2V0-641 VMware Certified Professional 6 Network Exam Set 1

Which Virtual Machine cannot be protected by the Distributed Firewall?


Options are :

  • A Virtual Machine connected to a vDS Portgroup running on an ESXi 5.5 host.
  • A Virtual Machine connected to a vDS Portgroup running on an ESXi 5.1 host.
  • A Virtual Machine connected to a vSS Portgroup running on an ESXi 5.5 host.
  • A Virtual Machine connected to a logical switch running on an ESXi 5.1 host.

Answer : A Virtual Machine connected to a vSS Portgroup running on an ESXi 5.5 host.

VCPC550 VMware Certified Professional Cloud Practice Test Set 9

Which tool is used to detect rogue services?


Options are :

  • Activity Monitoring
  • Flow Monitoring
  • NSX Logical Firewall
  • NSX Logical Router

Answer : Flow Monitoring

If a Security Group is the Source for a General Logical Firewall Rule, which Virtual Machines willbe affected by the rule?


Options are :

  • Each Virtual Machine defined in the Source and Destination fields of the Logical Firewall Rule.
  • Each Virtual Machine defined in the Security Group.
  • Each Virtual Machine identified in the Applied To field of the Logical Firewall Rule.
  • Each Virtual Machine identified in the Destination field of the Logical Firewall Rule.

Answer : Each Virtual Machine identified in the Applied To field of the Logical Firewall Rule.

What is required before running an Activity Monitoring report?


Options are :

  • Enable data collection on the virtual machine.
  • Enable data collection on the NSX Controller.
  • Enable data collection on the vCenter Server.
  • Enable data collection on the NSX Manager.

Answer : Enable data collection on the virtual machine.

VCP-410 VMware Certified Professional on VSphere 4 Exam Set 17

A user needs to be given the ability to make configuration changes on a specific NSX Edgedevice. What role and scope could be used to meet this requirement?


Options are :

  • NSX Administrator role and No restriction scope
  • Security Administrator role and Limit Access scope
  • Security Administrator role and No restriction scope
  • NSX Administrator role and Limit Access scope

Answer : Security Administrator role and Limit Access scope

Where does the Distributed Logical Firewall enforce firewall rules?


Options are :

  • At the ESXi host vmnic used by the vSphere Distributed Switch.
  • At the Virtual Machine's virtual Network Interface Card (vNIC).
  • At the Logical Switch virtual port that the Virtual Machine connects to.
  • At the NSX Controller's firewall kernel module.

Answer : At the Virtual Machine's virtual Network Interface Card (vNIC).

Which two NSX Data Security roles could be assigned to view configured policies and violationreports? (Choose two.)A.Security AdministratorB.NSX AdministratorC.AuditorD.Enterprise Administrator


Options are :

  • a,c
  • b,c
  • c,d
  • a,b

Answer : a,c

VMware VDCD510 Advanced Professional Data Center Design Exam Set 6

An administrator has deployed NSX in an environment containing a mix of vSphere 5 hosts. Theimplementation includes the Distributed Firewall Service, but the administrator finds that rules arenot being applied to all affected virtual machines.What two conditions would cause this behavior? (Choose two.)A.Some hosts have not been prepared for NSX.B.Only ESXi 5.5 and later hosts can push the rules to the virtual machines.C.Only ESXi 5.1 and later hosts can push the rules to the virtual machines.D.Some hosts are blocking the port used for rule distribution.


Options are :

  • b,c
  • a,b
  • c,d
  • a,c

Answer : a,c

An administrator enables the NSX Ticket Logger to track infrastructure changes. Theadministrator logs out for lunch, returns and logs back in to complete the task. What is the statusof ticket logger when the administrator logs back in?


Options are :

  • The ticket logger will prompt the user if they still want to continue tracking changes.
  • The ticket logger still tracks changes until it is turned off by the administrator.
  • The ticket logger will display an error.
  • The ticket logger is turned off.

Answer : The ticket logger is turned off.

Where does an administrator configure logging for the NSX Manager?


Options are :

  • In the NSX Manager command line interface (CLI)
  • In the vSphere Web Client
  • In the vSphere Syslog Collector
  • In the NSX Manager GUI

Answer : In the NSX Manager GUI

VMware VDCD510 Advanced Professional Data Center Design Exam Set 7

Which component automates the consumption of third-party services and provides mapping tovirtual machines using a logical policy?


Options are :

  • NSX Data Security
  • NSX Manager
  • Cloud Management Platform (CMP)
  • Service Composer

Answer : Service Composer

An administrator needs to verify which port the switch manager is using. Which command shouldbe used?


Options are :

  • show controller-cluster status
  • show controller-cluster logical-switches
  • show controller-cluster core stats
  • show controller-cluster connections

Answer : show controller-cluster connections

Which two options are pieces of information required to perform an NSX backup? (Choose two.)A.Transfer protocolB.Default PortC.Number of backups retainedD.Filename prefix


Options are :

  • b,c
  • a,b
  • a,d
  • c,d

Answer : a,d

2V0-631 VMware Certified Professional 6 Cloud Management Set 4

Which two statements are true regarding NSX High Availability (HA)? (Choose two.)A.NSX HA is configured as Active-ActiveB.NSX HA is configured as Active-Standby.C.If an Active node fails, there is no service interruption during failover.D.If an Active node fails, there is a 15 second service interruption during failover


Options are :

  • a,b
  • b,c
  • c,d
  • a,d

Answer : b,c

An administrator wants to perform Activity Monitoring on a large group of virtual machines in anNSX environment.How would this task be accomplished with minimal administrative effort?


Options are :

  • Create a PowerCLI script to enable virtual machine data collection on each virtual machine.
  • None
  • Add the virtual machines to the pre-defined Activity Monitoring security group in Service Composer
  • Add the virtual machines to a VM folder in vCenter Server and enable data collection.
  • Create a PowerCLI script to enable virtual machine data collection on each virtual machine.

Answer : Add the virtual machines to the pre-defined Activity Monitoring security group in Service Composer

What is the function of NSX Data Security?


Options are :

  • Identifies sensitive data in your virtualized environment based upon regulation security policies
  • Identifies sensitive data in your virtualized environment based upon regulation violation reports
  • Prevents sensitive data in your virtualized environment from being copied
  • Prevents sensitive data in your virtualized environment from being modified

Answer : Identifies sensitive data in your virtualized environment based upon regulation violation reports

VCPN610 VMware Certified Professional Network Virtual Test Set 5

Which service cannot be included in a Security Policy using Service Composer?


Options are :

  • Network Introspection Services
  • Firewall Rules
  • Virtual Private Network Services
  • Endpoint Services

Answer : Virtual Private Network Services

An administrator needs to perform a configuration backup of NSX. From which two locations canthis task be performed? (Choose two.)A.Directly on the NSX ManagerB.From the vSphere Web ClientC.Using the NSX APID.Directly on each NSX Controller


Options are :

  • b,c
  • a,d
  • a,c
  • c,d

Answer : a,c

Where are the distributed NSX firewall decisions logged?


Options are :

  • ESXi host
  • vCenter Server
  • NSX Manager
  • NSX Edge

Answer : ESXi host

VCPC550 VMware Certified Professional Cloud Practice Test Set 8

High Availability (HA) was not initially configured when an administrator deployed an NSX EdgeService Gateway. What should the administrator do to configure the NSX Edge with HA?


Options are :

  • Delete the NSX Edge instance and redeploy it with HA. The configuration data is retained by NSX Manager and pushed to the new NSX Edge instance.
  • Delete the NSX Edge instance and redeploy it with HA. The existing NSX Edge configuration data will be lost
  • Select the NSX Edge instance from the NSX Edges view in Networking & Security. Go to Manage> Settings> Configuration and add a NSX Edge appliance.
  • Select the NSX Edge appliance from the Virtual Machines and Templates view. Go to Actions> All vCenter Actions> Enable HA to configure High Availability.

Answer : Select the NSX Edge instance from the NSX Edges view in Networking & Security. Go to Manage> Settings> Configuration and add a NSX Edge appliance.

Which two options are valid SpoofGuard operational modes? (Choose two.)A.Allow Local Address as Valid Address in This NamespaceB.Allow and Approve DHCP Requests Regardless of Enabled ModeC.Automatically Trust IP Assignments on Their First UseD.Manually Inspect and Approve All IP Assignments Before Use


Options are :

  • c,d
  • a,b
  • b,c
  • a,c

Answer : c,d

An administrator wishes to control traffic flow between two virtual machines. The virtual machinesare in the same subnet, but are located on separate ESXi hosts. The administrator deploys anEdge Firewall to one of the hosts and verifies the default firewall rule is set to deny, but the twovirtual machines can still communicate with each other.What task will correct this issue?


Options are :

  • Remove any other firewall appliances that may exist on either of the ESXi hosts.
  • Deploy another Edge Firewall on the host running the second virtual machine.
  • Deploy a Distributed Firewall with firewall rules to prevent traffic between the virtual machines.
  • Configure both ESXi host firewalls to deny traffic from the virtual machine on the other host.
  • None

Answer : Deploy a Distributed Firewall with firewall rules to prevent traffic between the virtual machines.

VMware VDCD510 Advanced Professional Data Center Design Exam Set 7

What is the most restrictive NSX role that can be used to create and publish security policies?


Options are :

  • NSX Administrator
  • Enterprise Administrator
  • Security Administrator
  • Auditor

Answer : Enterprise Administrator

Which port is used for NSX REST API Requests?


Options are :

  • 8443
  • 5480
  • 80
  • 443

Answer : 443

How are Logical Firewall rules applied to affected virtual machines?


Options are :

  • They are pushed by the NSX Manager to all the ESXi hosts in the NSX environment.
  • They are pushed by the NSX Controllers into all the ESXi hosts in the same Transport Zone.
  • They are pushed by the NSX Controllers to the ESXi hosts running the destination virtual machines.
  • They are pushed by the NSX Manager to the ESXi hosts running the source and/or destination virtual machines.

Answer : They are pushed by the NSX Manager to the ESXi hosts running the source and/or destination virtual machines.

VCPC610 VMware Certified Professional 6 Cloud Practice Test Set 3

Which two actions take place when an active NSX Edge instance fails? (Choose two.)A.Once the original NSX Edge instance is recovered, it preempts the other NSX Edge instance andtakes over the active role.B.The standby NSX Edge instance becomes the active instance and requests routing updates fromthe routing neighbors.C.Once the original NSX Edge instance is recovered, the NSX Manager attempts to place it on adifferent host from the other NSX Edge instance.D.The standby NSX Edge instance becomes the active instance and retains any routing neighboradjacencies.


Options are :

  • b,c
  • a,b
  • c,d
  • a,d

Answer : c,d

Which action is not an option for adding Virtual Machines to a Security Group?


Options are :

  • Adding Virtual Machines to a Security Policy and associating it with a Security Group.
  • Selecting objects to include within a Security Group.
  • Adding Virtual Machines to a Security Group and nesting it within another Security Group.
  • Defining Dynamic Membership in the Security Group.

Answer : Adding Virtual Machines to a Security Policy and associating it with a Security Group.

Which is not a valid Destination option for a General Logical Firewall rule?


Options are :

  • Network
  • MAC Set
  • Virtual App
  • Datacenter

Answer : MAC Set

VCP-410 VMware Certified Professional on VSphere 4 Exam Set 1

Which NSX component can validate that security policies at your organization are being enforcedcorrectly?


Options are :

  • Activity Monitoring
  • Distributed firewalls
  • Flow Monitoring
  • ERSPAN

Answer : Activity Monitoring

An administrator manages a TFTP server virtual machine that is connected to a Logical Switchwith a VNI of 7321. The TFTP server has been configured to use port 1069. An NSX Edge ServiceGateway is connected to VNI 7321 and has an uplink interface with access to the physicalnetwork. Assume external users can reach the Service Gateway.What should the administrator configure to ensure external connections to the TFTP server aresuccessful?


Options are :

  • Create a DNAT rule with the original port of 69 and translated port of 1069.
  • Create a SNAT rule with the original port of 69 and translated port of 1069.
  • Create a DNAT rule with the original port of 1069 and translated port of 69.
  • None of the above
  • Create a SNAT rule with the original port of 1069 and translated port of 69.

Answer : Create a DNAT rule with the original port of 69 and translated port of 1069.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions

Subscribe to See Videos

Subscribe to my Youtube channel for new videos : Subscribe Now