Q1. Layer 2 Multipathing (L2MP) and Multi-chassis Etherchannel (MEC) features have distinct scaling differences with the network switching and routing services provided by NSX. Which two statements provide a proper contrast of these services? (Choose two.)
A. Multi-chassis Etherchannel features provide higher utilization of Ethernet links within a defined L2/L3 distribution area.
B. Multi-Chassis Etherchannel features provide an easy ability to scale a VLAN across the data center.
C. NSX provides a method to transparently deploy L2MP protocols upon existing data center installations without service disruption.
D. NSX provides a method to deploy scalable L2/L3 services on existing data center installations.
Answer: A, D
Q2. Where is the layer 2 bridge instance deployed when configuring a bridge connection between a logical switch and a VLAN?
A. On the ESXi host running the logical router
B. On the ESXi host running the logical switch
C. On both ESXi hosts that make up the layer 2 bridge
D. On each virtual machine that will utilize the layer 2 bridge
Answer: A
Q3. Which tool is used to detect rogue services?
A. NSX Logical Firewall
B. NSX Logical Router
C. Activity Monitoring
D. Flow Monitoring
Answer: D
Q4. Which two statements are true regarding Layer 2 VPNs? (Choose two.)
A. Layer 2 VPNs are used to securely extend Ethernet segments over an untrusted medium.
B. The NSX Edge Service Gateway can form a Layer 2 VPN with a standards-compliant physical appliance.
C. The Distributed Router can form a Layer 2 VPN to another Distributed Router or NSX Edge Service Gateway.
D. Layer 2 VPNs require the two VPN endpoints be in the same Layer 2 segment.
Answer: A, B
Q5. Which port is used for NSX REST API Requests?
A. 80
B. 443
C. 5480
D. 8443
Answer: B
Q6. What is the function of NSX Data Security?
A. Prevents sensitive data in your virtualized environment from being copied
B. Prevents sensitive data in your virtualized environment from being modified
C. Identifies sensitive data in your virtualized environment based upon regulation security policies
D. Identifies sensitive data in your virtualized environment based upon regulation violation reports
Answer: D