Professional Documents
Culture Documents
QUESTION NO: 2
Which statement describes the traffic throughput of the NSX Distributed Firewall?
A. By decoupling the firewall services from the virtualization layer, traffic is directed to the
distribution layer for firewall processing within a service module.
B. By deploying firewall software on a per virtual machine basis, firewall services will be distributed
across multiple compute nodes.
C. Firewall services are implemented as kernel modules and provide traffic filtering between the
virtual machine's vNIC and the vSwitch.
D. Firewall services are distributed as a software firewall appliance and may be deployed on more
than one ESXi host for scalability and high availability.
Answer: C
Explanation:
QUESTION NO: 3
Using VMware's best practices, choose two statements that define the best solution for scaling
layer 2 services for the virtual network. (Choose two.)
A. Employ a layer 2 switched network.
B. Employ a layer 3 switched network.
C. Use GRE for an overlay network.
D. Use VXLAN for an overlay network.
Answer: B,D
Explanation:
QUESTION NO: 4
Which component provides for installation of NSX hypervisor kernel components and user world
agents?
A. NSX Controller
B. NSX Edge Virtual Appliance
C. NSX Manager
D. vCloud Automation Center
Answer: C
Explanation:
QUESTION NO: 5
Which NSX service or feature provides optimized management of virtual machine broadcast
(ARP) traffic?
A. NSX Controller
B. NSX Manager
C. Edge Services Gateway
D. VTEP
Answer: A
Explanation:
QUESTION NO: 6
You are tasked with designing a data center architecture that should maximize the use of vMotion
within your environment. You must use these VMware best practices:
- The network must utilize widely offered layer 2 switching and layer 3 switching services
- Purchase of new equipment should be minimized
Which two network design architectures will provide the requirements for vMotion in your data
center? (Choose two.)
QUESTION NO: 7
Which two statements describe the benefits provided by firewall services deployed by NSX?
(Choose two.)
A. Firewall services deployed using a software appliance will provide east-west traffic filtering and
security.
B. Firewall services deployed using a distributed kernel module will provide east-west traffic
filtering and security.
C. Firewall services providing edge security services uses a virtual appliance and is centrally
managed.
D. Firewall services providing edge security services uses a distributed kernel module.
Answer: B,C
Explanation:
QUESTION NO: 8
Which two statements are valid regarding vCloud Networking and Security (vCNS) and NSX?
(Choose two.)
A. Both vCNS and NSX support multiple hypervisor environments.
B. NSX provides support for multiple hypervisor environments, vCNS does not.
C. Both vCNS and NSX support dynamic routing protocols.
D. NSX supports dynamic routing protocols, vCNS does not.
Answer: B,D
Explanation:
QUESTION NO: 9
What is a valid, minimum set of steps to properly upgrade this environment to NSX?
A. 1. Upgrade vCenter Server 4.1 to vCenter Server 5.5
2. Upgrade vShield 5.0 to vShield 5.5
3. Upgrade ESXi hosts to ESXi 5.1 or greater
4. Install the NSX upgrade bundle
B. 1. Upgrade vCenter Server 4.1 to vCenter Server 5.1
2. Upgrade vCenter Server 5.1 to vCenter Server 5.5
3. Upgrade ESXi hosts to ESXi 5.1 or greater
4. Install the NSX upgrade bundle
C. 1. Upgrade vCenter Server 4.1 to vCenter Server 5.5
2. Upgrade ESXi hosts to ESXi 5.1 or greater
3. Install the NSX upgrade bundle
D. 1. Upgrade vCenter Server 4.1 to vCenter Server 5.5
2. Upgrade vShield 5.0 to vShield 5.5
3. Install the NSX upgrade bundle
Answer: A
Explanation:
QUESTION NO: 10
Layer 2 Multipathing (L2MP) and Multi-chassis Etherchannel (MEC) features have distinct scaling
differences with the network switching and routing services provided by NSX.
Which two statements provide a proper contrast of these services? (Choose two.)
A. Multi-chassis Etherchannel features provide higher utilization of Ethernet links within a defined
L2/L3 distribution area.
B. Multi-Chassis Etherchannel features provide an easy ability to scale a VLAN across the data
center.
C. NSX provides a method to transparently deploy L2MP protocols upon existing data center
installations without service disruption.
D. NSX provides a method to deploy scalable L2/L3 services on existing data center installations.
QUESTION NO: 11
An administrator has recently deployed NSX, but is still using a pair of physical network security
devices. The administrator wants to use the physical security devices to filter virtual machine traffic
hosted in the overlay network.
Which NSX component will provide the connectivity between the overlay and the physical
network?
A. Distributed Firewall
B. NSX Controller
C. Edge Services Gateway
D. Logical Router
Answer: D
Explanation:
QUESTION NO: 12
Which two are valid statements regarding third-party services and NSX? (Choose two.)
A. Third party services are automatically registered with NSX Manager.
B. Third party services can either be automatically or manually registered with NSX Manager.
C. Third party services require the deployment of a virtual appliance.
D. Third party services may or may not utilize a service virtual appliance.
Answer: B,D
Explanation:
QUESTION NO: 13
Which VMware NSX for vSphere component can be created on-demand using vCloud Automation
Center?
QUESTION NO: 14
What is one way that NSX improves network performance?
A. Virtual machines in different subnets residing on the same host route traffic through an NSX
controller, keeping traffic on the host.
B. Virtual machines in different subnets residing on the same host route traffic through an NSX
logical router, keeping traffic on the host.
C. Virtual machines in different subnets residing on the same host route traffic through an NSX
Edge gateway, keeping traffic on the host.
D. Virtual machines in different subnets residing on the same host route traffic through an NSX
switch, keeping traffic on the host.
Answer: B
Explanation:
QUESTION NO: 15
Which statement is true regarding deploying NSX over a physical network?
A. OSPF can be used for Management traffic in a Layer 3 fabric design.
B. NSX can implement IPv6 on an IPv4 physical network.
C. Routing is supported on bridged interfaces.
D. VLANs are not required to separate traffic between virtual machines.
Answer: B
Explanation:
QUESTION NO: 16
How does NSX simplify physical network design?
"Pass Any Exam. Any Time." - www.actualtests.com
QUESTION NO: 17
Which two statements are true regarding NSX? (Choose two.)
A. Workloads can be placed and moved independently of physical topology.
B. Operational efficiency can be achieved through automation of the physical network.
C. Workload deployments are non-disruptive over the existing physical network.
D. NSX implementation requires a VMware vSphere environment.
Answer: A,C
Explanation:
QUESTION NO: 18
How does NSX simplify the underlying physical network?
A. All configuration and state information is available via the REST APIs to automate the
configuration of the physical network.
B. All configuration and state information are readily accessible, as is the mapping between virtual
network topologies and the physical network.
C. All configuration and state information is stored in the local NSX BPDU database, eliminating
the need for Spanning Tree Protocol (STP) on the physical network.
D. All configuration and state information is cached by the NSX controllers, reducing the number of
MAC/ARP table entries on the physical network.
Answer: B
Explanation:
QUESTION NO: 20
Which two characteristics of the underlying physical network does VMware NSX require for robust
IP transport? (Choose two.)
A. The physical network should provide scalable network I/O using Layer 2 Multipathing (L2MP)
and Multichassis Link Aggregation (MLAG).
B. The physical network should provide scalable network I/O using Equal Cost Multipathing
(ECMP).
C. QoS is not necessary since classification and marking will be done in the overlay.
D. QoS classification and marking is required to provide end-to-end flow control.
Answer: B,D
Explanation:
QUESTION NO: 21
In a data center using a leaf and spine architecture, which two statements define the connectivity
between the leaf and spine tiers required to provide optimal network connectivity for NSX?
(Choose two.)
A. Links are required between leaf and spine switches, and from each spine switch to other spine
switches in the architecture.
B. Links are required between leaf and spine switches in the architecture to form a point-to-point
connection between the two tiers.
C. High availalability and scalability should be achieved using NSX High Availability.
D. High availability and scalability should be achieved using Equal Cost Multipathing (ECMP).
QUESTION NO: 22
-- Exhibit
-- Exhibit -An NSX administrator has deployed the network shown in the diagram:
Based on the diagram, which statement describes a valid method for redirecting traffic around the
fault?
A. Building this topology using a layer 2 switched fabric with connectivity between the leafs would
allow traffic to be redirected around the fault to another leaf.
B. Building this topology using a layer 3 routed fabric with connectivity between the leafs would
allow traffic to be redirected around the fault to another leaf.
C. Building this topology using a layer 2 switched fabric with spanning tree will provide the
quickest path around the fault to another spine when connectivity is lost.
D. Building this topology using a layer 3 routed fabric will provide the quickest path around the
fault to another spine when connectivity is lost.
Answer: D
Explanation:
QUESTION NO: 23
10
-- Exhibit -The diagrams show two possible physical network architectures. Each architecture provides a
means in dealing with the pictured failure.
Which architecture provides the highest degree of connectivity in the event of the pictured failure?
A. Both designs will provide the same percentage ofconnectivityin times of failure.
B. Neither design is properly architected to work around the displayed failure.
C. Diagram A's architecture will provide the highest percentage of connectivity in times of failure.
D. Diagram B's architecture will provide the highest percentage of connectivity in times of failure.
Answer: D
Explanation:
11
-- Exhibit -This diagram details the network connectivity from an NSX network and the supporting physical ne
twork. Locations C and D may be required to process packets with QoS tags.
Based on the diagram, which statement details proper processing of packets if they are QoS
tagged?
A. Locations C and D will trust the QoS tags of the encapsulated frame when passing packets.
B. Location B should trust the QoS tags of the encapsulated frames that are switched.
C. Location A will mark the inner header of the encapsulated frame.
D. Location B should trust the QoS tags of the external header.
Answer: D
Explanation:
QUESTION NO: 25
-- Exhibit
12
-- Exhibit -You are designing a network for NSX and your customer has stated that virtual machine traffic nee
ds to span the virtual and physical space.
Based on the diagram, where should this requirement be configured?
A. Location A
B. Location B
C. Location C
D. Locations B and C
Answer: B
Explanation:
QUESTION NO: 26
Which two statements describe the network connectivity provided by a vSphere Standard Switch
(vSS)? (Choose two.)
A. A vSS provides a direct and logical connection between a virtual machine NIC and a physical
NIC.
B. A vSS provides a direct and logical connection between two vSphere Distributed Switches.
C. A vSS connects the vNIC of a virtual machine to the physical network based on the bandwidth
of the VM's configured network adapter.
D. A vSS connects the vNIC of a virtual machine to the physical network and is not restricted to a
"Pass Any Exam. Any Time." - www.actualtests.com
13
QUESTION NO: 27
On a vSS, how does teaming two or more physical network adapters provide load balancing when
using the Load Balancing feature Route based on the originating virtual port ID?
A. They physical network adapter is chosen by use of a round robin based algorithm for each
additional virtual port in the port group that becomes active.
B. The physical network adapter is chosen by using the source IP address of the virtual machine
and the destination IP address as variables in an algorithm.
C. The physical network adapter is chosen by using the source MAC address as a variable in an
algorithm.
D. The physical network adapter is chosen based on the workloads from each port and the
number of physical adapters.
Answer: A
Explanation:
QUESTION NO: 28
What are two valid methods of configuring virtual machines to use a vSphere Distributed Switch
(vDS) that are currently using a vSphere Standard Switch (vSS)? (Choose two.)
A. Select each virtual machine and drag it to the vSphere Distributed Switch.
B. Select the vSS in use by the virtual machines and select the Move to option on the right-click
menu.
C. Select each virtual machine and edit the virtual network adapter's connection settings.
D. Use the Migrate Virtual Machine Networking option from the right-click menu of the vDS.
Answer: C,D
Explanation:
QUESTION NO: 29
A network security administrator wants to monitor traffic on several VLANs configured on a
"Pass Any Exam. Any Time." - www.actualtests.com
14
QUESTION NO: 30
What are three switch features found only on vSphere Distributed Switches? (Choose three.)
A. Network I/O Control
B. CDP
C. LLDP
D. SR-IOV
E. Port Mirroring
Answer: A,C,E
Explanation:
QUESTION NO: 31
You have deployed a two-tiered application using four virtual machines:
- Two virtual machines are web application servers
- Two virtual machines providing a clustered database service
What feature can you configure to provide the most accurate account for only the traffic between
the web servers and the clustered database?
A. On the vSphere Distributed Switch, configure the use of a port mirroring session using the
Encapsulated Remote Mirroring (L3) Source session type.
15
QUESTION NO: 32
Which three network policy settings can only be configured on a vSphere 5.5 Distributed Switch?
(Choose three.)
A. Access Control Lists (ACLs)
B. Network I/O Control
C. LACP v2
D. NetFlow
E. DSCP Marking
Answer: A,C,E
Explanation:
QUESTION NO: 33
Which two vSphere components are required for NSX? (Choose two.)
A. Standard vSwitch
B. Network I/O Control
C. Distributed Port Group
D. VMkernel port
Answer: C,D
Explanation:
QUESTION NO: 34
What is the minimum MTU size recommended by VMware for the physical network when
"Pass Any Exam. Any Time." - www.actualtests.com
16
QUESTION NO: 35
A company wants to deploy VMware NSX for vSphere with no PIM and no IGMP configured in the
underlying physical network. This company also must ensure that non-ESXi hosts do not receive
broadcast, unknown unicast or multicast (BUM) traffic.
Which replication mode should the logical switches be deployed with?
A. Unicast Replication Mode
B. Multicast Replication Mode
C. Hybrid Replication Mode
D. Transport Zone Mode
Answer: A
Explanation:
QUESTION NO: 36
Your data center is made up of two VMware vCenter Server instances. Each vCenter Server
manages three clusters with 16 hosts per cluster.
In preparing for your VMware NSX deployment, how many vShield Endpoint instances will you
have?
A. 2
B. 6
C. 48
D. 96
17
QUESTION NO: 37
-- Exhibit
-- Exhibit -Your data center clusters are configured as shown in the exhibit:
Core0 uses Virtual SAN and hosts virtual machines running the following components:
-
vCenter Server
Single Sign-On Server
Update Manager
SQL Server database
Core1, Core2, and Core3 use a single Fibre Channel attached storage array. Core1 hosts over
500 virtual machines. Core2 hosts over 400 virtual machines. Core3 hosts 100 virtual machines.
Following VMware's best practices, NSX Controller components should be deployed to which
location(s)?
18
QUESTION NO: 38
After deploying NSX, an administrator does not see the Networking & Security tab when
connecting to the vCenter Server using the vSphere Web Client.
QUESTION NO: 39
Which statement is correct when upgrading vShield Data Security to NSX Data Security?
A. NSX Data Security does not support a direct upgrade.
B. NSX Controller must be deployed before the upgrade.
C. The vCloud Network and Security Virtual Wires must have been upgraded.
D. vCould Network and Security must be at least version 5.1 before starting the upgrade.
Answer: A
Explanation:
QUESTION NO: 40
19
QUESTION NO: 41
What is determined when an NSX Administrator creates a Segment ID Pool?
A. The range of VXLAN Network Identifiers (VNIs) that can be assigned to Logical Switches.
B. The total number of Logical Switches that can be deployed in a single Compute Cluster.
C. The range of VLAN segments that can be assigned to Transport Zones.
D. The total number of addresses that can be used to assign VTEP IP addresses to ESXi hosts
during host preparation.
Answer: A
Explanation:
QUESTION NO: 42
-- Exhibit
20
-- Exhibit -An administrator has created an NSX network as shown in the exhibit:
Both VMs in the exhibit use the same distributed router for their default gateway. VM-B obtains its
IP address via DHCP. VM-A wants to send a packet to VM-B.
A. If Host-A is made aware by the NSX Controller of VM-B's MAC and IP addresses, Host-A
replies directly to VM-A with an ARP response.
B. If Host-A is made aware by Host-B of VM-B's MAC and IP addresses, Host-A replies directly to
VM-A with an ARP response.
C. If the NSX Controller is made aware by Host-B of VM-B's MAC and IP addresses, the NSX
Controller replies directly to VM-A with an ARP response.
D. If Host-B is aware of VM-B's MAC and IP addresses, Host-B is able to reply directly to VM-A
with an ARP response.
Answer: A
Explanation:
21
QUESTION NO: 43
-- Exhibit
-- Exhibit -An administrator has created the NSX network shown in the exhibit:
Both VMs use the same Distributed Router for their default gateway. VM-B receives an IP
message from VM-A.
22
QUESTION NO: 44
An administrator consults with the network team and decides that Transport Zones will be
configured with Hybrid Replication Mode for a new NSX for vSphere deployment.
QUESTION NO: 45
-- Exhibit
23
-- Exhibit -An NSX administrator creates the NSX network in the exhibit:
What destination IP address will Host-A use when sending a VXLAN frame to Host-B?
A. The IP address of one of Host-B's new vmkernel ports created during host configuration.
B. The IP address of Host-B's management vmkernel port, which is also the VTEP IP address.
C. The IP address of Host-B's NSX Controller. The NSX Controller forwards the VXLAN frame to
Host-B.
D. The IP address Host-B provided to Host-A during VXLAN tunnel setup negotiations.
Answer: A
Explanation:
24
QUESTION NO: 46
How is the Bridge Instance chosen?
A. It is chosen based on the ESXi host where the Logical Router Control VM is running.
B. It is manually assigned by the vSphere administrator when the distributed portgroup is
configured.
C. During an election process among all ESXi hosts. The host with the highest MAC address is
selected.
D. The VTEP configured with the highest VXLAN Network Identifier (VNI) is selected.
Answer: A
Explanation:
QUESTION NO: 47
Which two options are use cases of Layer 2 bridging in NSX for vSphere? (Choose two.)
A. Extend the network security to physical devices in the physical network by use of the
Distributed Firewall.
B. Extend physical services to Virtual Machines in virtual network.
C. Allow clustering of multiple NSX Managers in a single vCenter Server instance.
D. Allow physical devices in the physical network to use the NSX Edge Gateway as a default
router.
Answer: B,D
Explanation:
QUESTION NO: 48
Which components are required to enable layer 2 bridging? (Choose two.)
A. Distributed firewall rule to allow layer 2 traffic in the bridge.
B. Deployed Logical Switch.
C. Deployed Logical Router.
D. VLAN trunk configured on logical switch.
25
QUESTION NO: 49
Which two are valid types of authentication for an OSPF area? (Choose two.)
A. Password authentication
B. MD5 authentication
C. SHA1 authentication
D. LDAP authentication
Answer: A,B
Explanation:
QUESTION NO: 50
A vSphere administrator wants to add a VLAN LIF to a Distributed Router. What must the vSphere
administrator do for the VLAN LIF to be added successfully?
A. The vSphere administrator must assign a VLAN number to the distributed portgroup that the
VLAN LIF connects to.
B. The vSphere administrator must assign a VLAN number to the Distributed Router that the
Logical Switch connects to.
C. The vSphere administrator must assign a VLAN number to the Logical Switch that the
Distributed Router connects to.
D. The vSphere administrator must assign a VLAN number to the uplink on the distributed switch
that the VLAN LIF connects to.
Answer: A
Explanation:
QUESTION NO: 51
A vSphere administrator added a new interface to a Distributed Router with a subnet of
172.16.10.0/24 and wants to make this subnet reachable to the rest of the network. How can the
vSphere administrator achieve this?
26
QUESTION NO: 52
-- Exhibit
27
A. Distributed Router in Host-A receives the packet from VM-A and forwards it to Logical Switch
7775 in Host-B, via a VXLAN frame, which delivers it to VM-B.
B. Logical Switch 7321 in Host-A receives the packet inside a frame from VM-A and forwards it to
Logical Switch 7775 in Host-B, via a VXLAN frame, which delivers it to VM-B.
C. Distributed Router in Host-A receives the packet from VM-A and forwards it to Logical Switch
7321 in Host-B, via a VXLAN frame, which delivers it to Logical Switch 7775 before it is delivered
to VM-B.
D. Logical Switch 7321 in Host-A receives the packet from VM-A and forwards it to the Distributed
Router in Host-B, which passes it along to Logical Switch 7775 in Host-B before it is delivered to
VM-B.
Answer: A
Explanation:
QUESTION NO: 53
-- Exhibit
28
Both VM-A and VM-B use the same Distributed Router for their default gateway. VM-B receives an
IP message from VM-A.
What is the source MAC address of the IP message received by VM-B?
29
QUESTION NO: 54
Which two options are valid distribution methods used by the NSX Edge Load Balancer? (Choose
two.)
A. Destination IP Hash
B. Least Load
C. URI
D. Round Robin
Answer: C,D
Explanation:
QUESTION NO: 55
A vSphere administrator deployed an NSX Edge Load Balancer in HA mode. What happens in the
event the Load Balancer has a failure?
A. The secondary NSX Edge Load Balancer assumes the role of primary. Existing Flows will need
to have their connections reestablished.
B. HA will start the NSX Edge Load Balancer on another ESXi host in the cluster. All existing flows
will need to have their connections reestablished.
C. HA will start the NSX Edge Load Balancer on another ESXi host in the cluster. The NSX
Controller caches existing flows and hands them to the Load Balancer when it is back up.
D. The secondary NSX Edge Load Balancer assumes the role of primary. The NSX Controller
caches existing flows and hands them to the Load Balancer when it is back up.
Answer: A
Explanation:
QUESTION NO: 56
A company hosts an internal website on multiple virtual machines attached to a Logical Switch
with VNI 7321. A Distributed Router serves as the virtual machines' default gateway.
30
The company wants to deploy a NSX Edge Service Load Balancer to improve on this situation.
Which distribution method can be configured on the NSX Edge Load Balancer to meet the
company's needs?
A. LEAST_CONN
B. IP_HASH
C. LEAST_LOAD
D. URI
Answer: A
Explanation:
QUESTION NO: 57
Which two statements are true regarding Layer 2 VPNs? (Choose two.)
A. Layer 2 VPNs are used to securely extend Ethernet segments over an untrusted medium.
B. The NSX Edge Service Gateway can form a Layer 2 VPN with a standards-compliant physical
appliance.
C. The Distributed Router can form a Layer 2 VPN to another Distributed Router or NSX Edge
Service Gateway.
D. Layer 2 VPNs require the two VPN endpoints be in the same Layer 2 segment.
Answer: A,B
Explanation:
QUESTION NO: 58
A vSphere administrator wants to setup an NSX Edge Service Gateway to provide traveling
employees secure access to company servers located in specific network segments within the
corporate Data Center. The remote access solution must provide a method to authenticate the
users.
Which two methods can be used with the NSX Edge Service Gateway? (Choose two.)
"Pass Any Exam. Any Time." - www.actualtests.com
31
QUESTION NO: 59
A company has augmented its Data Center infrastructure by using vCloud Hybrid Service during
peak hours. The company wants to extend their existing subnets into the cloud while workloads
retain their existing IP addresses. The virtual machines in these subnets use an NSX Edge
Gateway as their default gateway.
QUESTION NO: 60
A vSphere administrator wants to setup an NSX Edge Service Gateway to provide traveling
employees secure access to company servers located in specific network segments within the
corporate Data Centers. The solution has to be as scalable as possible.
Which Virtual Private Network solution will satisfy the administrator's requirements?
A. SSL VPN
B. MPLS VPN
C. Layer 2 VPN
D. IPSec VPN
32
QUESTION NO: 61
Which statement is true regarding an NSX Edge gateway device configured with a DNS Server?
A. The NSX Edge will forward all DNS requests from virtual machines sent to it to the DNS Server.
B. The NSX Edge configuration will override the DNS Server configured by the NSX Manager.
C. The NSX Edge registers the DNS Server with the NSX Controller.
D. The NSX Edge periodically synchronizes its DNS tables with the primary DNS Server.
Answer: A
Explanation:
QUESTION NO: 62
An NSX Edge Service Gateway has two interfaces:
Internal interface named Internal Access
-- IP address = 10.10.10.1
-- Network mask = 255.255.255.0
Uplink interface named Physical Uplink
-- IP address = 20.20.20.1
-- Network mask = 255.255.255.0
A vSphere administrator wants to add a SNAT rule to allow traffic from the internal network
segment to access external resources via the uplink interface.
Which three steps should the vSphere administrator do to add the SNAT rule? (Choose three)
A. Apply the SNAT rule to the Internal Access interface.
B. Select 10.10.10.1 as the translated source IP.
C. Apply the SNAT rule on the Physical Uplink interface.
"Pass Any Exam. Any Time." - www.actualtests.com
33
QUESTION NO: 63
An administrator manages a TFTP server virtual machine that is connected to a Logical Switch
with a VNI of 7321. The TFTP server has been configured to use port 1069. An NSX Edge Service
Gateway is connected to VNI 7321 and has an uplink interface with access to the physical
network. Assume external users can reach the Service Gateway.
What should the administrator configure to ensure external connections to the TFTP server are
successful?
A. Create a DNAT rule with the original port of 69 and translated port of 1069.
B. Create a SNAT rule with the original port of 1069 and translated port of 69.
C. Create a SNAT rule with the original port of 69 and translated port of 1069.
D. Create a DNAT rule with the original port of 1069 and translated port of 69.
Answer: A
Explanation:
QUESTION NO: 64
Which two actions take place when an active NSX Edge instance fails? (Choose two.)
A. Once the original NSX Edge instance is recovered, it preempts the other NSX Edge instance
and takes over the active role.
B. The standby NSX Edge instance becomes the active instance and requests routing updates
from the routing neighbors.
C. Once the original NSX Edge instance is recovered, the NSX Manager attempts to place it on a
different host from the other NSX Edge instance.
D. The standby NSX Edge instance becomes the active instance and retains any routing neighbor
adjacencies.
Answer: C,D
Explanation:
34
QUESTION NO: 65
Which two statements are true regarding NSX High Availability? (Choose two.)
A. NSX HA is configured as Active-Active.
B. NSX HA is configured as Active-Standby.
C. If an Active node fails, there is no service interruption during failover.
D. If an Active node fails, there is a 15 second service interruption during failover.
Answer: B,C
Explanation:
QUESTION NO: 66
Where does the Distributed Logical Firewall enforce firewall rules?
A. At the Virtual Machine's virtual Network Interface Card (vNIC).
B. At the Logical Switch virtual port that the Virtual Machine connects to.
C. At the NSX Controller's firewall kernel module.
D. At the ESXi host vmnic used by the vSphere Distributed Switch.
Answer: A
Explanation:
QUESTION NO: 67
How are Logical Firewall rules applied to affected virtual machines?
A. They are pushed by the NSX Controllers into all the ESXi hosts in the same Transport Zone.
B. They are pushed by the NSX Manager to the ESXi hosts running the source and/or destination
virtual machines.
C. They are pushed by the NSX Controllers to the ESXi hosts running the destination virtual
machines.
D. They are pushed by the NSX Manager to all the ESXi hosts in the NSX environment.
Answer: B
Explanation:
"Pass Any Exam. Any Time." - www.actualtests.com
35
QUESTION NO: 68
An administrator wishes to control traffic flow between two virtual machines. The virtual machines
are in the same subnet, but are located on separate ESXi hosts. The administrator deploys an
Edge Firewall to one of the hosts and verifies the default firewall rule is set to deny, but the two
virtual machines can still communicate with each other.
QUESTION NO: 69
An administrator has deployed NSX in an environment containing a mix of vSphere 5 hosts. The
implementation includes the Distributed Firewall Service, but the administrator finds that rules are
not being applied to all affected virtual machines.
What two conditions would cause this behavior? (Choose two.)
A. Some hosts have not been prepared for NSX.
B. Only ESXi 5.5 and later hosts can push the rules to the virtual machines.
C. Only ESXi 5.1 and later hosts can push the rules to the virtual machines.
D. Some hosts are blocking the port used for rule distribution.
Answer: A,C
Explanation:
QUESTION NO: 70
An administrator wants to perform Activity Monitoring on a large group of virtual machines in an
"Pass Any Exam. Any Time." - www.actualtests.com
36
QUESTION NO: 71
Which action is not an option for adding Virtual Machines to a Security Group?
A. Adding Virtual Machines to a Security Group and nesting it within another Security Group.
B. Defining Dynamic Membership in the Security Group.
C. Adding Virtual Machines to a Security Policy and associating it with a Security Group.
D. Selecting objects to include within a Security Group.
Answer: C
Explanation:
QUESTION NO: 72
What is the most restrictive NSX role that can be used to create and publish security policies and
install virtual appliances?
A. Security Administrator
B. NSX Administrator
C. Auditor
D. Enterprise Administrator
Answer: D
Explanation:
QUESTION NO: 73
"Pass Any Exam. Any Time." - www.actualtests.com
37
QUESTION NO: 74
Which port is used for NSX REST API Requests?
A. 80
B. 443
C. 5480
D. 8443
Answer: B
Explanation:
QUESTION NO: 75
Which component automates the consumption of third-party services and provides mapping to
virtual machines using a logical policy?
A. NSX Manager
B. Cloud Management Platform (CMP)
C. Service Composer
D. NSX Data Security
Answer: C
Explanation:
QUESTION NO: 76
38
QUESTION NO: 77
What is required before running an Activity Monitoring report?
A. Enable data collection on the NSX Controller
B. Enable data collection on the vCenter Server
C. Enable data collection on the NSX Manager
D. Enable data collection on the virtual machine
Answer: D
Explanation:
QUESTION NO: 78
What is the function of NSX Data Security?
A. Prevents sensitive data in your virtualized environment from being copied
B. Prevents sensitive data in your virtualized environment from being modified
C. Identifies sensitive data in your virtualized environment based upon regulation security policies
D. Identifies sensitive data in your virtualized environment based upon regulation violation reports
Answer: D
Explanation:
QUESTION NO: 79
39
QUESTION NO: 80
An administrator needs to perform a configuration backup of NSX. From which two locations can
this task be performed? (Choose two.)
A. Directly on the NSX Manager
B. From the vSphere Web Client
C. Using the NSX API
D. Directly on each NSX Controller
Answer: A,C
Explanation:
QUESTION NO: 81
-- Exhibit
-- Exhibit --
40
What task does the administrator need to complete to perform a successful backup?
QUESTION NO: 82
Which tool detects a VLAN misconfiguration between virtual and physical switches?
A. esxtop
B. esxcfg-vswitch
C. VDS Health Check
D. NSX Controller command line interface (CLI)
Answer: C
Explanation:
QUESTION NO: 83
Which tool is used to display VXLAN connection information?
A. pktcap-uw
B. NSX Controller CLI
C. esxtop
D. VDS Health Check
Answer: B
"Pass Any Exam. Any Time." - www.actualtests.com
41
QUESTION NO: 84
An administrator has created a logical switch, but when attempting to select a transport zone, the
dropdown box is empty. Which option is causing this issue?
A. The transport zone has not been enabled on the NSX Controller
B. A VXLAN has not been created
C. A VLAN has not been created
D. The transport zone has not been assigned an IP address pool
Answer: B
Explanation:
QUESTION NO: 85
-- Exhibit
-- Exhibit -An administrator is troubleshooting a NSX controller cluster issue and runs the control-cluster
command:
42
QUESTION NO: 86
-- Exhibit
43
The administrator clicks on the Change link to specify the network to connect to. Selecting the
distributed portgroup, the administrator finds that no portgroups are listed. The administrator
verifies the desired portgroup exists in vCenter Server.
QUESTION NO: 87
-- Exhibit
44
QUESTION NO: 88
-- Exhibit
-- Exhibit -An NSX administrator is examining an error in the Event Console as shown:
45
-- Exhibit -An administrator is testing connectivity between two ESXi hosts and uses the ping utility.
Based on the results shown in the exhibit, which statement is correct?
QUESTION NO: 90
Which statement is true regarding multicast traffic when implementing NSX?
A. A multicast address range is required when using vCenter Server 5.5
B. A multicast address range is required when using ESXi 5.1 hosts
C. A multicast address range is required when using ESXi 5.0 hosts
D. A multicast address range is required when using vCenter Server 5.1
"Pass Any Exam. Any Time." - www.actualtests.com
46
QUESTION NO: 91
Choose the two statements correctly describing the way NSX provides integration with Cloud
Management Platforms (CMP). (Choose two.)
A. OpenStack provides integration with the Cinder plug-in.
B. OpenStack provides integration with the Neutron plug-in.
C. VMware provides open source API plug-ins for their own CMP products such as vCD and
vCAC.
D. VMware provides out of the box integration with their own CMP products such as vCD and
vCAC.
Answer: B,D
Explanation:
QUESTION NO: 92
A company wants to deploy VMware NSX for vSphere and ensure the least amount of bandwidth
consumption in the underlying physical architecture. Which replication mode should the logical
switches be deployed with?
A. Multicast Replication Mode
B. Unicast Replication Mode
C. Hybrid Replication Mode
D. vSphere Replication Mode
Answer: A
Explanation:
QUESTION NO: 93
You want to use an existing NSX Manager to extend logical networks to the ESXi hosts of a new
cluster.
47
QUESTION NO: 94
What is the earliest version of vCloud Network and Security (vCNS) that can be upgraded to
VMware NSX for vSphere 6.0?
A. vCNS 5.0
B. vCNS 5.1
C. vCNS 5.5
D. vCNS 6.0
Answer: C
Explanation:
QUESTION NO: 95
Which is not a prerequisite to upgrade vCloud Network and Security Virtual Wires to Logical
Switches?
A. vCloud Network and Security Manager has been upgraded to NSX Manager.
B. vShield Data Security has been uninstalled.
C. NSX Controllers have been deployed.
D. The NSX Manager has been configured with the same IP as the vCloud Network and Security
Manager.
Answer: C
Explanation:
48
QUESTION NO: 96
High Availability (HA) was not initially configured when an administrator deployed an NSX Edge
Service Gateway. What should the administrator do to configure the NSX Edge with HA?
A. Select the NSX Edge instance from the NSX Edges view in Networking & Security. Go to
Manage> Settings> Configuration and add a NSX Edge appliance.
B. Delete the NSX Edge instance and redeploy it with HA. The existing NSX Edge configuration
data will be lost.
C. Delete the NSX Edge instance and redeploy it with HA. The configuration data is retained by
NSX Manager and pushed to the new NSX Edge instance.
D. Select the NSX Edge appliance from the Virtual Machines and Templates view. Go to Actions>
All vCenter Actions> Enable HA to configure High Availability.
Answer: A
Explanation:
QUESTION NO: 97
Which is not a valid Destination option for a General Logical Firewall rule?
A. Datacenter
B. Virtual App
C. MAC Set
D. Network
Answer: C
Explanation:
QUESTION NO: 98
Where are the Logical Firewall logs saved?
A. On the vNIC-FW module
B. On the ESXi host
C. On the NSX Controllers
D. On the NSX Manager
"Pass Any Exam. Any Time." - www.actualtests.com
49
QUESTION NO: 99
If a Security Group is the Source for a General Logical Firewall Rule, which Virtual Machines will
be affected by the rule?
A. Each Virtual Machine defined in the Security Group.
B. Each Virtual Machine defined in the Source and Destination fields of the Logical Firewall Rule.
C. Each Virtual Machine identified in the Applied To field of the Logical Firewall Rule.
D. Each Virtual Machine identified in the Destination field of the Logical Firewall Rule.
Answer: C
Explanation:
50
51
52
How many NSX Manager instances would be required for this deployment?
A. 1
B. 2
C. 3
D. 6
Answer: B
Explanation:
53
Which two steps must be taken to ensure a successful NSX deployment? (Choose two.)
A. Upgrade the vCenter Server installation to vCenter Server 5.5.
B. Upgrade the network devices to support layer 2 multi-pathing.
C. Upgrade all compute nodes to ESXi 5.1 or later.
D. Upgrade the VMware Horizon View installation to Horizon View 5.3.
Answer: A,C
Explanation:
54
55
56
57
-- Exhibit --
58
59
60
Using VMware best practices, which option shows the steps required to configure use of LACP?
A. Upgrade all ESXi hosts to ESXi version 5.5. Create a new version 5.5 vDS. Use the Add and
Manage Hosts option to migrate the hosts to the new vDS. Configure the appropriate LACP
settings.
B. Upgrade all ESXi hosts to ESXi version 5.5. Create a new version 5.5 vDS and use the Add
and Manage Hosts option to migrate the hosts to the new vDS. Upgrade all virtual machines to
hardware version 10. Configure the appropriate LACP settings.
C. Upgrade all ESXi hosts to ESXi version 5.5. Upgrade the existing vDS and use the Add and
Manage Hosts option to migrate the hosts to the new vDS. Upgrade all virtual machines to
hardware version 10. Configure the appropriate LACP settings.
D. Upgrade all ESXi hosts to ESXi version 5.5. Upgrade the existing vDS to version 5.5.
Configure the appropriate LACP settings.
Answer: D
Explanation:
61
62
63
Which statement is true regarding the function of the VXLAN Tunnel End Points (VTEPs)?
A. The VTEPs will send unicast frames to the NSX Controllers when the VTEPs do not have a
MAC address in the MAC table.
B. The VTEPs will switch to Multicast Replication Mode for those VTEPs to which multicast path
discovery is successful.
C. The VTEPs will send multicast frames to all other VTEPs in the Transport Zone when the
VTEPs do not have a MAC address in the MAC table.
D. The VTEPs will send unicast frames to all local VTEPs and remote proxies in the Transport
Zone when the VTEPs do not have a MAC address in the MAC table.
Answer: D
Explanation:
64
65
66
When an user resolves the URL for the website, the internal DNS server responds with the IP
address of one of the virtual machine's IP addresses in a round robin fashion. The company wants
to deploy an NSX Edge Service Load Balancer and maintain the use of the Distributed Router for
the virtual machines' default gateway.
Which mode can the NSX Edge Load Balancer can be deployed to meet the Company's needs?
A. One-Arm
B. Transparent
C. Local
D. Global
Answer: A
Explanation:
67
68
A vSphere administrator does not want to advertise the subnet in VNI 7321 to the rest of the
network, but still wants to allow virtual machines in the segment to access external resources.
What two steps should the vSphere administrator take to achieve this? (Choose two)
A. Make the NSX Edge Gateway the default gateway for VNI 7321.
B. Configure a SNAT rule for VNI 7321 on the NSX Edge Gateway.
69
70
71
72
73
74
75
76
INVALID_ID_INFORMATION
77
78
79