What are the two advantages of deploying NSX Edge load balancer in a network"? (Choose two.)
A. Provides improved application availability in case of server failures.
B. Enables application or service requests that are distributed across multiple back-end servers.
C. Enables migration of virtual machines from one data to the other.
D. Reduces the usage of public IP addresses in the network.
What does a Layer 3 VPN service, which is used by a remote client, use to leverage SSL tunnels to
securely connect to private networks behind an Edge Gateway?
A. SSL VPN-Edge services
B. SSL VPN-Gateway services
C. SSL VPN-Core services
D. SSL VPN-Core services
An administrator wants to provide seamless connectivity between on-premises and hybrid cloud resources. In this scenario which technologies can be incorporated to provide seamless connectivity? (Choose two.)
A. VMwareNSXL2VPN
B. VMwareNSXL4-L7VPN
C. Site to Site VPN with TLS
D. Site to site VPN with IPSec
Which port in a vSphere Standard Switch is used to connect Virtual NIC (vNIC)?
A. vNIC
B. Physical
C. Uplink
D. VMKernel
Which internet security protocol does NSX Edge use to interoperate with all major VPN vendors' equipment?
A. TLS
B. TCP/IP
C. HTTPS
D. IPSec
Which component of NSX logical firewall, offers by the NSX Edge Services Gateway (ESG), focuses on North-South traffic enforcement at the data center perimeter or tenant perimeter?
A. Distributed firewall
B. Centralized NSX Edge firewall
C. NSX controller cluster
D. Distributed logical router
How does Software-Defined Data Center (SDDC) facilitate easy provisioning and management of the underlying physical resources?
A. Organizes physical resources into logical pools.
B. Calculate the number of users.
C. Organizes physical resources into clusters
D. Uses predetermined policies and rules.
A security policy is a collection of security services of firewall rules, or both. Which security service is applied to virtual machines to ensure data security?
A. Virtual machine
B. Guest Introspection
C. Network Introspection
D. SpoofGuard
What is the total volume of traffic per Distributed Logical Router (DLR) that issupported by the Equal Cost Multipath (ECMP) model?
A. 20GB
B. 50 GB
C. 80 GB
D. 40 GB
In a Software-Defined Data Center (SDDC) that has a distributed firewall, where are the firewall policies enforced?
A. Guest operating system
B. Uplink ports
C. Virtual machine's virtual interface
D. Host