How does the Traceflow tool identify issues in a network?
A. Compares the management plane configuration states containing control plane traffic and error reporting from transport node agents.
B. Compares intended network state in the control plane with Tunnel End Point (TEP) keepalives in the data plane.
C. Injects ICMP traffic into the data plane and observes the results in the control plane.
D. Injects synthetic traffic into the data plane and observes the results in the control plane.
An administrator has a requirement to have consistent policy configuration and enforcement across NSX instances.
What feature of NSX fulfills this requirement?
A. Load balancer
B. Federation
C. Multi-hypervisor support
D. Policy-driven configuration
Which command Is used to test management connectivity from a transport node to NSX Manager?
A. esxcli network ip connection list | grep 1234
B. esxcli network connection list | grep 1235
C. esxcli network ip connection list | grep 1235
D. esxcli network connection list | grep 1234
An NSX administrator is reviewing syslog and notices that Distributed Firewall Rules hit counts are not being logged.
What could cause this issue?
A. Syslog is not configured on the ESXi transport node.
B. Zero Trust Security is not enabled.
C. Syslog is not configured on the NSX Manager.
D. Distributed Firewall Rule logging is not enabled.
An NSX administrator Is treating a NAT rule on a Tler-0 Gateway configured In active-standby high availability mode. Which two NAT rule types are supported for this configuration? (Choose two.)
A. Reflexive NAT
B. Destination NAT
C. 1:1 NAT
D. Port NAT
E. Source NAT
Refer to the exhibit.
An administrator would like to change the private IP address of the NAT VM I72.l6.101.il to a public address of 80.80.80.1 as the packets leave the NAT-Segment network.
Which type of NAT solution should be implemented to achieve this?
A. DNAT
B. SNAT
C. Reflexive NAT
D. NAT64
Which field in a Tier-1 Gateway Firewall would be used to allow access for a collection of trustworthy web sites?
A. Source
B. Profiles-> Context Profiles
C. Destination
D. Profiles-> L7 Access Profile
Which NSX feature can be leveraged to achieve consistent policy configuration and simplicity across sites?
A. VRF Lite
B. Ethernet VPN
C. NSX MTML5 UI
D. NSX Federation
Which two of the following will be used for Ingress traffic on the Edge node supporting a Single Tier topology? (Choose two.)
A. Inter-Tier interface on the Tier-0 gateway
B. Tier-0 Uplink interface
C. Downlink Interface for the Tier-0 DR
D. Tier-1 SR Router Port
E. Downlink Interface for the Tier-1 DR
What should an NSX administrator check to verify that VMware Identity Manager Integration Is successful?
A. From VMware Identity Manager the status of the remote access application must be green.
B. From the NSX UI the status of the VMware Identity Manager Integration must be "Enabled".
C. From the NSX CLI the status of the VMware Identity Manager Integration must be "Configured".
D. From the NSX UI the URI in the address bar must have "locaNfatse" part of it.