An NSX administrator has deployed a single NSX Manager node and will be adding two additional nodes to form a 3-node NSX Management Cluster for a production environment. The administrator will deploy these two additional nodes and Cluster VIP using the NSX UI.
What two are the prerequisites for this configuration? (Choose two.)
A customer is preparing to deploy a VMware Kubernetes solution in an NSX environment.
What is the minimum MTU size for the UPLINK profile?
When a stateful service is enabled for the first time on a Tier-0 Gateway, what happens on the NSX Edge node?
An architect receives a request to apply distributed firewall in a customer environment without making changes to the network and vSphere environment. The architect decides to use Distributed Firewall on VDS.
Which two of the following requirements must be met in the environment? (Choose two.)
Which of the following exist only on Tler-1 Gateway firewall configurations and not on Tier-0?
An NSX administrator would like to export syslog events that capture messages related to NSX host preparation events.
Which message ID (msgid) should be used in the syslog export configuration command as a filter?
Which command is used to set the NSX Manager’s logging-level to debug mode for troubleshooting?
What should an NSX administrator check to verify that VMware Identity Manager integration is successful?
When running nsxcli on an ESXi host, which command will show the Replication mode?
Which TraceFlow traffic type should an NSX administrator use for validating connectivity between App and DB virtual machines that reside on different segments?
Which troubleshooting step will resolve an error with code 1001 during the configuration of a time-based firewall rule?
An administrator is configuring service insertion for Network Introspection.
Which two places can the Network Introspection be configured? (Choose two.)
What can the administrator use to identify overlay segments in an NSX environment if troubleshooting is required?
Which steps are required to activate Malware Prevention on the NSX Application Platform?
Which two BGP configuration parameters can be configured in the VRF Lite gateways? (Choose two.)
Which two of the following are used to configure Distributed Firewall on VDS? (Choose two.)
NSX improves the security of today's modern workloads by preventing lateral movement, which feature of NSX can be used to achieve this?
What are the four types of role-based access control (RBAC) permissions? (Choose four.)
An administrator has connected two virtual machines on the same overlay segment. Ping between both virtual machines is successful.
What type of network boundary does this represent?
Which two of the following parameters are required for deploying the NSX Application Platform? (Choose two.)
What are four NSX built-in role-based access control (RBAC) roles? (Choose four.)
Which three data collection sources are used by NSX Network Detection and Response to create correlations/Intrusion campaigns? (Choose three.)
Which two choices are use cases for Distributed Intrusion Detection? (Choose two.)
An NSX administrator is reviewing syslog and notices that Distributed Firewall Rules hit counts are not being logged.
What could cause this issue?
An NSX administrator is using ping to check connectivity between VM1 running on ESXi1 to VM2 running on ESXi2. The ping tests fail. The administrator knows the maximum transmission unit size on the physical switch is 1600.
Which command does the administrator use to check the VMware kernel ports for tunnel end point communication?