SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 304 Weeks Ago, 4 Days Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 09 Dec 2017 My Price 10.00

maximum number of instances that VMware NSX

VMWare please answer the following questions. Thank you

1. What is the maximum number of instances that VMware NSX can extend for the networking and security
of either within or across data?


A. Nine

B. Eight


C. Seven

D. Five

 

2. Which VMware Integrated OpenStack has the ability to communicate with VMware Controller, create
logical switches and route new NSX machines on demand?

A. Neutron

B. Proton

C. Glance

 D. Nova

3. Which component of NSX logical firewall, offered by the NSX Edge Services Gateway (ESG), focuses on
North-South traffic enforcement perimeter or tenant perimeter?


A. Distributed firewall

B. Centralized NSX Edge firewall

C. NSX controller cluster


D. Distributed logical router

 

4 One of the advantage of using VXLAN over VLAN is its high scalability. What is the maximum number of
logical network IDs that is handled by VXL.?


A. 16 million

B. 10 million

C. 4,096


D. 12 million

 

5 Which is NOT a benefit of virtualized compute over traditional physical hardware for server deployments?


A. Cost


B. Deployment time

C. Security

D. Flexibility

 

6 What is the advantage of live migration of virtual machines with VMware Site Recovery Manager and
VMware NSX?

A. Micro-segmentation security.


B. Networking beyond data center.


C. Simplified application deployment.


D. Reduced Recovery Time Objective (RTO) by 80 percent.

7 Which component of NSX logical firewall, offered by the NSX Edge Services Gateway (ESG), focuses on
North-South traffic enforcement at data center perimeter or tenant perimeter?


A. Distributed firewall

B. Centralized NSX Edge firewall

C. NSX controller cluster


D. Distributed logical router

8 Which domain does vSphere/ESXi virtualize for the Software-Defined Data Center (SDDC) ?

A. Applications


B. Storage


C. Compute

D. Network

 

9 What are the two advantages of deploying NSX Edge load balancer in a network? (Choose two.)

A. Provides improved application availability in case of server failures.


B. Enables application or service requests that are distributed across multiple back-end servers.


C. Enable migration of virtual machines form one data center to the other.

D. Reduce the usage of public IP addresses in the network.

10 How can the legacy physical network become simple , and reliable when network abstraction is
implemented?


A. By leveraging the existing physical devices without configuration changes.

B. By automating services for provisioning new servers.


C. By configuring new VLANs.


D. By integrating third-party devices with the existing infrastructure.

 

11 What is the default virtual standard switch that is created when ESXi is installed on a hypervisor?

A. vSwitch1


B. vSwitch

C.vSwitch0

D. vSwitch2

12 Which port in a VSphere Standard Switch is used to connect Virtual NIC (vNIC)?

 A. vNIC

B. Physical

C. Uplink


D. VMKernel

 

13 Which state considered a myth when securing the network through a legacy approach?

A. The rented from the network when the perimeter is secure.


B. A physical firewall is required to protect the network from threats.


C. Deploy and security policies for each data center protects a network from threates.

D. The protected from threats with the deployment of the intrusion prevention system with the data center.


 

14 What are the three common problems for administrators when managing application workloads with
network security models that are not virus? (Cheese three.)


A. Lack of interoperability and automation creates error-prone manual work.

B. Integration of third-party security products with home products is not possible.

C. Deploying and managing third party security products become difficult.


D. Load balancing by vMotion is not possible.
E. There is limited visibility into a workload's security posture and policies.

 

15 Administrator is working in an IT infrastructure where traditional routing methods are followed for routing
network traffic. What are the best an administrator in this infrastructure? (Choose three.)


A. The use of East-West traffic is not secure within a data center.

B. North-South routing methods limit -data center scalability.


C. The complexity of routing increases in a multi tenant environment.

 D. A suboptimal traffic routes is used to reach destination.


E. Adding new servers to an isolated network becomes difficult.

16 What are the two operational modes available with VMware NSX laod balancer? (Choose two.)


A. Proxy


B. Setup

C. Baseline

D. Inline

 

17 Which internet security protocol does NSX Edge use to interoperate with all VPN vendor's equipment?


A. TLS


B.TCP/IP

C. HTTPS

D. IPSec

 

18 What is the default TCP port through which the Layer 2 VPN client makes an outgoing connection request
in the Layer 2 VPN tunnel architecture?


A. 443

B. 843


C. 440


D. 401

19 Which plane of the VMware NSX architecture provides a single point configuration and Representational
State Transfer (REST) API entry points?


A. Management

B. Control


C. Integration

 D. Data

20 Which security service applies rules at the Virtual NIC (vNIC) level to define the traffic allowed to and from
a security group?


A. Distributed firewall rules

B. Network firewall rules


C. Network introspection services.

D. Guest introspection services.

 

21 What is the common practice that is followed when a new application is deployed in legacy networking?


A. The application is mapped to users upfront.


B. The physical network is updated by the network team each time.

C. Resource allocation is reconfigured based on the application requirement.


D. Firewall and Intrusion Prevention System (IPS) solutions are switched off during the first deployment
cycle.

 

22 Which are mode does the NSX Edge router use to connect to the logical network for load balancing?


A. Inline


B. Transparent

C. Custom

D. One arm

 

23 A security policy IS a collection, of security services or firewall rules, or both. Which security service is
applied to virtual machines to ensure.

A. Virtual machine


B. Data introspection


C. Network introspection


D. Spoof Guard.


24 Which is technology is used by User World Agent (UWA) to communicate with VMware NSX Controller on
the control plane?


A. secIT

B. Transport Layer Security (TTLS)

C. Layer Security (TLS)


D. Sockets layer (SSL)


 

25 Which setback is NOT related to the hardware-centric legacy of networking?

A. Unpredicted downtime occurrences.


B. Insufficient and weak perimeter security.


C. Increased capital and operational costs.

D. Complexity in service deployment.

 

26 Which choice of Netware NSX enables source intra data center network to work traffic?

A. East city


B. Cloud


C. Mat manageability

 

27 Which three cloud environments are automated with the help of VM ware NSX?(Choose three.)


A. Intranet Cloud


B. Public Cloud

C. Private Cloud


D. Developer Cloud


E. Multi-Tenant Infrastructure

 

28 Which-VMX component enforces security rules between two virtual machines that are on the same Layer
2 segment?


A. NXM

B. distributed Router

 C. NSX Dost Firewall

D. NSX Control

 

29 What are the three critical demands that lead the way for the evolution of a new networking model against
the traditional legacy model (Choose two)


A. Need for flexible movement of workloads within and across data centers.

B. Cost effectiveness.


C. Decentralization of resource management.

D. Need for a dynamic business environment.

 E. Faster network security.


 

30 What does a Layer 3 VPN service, which is used by a remote client, use to leverage SSL tunnels to
securely connect to private networks behind an Edge Gateway?


A. SSL VPN-Edge services

B.SSL VPN-Gateway services

C.SSL VPN-Plus services

D.SSL VPN-Core services

 

31 How do virtual networks support physical infrastructure Quality of Service (QoS)?

A. By receiving the help of the NSX gateway.


B. By marking the packets in the encapsulated header.


C. By employing East-West traffic.

D. By restricting the access of VLANs to specific pods.

 

32 An organization has not yet implemented network virtualization in their IT infrastructure. What are the two common management challenges organizations in their day-to-day administration? (Choose Two)


A. Be susceptible to malware an virus vu liner abilities in the network.


B. Update the physical network manually each time a new application is deployed.


C. Update the physical network manually each time a new application is deployed.


D. Spend more time in provisioning and decommissioning lab environments.


E. Manage frequently occurring network requests manually.


33 Why is VMware NSX the most secure environment against threats and vulnerabilities?


A. Does not require high-end security protocols due to the isolated arrangement of virtual machines.

B. Offers a threat free network because each virtual machine is managed by customize security policies.

C. Offers no risk from unrelated steams of data communicating with each other.


D. Handles threats efficiently through the use of alerts and notifications, before any horizontal impact is
created to the adjacent virtual machine.


 

34 What are the two main limitations of a VSphere Standard Switch? (Choose two)

A. Centralized management


B. Virtual machines per host


C. Complex installation procedure

D. Scalability


 

35 Which component of VMware Horizon acts as a broker for client connections, providing authentication to
users an directing incoming desktop request from user to View virtualized desktops?


A. View Client

B. View administrator


C. View Composer


D. View Connection server

 

36 An administration to provide seamless connectivity between the on-premises and hybrid cloud resources.
In this scenario two technologies can be incorporated to provide seamless connectivity? (Choose two.)

A. Site to/Site with NTLS

B. VMware VPN


C. VMware SPN


D. Site to Site VPN IPSec

 

37 How do virtual networks that are natively isolated from each other provide support for overlapping IP
addresses in a multi-tenant environment?


A. By enabling isolation without using access control list and firewall rules.

B. By enabling isolation with the help of Active Directory (AD).

C. By employing the spanning tree protocol.


D. By implementing load balancing.


 

 

38 What are the two functions of DLR Control VM? (Choose two)


A. Communicates with the NSX manager and sends routing updates to the NSX controller cluster.

B. Performs Address Resolution Protocol (ARP) entry lookup.


C. Establishes routing protocol sessions with other routers.


D. Forms adjacencies with edge routing peers.


 

39 Which version of communication protocol is used in a virtualized network?

A. VTEP


B.IPv2


C. IPv6

D. IPv1

 

40 Which logical networking service does NSX Edge use to change source or destination IP address and
TCP/UDP port numbers that are found packet header?


A. Load balancing

B. Dynamic Host Configuration Protocol (DHCP)

C. Network Address Translation (NAT)

D. VPN


41 Which is the VMware product through which VMware NSX, other than VMware vRealize Automation,
provides automation of the entire data center?


A. VRealize Operations Manager

B. VMware Integrated OpenStack

C. VMware Site Recovery Manager

D. VMware vRealize Log Insight

 

42 An administrator decides to implement logical switching to establish connectivity between virtual
machines that reside on the same host.
Which layer is used by logical switching to provide this connectivity?

A. Layer 4

B. Layer 5

C. Layer 3

D. Layer 2

 

43 How does Software -Defined Data Center (SDDC) facilitate easy provisioning and management of the
underlying physical resources?


A. Organizes physical resources into logical pools.

B. Calculates the number of users.


C. Organizes physical resources into clusters.

D. Uses predetermined policies and rules.

 

44 Which of these allows static or dynamic grouping based on inclusion and exclusion of objects such as
virtual machines, vNICs, vSphere cluster Switches?


A. Uplink

B. Active Directory (AD)

C. Port


D. Security


 

 

45 What are the two core components that VMware NSX leverages for North-South traffic flow with an
external network? (Choose two)

 A. vSphere Standard switch


B. Edge Service Gateway


C. vSphere Controller


D. DLR Control VM


 

46 Which technique best explains the use of fine-grained polices and network controls to enable security
inside the data center?


A. Micro division

B. Bifurcation


C. Dissection


D. Dissection


E. Micro-segmentation

 

47 An administrator has deployed Distributed Firewall to protect their infrastructure form security threats.
Due to extreme loads on the saturated the memory becomes full.
In this scenario, which mode des the Distributed Firewall enter?

A. Secondary

B. Fall up


C. Proxy


D. Fail close

 

48 Which operational mode does the NEX Edge router use to connect to the logical network for load
balancing?


A. One-arm

B. Transparent

C. Inline


D. Custom

 

49 Which are mode does the NSX Edge router use to connect to the logical network for load balancing?


A. One arm


B. Transparent

C. Inline

D. Custom

 

50 What are the three functional planes of the VMware NSX architecture? (Choose three.)

A. Routing

B. Control


C. Data


D. Integration

E. Management

 

51 Which the two advantage of embedding the security functions in the hypervisor? (Choose two.)


A. Manages security posture of workloads at scale.


B. Tables high throughput rates.

C. Users East-West traffic between each single virtual machine.

D. ids/hair pinning of resources.


 

52 Which three statements are true about NSX Distributed Firewall? (Choose Three.)


A. It provides east-west stateful Layer 2 -Layer 4 firewall.


B. It allows you to create access control policies based on VMware vCenter Server Objects such as data
centers and clusters.


C. It works as perimeter security firewall.


D. It provides north -south stateful Layer 3- Layer 4 firewall.

E. It is a virtualization-aware firewall.


 

Attachments:

Answers

(5)
Status NEW Posted 09 Dec 2017 06:12 AM My Price 10.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly

Not Rated(0)