Which domain does vSphere/ESXi virtualize for the Software-Defined Data Center (SDDC)?
A. Applications
B. Storage
C. Compute
D. Network
Why is VMware NSX the most secure environment against threats and vulnerabilities?
A. Does not require high-end security protocols due to trie isolated arrangements or virtual machines.
B. Offers a threat-free network because each virtual machine is managed by customized security policies.
C. Offers no risk from unrelated streams of data communicating with each other.
D. Handles threats efficiently through the use of alerts and notifications, before any honzontal impact is created to the adjacent virtual machine
Which setback is NOT related to the hardware-centric legacy of networking?
A. Unpredicted downtime occurrences.
B. Insufficient and weak perimeter security.
C. Increased capital and operational costs.
D. Complexity in service deployment.
Which version of communication protocol is used in a virtualized network?
A. VTFP
B. Ipv2
C. IPv6
D. RIPv1
What is the common practice that I followed when a new application is deployed in legacy networking?
A. The application is mapped to users upfront.
B. The physical network is updated by the network team each time.
C. Recourse allocation is reconfigured based on the application requirement.
D. Firewall and Intrusion Prevention System (IPS) solutions are switched off during the first deployment cycle.
One of the advantages of using VXLAN over VLAN is its high scalability. What is the maximum number of logical network IDs that is handled by VXLAN?
A. 16 million
B. 10 million
C. 4,096
D. 12 million
What is the advantage of live migration of virtual machines with VMware Site Recovery Manager and VMware NSX?
A. Micro-segmentation security.
B. Networking beyond data center.
C. Simplified application deployment.
D. Reduced Recovery Time Objective (RTO) by 80 percent.
Which of these allows static or dynamic grouping based on inclusion and exclusion of objects such as virtual machines, vNICs, cSphere clusters, and logical switches?
A. uplink
B. Active Directory (AD)
C. Port
D. Security group
An administrator has deployed Distributed Firewall to protect their infrastructure from security threats. Due to extreme loads on the network the CPU is saturated and the memory becomes full.
In this scenario, which mode does the Distributed Firewall enter?
A. Secondary
B. Fail open
C. Proxy
D. Fail close
Which NSX component enforces security rules between two virtual machines that are on the same Layer 2 segment?
A. NSX Manager
B. Distributed Router
C. NSX distributed Firewall
D. NSX Controller