What is VMware??s recommendation for the minimum MTU requirements when planning an NSX deployment?
Correct Answer:
A
VMware recommends setting the MTU (Maximum Transmission Unit) to 1700 or greater for NSX deployments. This is to ensure that the VXLAN encapsulation, which adds overhead to the original Ethernet frame, can be accommodated without fragmentation. This MTU requirement includes the entire data center network, including inter-data center connections, to ensure consistent communication across all network components involved in the NSX deployment.
A company security policy requires all users to log into applications using a centralized authentication system.
Which two authentication, authorization, and accounting (AAA) systems are available when integrating NSX with VMware Identity Manager? (Choose two.)
Correct Answer:
AD
RSA SecureID: RSA SecureID is a commonly used two-factor authentication (2FA) system that can integrate with VMware Identity Manager for enhanced security during authentication, making it a suitable AAA system for user authentication.
LDAP and OpenLDAP based on Active Directory (AD): VMware Identity Manager can integrate with LDAP and OpenLDAP directories, including Active Directory (AD), for
centralized user authentication. This allows users to authenticate against an organization's directory service.
Which three data collection sources are used by NSX Network Detection and Response to
create correlations/Intrusion campaigns? (Choose three.)
Correct Answer:
ADE
The correct answers are A. Files and anti-malware (file) events from the NSX Edge nodes and the Security Analyzer, D. IDS/IPS events from the ESXi hosts and NSX Edge nodes, and E. Suspicious Traffic Detection events from NSX Intelligence. According to the VMware NSX Documentation3, these are the three data collection sources that are used by NSX Network Detection and Response to create correlations/intrusion campaigns.
The other options are incorrect or not supported by NSX Network Detection and Response. East-West anti-malware events from the ESXi hosts are not collected by NSX
Network Detection and Response3. Distributed Firewall flow data from the ESXi hosts are not used for correlation/intrusion campaigns by NSX Network Detection and Response3. https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.2/administration/GUID- 14BBE50D-9931-4719-8FA7-884539C0D277.html
What needs to be configured on a Tier-0 Gateway to make NSX Edge Services available to a VM on a VLAN-backed logical switch?
Correct Answer:
D
A Service interface on the Tier-0 Gateway is required to make NSX Edge Services, such as
NAT or load balancing, available to a VM on a VLAN-backed logical switch. The Service interface allows the Tier-0 Gateway to connect directly to the VLAN-backed network, enabling Edge Services to interact with VMs on that network.
