Which of the two following characteristics about NAT64 are true? (Choose two.)
A. NAT64 is stateless and requires gateways to be deployed in active-standby mode.
B. NAT64 is supported on Tier-1 gateways only.
C. NAT64 is supported on Tier-0 and Tier-1 gateways.
D. NAT64 requires the Tier-1 gateway to be configured in active-standby mode.
E. NAT64 requires the Tier-1 gateway to be configured in active-active mode.
What are two valid options when configuring the scope of a distributed firewall rule? (Choose two.)
A. DFW
B. Tier-1 Gateway
C. Segment
D. Segment Port
E. Group
Which two choices are use cases for Distributed Intrusion Detection? (Choose two.)
A. Use agentless antivirus with Guest Introspection.
B. Quarantine workloads based on vulnerabilities.
C. Identify risk and reputation of accessed websites.
D. Gain Insight about micro-segmentation traffic flows.
E. Identify security vulnerabilities in the workloads.
NSX improves the security of today's modern workloads by preventing lateral movement, which feature of NSX can be used to achieve this?
A. Network Segmentation
B. Virtual Security Zones
C. Edge Firewalling
D. Dynamic Routing
Which Is the only supported mode In NSX Global Manager when using Federation?
A. Controller
B. Policy
C. Proxy
D. Proton
Which CLI command is used for packet capture on the ESXi Node?
A. tcpdump
B. debug
C. pktcap-uw
D. set capture
An NSX administrator is reviewing syslog and notices that Distributed Firewall Rules hit counts are not being logged.
What could cause this issue?
A. Syslog is not configured on the ESXi transport node.
B. Zero Trust Security is not enabled.
C. Syslog is not configured on the NSX Manager.
D. Distributed Firewall Rule logging is not enabled.
Refer to the exhibit.
An administrator would like to change the private IP address of the NAT VM I72.l6.101.il to a public address of 80.80.80.1 as the packets leave the NAT-Segment network.
Which type of NAT solution should be implemented to achieve this?
A. DNAT
B. SNAT
C. Reflexive NAT
D. NAT64
Which statement is true about an alarm in a Suppressed state?
A. An alarm can be suppressed for a specific duration in seconds.
B. An alarm can be suppressed for a specific duration in days.
C. An alarm can be suppressed for a specific duration in minutes.
D. An alarm can be suppressed for a specific duration in hours.
Which is an advantages of a L2 VPN In an NSX 4.x environment?
A. Enables Multi-Cloud solutions
B. Achieve better performance
C. Enables VM mobility with re-IP
D. Use the same broadcast domain