Gateway

C.

Segment

D.

Segment Port

E.

Group

Full Access
Question # 23

Which two logical router components span across all transport nodes? (Choose two.)

A.

SFRVICE_ROUTER_TJER0

B.

TIERO_DISTRI BUTE D_ ROUTER

C.

DISTRIBUTED_R0UTER_TIER1

D.

DISTRIBUTED_ROUTER_TIER0

E.

SERVICE_ROUTER_TIERl

Full Access
Question # 24

What are three NSX Manager roles? (Choose three.)

A.

master

B.

cloud

C.

zookeepet

D.

manager

E.

policy

F.

controller

Full Access
Question # 25

Which troubleshooting step will resolve an error with code 1001 during the configuration of a time-based firewall rule?

A.

Reinstalling the NSX VIBs on the ESXi host.

B.

Restarting the NTPservice on the ESXi host.

C.

Changing the lime zone on the ESXi host.

D.

Reconfiguring the ESXI host with a local NTP server.

Full Access
Question # 26

Which TraceFlow traffic type should an NSX administrator use tor validating connectivity between App and DB virtual machines that reside on different segments?

A.

Multicast

B.

Unicast

C.

Anycast

D.

Broadcast

Full Access
Question # 27

An NSX administrator is reviewing syslog and notices that Distributed Firewall Rules hit counts are not being logged.

What could cause this issue?

A.

Syslog is not configured on the ESXi transport node.

B.

Zero Trust Security is not enabled.

C.

Syslog is not configured on the NSX Manager.

D.

Distributed Firewall Rule logging is not enabled.

Full Access
Question # 28

Which statement is true about an alarm in a Suppressed state?

A.

An alarm can be suppressed for a specific duration in seconds.

B.

An alarm can be suppressed for a specific duration in days.

C.

An alarm can be suppressed for a specific duration in minutes.

D.

An alarm can be suppressed for a specific duration in hours.

Full Access
Question # 29

Which steps are required to activate Malware Prevention on the NSX Application Platform?

A.

Select Cloud Region and Deploy Network Detection and Response.

B.

Activate NSX Network Detection and Response and run Pre-checks.

C.

Activate NSX Network Detection and Response and Deploy Malware Prevention.

D.

Select Cloud Region and run Pre-checks.

Full Access
Question # 30

Match the NSX Intelligence recommendations with their correct purpose.

Full Access
Question # 31

Which CLI command does an NSX administrator run on the NSX Manager to generate support bundle logs if the NSX UI Is inaccessible?

A.

set support-bundle file vcpnv.tgz

B.

esxcli system syslog config logger set - -id=nsxmanager

C.

vm-support

D.

get support-bundle file vcpnv.tgz

Full Access
Question # 32

An administrator needs to download the support bundle for NSX Manager. Where does the administrator download the log bundle from?

A.

System > Utilities > Tools

B.

System > Support Bundle

C.

System > Settings > Support Bundle

D.

System > Settings

Full Access