Get Full Version of the Exam Question No.41What are the three functional planes of the VMware NSX architecture? (Choose three.)RoutingControlDataIntegrationManagementCorrect Answer: BCE Question No.42Which three statements are true about Transport Zone? (Choose three.)it defines the VXLAN tunnel endpoint (VTEP) members of the VXLAN overlay.It controls the hosts that a logical switch can reach and can span one or more vSphere clusters.It is a solution of ESXi Read more [...]
Get Full Version of the Exam Question No.31What is the total volume of traffic per Distributed Logical Router (DLR) that issupported by the Equal Cost Multipath (ECMP) model?20GB50 GB80 GB40 GBCorrect Answer: A Question No.32What are the two operational modes available with VMware NSX balancer? (Choose two.)ProxySetupBaselineinlineCorrect Answer: AD Question No.33Which NSX component enforces security rules between two virtual machines that are on the same Read more [...]
Get Full Version of the Exam Question No.21What are two functions of a DLR control VM? (Choose two.)Communicates with the NSX manager and sends routing updates to the NSX controller.Performs Address Resolution Protocol (ARP) entry lookup.Establishes routing protocol sessions with other routers.Forms adjacencies with edge routing peers.Correct Answer: AD Question No.22What are the two main limitations of a vSphere Standard Switch? (Choose two.)Centralized managementVirtual Read more [...]
Get Full Version of the Exam Question No.11An administrator has deployed Distributed Firewall to protect their infrastructure from security threats. Due to extreme loads on the network the CPU is saturated and the memory becomes full. In this scenario, which mode does the Distributed Firewall enter?SecondaryFail openProxyFail closeCorrect Answer: B Question No.12What does a Layer 3 VPN service, which is used by a remote client, use to leverage SSL tunnels Read more [...]
Get Full Version of the Exam Question No.1What is the common practice that I followed when a new application is deployed in legacy networking?The application is mapped to users upfront.The physical network is updated by the network team each time.Recourse allocation is reconfigured based on the application requirement.Firewall and Intrusion Prevention System (IPS) solutions are switched off during the first deployment cycle.Correct Answer: C Question No.2Which Read more [...]