欢迎来到尧图网

客户服务 关于我们

您的位置:首页 > 文旅 > 明星 > VMware NSX 4.X Professional V2(2V0-41.24)题库

VMware NSX 4.X Professional V2(2V0-41.24)题库

2025/2/22 19:38:53 来源:https://blog.csdn.net/weixin_39935442/article/details/145787889  浏览:    关键词:VMware NSX 4.X Professional V2(2V0-41.24)题库

What is the VMware recommended way to deploy a virtual NSX Edge Node?
A. Through the NSX UI
B. Through automated or interactive mode using an ISO
C. Through the vSphere Web Client
D. Through the OVF command line tool
答案: A
解析:Install NSX Edge on an ESXi host using NSX Manager UI (recommended method),
https://docs.vmware.com/en/VMware-NSX/4.1/installation/GUID-E9A01C68-93E7-4140-B306-19CD6806199F.html

Which three selections are capabilities of Network Topology? (Choose three.)
A. Display how the different NSX components are interconnected.
B. Display the VMs connected to Segments.
C. Display how the Physical components are interconnected.
D. Display the uplinks configured on the Tier-1 Gateways.
E. Display the uplinks configured on the Tier-0 Gateways.
答案:ABE
解析:
According to the VMware NSX Documentation, these are three of the capabilities of Network Topology, which is a graphical representation of your network infrastructure in NSX:
* Display how the different NSX components are interconnected: You can use Network Topology to view how your segments, gateways, routers, firewalls, load balancers, VPNs, and other NSX components are connected and configured in your network.
* Display the uplink configured on the Tier-0 Gateways: You can use Network Topology to view the uplink interface and segment that connect your tier-0 gateways to your physical network. You can also view the VLAN ID and IP address of the uplink interface.
* Display the VMs connected to Segments: You can use Network Topology to view the VMs that are attached to your segments. You can also view the IP address and MAC address of each VM.

An NSX administrator has deployed a single NSX Manager node and will be adding two additional nodes to form a 3-node NSX Management Cluster for a production environment. The administrator will deploy these two additional nodes and Cluster VIP using the NSX UI.
What two are the prerequisites for this configuration? (Choose two.)
A. The cluster configuration must be completed using API.
B. All nodes must be in the same subnet.
C. All nodes must be in separate subnets.
D. A compute manager must be configured.
E. NSX Manager must reside on a Windows Server.
答案:BD

Which two commands does an NSX administrator use to check the IP address of the VMkernel port for the Geneve protocol on the ESXi transport node? (Choose two.)
A. net-dvs
B. esxcfg-nics -l
C. esxcli network ip interface ipv4 get
D. esxcfg-vmknic -l
E. esxcli network nic list
答案:CD

Which two are supported by L2 VPN clients? (Choose two.)
A. NSX Autonomous Edge
B. NSX Edge
C. NSX for vSphere Edge
D. 3rd party Hardware VPN Device
答案:AB
解析:
The following L2 VPN clients are recommended:
1. NSX Managed NSX Edge in a separate NSX Managed environment.
• Overlay and VLAN segments can be extended.
2. Autonomous Edge:
• Enables L2 VPN access from a non-a NSX environment to NSX environments.
• Deployed by using an OVF file on a host that is not managed by NSX.
• Only VLAN segments can be extended.

As part of an organization’s IT security compliance requirement, NSX Manager must be configured for 2FA (two-factor authentication).
What should an NSX administrator have ready before the integration can be configured?
A. Active Directory LDAP integration with ADFS
B. VMware Identity Manager with NSX added as a Web Application
C. VMware Identity Manager with an OAuth Client added
D. Active Directory LDAP integration with OAuth Client added
答案:C

What should an NSX administrator check to verify that VMware Identity Manager integration is successful?
A. From the NSX UI the status of the VMware Identity Manager Integration must be “Enabled”.
B. From the NSX CLI the status of the VMware Identity Manager Integration must be “Configured”.
C. From VMware Identity Manager the status of the remote access application must be green.
D. From the NSX UI the URI in the address bar must have “local=false” part of it.
答案:A

An administrator has been tasked with implementing the SSL certificates for the NSX Manager Cluster VIP.
Which is the correct way to implement this change?
A. Send an API call to https://<nsx-mgr>/api/vl/cluster/api-certificate?action=set_cluster_certificate&certificate_id=<certificate_id>
B. Send an API call to https://<nsx-mgr>/api/vl/node/services/http?action=apply_certificate&certificate_id=<certificate_id>
C. SSH as admin into the NSX manager with the cluster VIP IP and run nsxcli cluster certificate node install <certificate_id>
D. SSH as admin into the NSX manager with the cluster VIP IP and run nsxcli cluster certificate vip install <certificate_id>
答案:D

What is VMware’s recommendation for the minimum MTU requirements when planning an NSX deployment?
A. MTU should be set to 1700 or greater across the data center network including inter-data center connections.
B. MTU should be set to 1500 or less only on inter-data center connections.
C. Configure Path MTU Discovery and rely on fragmentation.
D. MTU should be set to 1550 or less across the data center network including inter-data center connections.
答案:A
解析:VMware recommends setting the MTU to at least 1700 bytes to ensure optimal performance and to future-proof the environment. This helps accommodate various functions and potential expansions

In which VPN type are the Virtual Tunnel interfaces (VTI) used?
A. SSL-based VPN
B. Route & SSL based VPNs
C. Policy & Route based VPNs
D. Route-based VPN
答案:D

In an NSX environment, an administrator is observing low throughput and congestion between the Tier-0 Gateway and the upstream physical routers.
Which two actions could address low throughput and congestion? (Choose two.)
A. Configure ECMP on the Tier-0 gateway.
B. Configure a Tier-1 gateway and connect it directly to the physical routers.
C. Deploy Large size Edge node/s.
D. Configure NAT on the Tier-0 gateway.
E. Add an additional vNIC to the NSX Edge node.
答案:AC

A company security policy requires all users to log into applications using a centralized authentication system.
Which two authentication, authorization, and accounting (AAA) systems are available when integrating NSX with VMware Identity Manager? (Choose two.)
A. RSA SecureID
B. SecureDAP
C. RADII 2.0
D. LDAP and OpenLDAP based on Active Directory (AD)
E. Keygen Enterprise
答案:AD

An NSX administrator would like to export syslog events that capture messages related to NSX host preparation events.
Which message ID (msgid) should be used in the syslog export configuration command as a filter?
A. FABRIC
B. SYSTEM
C. GROUPING
D. MONITORING
答案:A

An NSX administrator wants to create a Tier-0 Gateway to support equal cost multi-path (ECMP) routing.
Which failover detection protocol must be used to meet this requirement?
A. Host Standby Router Protocol (HSRP)
B. Beacon Probing (BP)
C. Virtual Router Redundancy Protocol (VRRP)
D. Bidirectional Forwarding Detection (BFD)
答案:D

An administrator has connected two virtual machines on the same overlay segment. Ping between both virtual machines is successful.
What type of network boundary does this represent?
A. Layer 2 bridge
B. Layer 2 broadcast domain
C. Layer 2 VPN
D. Layer 3 route
答案:B

版权声明:

本网仅为发布的内容提供存储空间,不对发表、转载的内容提供任何形式的保证。凡本网注明“来源:XXX网络”的作品,均转载自其它媒体,著作权归作者所有,商业转载请联系作者获得授权,非商业转载请注明出处。

我们尊重并感谢每一位作者,均已注明文章来源和作者。如因作品内容、版权或其它问题,请及时与我们联系,联系邮箱:809451989@qq.com,投稿邮箱:809451989@qq.com

热搜词