Which would best describe a workload in Compute Cluster 1 attached to a logical switch port group?
Which would best describe a workload in Compute Cluster 1 attached to a logical switch port group? A . Within Compute Cluster 1, Layer 2 would function, but Layer 3 would fail.B . Within Compute Cluster 1, Layer 2 would fail, and Layer 3 would fail.C . Within Compute Cluster...
How is high availability of the NSX Edge Gateway accomplished?
How is high availability of the NSX Edge Gateway accomplished?A . HA Application Monitoring on the Edge Gateway sends a heartbeat to the ESXi host.B . VMware Tools on the Edge Gateway sends a heartbeat to the ESXi host.C . The Edge appliance sends a heartbeat through an uplink interface.D...
Which three objects are supported for universal synchronization in a Cross-vCenter NSX deployment? (Choose three.)
Which three objects are supported for universal synchronization in a Cross-vCenter NSX deployment? (Choose three.)A . IP PoolsB . IP SetsC . L2 bridgesD . MAC SetsE . Transport ZonesView AnswerAnswer: BDE Explanation: Reference: https://pubs.vmware.com/NSX-62/index.jsp?topic=%2Fcom.vmware.nsx-cross-vcenterinstall.doc%2FGUID-35831055-57D8-4F2F-95BA-8EFE5362746C.html
When specifying a source for a security rule, what is the purpose of the Negate Source check box?
When specifying a source for a security rule, what is the purpose of the Negate Source check box? A . If Negate Source is selected, the rule is sent to only the objects identified under object type.B . If Negate Source is selected, the rule is applied to traffic coming...
When creating a new security policy how is the default weight determined?
When creating a new security policy how is the default weight determined?A . The default weight is equal to the highest defined weight minus 1000.B . The default weight is equal to the highest defined weight plus 1000.C . The default weight is equal to the highest defined weight.D ....
Which two modes are associated with this type of policy?
An administrator creates a SpoofGuard policy for specific networks. Which two modes are associated with this type of policy? (Choose two.)A . Automatically trust IP assignments on their first useB . Manually inspect and approve all IP assignments before useC . Manually approve IP assignments listed in the Host file...
Which term describes a situation where a bottleneck is created when traffic is sent to a single device for security enforcement?
Which term describes a situation where a bottleneck is created when traffic is sent to a single device for security enforcement?A . security event queueingB . hairpinningC . security loopingD . enforcement degradationView AnswerAnswer: A
Where can firewall rules be applied on the NSX Edge Services Gateway?
Where can firewall rules be applied on the NSX Edge Services Gateway?A . Rules can be applied on the uplink interface only.B . Rules can be applied on either the uplink interface or internal interface.C . Rules can be on either the uplink, internal, or management interfaces.D . Rules can...
What is one of the benefits of using logical switches in an NSX environment?
What is one of the benefits of using logical switches in an NSX environment?A . Quality of Service parameters are automatically configured in a logical switch.B . The physical infrastructure is responsible for maintaining the logical switch broadcast tables.C . The physical infrastructure is not constrained by MAC/FIB table limits.D...
Which is required to support unicast mode in NSX?
Which is required to support unicast mode in NSX?A . Hardware VTEPB . Distributed Logical RouterC . NSX ControllerD . NSX EdgeView AnswerAnswer: C Explanation: Reference: http://www.virtually-limitless.com/vcix-nv-study-guide/create-transport-zones-in-nsx/