ExamGecko
Home Home / VMware / 2V0-41.23

VMware 2V0-41.23 Practice Test - Questions Answers, Page 8

Question list
Search
Search

An administrator has connected two virtual machines on the same overlay segment. Ping between both virtual machines is successful. What type of network boundary does this represent?

A.
Layer 2 VPN
A.
Layer 2 VPN
Answers
B.
Layer 2 bridge
B.
Layer 2 bridge
Answers
C.
Layer 2 broadcast domain
C.
Layer 2 broadcast domain
Answers
D.
Layer 3 route
D.
Layer 3 route
Answers
Suggested answer: C

Explanation:

An overlay segment is a logical construct that provides Layer 2 connectivity between virtual machines that are attached to it.An overlay segment can span multiple hosts and can be extended across different subnets or locations using Geneve encapsulation3. Therefore, two virtual machines on the same overlay segment belong to the same Layer 2 broadcast domain, which means they can communicate with each other using their MAC addresses without requiring any routing. The other options are incorrect because they involve Layer 3 or higher network boundaries, which require routing or tunneling to connect different segments.References:VMware NSX Documentation

Which CLI command on NSX Manager and NSX Edge is used to change NTP settings?

A.
get timezone
A.
get timezone
Answers
B.
get time-server
B.
get time-server
Answers
C.
set timezone
C.
set timezone
Answers
D.
set ntp-server
D.
set ntp-server
Answers
Suggested answer: D

Explanation:

The CLI command on NSX Manager and NSX Edge that is used to change NTP settings isset ntp-server.This command allows the user to configure one or more NTP servers for time synchronization12. The other options are incorrect because they are not valid CLI commands for changing NTP settings.Theget timezoneandset timezonecommands are used to display and configure the timezone of the system1.Theget time-servercommand is used to display the current time server configuration1. There are no CLI commands for using RADIUS or BootP for NTP settings.References:NSX-T Command-Line Interface Reference,vSphere ESXi 7.0 U3 and later versions NTP configuration steps

When deploying an NSX Edge Transport Node, what two valid IP address assignment options should be specified for the TEP IP addresses? (Choose two.)

A.
Use an IP Pool
A.
Use an IP Pool
Answers
B.
Use a DHCP Server
B.
Use a DHCP Server
Answers
C.
Use RADIUS
C.
Use RADIUS
Answers
D.
Use a Static IP List
D.
Use a Static IP List
Answers
E.
Use BootP
E.
Use BootP
Answers
Suggested answer: A, D

Explanation:

When deploying an NSX Edge Transport Node, two valid IP address assignment options that should be specified for the TEP IP addresses areUse an IP PoolandUse a Static IP List.These options allow the user to assign TEP IP addresses from a predefined range of IP addresses or a manually entered list of IP addresses, respectively345. The other options are incorrect because they are not supported methods for assigning TEP IP addresses.There is no option to use a DHCP server, RADIUS, or BootP for TEP IP address assignment in NSX-T345.References:NSX-T Edge TEP networking options,Multi-TEP High Availability,Create an IP Pool for Host Tunnel Endpoint IP Addresses

DRAG DROP

Match the NSX Intelligence recommendations with their correct purpose.

Answer:

Question 74
Correct answer: Question 74

Which field in a Tier-1 Gateway Firewall would be used to allow access for a collection of trustworthy web sites?

A.
Source
A.
Source
Answers
B.
Profiles -> Context Profiles
B.
Profiles -> Context Profiles
Answers
C.
Destination
C.
Destination
Answers
D.
Profiles -> L7 Access Profile
D.
Profiles -> L7 Access Profile
Answers
Suggested answer: D

Explanation:

The field in a Tier-1 Gateway Firewall that would be used to allow access for a collection of trustworthy web sites isProfiles -> L7 Access Profile.This field allows the user to create a Layer 7 access profile that defines a list of allowed or blocked URLs based on categories, reputation, or custom entries1.The user can then apply the L7 access profile to a firewall rule to control the traffic based on the URL filtering criteria1. The other options are incorrect because they are not related to URL filtering.The Source field specifies the source IP address or group of the firewall rule1.The Destination field specifies the destination IP address or group of the firewall rule1.The Profiles -> Context Profiles field allows the user to create a context profile that defines a list of application signatures or attributes that can be used to identify and classify network traffic1.References:Gateway Firewall

An NSX administrator is reviewing syslog and notices that Distributed Firewall Rules hit counts are not being logged.

What could cause this issue?

A.
Syslog is not configured on the ESXi transport node.
A.
Syslog is not configured on the ESXi transport node.
Answers
B.
Zero Trust Security is not enabled.
B.
Zero Trust Security is not enabled.
Answers
C.
Syslog is not configured on the NSX Manager.
C.
Syslog is not configured on the NSX Manager.
Answers
D.
Distributed Firewall Rule logging is not enabled.
D.
Distributed Firewall Rule logging is not enabled.
Answers
Suggested answer: D

Explanation:

https://docs.vmware.com/en/VMware-NSX/4.0/administration/GUID-D57429A1-A0A9-42BE-A299-0C3C3546ABF3.html

When running nsxcli on an ESXi host, which command will show the Replication mode?

A.
get logical-switch <Local-Switch-UUID> status
A.
get logical-switch <Local-Switch-UUID> status
Answers
B.
get logical-switch <Logical-Switch-UUID>
B.
get logical-switch <Logical-Switch-UUID>
Answers
C.
get logical-switches
C.
get logical-switches
Answers
D.
get logical-switch status
D.
get logical-switch status
Answers
Suggested answer: C

Explanation:

https://vdc-download.vmware.com/vmwb-repository/dcr-public/c3fd9cef-6b2b-4772-93be-3fe60ce064a1/1f67b9e1-b111-4de7-9ea1-39931d28f560/NSX-T%20Command-Line%20Interface%20Reference.html#get%20logical-switch%20%3Clogical-switch-id%3E

An administrator is configuring service insertion for Network Introspection.

Which two places can the Network Introspection be configured? (Choose two.)

A.
Host pNIC
A.
Host pNIC
Answers
B.
Partner SVM
B.
Partner SVM
Answers
C.
Tier-0 gateway
C.
Tier-0 gateway
Answers
D.
Tier-1 gateway
D.
Tier-1 gateway
Answers
E.
Edge Node
E.
Edge Node
Answers
Suggested answer: A, B

Explanation:

Network Introspection is a service insertion feature that allows third-party network security services to monitor and analyze the traffic between virtual machines. Network Introspection can be configured on the host pNIC or on the partner SVM, depending on the type of service and the deployment model. The host pNIC configuration is used for services that require traffic redirection from the physical network to the service virtual machine. The partner SVM configuration is used for services that require traffic redirection from the virtual network to the service virtual machine. Network Introspection cannot be configured on the Tier-0 or Tier-1 gateways, as they are not part of the data plane where the service insertion occurs. Network Introspection also cannot be configured on the edge node, as it is a logical construct that hosts the Tier-0 and Tier-1 gateways.References:Distributed Service Insertion,NSX Securing ''Anywhere'' Part IV

Which CLI command would an administrator use to allow syslog on an ESXi transport node when using the esxcli utility?

A.
esxcli network firewall ruleset set -r syslog -e true
A.
esxcli network firewall ruleset set -r syslog -e true
Answers
B.
esxcli network firewall ruleset -e syslog
B.
esxcli network firewall ruleset -e syslog
Answers
C.
esxcli network firewall ruleset set -r syslog -e false
C.
esxcli network firewall ruleset set -r syslog -e false
Answers
D.
esxcli network firewall ruleset set -a -e false
D.
esxcli network firewall ruleset set -a -e false
Answers
Suggested answer: A

Explanation:

To allow syslog on an ESXi transport node, the administrator needs to use the esxcli utility to enable the syslog ruleset in the ESXi firewall. The correct syntax for this command isesxcli network firewall ruleset set -r syslog -e true, where-rspecifies the ruleset name and-especifies whether to enable or disable it. The other options are incorrect because they either use an invalid syntax, such as omitting the ruleset name or using-ainstead of-r, or they disable the syslog ruleset instead of enabling it, which is the opposite of what the question asks.References: [ESXi Firewall Command-Line Interface], [Configure Syslog on ESXi Hosts]

An administrator has a requirement to have consistent policy configuration and enforcement across NSX instances.

What feature of NSX fulfills this requirement?

A.
Load balancer
A.
Load balancer
Answers
B.
Federation
B.
Federation
Answers
C.
Multi-hypervisor support
C.
Multi-hypervisor support
Answers
D.
Policy-driven configuration
D.
Policy-driven configuration
Answers
Suggested answer: B

Explanation:

Federation is a feature of NSX that allows the administrator to manage multiple NSX instances with a single pane of glass view, create gateways and segments that span one or more locations, and configure and enforce firewall rules consistently across locations1.Federation provides centralized policy management for security and networking services for all locations and pushes it down to NSX Local Managers at the respective sites for enforcement1.Federation also enables disaster recovery and workload mobility scenarios by providing consistent network and security policies across different sites1.References:1: NSX Federation - VMware Docs(https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.2/administration/GUID-D5B6DC79-6733-44A7-8072-50221CF2122A.html)

Total 107 questions
Go to page: of 11