Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free VMware 2V0-41.24 Practice Exam with Questions & Answers

Questions 1

Which tool could be used to configure BGP on a Tier-0 Gateway?

Options:
A.

ESX CLI

B.

NSX CLI

C.

API

D.

iPerf3

VMware 2V0-41.24 Premium Access
Questions 2

Which of the two following characteristics about NAT64 are true? (Choose two.)

Options:
A.

NAT64 requires the Tier-1 gateway to be configured in active-active mode.

B.

NAT64 is stateless and requires gateways to be deployed in active-standby mode.

C.

NAT64 is supported on Tier-0 and Tier-1 gateways.

D.

NAT64 is supported on Tier-1 gateways only.

E.

NAT64 requires the Tier-1 gateway to be configured in active-standby mode.

Questions 3

Which two built-in VMware tools will help identify the cause of packet loss on VLAN Segments? (Choose two.)

Which two built-in VMware tools will help identify the cause of packet loss on VLAN Segments? (Choose two.)

Options:
A.

Flow Monitoring

B.

Traceflow

C.

Live Flow

D.

Packet Capture

E.

Activity Monitoring

Questions 4

Which command is used to display the network configuration of the Tunnel Endpoint (TEP) IP on a bare metal transport node?

Options:
A.

debug

B.

tcpdump

C.

tcpconfig

D.

ifconfig

Questions 5

When configuring OSPF on Tier-0 Gateway, which three of the following must match in order to establish a neighbor relationship with an upstream router? (Choose three.)

Options:
A.

Area ID

B.

MTU of the Uplink

C Naming convention

C.

Address of the neighbor

D.

Subnet mask

E.

Protocol and Port

Questions 6

A company Is deploying NSX micro-segmentation in their vSphere environment to secure a simple application composed of web. app, and database tiers.

The naming convention will be:

• WKS-WEB-SRV-XXX

• WKY-APP-SRR-XXX

• WKI-DB-SRR-XXX

What is the optimal way to group them to enforce security policies from NSX?

Options:
A.

Use Edge as a firewall between tiers.

B.

Do a service insertion to accomplish the task.

C.

Group all by means of tags membership.

D.

Create an Ethernet based security policy.

Questions 7

Which VMware NSX Portfolio product can be described as a distributed analysis solution that provides visibility and dynamic security policy enforcement for NSX environments?

Options:
A.

NSX Manager

B.

NSX Distributed IDS/IPS

C.

NSX Intelligence

D.

NSX Cloud

Questions 8

A customer is preparing to deploy a VMware Kubernetes solution in an NSX environment.

What is the minimum MTU size for the UPLINK profile?

Options:
A.

1700

B.

1500

C.

1550

D.

1650

Questions 9

What are the four types of role-based access control (RBAC) permissions? (Choose four.)

Options:
A.

Auditor

B.

Full access

C.

Enterprise Admin

D.

None

E.

Execute

F.

Read

G.

Network Admin

Questions 10

What are two valid options when configuring the scope of a distributed firewall rule? (Choose two.)

Options:
A.

DFW

B.

Tier-1 Gateway

C.

Segment

D.

Segment Port

E.

Group