Which three security features are dependent on the NSX Application Platform? (Choose three.)
Which Is the only supported mode In NSX Global Manager when using Federation?
An architect receives a request to apply distributed firewall in a customer environment without making changes to the network and vSphere environment. The architect decides to use Distributed Firewall on VDS.
Which two of the following requirements must be met in the environment? (Choose two.)
In an NSX environment, an administrator is observing low throughput and congestion between the Tier-O Gateway and the upstream physical routers.
Which two actions could address low throughput and congestion? (Choose two.)
Refer to the exhibits.
Drag and drop the NSX graphic element icons on the left found in an NSX Intelligence visualization graph to Its correct description on the right.
What are two valid BGP Attributes that can be used to influence the route path traffic will take? (Choose two.)
Which of the following exist only on Tler-1 Gateway firewall configurations and not on Tier-0?
An NSX administrator Is treating a NAT rule on a Tler-0 Gateway configured In active-standby high availability mode. Which two NAT rule types are supported for this configuration? (Choose two.)
Which NSX feature can be leveraged to achieve consistent policy configuration and simplicity across sites?
How is the RouterLink port created between a Tier-1 Gateway and Tler-0 Gateway?
An administrator has a requirement to have consistent policy configuration and enforcement across NSX instances.
What feature of NSX fulfills this requirement?
When a stateful service is enabled for the first lime on a Tier-0 Gateway, what happens on the NSX Edge node'
What are two valid options when configuring the scope of a distributed firewall rule? (Choose two.)
Which two logical router components span across all transport nodes? (Choose two.)
Which troubleshooting step will resolve an error with code 1001 during the configuration of a time-based firewall rule?
Which TraceFlow traffic type should an NSX administrator use tor validating connectivity between App and DB virtual machines that reside on different segments?
An NSX administrator is reviewing syslog and notices that Distributed Firewall Rules hit counts are not being logged.
What could cause this issue?
Which steps are required to activate Malware Prevention on the NSX Application Platform?
Which CLI command does an NSX administrator run on the NSX Manager to generate support bundle logs if the NSX UI Is inaccessible?
An administrator needs to download the support bundle for NSX Manager. Where does the administrator download the log bundle from?