Q1. Which VMware NSX for vSphere component can be created on-demand using vRealize Automation?
A. The logical switch
B. The logical distributed router
C. The distributed firewall
D. The NSX Edge Services Gateway
Answer: A
Q2. -- Exhibit --An administrator is troubleshooting a NSX controller cluster issue and runs the control-cluster command, as shown in the Exhibit. What information can be determined from the output provided in the exhibit?
A. This is the control cluster majority leader controller.
B. There are two controllers in the cluster.
C. This is not the control cluster majority leader controller.
D. The persistence_server role is not functioning correctly.
Answer: C
Q3. Which two components are required to enable layer 2 bridging? (Choose two.)
A. Distributed firewall rule to allow layer 2 traffic in the bridge.
B. Deployed Logical Switch.
C. Deployed Logical Router.
D. VLAN trunk configured on logical switch.
Answer: A, C
Q4. You are tasked with designing a data center architecture that should maximize the use of vMotion within your environment. The design has these requirements:
. The network must utilize widely offered layer 2 switching and layer 3 switching services
. Purchase of new equipment should be minimized Which two network design architectures will provide the requirements for vMotion in your data center? (Choose two.)
A. Utilize layer 3 switching from the access layer through the core.
B. Employ layer 2 multipathing using a standardized protocol.
C. Deploy a flat, traditional layer 2 switched network.
D. Deploy an overlay technology for the deployment of your virtual network.
Answer: A, D
Q5. A vSphere administrator added a new interface to a Distributed Router with a subnet of 172.16.10.0/24 and wants to make this subnet reachable to the rest of the network. How can the vSphere administrator achieve this?
A. Enable OSPF on the Distributed Router. Configure the uplink interface in the Backbone area and redistribute into OSPF the 172.16.10.0/24 subnet.
B. Enable OSPF on the Distributed Router. Configure the uplink interface in the normal area and the new interface with the subnet 172.16.10.0/24 in a Backbone area.
C. Enable OSPF on the Distributed Router. Configure the uplink interface in the Backbone area and redistribute from OSPF the 172.16.10.0/24 subnet.
D. Enable OSPF on the Distributed Router. Configure the uplink interface in the Backbone area and the new interface with the subnet 172.16.10.0/24 in a normal area.
Answer: D
Q6. An administrator needs to verify which port the switch manager is using. Which command should be used?
A. show controller-cluster status
B. show controller-cluster core stats
C. show controller-cluster connections
D. show controller-cluster logical-switches
Answer: C
Q7. -- Exhibit --
-- Exhibit --The Exhibit details the network connectivity from an NSX network and the supporting physical network. Locations C and D may be required to process packets with QoS tags. Based on the exhibit, which statement details proper processing of packets if they are QoS tagged?
A. Locations C and D will trust the QoS tags of the encapsulated frame when passing packets.
B. Location B should trust the QoS tags of the encapsulated frames that are switched.
C. Location A will mark the inner header of the encapsulated frame.
D. Location B should trust the QoS tags of the external header.
Answer: D
Q8. How many Logical Interfaces can be assigned to a single Distributed Router instance?
A. 1
B. 12
C. 1000
D. 1200
Answer: C
Q9. What are two valid methods of configuring virtual machines to use a vSphere Distributed Switch (vDS) that are currently using a vSphere Standard Switch (vSS)? (Choose two.)
A. Select each virtual machine and drag it to the vSphere Distributed Switch.
B. Select the vSS in use by the virtual machines and select the Move to option on the right-click menu.
C. Select each virtual machine and edit the virtual network adapter's connection settings.
D. Use the Migrate Virtual Machine Networking option from the right-click menu of the vDS.
Answer: C, D
Q10. If a Security Group is the Source for a General Logical Firewall Rule, which Virtual Machines will be affected by the rule?
A. Each Virtual Machine defined in the Security Group.
B. Each Virtual Machine defined in the Source and Destination fields of the Logical Firewall Rule.
C. Each Virtual Machine identified in the Applied To field of the Logical Firewall Rule.
D. Each Virtual Machine identified in the Destination field of the Logical Firewall Rule.
Answer: C