Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free VMware 2V0-41.24 Practice Exam with Questions & Answers | Set: 3

Questions 21

Which CLI command would an administrator use to allow syslog on an ESXi transport node when using the esxcli utility?

Options:
A.

esxcli network firewall ruleset set -a -e false

B.

esxcli network firewall ruleset set -r syslog -e false

C.

esxcli network firewall ruleset -e syslog

D.

esxcli network firewall ruleset set -r syslog -e true

VMware 2V0-41.24 Premium Access
Questions 22

Which CLI command on NSX Manager and NSX Edge is used to change NTP settings?

Options:
A.

set timezone

B.

set ntp-server

C.

get timezone

D.

get time-server

Questions 23

Refer to the exhibit.

An administrator would like to change the private IP address of the NAT VM 172.16.101.11 to a public address of 80.80.80.1 as the packets leave the NAT-Segment network.

Which type of NAT solution should be implemented to achieve this?

2V0-41.24 Question 23

Options:
A.

NAT64

B.

Reflexive NAT

C.

DNAT

D.

SNAT

Questions 24

Which two BGP configuration parameters can be configured in the VRF Lite gateways? (Choose two.)

Options:
A.

Route Aggregation

B.

Route Distribution

C.

BGP Neighbors

D.

Graceful Restart

E.

Local AS

Questions 25

Which of the two following characteristics about NAT64 are true? (Choose two.)

Options:
A.

NAT64 is stateless and requires gateways to be deployed in active-standby mode.

B.

NAT64 is supported on Tier-1 gateways only.

C.

NAT64 is supported on Tier-0 and Tier-1 gateways.

D.

NAT64 requires the Tier-1 gateway to be configured in active-standby mode.

E.

NAT64 requires the Tier-1 gateway to be configured in active-active mode.

Questions 26

Which two of the following features are supported for the Standard NSX Application Platform Deployment? (Choose two.)

Options:
A.

NSX Intrusion Detection and Prevention

B.

NSX Intelligence

C.

NSX Network Detection and Response

D.

NSX Malware Prevention Metrics

E.

NSX Intrinsic Security

Questions 27

How is the RouterLink port created between a Tier-1 Gateway and Tier-0 Gateway?

Options:
A.

Automatically created when Tier-1 is created.

B.

Manually create a Logical Switch and connect to bother Tier-1 and Tier-0 Gateways.

C.

Manually create a Segment and connect to both Tier-1 and Tier-0 Gateways.

D.

Automatically created when Tier-1 is connected with Tier-0 from NSX Ul.

Questions 28

Which three data collection sources are used by NSX Network Detection and Response to create correlations/Intrusion campaigns? (Choose three.)

Options:
A.

Files and anti-malware (lie events from the NSX Edge nodes and the Security Analyzer

B.

East-West anti-malware events from the ESXi hosts

C.

Distributed Firewall flow data from the ESXi hosts

D.

IDS/IPS events from the ESXi hosts and NSX Edge nodes

E.

Suspicious Traffic Detection events from NSX Intelligence

Questions 29

Which TraceFlow traffic type should an NSX administrator use for validating connectivity between App and DB virtual machines that reside on different segments?

Options:
A.

Anycast

B.

Multicast

C.

Broadcast

D.

Unicast

Questions 30

Which NSX feature can be leveraged to achieve consistent policy configuration and simplicity across sites?

Options:
A.

VRF Lite

B.

Ethernet VPN

C.

NSX MTML5 UI

D.

NSX Federation