ExamGecko
Home Home / VMware / 2V0-41.20

VMware 2V0-41.20 Practice Test - Questions Answers, Page 5

Question list
Search
Search

Related questions











Which CLI command is used to start the NSX Manager virtual machine in the KVM environment?

A.
virsh start <NSX-Manager-ID>
A.
virsh start <NSX-Manager-ID>
Answers
B.
virsh poweron <nsx-manager-ID>
B.
virsh poweron <nsx-manager-ID>
Answers
C.
virsh start <NSX-Manager-Name>
C.
virsh start <NSX-Manager-Name>
Answers
D.
virsh poweron <nsx-manager-name>
D.
virsh poweron <nsx-manager-name>
Answers
Suggested answer: C

Which component does the hyperbus interface (vmk50) provide network connectivity to?

A.
containers running on ESXi/KVM transport nodes
A.
containers running on ESXi/KVM transport nodes
Answers
B.
virtual machines and containers running across transport nodes
B.
virtual machines and containers running across transport nodes
Answers
C.
virtual machines running on the same hypervisor
C.
virtual machines running on the same hypervisor
Answers
D.
virtual machines running in the same segment
D.
virtual machines running in the same segment
Answers
Suggested answer: A

When deploying east-west network introspection, which Service Virtual Machine (SVM) deployment method achieves the least amount of traffic hair pinning?

A.
Create a secondary vNIC on each quest VM for SVM communication.
A.
Create a secondary vNIC on each quest VM for SVM communication.
Answers
B.
Place a partner SVM on each compute cluster node.
B.
Place a partner SVM on each compute cluster node.
Answers
C.
Centralize partner SVMs in a service cluster.
C.
Centralize partner SVMs in a service cluster.
Answers
D.
Add partner SVMs to an edge cluster.
D.
Add partner SVMs to an edge cluster.
Answers
Suggested answer: B

Explanation:

"For SVMs deployed on compute hosts, an SVM does not need to be installed on every host. Some customers prefer to deploy the partner SVM on each host to achieve the least amount of traffic hairpinning. When the partner SVM is deployed in a service cluster, traffic is sent from the compute hosts across the overlay to the hosts in the service cluster."

In a NSX-T Data Center environment, an administrator is observing low throughput and congestion between the Tier-0 Gateway and the upstream physical routers.

Which two actions could address low throughput and congestion? (Choose two.)

A.
Deploy Large size Edge node/s.
A.
Deploy Large size Edge node/s.
Answers
B.
Configure ECMP on the Tier-0 gateway.
B.
Configure ECMP on the Tier-0 gateway.
Answers
C.
Configure NAT on the Tier-0 gateway.
C.
Configure NAT on the Tier-0 gateway.
Answers
D.
Add an additional vNIC to the NSX Edge node.
D.
Add an additional vNIC to the NSX Edge node.
Answers
E.
Configure a Tier-1 gateway and connect it directly to the physical routers.
E.
Configure a Tier-1 gateway and connect it directly to the physical routers.
Answers
Suggested answer: A, B

Which three steps must be carried out to configure North-South / East-West Network Inspection?

(Choose three.)

A.
Service Deployment
A.
Service Deployment
Answers
B.
Service Insertion
B.
Service Insertion
Answers
C.
Service Consumption
C.
Service Consumption
Answers
D.
Service Registration
D.
Service Registration
Answers
E.
Service Introspection
E.
Service Introspection
Answers
Suggested answer: A, B, E

Explanation:

Use these steps to configure north-south and east-west Network Introspection:1. Service Registration: Service registration makes a service available in the catalog.2. Service Deployment: Deploy an instance of a registered service.3.

Service Consumption: Use services in a service chain and redirect traffic.Taken from NSX-T ICM 3.0 Lecture Manual.

Which statement describes the VMware Virtual Cloud Network Vision?

A.
Virtual Cloud Network connects and protects virtual machines running in KVM environments.
A.
Virtual Cloud Network connects and protects virtual machines running in KVM environments.
Answers
B.
Virtual Cloud Network connects and protects virtual machines running in vSphere environments.
B.
Virtual Cloud Network connects and protects virtual machines running in vSphere environments.
Answers
C.
Virtual Cloud Network connects and protects applications, regardless of their physical locations.
C.
Virtual Cloud Network connects and protects applications, regardless of their physical locations.
Answers
D.
Virtual Cloud Network connects and protects applications and data, regardless of their physical locations.
D.
Virtual Cloud Network connects and protects applications and data, regardless of their physical locations.
Answers
Suggested answer: D

Which two commands are used to query the arp-table of a logical switch? (Choose two.)

A.
get logical-switch arp-table <logical-switch-uuid>
A.
get logical-switch arp-table <logical-switch-uuid>
Answers
B.
get logical-switch arp-table <vni>
B.
get logical-switch arp-table <vni>
Answers
C.
get logical-switch arp-table
C.
get logical-switch arp-table
Answers
D.
get logical-switch <logical-switch-uuid> arp-table
D.
get logical-switch <logical-switch-uuid> arp-table
Answers
E.
get logical-switch <vni> arp-table
E.
get logical-switch <vni> arp-table
Answers
Suggested answer: D, E

Which two statements describe the characteristics of an Edge Cluster in NSX-T 3.0 Data Center?

(Choose two.)

A.
can have a maximum of 8 edge nodes
A.
can have a maximum of 8 edge nodes
Answers
B.
must have only active-active edge nodes
B.
must have only active-active edge nodes
Answers
C.
can have a maximum of 10 edge nodes
C.
can have a maximum of 10 edge nodes
Answers
D.
can contain multiple types of edge nodes (VM or bare metal)
D.
can contain multiple types of edge nodes (VM or bare metal)
Answers
E.
must contain only one type of edge nodes (VM or bare metal)
E.
must contain only one type of edge nodes (VM or bare metal)
Answers
Suggested answer: C, D

Explanation:

Reference:

https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.0/installation/GUID-14183A62-8E8D-43CC-92E0-E8D72E198D5A.html

A security administrator needs to configure a firewall rule based on the domain name of a specific application. Which field in a distributed firewall rule does the administrator configure?

A.
Profile
A.
Profile
Answers
B.
Source
B.
Source
Answers
C.
Service
C.
Service
Answers
D.
Policy
D.
Policy
Answers
Suggested answer: A

What are the advantages of using a Tier-0 Gateway in ECMP mode? (Choose two.)

A.
stateful services leveraged
A.
stateful services leveraged
Answers
B.
Failover of services
B.
Failover of services
Answers
C.
traffic predictability
C.
traffic predictability
Answers
D.
traffic load balancing
D.
traffic load balancing
Answers
E.
increased north/south bandwidth
E.
increased north/south bandwidth
Answers
Suggested answer: D, E

Explanation:

From ICM manual:

Equal-cost multipath (ECMP) routing has several features and functions:

• ECMP routing increases the north-south communication bandwidth by combining multiple uplinks.

• ECMP routing performs traffic load balancing.

• ECMP routing provides fault tolerance for failed paths.

• A maximum of eight ECMP paths are supported.

• Hashing is based on 2-tuple IP source and destination addresses.

• ECMP routing is only available on Tier-0 gateways.

Total 93 questions
Go to page: of 10