VMware NSX 4.X Professional V2(2V0-41.24)题库

news/2025/2/22 16:05:17

What is the VMware recommended way to deploy a virtual NSX Edge Node?
A. Through the NSX UI
B. Through automated or interactive mode using an ISO
C. Through the vSphere Web Client
D. Through the OVF command line tool
答案: A
解析:Install NSX Edge on an ESXi host using NSX Manager UI (recommended method),
https://docs.vmware.com/en/VMware-NSX/4.1/installation/GUID-E9A01C68-93E7-4140-B306-19CD6806199F.html

Which three selections are capabilities of Network Topology? (Choose three.)
A. Display how the different NSX components are interconnected.
B. Display the VMs connected to Segments.
C. Display how the Physical components are interconnected.
D. Display the uplinks configured on the Tier-1 Gateways.
E. Display the uplinks configured on the Tier-0 Gateways.
答案:ABE
解析:
According to the VMware NSX Documentation, these are three of the capabilities of Network Topology, which is a graphical representation of your network infrastructure in NSX:
* Display how the different NSX components are interconnected: You can use Network Topology to view how your segments, gateways, routers, firewalls, load balancers, VPNs, and other NSX components are connected and configured in your network.
* Display the uplink configured on the Tier-0 Gateways: You can use Network Topology to view the uplink interface and segment that connect your tier-0 gateways to your physical network. You can also view the VLAN ID and IP address of the uplink interface.
* Display the VMs connected to Segments: You can use Network Topology to view the VMs that are attached to your segments. You can also view the IP address and MAC address of each VM.

An NSX administrator has deployed a single NSX Manager node and will be adding two additional nodes to form a 3-node NSX Management Cluster for a production environment. The administrator will deploy these two additional nodes and Cluster VIP using the NSX UI.
What two are the prerequisites for this configuration? (Choose two.)
A. The cluster configuration must be completed using API.
B. All nodes must be in the same subnet.
C. All nodes must be in separate subnets.
D. A compute manager must be configured.
E. NSX Manager must reside on a Windows Server.
答案:BD

Which two commands does an NSX administrator use to check the IP address of the VMkernel port for the Geneve protocol on the ESXi transport node? (Choose two.)
A. net-dvs
B. esxcfg-nics -l
C. esxcli network ip interface ipv4 get
D. esxcfg-vmknic -l
E. esxcli network nic list
答案:CD

Which two are supported by L2 VPN clients? (Choose two.)
A. NSX Autonomous Edge
B. NSX Edge
C. NSX for vSphere Edge
D. 3rd party Hardware VPN Device
答案:AB
解析:
The following L2 VPN clients are recommended:
1. NSX Managed NSX Edge in a separate NSX Managed environment.
• Overlay and VLAN segments can be extended.
2. Autonomous Edge:
• Enables L2 VPN access from a non-a NSX environment to NSX environments.
• Deployed by using an OVF file on a host that is not managed by NSX.
• Only VLAN segments can be extended.

As part of an organization’s IT security compliance requirement, NSX Manager must be configured for 2FA (two-factor authentication).
What should an NSX administrator have ready before the integration can be configured?
A. Active Directory LDAP integration with ADFS
B. VMware Identity Manager with NSX added as a Web Application
C. VMware Identity Manager with an OAuth Client added
D. Active Directory LDAP integration with OAuth Client added
答案:C

What should an NSX administrator check to verify that VMware Identity Manager integration is successful?
A. From the NSX UI the status of the VMware Identity Manager Integration must be “Enabled”.
B. From the NSX CLI the status of the VMware Identity Manager Integration must be “Configured”.
C. From VMware Identity Manager the status of the remote access application must be green.
D. From the NSX UI the URI in the address bar must have “local=false” part of it.
答案:A

An administrator has been tasked with implementing the SSL certificates for the NSX Manager Cluster VIP.
Which is the correct way to implement this change?
A. Send an API call to https://<nsx-mgr>/api/vl/cluster/api-certificate?action=set_cluster_certificate&certificate_id=<certificate_id>
B. Send an API call to https://<nsx-mgr>/api/vl/node/services/http?action=apply_certificate&certificate_id=<certificate_id>
C. SSH as admin into the NSX manager with the cluster VIP IP and run nsxcli cluster certificate node install <certificate_id>
D. SSH as admin into the NSX manager with the cluster VIP IP and run nsxcli cluster certificate vip install <certificate_id>
答案:D

What is VMware’s recommendation for the minimum MTU requirements when planning an NSX deployment?
A. MTU should be set to 1700 or greater across the data center network including inter-data center connections.
B. MTU should be set to 1500 or less only on inter-data center connections.
C. Configure Path MTU Discovery and rely on fragmentation.
D. MTU should be set to 1550 or less across the data center network including inter-data center connections.
答案:A
解析:VMware recommends setting the MTU to at least 1700 bytes to ensure optimal performance and to future-proof the environment. This helps accommodate various functions and potential expansions

In which VPN type are the Virtual Tunnel interfaces (VTI) used?
A. SSL-based VPN
B. Route & SSL based VPNs
C. Policy & Route based VPNs
D. Route-based VPN
答案:D

In an NSX environment, an administrator is observing low throughput and congestion between the Tier-0 Gateway and the upstream physical routers.
Which two actions could address low throughput and congestion? (Choose two.)
A. Configure ECMP on the Tier-0 gateway.
B. Configure a Tier-1 gateway and connect it directly to the physical routers.
C. Deploy Large size Edge node/s.
D. Configure NAT on the Tier-0 gateway.
E. Add an additional vNIC to the NSX Edge node.
答案:AC

A company security policy requires all users to log into applications using a centralized authentication system.
Which two authentication, authorization, and accounting (AAA) systems are available when integrating NSX with VMware Identity Manager? (Choose two.)
A. RSA SecureID
B. SecureDAP
C. RADII 2.0
D. LDAP and OpenLDAP based on Active Directory (AD)
E. Keygen Enterprise
答案:AD

An NSX administrator would like to export syslog events that capture messages related to NSX host preparation events.
Which message ID (msgid) should be used in the syslog export configuration command as a filter?
A. FABRIC
B. SYSTEM
C. GROUPING
D. MONITORING
答案:A

An NSX administrator wants to create a Tier-0 Gateway to support equal cost multi-path (ECMP) routing.
Which failover detection protocol must be used to meet this requirement?
A. Host Standby Router Protocol (HSRP)
B. Beacon Probing (BP)
C. Virtual Router Redundancy Protocol (VRRP)
D. Bidirectional Forwarding Detection (BFD)
答案:D

An administrator has connected two virtual machines on the same overlay segment. Ping between both virtual machines is successful.
What type of network boundary does this represent?
A. Layer 2 bridge
B. Layer 2 broadcast domain
C. Layer 2 VPN
D. Layer 3 route
答案:B


http://www.niftyadmin.cn/n/5862501.html

相关文章

C++ 设计模式 - 策略模式

一&#xff1a;概述 策略模式是一种行为设计模式&#xff0c;来源于《设计模式&#xff1a;可复用面向对象软件的基础》一书。它定义了一组算法&#xff0c;并将它们封装成独立的对象。策略模式在标准模板库&#xff08;STL&#xff09;中被广泛使用。 二&#xff1a;策略模式…

NeurIPS-2024 | 具身智能如何理解空间关系?SpatialRGPT:视觉语言模型中的具象空间推理

作者&#xff1a;An-Chieh Cheng, Hongxu Yin, Yang Fu, Qiushan Guo, Ruihan Yang, Jan Kautz, Xiaolong Wang, Sifei Liu 单位&#xff1a;加州大学圣地亚哥分校&#xff0c;NVIDIA 标题&#xff1a;SpatialRGPT: Grounded Spatial Reasoning in Vision-Language Models 原…

5G-A的尔滨故事,冰雪下的科技春潮

刚刚结束的第九届亚冬会中&#xff0c;黑科技5G-A达成了刷屏级的效果。这也是5G-A首次大规模服务于国际大型体育赛事。 一场冰雪盛会之后&#xff0c;5G-A向何处去&#xff1f;这个黑科技的能力&#xff0c;将如何投放给大众消费者和企业&#xff1f;这是值得我们进一步思考的话…

GlusterFS卷管理实战指南:从扩展卷到自我修复,全面掌握高效运维技巧

#作者&#xff1a;闫乾苓 文章目录 1 扩展卷2 收缩卷3 更换故障brick3.1 更换纯分布式中的brick3.2 更换复制/分布式复制卷中的brick 4 重新平衡卷4.1 重新平衡卷以修复布局变化4.2 重新平衡卷以修复布局并迁移现有数据4.3 显示重新平衡操作的状态4.4 停止正在进行的重新平衡操…

Ae:导入 3D 模型

在 After Effects 24.1 及更高版本中&#xff0c;可以直接将 3D 模型 3D Model导入到项目&#xff0c;并将其与其他 2D 和 3D 图层一起放入合成中。 3D 模型文件主要是通过描述几何结构、材质和纹理、动画、光源与摄像机、场景结构、物理属性&#xff08;某些文件格式&#xff…

LangChain:AI大模型开发与分布式系统设计

文章目录 第一部分&#xff1a;大模型与 LangChain 基础1.1 大语言模型概述1.2 LangChain 基础 第二部分&#xff1a;模型初始化与调用2.1 自定义大模型架构 第三部分&#xff1a;高级模型设计与优化3.1 提示工程与模型调优3.2 高效处理大规模数据 第四部分&#xff1a;分布式系…

Docker-技术架构演进之路

目录 一、概述 常见概念 二、架构演进 1.单机架构 2.应用数据分离架构 3.应用服务集群架构 4.读写分离 / 主从分离架构 5.引入缓存 —— 冷热分离架构 6.垂直分库 7.业务拆分 —— 微服务 8.容器化引入——容器编排架构 三、尾声 一、概述 在进行技术学习过程中&am…