Empower your networking prowess with our comprehensive resources tailored for VMware NSX 4.x Professional certification. Unveil the secrets of NSX-T Data Center with our expertly crafted content covering architecture, design best practices, and advanced features. Master the art of software-defined networking (SDN) and delve into NSX-T deployment, micro-segmentation, and security. Elevate your skills with our VMware Certified Professional-approved materials, offering troubleshooting insights, management tips, and integration strategies. Explore the world of NSX automation, load balancing, and real-world use cases. Whether you’re gearing up for the NSX 4.x Professional Exam or aiming for in-depth knowledge, our NSX-T training resources are your key to success. Transform your networking journey with us – Start your NSX-T mastery today.
Q1. What are two valid BGP Attributes that can be used to influence the route path traffic will take? (Choose two.)
A. AS-Path Prepend
Q2. What are two supported host switch modes? (Choose two.)
A. Overlay Datapath
B. DPDK Datapath
C. Standard Datapath
D. Enhanced Datapath
E. Secure Datapath
Q3. Which two commands does an NSX administrator use to check the IP address of the VMkernel port for the Geneve protocol on the ESXi transport node? (Choose two.)
B. esxcli network ip interface ipv4 get
C. esxcfg-vmknic -1
D. esxcfg-nics -1
E. esxcli network nic list
Q4. Which choice is a valid insertion point for North-South network introspection?
A. Tier-0 gateway
B. Host Physical NIC
C. Guest VM vNIC
D. Partner SVM
Q5. An NSX administrator is troubleshooting a connectivity issue with virtual machines running on an ESXi transport node. Which feature in the NSX UI shows the mapping between the virtual NIC and the host’s physical adapter?
A. Port Mirroring
C. Activity Monitoring
D. Switch Visualization
Q6. Which two statements describe the characteristics of an Edge Cluster in NSX? (Choose two.)
A. Can have a maximum of 10 edge nodes
B. Can have a maximum of 8 edge nodes
C. Can contain multiple types of edge nodes (VM or bare metal)
D. Must contain only one type of edge nodes (VM or bare metal)
E. Must have only active-active edge nodes
Q7. When deploying an NSX Edge Transport Node, what two valid IP address assignment options should be specified for the TEP IP addresses? (Choose two.)
A. Use a Static IP List
B. Use BootP
C. Use an IP Pool
D. Use RADIUS
E. Use a DHCP Server
Q8. When running nsxcli on an ESXi host, which command will show the Replication mode?
A. get logical-switch status
B. get logical-switch status
C. get logical-switch
D. get logical-switches
Q9. When collecting support bundles through NSX Manager, which files should be excluded for potentially containing sensitive information?
A. Audit Files
B. Core Files
C. Management Files
D. Controller Files
Q10. An administrator needs to download the support bundle for NSX Manager. Where does the administrator download the log bundle from?
A. System > Utilities > Tools
B. System > Settings > Support Bundle
C. System > Support Bundle
D. System > Settings
Q11. What should an NSX administrator check to verify that VMware Identity Manager integration is successful?
A. From the NSX UI the status of the VMware Identity Manager Integration must be “Enabled”.
B. From VMware Identity Manager the status of the remote access application must be green.
C. From the NSX UI the URI in the address bar must have “local=false” part of it.
D. From the NSX CLI the status of the VMware Identity Manager Integration must be “Configured”.
Q12. An administrator has deployed 10 Edge Transport Nodes in their NSX Environment, but has forgotten to specify an NTP server during the deployment. What is the efficient way to add an NTP server to all 10 Edge Transport Nodes?
A. Use a Node Profile
B. Use the CLI on each Edge Node
C. Use Transport Node Profile
D. Use a PowerCLI script
Q13. Which statement is true about an alarm in a Suppressed state?
A. An alarm can be suppressed for a specific duration in hours.
B. An alarm can be suppressed for a specific duration in seconds.
C. An alarm can be suppressed for a specific duration in minutes.
D. An alarm can be suppressed for a specific duration in days.
Q14. An architect receives a request to apply distributed firewall in a customer environment without making changes to the network and vSphere environment. The architect decides to use Distributed Firewall on VDS. Which two of the following requirements must be met in the environment? (Choose two.)
A. VDS version 6.6.0 and later
B. vCenter 8.0 and later
C. NSX version must be 3.2 and later
D. NSX version must be 3.0 and later
Q15. An administrator has been tasked with implementing the SSL certificates for the NSX Manager Cluster VIP. Which is the correct way to implement this change?
A. Send an API call to https:///api/v1/cluster/api-certificate? action=set_cluster_certificate&certificate_id=
B. Send an API call to https:///api/v1/node/services/http? action=apply_certificate&certificate_id=
C. SSH as admin into the NSX manager with the cluster VIP IP and run nsxcli cluster certificate vip install
D. SSH as admin into the NSX manager with the cluster VIP IP and run nsxcli cluster certificate node install