When a stateful service is enabled for the first lime on a Tier-0 Gateway, what happens on the NSX Edge node'
Which two statements are correct about East-West Malware Prevention? (Choose two.)
What are two valid options when configuring the scope of a distributed firewall rule? (Choose two.)
A customer is preparing to deploy a VMware Kubernetes solution in an NSX environment.
What is the minimum MTU size for the UPLINK profile?
When collecting support bundles through NSX Manager, which files should be excluded for potentially containing sensitive information?
A customer has a network where BGP has been enabled and the BGP neighbor is configured on the Tier-0 Gateway. An NSX administrator used the get gateways command to retrieve this Information:
Which two commands must be executed to check BGP neighbor status? (Choose two.)
Which troubleshooting step will resolve an error with code 1001 during the configuration of a time-based firewall rule?
The security administrator turns on logging for a firewall rule.
Where is the log stored on an ESXi transport node?
Which three of the following describe the Border Gateway Routing Protocol (BGP) configuration on a Tier-0 Gateway? (Choose three.)
A company Is deploying NSX micro-segmentation in their vSphere environment to secure a simple application composed of web. app, and database tiers.
The naming convention will be:
• WKS-WEB-SRV-XXX
• WKY-APP-SRR-XXX
• WKI-DB-SRR-XXX
What is the optimal way to group them to enforce security policies from NSX?
Which three data collection sources are used by NSX Network Detection and Response to create correlations/Intrusion campaigns? (Choose three.)
Which steps are required to activate Malware Prevention on the NSX Application Platform?
Which two BGP configuration parameters can be configured in the VRF Lite gateways? (Choose two.)
An architect receives a request to apply distributed firewall in a customer environment without making changes to the network and vSphere environment. The architect decides to use Distributed Firewall on VDS.
Which two of the following requirements must be met in the environment? (Choose two.)
Which two choices are solutions offered by the VMware NSX portfolio? (Choose two.)
A security administrator needs to configure a firewall rule based on the domain name of a specific application.
Which field in a distributed firewall rule does the administrator configure?
What must be configured on Transport Nodes for encapsulation and decapsulation of Geneve protocol?
Which CLI command on NSX Manager and NSX Edge is used to change NTP settings?
Which two steps must an NSX administrator take to integrate VMware Identity Manager in NSX to support role-based access control? (Choose two.)
How is the RouterLink port created between a Tier-1 Gateway and Tier-O Gateway?
Which two logical router components span across all transport nodes? (Choose two.)
Which choice is a valid insertion point for North-South network introspection?
Refer to the exhibits.
Drag and drop the NSX graphic element icons on the left found in an NSX Intelligence visualization graph to Its correct description on the right.
Which two of the following are used to configure Distributed Firewall on VDS? (Choose two.)
An administrator wants to validate the BGP connection status between the Tier-O Gateway and the upstream physical router.
What sequence of commands could be used to check this status on NSX Edge node?