Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

When configuring OSPF on Tier-0 Gateway, which three of the following must match in order to establish a neighbor relationship with an upstream router? (Choose three.)

A.

Area ID

B.

MTU of the Uplink

C Naming convention

C.

Address of the neighbor

D.

Subnet mask

E.

Protocol and Port

Which of the following settings must be configured in an NSX environment before enabling stateful active-active SNAT?

A.

Tier-1 gateway in active-standby mode

B.

A Punting Traffic Group for the NSX Edge uplinks

C.

An Interface Group for the NSX Edge uplinks

D.

Tier-1 gateway in distributed only mode

An NSX administrator is creating a Tier-1 Gateway configured in Active-Standby High Availability Mode. In the event of node failure, the failover policy should not allow the original failed node to become the Active node upon recovery.

Which failover policy meets this requirement?

A.

Enable Preemptive

B.

Non-Preemptive

C.

Preemptive

D.

Disable Preemptive

Refer to the exhibit.

An administrator configured NSX Advanced Load Balancer to load balance the production web server traffic, but the end users are unable to access the production website by using the VIP address.

Which of the following Tier-1 gateway route advertisement settings needs to be enabled to resolve the problem? Mark the correct answer by clicking on the image.

Which TraceFlow traffic type should an NSX administrator use for validating connectivity between App and DB virtual machines that reside on different segments?

A.

Anycast

B.

Multicast

C.

Broadcast

D.

Unicast

Refer to the exhibit.

An administrator configured NSX Advanced Load Balancer to redistribute the traffic between the web servers. However, requests are sent to only one server

Which of the following pool configuration settings needs to be adjusted to resolve the problem? Mark the correct answer by clicking on the image.

Which two statements describe the characteristics of an Edge Cluster in NSX? (Choose two.)

A.

Must have only active-active edge nodes

B.

Can contain multiple types of edge nodes (VM or bare metal)

C.

Must contain only one type of edge nodes (VM or bare metal)

D.

Can have a maximum of 10 edge nodes

E.

Can have a maximum of 8 edge nodes

Which steps are required to activate Malware Prevention on the NSX Application Platform?

A.

Select Cloud Region and Deploy Network Detection and Response.

B.

Activate NSX Network Detection and Response and run Pre-checks.

C.

Activate NSX Network Detection and Response and Deploy Malware Prevention.

D.

Select Cloud Region and run Pre-checks.

An administrator has a requirement to have consistent policy configuration and enforcement across NSX instances.

What feature of NSX fulfills this requirement?

A.

Multi-hvpervisor support

B.

Federation

C.

Load balancer

D.

Policy-driven configuration

Which two statements are true about IDS Signatures? (Choose two.)

A.

Users can upload their own IDS signature definitions.

B.

An IDS signature contains data used to identify known exploits and vulnerabilities.

C.

An IDS signature contains data used to identify the creator of known exploits and vulnerabilities.

D.

IDS signatures can be High Risk, Suspicious, Low Risk and Trustworthy.

E.

An IDS signature contains a set of instructions that determine which traffic is analyzed.