Which domain does vSphere/ESXi virtualize for the Software-Defined Data Center (SDDC)?
A. Applications
B. Storage
C. Compute
D. Network
How can the legacy physical network be simple, stable and reliable when network abstraction is implemented?
A. By leveraging the existing physical devices without configuration changes
B. By automating services for provisioning new services.
C. By configuring new VLANs.
D. By integrating third-party devices with the existing infrastructure.
Which logical networking service does NSX Edge use to change source of destination IP addresses and TCP/UDP port numbers that are found in the flow of a packet header?
A. Load balancing
B. Dynamic Host Configuration Protocol (DHCP)
C. Network Address Translation (NAT)
D. VPN
Which feature of NSX Edge Services Gateway (ESG) offers SSL-secured Layer 2 extension technology over any IP network for vCloud Director?
A. Logical Router.
B. Logical Layer 2 VPN.
C. Logical Load Balancer.
D. Logical Firewall,
What is the maximum number of instances that VMware NSX can extend for the networking and security of either within or across data centers?
A. Nine
B. Eight
C. Seven
D. Five
Which three statements are true about NSX Distributed Firewall? (Choose three.)
A. ft provides East-West stateful Layer 2 - Layer 4 firewall
B. it allows you to create access control policies based on VMware vCenter Server objects
C. such as data centers and clustersDC ft works as perimeter security firewall.
D. It provides North-South stateful Layer 3 - Layer 4 firewall.
E. It is virtualization-aware firewall.
Which port in a vSphere Standard Switch is used to connect Virtual NIC (vNIC)?
A. vNIC
B. Physical
C. Uplink
D. VMKernel
Which internet security protocol does NSX Edge use to interoperate with all major VPN vendors' equipment?
A. TLS
B. TCP/IP
C. HTTPS
D. IPSec
How does Software-Defined Data Center (SDDC) facilitate easy provisioning and management of the underlying physical resources?
A. Organizes physical resources into logical pools.
B. Calculate the number of users.
C. Organizes physical resources into clusters
D. Uses predetermined policies and rules.
What are the two operational modes available with VMware NSX balancer (Choose two.)
A. Proxy
B. Setup
C. Baseline
D. inline
A security policy is a collection of security services of firewall rules, or both. Which security service is applied to virtual machines to ensure data security?
A. Virtual machine
B. Guest Introspection
C. Network Introspection
D. SpoofGuard
What are two functions of a DLR control VM (Choose two.)
A. Communicates with the NSX manager and sends routing updates to the NSX controller.
B. Performs Address Resolution Protocol (ARP) entry lookup.
C. Establishes routing protocol sessions with other routers.
D. Forms adjacencies with edge routing peers.
Which NSX component enforces security rules between two virtual machines that are on the same Layer 2 segment?
A. NSX Manager
B. Distributed Router
C. NSX distributed Firewall
D. NSX Controller
Which technique best explains the use of the grained policies and network to enable security inside the data center?
A. Micro-division
B. Bifurcation
C. Dissection
D. Micro-segmentation
What are the two core components that VMware NSX leverages for North-South traffic flow with an external network? (Choose two.)
A. vSphere Standard switch
B. Edge Services Gateway (ESG)
C. vSphere Controller
D. DLR Control VM