Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

VMware NSX 4.X Professional V2

Last Update 15 hours ago Total Questions : 115

The VMware NSX 4.X Professional V2 content is now fully updated, with all current exam questions added 15 hours ago. Deciding to include 2V0-41.24 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 2V0-41.24 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 2V0-41.24 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any VMware NSX 4.X Professional V2 practice test comfortably within the allotted time.

Question # 11

An NSX administrator is using ping to check connectivity between VM1 running on ESXi1 to VM2 running on ESXi2. The ping tests fail. The administrator knows the maximum transmission unit size on the physical switch is 1600.

Which command does the administrator use to check the VMware kernel ports for tunnel end point communication?

A.

vmkping ++netstack=geneve -d -s 1572 < destination IP address >

B.

vmkping ++netstack=vxlan -d -s 1572 < destination IP address >

C.

esxcli network diag ping –H < destination IP address >

D.

esxcli network diag ping -I vmk0 -H < destination IP address >

Question # 12

Which three of the following describe the Border Gateway Routing Protocol (BGP) configuration on a Tier-0 Gateway? (Choose three.)

A.

It supports a 4-byte autonomous system number.

B.

Can be used as an Exterior Gateway Protocol.

C.

The network is divided into areas that are logical groups.

D.

EIGRP is disabled by default.

E.

BGP is enabled by default.

Question # 13

When deploying an NSX Edge Transport Node, what two valid IP address assignment options should be specified for the TEP IP addresses? (Choose two.)

A.

Use an IP Pool

B.

Use RADIUS

C.

Use a Static IP List

D.

Use BootP

E.

Use a DHCP Server

Question # 14

Which CLI command does an NSX administrator run on the NSX Manager to generate support bundle logs if the NSX UI is inaccessible?

A.

esxcli system syslog config logger set --id=nsxmanager

B.

get support-bundle file vcpnv.tgz

C.

vm-support

D.

set support-bundle file vcpnv.tgz

Question # 15

The security administrator turns on logging for a firewall rule.

Where is the log stored on an ESXi transport node?

A.

/var/log/messages.log

B.

/var/log/vmware/nsx/firewall.log

C.

/var/log/fw.log

D.

/var/log/dfwpktlogs.log

Question # 16

An NSX administrator is creating a NAT rule on a Tier-0 Gateway configured in active-standby high availability mode.

Which two NAT rule types are supported for this configuration? (Choose two.)

A.

Port NAT

B.

1:1 NAT

C.

Destination NAT

D.

Reflexive NAT

E.

Source NAT

Question # 17

Which two choices are solutions offered by the VMware NSX portfolio? (Choose two.)

A.

VMware Tanzu Kubernetes Grid

B.

VMware Tanzu Kubernetes Cluster

C.

VMware NSX Advanced Load Balancer

D.

VMware NSX Distributed IDS/IPS

E.

VMware Aria Automation

Question # 18

An NSX administrator is troubleshooting a connectivity issue with virtual machines running on an ESXi transport node.

Which feature in the NSX UI shows the mapping between the virtual NIC and the host’s physical adapter?

A.

Port Mirroring

B.

Activity Monitoring

C.

IPF1X

D.

Switch Visualization

Question # 19

An administrator has deployed 10 Edge Transport Nodes in their NSX Environment, but has forgotten to specify an NTP server during the deployment.

What is the efficient way to add an NTP server to all 10 Edge Transport Nodes?

A.

Use a Node Profile

B.

Use Transport Node Profile

C.

Use the CLI on each Edge Node

D.

Use a PowerCLI script

Question # 20

Which two choices are use cases for Distributed Intrusion Detection? (Choose two.)

A.

Use agentless antivirus with Guest Introspection.

B.

Quarantine workloads based on vulnerabilities.

C.

Identify risk and reputation of accessed websites.

D.

Gain Insight about micro-segmentation traffic flows.

E.

Identify security vulnerabilities in the workloads.

Go to page: