Which three methods can be used by the NSX Distributed Firewall to discover IP addresses? (Choose three )
Answer : A,C,D
Explanation:
Referencehttps://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd
=displayKC&externalId=2125437
In a Cross-vCenter implementation, where is the Universal Control Cluster deployed and configured?
Answer : D
Explanation:
Referencehttps://pubs.vmware.com/NSX-
62/topic/com.vmware.ICbase/PDF/nsx_62_cross_vc_install.pdf(page 16)
What are two things that should be done before upgrading from vCloud Networking and
Security to NSX? (Choose two.)
Answer : C,D
Explanation:
Referencehttps://pubs.vmware.com/NSX-
62/index.jsp?topic=%2Fcom.vmware.nsx.upgrade.endpoint.doc%2FGUID-0D1B18B1-
B5CC-483B-8BC0-95A2E8C025B9.html
A new ESXi host was added to an existing cluster, prepared for NSX and enabled for
Distributed Firewall, logical switching and Logical Routing.
The Most Preparation page in the NSX Web Ul shows this new host is in Ready state and the Logical Network Preparation tab displays the VXLAN VTEPs are correctly configured.
Virtual machines on the new host can communicate with each other but CANNOT communicate with VMs running on other hosts and connected to the same Logical Switch.
Which condition below will result in the described behavior on the new host?
Answer : B
What resource must a partner security service be registered with before the service is available to a policy?
Answer : A
Explanation:
Referencehttps://blogs.vmware.com/consulting/2015/01/automating-security-policy- enforcement-nsx-service-composer.html