New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

2V0-41.24 Questions and Answers

Question # 6

Which is an advantage of an L2 VPN in an NSX 4.x environment?

A.

Achieve better performance

B.

Use the same broadcast domain

C.

Enables Multi-Cloud solutions

D.

Enables VM mobility with re-IP

Full Access
Question # 7

Which three data collection sources are used by NSX Network Detection and Response to create correlations/Intrusion campaigns? (Choose three.)

A.

Files and anti-malware (lie events from the NSX Edge nodes and the Security Analyzer

B.

East-West anti-malware events from the ESXi hosts

C.

Distributed Firewall flow data from the ESXi hosts

D.

IDS/IPS events from the ESXi hosts and NSX Edge nodes

E.

Suspicious Traffic Detection events from NSX Intelligence

Full Access
Question # 8

Which TraceFlow traffic type should an NSX administrator use for validating connectivity between App and DB virtual machines that reside on different segments?

A.

Anycast

B.

Multicast

C.

Broadcast

D.

Unicast

Full Access
Question # 9

A company Is deploying NSX micro-segmentation in their vSphere environment to secure a simple application composed of web. app, and database tiers.

The naming convention will be:

• WKS-WEB-SRV-XXX

• WKY-APP-SRR-XXX

• WKI-DB-SRR-XXX

What is the optimal way to group them to enforce security policies from NSX?

A.

Use Edge as a firewall between tiers.

B.

Do a service insertion to accomplish the task.

C.

Group all by means of tags membership.

D.

Create an Ethernet based security policy.

Full Access
Question # 10

Which troubleshooting step will resolve an error with code 1001 during the configuration of a time-based firewall rule?

A.

Restarting the NTPservice on the ESXi host.

B.

Reconfiguring the ESXi host with a local NTP server.

C.

Re-installing the NSX VIBs on the ESXi host.

D.

Changing the time zone on the ESXi host.

Full Access
Question # 11

Which of the following statements is true regarding the use of a Dynamic Routing Protocol on a Tier-1 Gateway?

A.

Both BGP and OSPF can be used on a Tier-1 Gateway.

B.

You can only use OSPF on the Tier-1 Gateway

C.

A Dynamic Routing Protocol cannot be used on a Tier-1 Gateway.

D.

You can only use BGP on the Tier-1 Gateway.

Full Access
Question # 12

An NSX administrator wants to create a Tier-0 Gateway to support equal cost multi-path (ECMP) routing.

Which failover detection protocol must be used to meet this requirement?

A.

Host Standby Router Protocol (HSRP)

B.

Beacon Probing (BP)

C.

Virtual Router Redundancy Protocol (VRRP)

D.

Bidirectional Forwarding Detection (BFD)

Full Access
Question # 13

Which choice is a valid insertion point for North-South network introspection?

A.

Host Physical NIC

B.

Tier-0 gateway

C.

Guest VM vNIC

D.

Partner SVM

Full Access
Question # 14

An administrator is configuring service insertion for Network Introspection.

Which two places can the Network Introspection be configured? (Choose two.)

A.

Edge Node

B.

Host pNIC

C.

Tier-0 gateway

D.

Tier-1 gateway

E.

Partner SVM

Full Access
Question # 15

Which of the two following characteristics about NAT64 are true? (Choose two.)

A.

NAT64 requires the Tier-1 gateway to be configured in active-active mode.

B.

NAT64 is stateless and requires gateways to be deployed in active-standby mode.

C.

NAT64 is supported on Tier-0 and Tier-1 gateways.

D.

NAT64 is supported on Tier-1 gateways only.

E.

NAT64 requires the Tier-1 gateway to be configured in active-standby mode.

Full Access
Question # 16

What is the VMware recommended way to deploy a virtual NSX Edge Node?

A.

Through the NSX Ul

B.

Through automated or interactive mode using an ISO

C.

Through the vSphere Web Client

D.

Through the OVF command line tool

Full Access
Question # 17

Which two BGP configuration parameters can be configured in the VRF Lite gateways? (Choose two.)

A.

Route Aggregation

B.

Route Distribution

C.

BGP Neighbors

D.

Graceful Restart

E.

Local AS

Full Access
Question # 18

What are four NSX built-in rote-based access control (RBAC) roles? (Choose four.)

A.

Network Admin

B.

Enterprise Admin

C.

Full Access

D.

Read

E.

LB Operator

F.

None

G.

Auditor

Full Access
Question # 19

Which two statements are correct about East-West Malware Prevention? (Choose two.)

A.

A SVM is deployed on every ESXi host.

B.

NSX Application Platform must have Internet access.

C.

An agent must be installed on every ESXi host.

D.

An agent must be installed on every NSX Edge node.

E.

NSX Edge nodes must have Internet access.

Full Access
Question # 20

Refer to the exhibits.

Drag and drop the NSX graphic element icons on the left found in an NSX Intelligence visualization graph to Its correct description on the right.

Full Access
Question # 21

Which command is used to set the NSX Manager’s logging-level to debug mode for troubleshooting?

A.

set service manager log-level debug

B.

sec service nsx-manager logging-level debug

C.

sec service nsx-manager log-level debug

D.

sec service manager logging-level debug

Full Access
Question # 22

An NSX administrator is reviewing syslog and notices that Distributed Firewall Rules hit counts are not being logged.

What could cause this issue?

A.

Zero Trust Security is not enabled.

B.

Syslog is not configured on the NSX Manager.

C.

Syslog is not configured on the ESXi transport node.

D.

Distributed Firewall Rule logging is not enabled.

Full Access
Question # 23

Which two built-in VMware tools will help identify the cause of packet loss on VLAN Segments? (Choose two.)

Which two built-in VMware tools will help identify the cause of packet loss on VLAN Segments? (Choose two.)

A.

Flow Monitoring

B.

Traceflow

C.

Live Flow

D.

Packet Capture

E.

Activity Monitoring

Full Access
Question # 24

An NSX administrator is using ping to check connectivity between VM1 running on ESXi1 to VM2 running on ESXi2. The ping tests fail. The administrator knows the maximum transmission unit size on the physical switch is 1600.

Which command does the administrator use to check the VMware kernel ports for tunnel end point communication?

A.

vmkping ++netstack=geneve -d -s 1572

B.

vmkping ++netstack=vxlan -d -s 1572

C.

esxcli network diag ping –H

D.

esxcli network diag ping -I vmk0 -H

Full Access
Question # 25

How is the RouterLink port created between a Tier-1 Gateway and Tier-0 Gateway?

A.

Automatically created when Tier-1 is created.

B.

Manually create a Logical Switch and connect to bother Tier-1 and Tier-0 Gateways.

C.

Manually create a Segment and connect to both Tier-1 and Tier-0 Gateways.

D.

Automatically created when Tier-1 is connected with Tier-0 from NSX Ul.

Full Access
Question # 26

An NSX administrator noticed that the nsxcli command times out after 600 secs of idle time.

Which CLI command disables the nsxcli time out value on NSX Manager?

A.

set cli-timeout 1

B.

set cli-timeout enabled

C.

set cli-timeout disabled

D.

set cli-timeout 0

Full Access
Question # 27

What must be configured on Transport Nodes for encapsulation and decapsulation of Geneve protocol?

A.

TEP

B.

STT

C.

VXLAN

D.

UDP

Full Access
Question # 28

Which CLI command shows syslog on NSX Manager?

A.

(show log manager follow

B.

gee log-file syslog

C.

[get log-file auch.log

D.

/var/log/syslog/syslog.log

Full Access
Question # 29

An architect receives a request to apply distributed firewall in a customer environment without making changes to the network and vSphere environment. The architect decides to use Distributed Firewall on VDS.

Which two of the following requirements must be met in the environment? (Choose two.)

A.

vCenter 8.0 and later

B.

NSX version must be 3.2 and later

C.

NSX version must be 3.0 and later

D.

VDS version 6.6.0 and later

Full Access
Question # 30

Which three selections are capabilities of Network Topology? (Choose three.)

A.

Display how the different NSX components are interconnected.

B.

Display the VMs connected to Segments.

C.

Display how the Physical components are interconnected.

D.

Display the uplinks configured on the Tier-1 Gateways.

E.

Display the uplinks configured on the Tier-0 Gateways.

Full Access
Question # 31

Which two of the following will be used for ingress traffic on the Edge node supporting a Single Tier topology? (Choose two.)

A.

Tier-1 SR Router Port

B.

Tier-0 Uplink interface

C.

Downlink Interface for the Tier-0 DR

D.

Downlink Interface for the Tier-1 DR

E.

Inter-Tier interface on the Tier-0 gateway

Full Access
Question # 32

What needs to be configured on a Tier-0 Gateway to make NSX Edge Services available to a VM on a VLAN-backed logical switch?

A.

VLAN Uplink

B.

Downlink interface

C.

Loopback Router Port

D.

Service interface

Full Access
Question # 33

When configuring OSPF on Tier-0 Gateway, which three of the following must match in order to establish a neighbor relationship with an upstream router? (Choose three.)

A.

Area ID

B.

MTU of the Uplink

C Naming convention

C.

Address of the neighbor

D.

Subnet mask

E.

Protocol and Port

Full Access
Question # 34

Which command is used to display the network configuration of the Tunnel Endpoint (TEP) IP on a bare metal transport node?

A.

debug

B.

tcpdump

C.

tcpconfig

D.

ifconfig

Full Access