Which NSX component enforces security rules between two virtual machines that are on the same Layer 2 segment?

Which NSX component enforces security rules between two virtual machines that are on the same Layer 2 segment?Reference: http://www vmware.com/content/dam/diqitalmarketinq/vmware/en/pdf/whitepaper/products/nsx/vmware-nsx-network-virtualization-platformwhite- paper.Ddl (page 3) Question: Which NSX component enforces security rules between two virtual machines that are on the same Layer 2 segment? Options: NSX Manager Distributed Router NSX distributed Firewall NSX Controller Correct Answer The … Read more

Why is VMware NSX the most secure environment against threats and vulnerabilities?

Why is VMware NSX the most secure environment against threats and vulnerabilities? Question: Why is VMware NSX the most secure environment against threats and vulnerabilities? Options: Does not require high-end security protocols due to the isolated arrangements or virtual machines. Offers a threat-free network because each virtual machine is managed by customized security policies. Offers … Read more

What is the common practice that I followed when a new application is deployed in legacy networking?

What is the common practice that I followed when a new application is deployed in legacy networking? Question: What is the common practice that I followed when a new application is deployed in legacy networking? Options: The application is mapped to users upfront. The physical network is updated by the network team each time. Recourse … Read more

Which plane of the VMware NSX architecture provides a single point of configuration and Representational State Transfer (REST) API entry points?

Which plane of the VMware NSX architecture provides a single point of configuration and Representational State Transfer (REST) API entry points?Reference: https://pubs.vmware.com/NSX-62/topic/com.vmware.ICbase/PDF/nsx_62_api.pdf (page 24, management plane) Question: Which plane of the VMware NSX architecture provides a single point of configuration and Representational State Transfer (REST) API entry points? Options: Management Control Integration Data Correct Answer … Read more

What are the two common management challenges organizations meet in their day-to-day administration?

An organization has not yet implemented network virtualization in their IT infrastructure.What are the two common management challenges organizations meet in their day-to-day administration? (Choose two.) Question: What are the two common management challenges organizations meet in their day-to-day administration? Options: Be susceptible to malware and virus vulnerabilities in the network. Update physical network manually … Read more

What does a Layer 3 VPN service, which is used by a remote client, use to leverage SSL tunnels to securely connect to private networks behind an Edge Gateway?

What does a Layer 3 VPN service, which is used by a remote client, use to leverage SSL tunnels to securely connect to private networks behind an Edge Gateway? Question: What does a Layer 3 VPN service, which is used by a remote client, use to leverage SSL tunnels to securely connect to private networks … Read more

Which security service applies rules at the Virtual NIC (vNIC) level to define the traffic allowed to and from a security group?

Which security service applies rules at the Virtual NIC (vNIC) level to define the traffic allowed to and from a security group?Reference: http://www.routetocloud.com/2015/04/nsx-distributed-firewall-deep-dive/ Question: Which security service applies rules at the Virtual NIC (vNIC) level to define the traffic allowed to and from a security group? Options: Distributed firewall rules Network firewall rules, Network introspection … Read more

Which mode does the Distributed Firewall enter?

An administrator has deployed Distributed Firewall to protect their infrastructure from security threats. Due to extreme loads on the network the CPU is saturated and the memory becomes full.In this scenario, which mode does the Distributed Firewall enter?Reference: http://www.infosecurityeurope.com/ novadocuments/90945?v=635709318795000000 (slide 7) Question: Which mode does the Distributed Firewall enter? Options: Secondary Fail open Proxy … Read more

Which service of VMware Integrated OpenStack has the ability to communicate with VMware NSX Controller, create logical switches and routers, and add new NSX virtual machines on demand?

Which service of VMware Integrated OpenStack has the ability to communicate with VMware NSX Controller, create logical switches and routers, and add new NSX virtual machines on demand?Reference: http://blog.scottlowe.org/2014/o4/25/learning-nsx-part-12-intearating-vmware nsx-with-openstack/ Question: Which service of VMware Integrated OpenStack has the ability to communicate with VMware NSX Controller, create logical switches and routers, and add new NSX … Read more

Which logical networking service does NSX Edge use to change source of destination IP addresses and TCP/UDP port numbers that are found in the flow of a packet header?

Which logical networking service does NSX Edge use to change source of destination IP addresses and TCP/UDP port numbers that are found in the flow of a packet header?Reference: http://www.routetocloud.com/2014/12/nsx-v-edge-nat/ Question: Which logical networking service does NSX Edge use to change source of destination IP addresses and TCP/UDP port numbers that are found in the … Read more