2V0-41.23 Dumps

2V0-41.23 Free Practice Test

VMware 2V0-41.23: VMware NSX 4.x Professional

QUESTION 26

Which three selections are capabilities of Network Topology? (Choose three.)

Correct Answer: ABD
According to the VMware NSX Documentation, these are three of the capabilities of Network Topology, which is a graphical representation of your network infrastructure in NSX:
2V0-41.23 dumps exhibit Display how the different NSX components are interconnected: You can use Network Topology to view how your segments, gateways, routers, firewalls, load balancers, VPNs, and other NSX components are connected and configured in your network.
2V0-41.23 dumps exhibit Display the uplink configured on the Tier-0 Gateways: You can use Network Topology to view the uplink interface and segment that connect your tier-0 gateways to your physical network. You can also view the VLAN ID and IP address of the uplink interface.
2V0-41.23 dumps exhibit Display the VMs connected to Segments: You can use Network Topology to view the VMs that are attached to your segments. You can also view the IP address and MAC address of each VM.

QUESTION 27

What are two functions of the Service Engines in NSX Advanced Load Balancer? (Choose two.)

Correct Answer: CE
The Service Engines in NSX Advanced Load Balancer are VM-based applications that handle all data plane operations by receiving and executing instructions from the Controller. The Service Engines perform the following functions:
2V0-41.23 dumps exhibit They perform application load-balancing operations for all client- and server-facing network interactions. They support various load-balancing algorithms, health monitors, SSL termination, and persistence profiles.
2V0-41.23 dumps exhibit They provide a user interface to perform configuration and management tasks. The user interface is accessible through a web browser or a REST API. The user interface allows the user to create and modify virtual services, pools, health monitors, policies, analytics, and other load-balancing settings
https://docs.vmware.com/en/VMware-Telco-Cloud-Platform/3.0/vmware-telco-cloud-reference-architecture-gui

QUESTION 28

Which steps are required to activate Malware Prevention on the NSX Application Platform?

Correct Answer: D
To activate Malware Prevention on the NSX Application Platform, the steps are:
2V0-41.23 dumps exhibit In the NSX Manager UI, select System and in the Configuration section, select NSX Application Platform.
2V0-41.23 dumps exhibit Navigate to the Features section, locate the NSX Malware Prevention feature card, and click Activate or anywhere in the card.
2V0-41.23 dumps exhibit In the NSX Malware Prevention activation window, select one of the available cloud regions from which you can access the NSX Advanced Threat Prevention cloud service.
2V0-41.23 dumps exhibit Click Run Prechecks. This precheck process can take some time as the system validates that the minimum license requirement is met and that it is eligible for use with the NSX Advanced Threat Prevention cloud service. The system also validates that the selected cloud region is reachable.
2V0-41.23 dumps exhibit Click Activate. This step can take some time1. Therefore, the correct answer is D. The other options are incorrect because they involve activating or deploying NSX Network Detection and Response, which is
a different feature from Malware Prevention. References: Activate NSX Malware Prevention

QUESTION 29

What are tour NSX built-in rote-based access control (RBAC) roles? (Choose four.)

Correct Answer: ABEG
https://docs.vmware.com/en/VMware-NSX/4.1/administration/GUID-26C44DE8-1854-4B06-B6DA-A2FD426

QUESTION 30

An NSX administrator is using ping to check connectivity between VM1 running on ESXi1 to VM2 running on ESXi2. The ping tests fails. The administrator knows the maximum transmission unit size on the physical switch is 1600.
Which command does the administrator use to check the VMware kernel ports for tunnel end point communication?

Correct Answer: B
The command vmkping ++netstack=geneve -d -s 1572 <destination IP address> is used to check the VMwar kernel ports for tunnel end point communication. This command uses the geneve netstack, which is the default netstack for NSX-T. The -d option sets the DF (Don’t Fragment) bit in the IP header, which prevents the packet from being fragmented by intermediate routers. The -s 1572 option sets the packet size to 1572 bytes, which is the maximum payload size for a geneve encapsulated packet with an MTU of 1600 bytes.
The is the IP address of the remote ESXi host or VM. References: : VMware NS Data Center Installation Guide, page 19. : VMware Knowledge Base: Testing MTU with the vmkping command (1003728). : VMware NSX-T Data Center Administration Guide, page 102.