Sort the rule processing steps of the Distributed Firewall. Order responses from left to right.
Which two BGP configuration parameters can be configured in the VRF Lite gateways? (Choose two.)
Refer to the exhibit.
An administrator would like to change the private IP address of the NAT VM 172.16.101.11 to a public address of 80.80.80.1 as the packets leave the NAT-Segment network.
Which type of NAT solution should be implemented to achieve this?
Refer to the exhibits.
Drag and drop the NSX graphic element icons on the left found in an NSX Intelligence visualization graph to Its correct description on the right.
A customer is preparing to deploy a VMware Kubernetes solution in an NSX environment.
What is the minimum MTU size for the UPLINK profile?
In an NSX environment, an administrator is observing low throughput and congestion between the Tier-0 Gateway and the upstream physical routers.
Which two actions could address low throughput and congestion? (Choose two.)
An NSX administrator is troubleshooting a connectivity issue with virtual machines running on an ESXi transport node.
Which feature in the NSX UI shows the mapping between the virtual NIC and the host’s physical adapter?
Which VMware NSX Portfolio product can be described as a distributed analysis solution that provides visibility and dynamic security policy enforcement for NSX environments?
Which two commands does an NSX administrator use to check the IP address of the VMkernel port for the Geneve protocol on the ESXi transport node? (Choose two.)
Which of the following statements is true regarding the use of a Dynamic Routing Protocol on a Tier-1 Gateway?
An NSX administrator would like to create an L2 segment with the following requirements:
• L2 domain should not exist on the physical switches.
• East/West communication must be maximized as much as possible.
Which type of segment must the administrator choose?
What is the most restrictive NSX built-in role which will allow a user to apply configuration changes on an NSX Edge?
What are four NSX built-in rote-based access control (RBAC) roles? (Choose four.)
Which two steps must an NSX administrator take to integrate VMware Identity Manager in NSX to support role-based access control? (Choose two.)
An NSX administrator noticed that the nsxcli command times out after 600 secs of idle time.
Which CLI command disables the nsxcli time out value on NSX Manager?
A company Is deploying NSX micro-segmentation in their vSphere environment to secure a simple application composed of web. app, and database tiers.
The naming convention will be:
• WKS-WEB-SRV-XXX
• WKY-APP-SRR-XXX
• WKI-DB-SRR-XXX
What is the optimal way to group them to enforce security policies from NSX?
Which two statements are correct about East-West Malware Prevention? (Choose two.)
Which command is used to display the network configuration of the Tunnel Endpoint (TEP) IP on a bare metal transport node?
Which NSX CLI command is used to change the authentication policy for local users?
Which of the following exist only on Tler-1 Gateway firewall configurations and not on Tier-0?
As part of an organization’s IT security compliance requirement, NSX Manager must be configured for 2FA (two-factor authentication).
What should an NSX administrator have ready before the integration can be configured?
Which two choices are solutions offered by the VMware NSX portfolio? (Choose two.)
Which three protocols could an NSX administrator use to transfer log messages to a remote log server? (Choose three.)
Which NSX feature can be leveraged to achieve consistent policy configuration and simplicity across sites?