Q1. Which condition could prevent an ESXi host from receiving VXLAN Tunnel End Point (VTEP) tables?
A. The ESXi host is disconnected from vCenter Server.
B. The netcpa agent is not running on the ESXi host.
C. The vsfwd agent is not running on the ESXi host.
D. The NSX controller on the ESXi host is down.
Answer: B
Q2. Which action is not an option for adding Virtual Machines to a Security Group?
A. Adding Virtual Machines to a Security Group and nesting it within another Security Group.
B. Defining Dynamic Membership in the Security Group.
C. Adding Virtual Machines to a Security Policy and associating it with a Security Group.
D. Selecting objects to include within a Security Group.
Answer: C
Q3. Which tool is used to display VXLAN connection information?
A. pktcap-uw
B. NSX Controller CLI
C. esxtop
D. VDS Health Check
Answer: B
Q4. What is the most restrictive NSX role that can be used to create and publish security policies and install virtual appliances?
A. Security Administrator
B. NSX Administrator
C. Auditor
D. Enterprise Administrator
Answer: D
Q5. -- Exhibit --An administrator is troubleshooting a NSX controller cluster issue and runs the control-cluster command, as shown in the Exhibit. What information can be determined from the output provided in the exhibit?
A. This is the control cluster majority leader controller.
B. There are two controllers in the cluster.
C. This is not the control cluster majority leader controller.
D. The persistence_server role is not functioning correctly.
Answer: C
Q6. Which three network policy settings can only be configured on a vSphere 5.5 Distributed Switch? (Choose three.)
A. Access Control Lists (ACLs)
B. Network I/O Control
C. LACP v2
D. NetFlow
E. DSCP Marking
Answer: A, C, E
Q7. -- Exhibit --An administrator has created an NSX network as shown in the exhibit. Both VMs in the exhibit use the same distributed router for their default gateway. VM-B obtains its IP address via DHCP. VM-A wants to send a packet to VM-B. How does VM-A learn VM-B's MAC address?
A. If Host-A is made aware by the NSX Controller of VM-B's MAC and IP addresses, Host- A replies directly to VM-A with an ARP response.
B. If Host-A is made aware by Host-B of VM-B's MAC and IP addresses, Host-A replies directly to VM-A with an ARP response.
C. If the NSX Controller is made aware by Host-B of VM-B's MAC and IP addresses, the NSX Controller replies directly to VM-A with an ARP response.
D. If Host-B is aware of VM-B's MAC and IP addresses, Host-B is able to reply directly to VM-A with an ARP response.
Answer: A
Q8. Layer 2 Multipathing (L2MP) and Multi-chassis Etherchannel (MEC) features have distinct scaling differences with the network switching and routing services provided by NSX. Which two statements provide a proper contrast of these services? (Choose two.)
A. Multi-chassis Etherchannel features provide higher utilization of Ethernet links within a defined L2/L3 distribution area.
B. Multi-Chassis Etherchannel features provide an easy ability to scale a VLAN across the data center.
C. NSX provides a method to transparently deploy L2MP protocols upon existing data center installations without service disruption.
D. NSX provides a method to deploy scalable L2/L3 services on existing data center installations.
Answer: A, D
Q9. An administrator needs to verify which port the switch manager is using. Which command should be used?
A. show controller-cluster status
B. show controller-cluster core stats
C. show controller-cluster connections
D. show controller-cluster logical-switches
Answer: C
Q10. -- Exhibit --
-- Exhibit --Refer to the Exhibit. You are designing a network for NSX and your customer has stated that
virtual machine traffic needs to span the virtual and physical space. Based on the exhibit,
where should this requirement be configured?
A. Location A.
B. Location B
C. Location C
D. Locations B and C.
Answer: B
Q11. Which statement is correct when upgrading vShield Data Security to NSX Data Security?
A. NSX Data Security does not support a direct upgrade.
B. NSX Controller must be deployed before the upgrade.
C. The vCloud Network and Security Virtual Wires must have been upgraded.
D. vCould Network and Security must be at least version 5.1 before starting the upgrade.
Answer: A
Q12. Which two statements are true regarding NSX? (Choose two.)
A. Workloads can be placed and moved independently of physical topology.
B. Operational efficiency can be achieved through automation of the physical network.
C. Workload deployments are non-disruptive over the existing physical network.
D. NSX implementation requires a VMware vSphere environment.
Answer: A, C
Q13. How many Logical Interfaces can be assigned to a single Distributed Router instance?
A. 1
B. 12
C. 1000
D. 1200
Answer: C
Q14. -- Exhibit --An NSX administrator has deployed the network shown in the Exhibit. Based on the exhibit, which statement describes a valid method for redirecting traffic around the fault?
A. Building this topology using a layer 2 switched fabric with connectivity between the leafs would allow traffic to be redirected around the fault to another leaf.
B. Building this topology using a layer 3 routed fabric with connectivity between the leafs would allow traffic to be redirected around the fault to another leaf.
C. Building this topology using a layer 2 switched fabric with spanning tree will provide the quickest path around the fault to another spine when connectivity is lost.
D. Building this topology using a layer 3 routed fabric will provide the quickest path around the fault to another spine when connectivity is lost.
Answer: D
Q15. -- Exhibit --
-- Exhibit –
An administrator is testing connectivity between two ESXi hosts and uses the ping utility, as
shown in the Exhibit. Based on the results shown in the exhibit, which statement is correct?
A. Communication between the hosts is working correctly.
B. The hosts are in separate subnets.
C. The MTU size is too small.
D. A logical router has not been deployed and configured.
Answer: C
Q16. A vSphere administrator wants to setup an NSX Edge Service Gateway to provide traveling employees secure access to company servers located in specific network segments within the corporate Data Centers. The solution has to be as scalable as possible. Which Virtual Private Network solution will satisfy the administrator's requirements?
A. SSL VPN
B. MPLS VPN
C. Layer 2 VPN
D. IPSec VPN
Answer: A