Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A customer wants to use ECMP to provide additional throughput and availability for their critical business applications. Some applications require load balancing for scale and availability.

Which two Edge design choices can an architect present to the customer? (Choose two.)

A.

Create a Tier-0 gateway in Active/Standby mode and a Tier-1 gateway in Active/Standby mode.

B.

Configure ECMP and Load Balancing on the Tier-0 gateway.

C.

Create a Tier-0 gateway in Active/Active mode and a Tier-1 gateway in Active/Standby mode.

D.

Create a Tier-0 gateway in Active/Standby mode.

E.

Configure ECMP on the Tier-0 gateway and Load Balancing on the Tier-1 gateway.

An architect is helping an organization with the Logical Design of an NSX-T Data Center solution.

This information was gathered during the Assessment Phase:

    Data between two networks connected over a public network needs to be encrypted.

    Certificate authentication is required.

    Dynamic route learning is preferred.

Which selection should the architect include in their design? (Choose the best answer.)

A.

Deploy a Tier-0 gateway in Active/Standby mode. Configure policy-based IPSec VPN with SHA512 with RSA as the hash algorithm.

B.

Deploy a Tier-0 gateway in Active/Active mode. Configure route-based IPSec VPN with SHA512 with RSA as the hash algorithm.

C.

Deploy a Tier-0 gateway in Active/Standby mode. Configure route-based IPSec VPN with SHA512 with RSA as the hash algorithm.

D.

Deploy a Tier-0 gateway in Active/Active mode. Configure policy-based IPSec VPN with SHA512 with RSA as the hash algorithm.

An architect is helping an organization with the Conceptual Design of an NSX-T Data Center solution.

This information was gathered by the architect during the Discover Task of the Engagement Lifecycle:

    There are applications which use IPv6 addressing.

    Network administrators are not familiar with NSX-T Data Center solutions.

    Hosts can only be configured with two physical NICs.

    There is an existing management cluster to deploy the NSX-T components.

    Dynamic routing should be configured between the physical and virtual network.

    There is a storage array available to deploy NSX-T components.

Which risk was documented by the architect? (Choose the best answer.)

A.

Network administrators are not familiar with NSX-T Data Center solutions.

B.

Dynamic routing should be configured between the physical and virtual network.

C.

There are applications which use IPv6 addressing.

D.

There is a storage array available to deploy NSX-T components.

According to the Discover Task of the Engagement Lifecycle, which statement would be classified as a risk? (Choose the best answer.)

A.

Enough power and cooling capacity is available in each rack in the data center.

B.

To retain certification to provide financial services to end customers, PCI-DSS audits need to be passed.

C.

A merger and acquisition process was recently completed and new company on-boarding is not completed.

D.

Due to existing contracts and purchase agreements, the existing server hardware needs to be reused.

What is a design justification for a solution with 3 NSX Manager nodes deployed in a 4 ESXi cluster Management Cluster? (Choose the best answer.)

A.

NSX Controllers are separated from NSX Managers allowing 6 ESXi servers to host them.

B.

NSX Management Plane and Control Plane will be reduced to a single point of failure.

C.

Compute consumption guarantees NSX Manager nodes can be run on the same ESXi host.

D.

Single point of failure on Control Plane and Management Plane will be mitigated.

Which two protocols are typically used for multicast in a NSX-T Data Center environment? (Choose two.)

A.

PIM Full Form

B.

PIM Dense Mode

C.

IGMPv2

D.

PIM Sparse mode

E.

IGMPv3

Refer to the exhibit.

A financial company is adopting micro-services with the intent of simplifying network security. An NSX-T architect is proposing a NSX-T Data Center micro-segmentation logical design. The architect has created a diagram to share with the customer.

How many security levels will be implemented according to this Logical Design? (Choose the best answer.)

A.

5 levels

B.

3 levels

C.

9 levels

D.

4 levels

Which type of design includes vendor models, host names, IP Addresses, port connections, logical unit number sizes, and number of CPUs? (Choose the best answer.)

A.

Physical Design

B.

Conceptual Design

C.

High-Level Design

D.

Logical Design

Which NSX-T feature is used to allocate the network bandwidth to business-critical applications and to resolve situations where several types of traffic compete for common resources? (Choose the best answer.)

A.

Network I/O Control Profiles

B.

LLDP Profile

C.

LAG Uplink Profile

D.

Transport Node Profiles

An architect is helping an organization with the Physical Design of an NSX-T Data Center solution.

This information was gathered during a workshop:

    Current hypervisor of choice is KVM.

    Cost reduction is important.

Which two selections should the architect recommend to the organization? (Choose two.)

A.

Deploy Edge VM Nodes using ISO.

B.

Deploy NSX Manager using OVF.

C.

Deploy NSX Manager using QCOW2.

D.

Deploy bare metal Edge Nodes.

E.

Deploy Edge VM Nodes on KVM.