What needs to be deployed before configuring the identity Firewall?
A. Network Introspection
B. Data Security
C. LDAP Integration
D. Guest Introspection
When deploying a standalone NSX Edge as a Layer 2 VPN client, which port needs to be configured on the client vSphere Distributed Switch?
A. Trunk port
B. Span port
C. Sink port
D. Mirror port
Which virtual machine does VMware recommend be manually excluded from the Distributed Firewall?
A. NSX Manager
B. Microsoft SQL Server
C. vRealize Automation Appliance
D. vCenter Server
Which action is not an option for adding Virtual Machines to a Security Group?
A. Adding Virtual Machines to a Security Group and nesting it within another Security Group.
B. Defining Dynamic Membership in the Security Group.
C. Adding Virtual Machines to a Security Policy and associating it with a Security Group.
D. Selecting objects to include within a Security Group.
Which three ways can membership be defined in a dynamic security group? (Choose three.)
A. Distributed Firewall Rules
B. Locale ID
C. Security Tags
D. Security Groups
E. Regular Expressions
An NSX administrator is creating a filter as shown below.
What would be the purpose of creating a filter?
A. To quickly add a new rule.
B. To temporarily filter traffic.
C. To quickly remove a rule.
D. To quickly identify rules.
Which details can an administrator verify from the Summary tab of the VMware NSX Manager? (Choose three.)
A. Current time
B. Average MTBF
C. Version
D. Storage utilization
E. Health Score
A security administrator needs to create a Security Group based on an Active Directory group. However, AD Groups are not available as an option. What must the administrator configure before AD Groups are available?
A. Guest Introspection virtual machines must be joined to the domain
B. Inventory Service must be registered with a domain account
C. NSX Manager must be registered with Active Directory
D. NSX Controller must be registered with Active Directory
What is one of the benefits of a spine-leaf network topology?
A. A loop prevention protocol is not required.
B. Automatic propagation of security policies to all nodes.
C. Allows for VXLANs to be defined in a traditional network topology.
D. Network virtualization relies on spine leaf topologies to create logical switches.
What can be enabled on the vSphere Distributed Switch to monitor IP packets that are passing through a distributed port group?
A. Traffic Marking
B. TraceFlow
C. Traffic Filtering
D. NetFlow