Which three security features are dependent on the NSX Application Platform? (Choose three.)
ANSX Intelligence
BNSX Firewall
CNSX Network Detection and Response
DNSX TLS Inspection
ENSX Distributed IDS/IPS
FNSX Malware Prevention
Which two of the following will be used for ingress traffic on the Edge node supporting a Single Tier topology? (Choose two.)
AInter-Tier interface on the Tier-0 gateway
BTier-0 Uplink interface
CDownlink Interface for the Tier-0 DR
DTier-1 SR Router Port
EDownlink Interface for the Tier-1 DR
Which of the following exist only on Tier-1 Gateway firewall configurations and not on Tier-0?
AApplied To
BActions
CSources
DProfiles
What is the VMware recommended way to deploy a virtual NSX Edge Node?
AThrough the NSX UI
BThrough automated or interactive mode using an ISO
CThrough the vSphere Web Client
DThrough the OVF command line tool
When collecting support bundles through NSX Manager, which files should be excluded for potentially containing sensitive information?
AAudit Files
BCore Files
CManagement Files
DController Files
Which command is used to test management connectivity from a transport node to NSX Manager?
Aesxcli network ip connection list | grep 1234
Besxcli network connection list | grep 1235
Cesxcli network ip connection list | grep 1235
Desxcli network connection list | grep 1234
An administrator needs to download the support bundle for NSX Manager.
Where does the administrator download the log bundle from?
ASystem > Utilities > Tools
BSystem > Settings > Support Bundle
CSystem > Support Bundle
DSystem > Settings
HOTSPOT -
Refer to the exhibit.
Which two items must be configured to enable OSPF for the Tier-0 Gateway in the image? Mark your answers by clicking twice on the image.
An administrator has deployed 10 Edge Transport Nodes in their NSX Environment, but has forgotten to specify an NTP server during the deployment.
What is the efficient way to add an NTP server to all 10 Edge Transport Nodes?
AUse a Node Profile
BUse the CLI on each Edge Node
CUse Transport Node Profile
DUse a PowerCLI script
Which two BGP configuration parameters can be configured in the VRF Lite gateways? (Choose two.)
ARoute Aggregation
BRoute Distribution
CGraceful Restart
DBGP Neighbors
ELocal AS
Which two are requirements for FQDN Analysis? (Choose two.)
AThe NSX Edge nodes require access to the Internet to download category and reputation definitions.
BESXi control panel requires access to the Internet to download category and reputation definitions.
CThe NSX Manager requires access to the Internet to download category and reputation definitions.
DA layer 7 gateway firewall rule must be configured on the Tier-1 gateway uplink.
EA layer 7 gateway firewall rule must be configured on the Tier-0 gateway uplink.
Which three data collection sources are used by NSX Network Detection and Response to create correlations/intrusion campaigns? (Choose three.)
ADistributed Firewall flow data from the ESXi hosts
BEast-West anti-malware events from the ESXi hosts
CFiles and anti-malware file events from the NSX Edge nodes and the Security Analyzer
DIDS/IPS events from the ESXi hosts and NSX Edge nodes
ESuspicious Traffic Detection events from NSX Intelligence
What needs to be configured on a Tier-0 Gateway to make NSX Edge Services available to a VM on a VLAN-backed logical switch?
ALoopback Router Port
BVLAN Uplink
CService interface
DDownlink interface
Which two statements are true about IDS Signatures? (Choose two.)
AUsers can upload their own IDS signature definitions.
BAn IDS signature contains data used to identify the creator of known exploits and vulnerabilities.
CIDS signatures can be High Risk, Suspicious, Low Risk and Trustworthy.
DAn IDS signature contains data used to identify known exploits and vulnerabilities.
EAn JDS signature contains a set of instructions that determine which traffic is analyzed.
Which of the two following characteristics about NAT64 are true? (Choose two.)
ANAT64 is stateless and requires gateways to be deployed in active-standby mode.
BNAT64 is supported on Tier-1 gateways only.
CNAT64 is supported on Tier-0 and Tier-1 gateways.
DNAT64 requires the Tier-1 gateway to be configured in active-standby mode.
ENAT64 requires the Tier-1 gateway to be configured in active-active mode.
Which command is used to set the NSX Manager's logging-level to debug mode for troubleshooting?
Aset service manager logging-level debug
Bset service nsx-manager logging-level debug
Cset service nsx-manager log-level debug
Dset service manager log-level debug
Which two logical router components span across all transport nodes? (Choose two.)
ADISTRIBUTED_ROUTER_TIER1
BTIER0_DISTRIBUTED_ROUTER
CSERVICE_ROUTER_TIER0
DDISTRIBUTED_ROUTER_TIER0
ESERVICE_ROUTER_TIER1
Which two choices are solutions offered by the VMware NSX portfolio? (Choose two.)
AVMware Aria Automation
BVMware NSX Distributed IDS/IPS
CVMware NSX Advanced Load Balancer
DVMware Tanzu Kubernetes Grid
EVMware Tanzu Kubernetes Cluster
An administrator has been tasked with implementing the SSL certificates for the NSX Manager Cluster VIP.
Which is the correct way to implement this change?
ASend an API call to https://<nsx-mgr>/api/v1/cluster/api-certificate? action=set_cluster_certificate&certificate_id=<certificate_id>
BSend an API call to https://<nsx-mgr>/api/v1/node/services/http? action=apply_certificate&certificate_id=<certificate_id>
CSSH as admin into the NSX manager with the cluster VIP IP and run nsxcli cluster certificate vip install <certificate_id>
DSSH as admin into the NSX manager with the cluster VIP IP and run nsxcli cluster certificate node install <certificate_id>
Which CLI command shows syslog on NSX Manager?
Ashow log manager follow
Bget log-file syslog
C/var/log/syslog/syslog.log
Dget log-file auth.log
Which VPN type must be configured before enabling a L2VPN?
ASSL-based IPSec VPN
BRoute-based IPSec VPN
CPort-based IPSec VPN
DPolicy-based IPSec VPN
A company security policy requires all users to log into applications using a centralized authentication system.
Which two authentication, authorization, and accounting (AAA) systems are available when integrating NSX with VMware Identity Manager? (Choose two.)