An administrator has deployed 10 Edge Transport Nodes in their NSX Environment, but has forgotten to specify an NTP server during the deployment.
What is the efficient way to add an NTP server to all 10 Edge Transport Nodes?
An NSX administrator would like to create an L2 segment with the following requirements:
• L2 domain should not exist on the physical switches.
• East/West communication must be maximized as much as possible.
Which type of segment must the administrator choose?
Which choice is a valid insertion point for North-South network introspection?
An NSX administrator wants to create a Tler-0 Gateway to support equal cost multi-path (ECMP) routing. Which failover detection protocol must be used to meet this requirement?
Which two of the following features are supported for the Standard NSX Application Platform Deployment? (Choose two.)
A security administrator needs to configure a firewall rule based on the domain name of a specific application.
Which field in a distributed firewall rule does the administrator configure?
What must be configured on Transport Nodes for encapsulation and decapsulation of Geneve protocol?
Which three security features are dependent on the NSX Application Platform? (Choose three.)
Which of the following exist only on Tler-1 Gateway firewall configurations and not on Tier-0?
Which three NSX Edge components are used for North-South Malware Prevention? (Choose three.)
What are two valid BGP Attributes that can be used to influence the route path traffic will take? (Choose two.)
Which two statements describe the characteristics of an Edge Cluster in NSX? (Choose two.)
Which command is used to set the NSX Manager's logging-level to debug mode for troubleshooting?
An administrator has been tasked with implementing the SSL certificates for the NSX Manager Cluster VIP.
Which is the correct way to implement this change?
When deploying an NSX Edge Transport Node, what two valid IP address assignment options should be specified for the TEP IP addresses? (Choose two.)
A company security policy requires all users to log Into applications using a centralized authentication system.
Which two authentication, authorization, and accounting (AAA) systems are available when Integrating NSX with VMware Identity Manager? (Choose two.)
In an NSX environment, an administrator is observing low throughput and congestion between the Tier-O Gateway and the upstream physical routers.
Which two actions could address low throughput and congestion? (Choose two.)
Which two statements are correct about East-West Malware Prevention? (Choose two.)
When configuring OSPF on a Tler-0 Gateway, which three of the following must match in order to establish a neighbor relationship with an upstream router? (Choose three.)
What are the four types of role-based access control (RBAC) permissions? (Choose four.)
Which troubleshooting step will resolve an error with code 1001 during the configuration of a time-based firewall rule?
A company Is deploying NSX micro-segmentation in their vSphere environment to secure a simple application composed of web. app, and database tiers.
The naming convention will be:
• WKS-WEB-SRV-XXX
• WKY-APP-SRR-XXX
• WKI-DB-SRR-XXX
What is the optimal way to group them to enforce security policies from NSX?
Which NSX feature can be leveraged to achieve consistent policy configuration and simplicity across sites?
An NSX administrator Is treating a NAT rule on a Tler-0 Gateway configured In active-standby high availability mode. Which two NAT rule types are supported for this configuration? (Choose two.)
An administrator needs to download the support bundle for NSX Manager. Where does the administrator download the log bundle from?