Free VMware 2V0-41.24 Practice Test Questions 2026

Total 114 Questions |

Last Updated On : 7-Apr-2026


VMware NSX 4.X Professional V2

Which two choices are solutions offered by the VMware NSX portfolio? (Choose two.)



A. VMware Tanzu Kubernetes Grid


B. VMware Tanzu Kubernetes Cluster


C. VMware NSX Advanced Load Balancer


D. VMware NSX Distributed IDS/IPS


E. VMware Aria Automation





C.
  VMware NSX Advanced Load Balancer

D.
  VMware NSX Distributed IDS/IPS

Which three DHCP Services are supported by NSX? (Choose three.)



A. Gateway DHCP


B. Segment DHCP


C. DHCP Relay


D. Port DHCP per VNF


E. VRF DHCP Server





B.
  Segment DHCP

C.
  DHCP Relay

As part of an organization’s IT security compliance requirement, NSX Manager must be configured for 2FA (two-factor authentication).
What should an NSX administrator have ready before the integration can be configured?



A. Active Directory LDAP integration with ADFS


B. VMware Identity Manager with NSX added as a Web Application


C. VMware Identity Manager with an OAuth Client added


D. Active Directory LDAP integration with OAuth Client added





B.
  VMware Identity Manager with NSX added as a Web Application

Which CLI command does an NSX administrator run on the NSX Manager to generate support bundle logs if the NSX UI is inaccessible?



A. esxcli system syslog config logger set --id=nsxmanager


B. get support-bundle file vcpnv.tgz


C. vm-support


D. set support-bundle file vcpnv.tgz





B.
  get support-bundle file vcpnv.tgz

Which two choices are use cases for Distributed Intrusion Detection? (Choose two.)



A. Use agentless antivirus with Guest Introspection.


B. Quarantine workloads based on vulnerabilities.


C. Identify risk and reputation of accessed websites.


D. Gain Insight about micro-segmentation traffic flows.


E. Identify security vulnerabilities in the workloads.





B.
  Quarantine workloads based on vulnerabilities.

E.
  Identify security vulnerabilities in the workloads.

Which two statements are true about IDS Signatures? (Choose two.)



A. Users can upload their own IDS signature definitions.


B. An IDS signature contains data used to identify known exploits and vulnerabilities.


C. An IDS signature contains data used to identify the creator of known exploits and vulnerabilities.


D. IDS signatures can be High Risk, Suspicious, Low Risk and Trustworthy.


E. An IDS signature contains a set of instructions that determine which traffic is analyzed.





B.
  An IDS signature contains data used to identify known exploits and vulnerabilities.

E.
  An IDS signature contains a set of instructions that determine which traffic is analyzed.

When deploying an NSX Edge Transport Node, what two valid IP address assignment options should be specified for the TEP IP addresses? (Choose two.)



A. Use an IP Pool


B. Use RADIUS


C. Use a Static IP List


D. Use BootP


E. Use a DHCP Server





A.
  Use an IP Pool

E.
  Use a DHCP Server

What are four NSX built-in rote-based access control (RBAC) roles? (Choose four.)



A. Network Admin


B. Enterprise Admin


C. Full Access


D. Read


E. LB Operator


F. None


G. Auditor





A.
  Network Admin

B.
  Enterprise Admin

E.
  LB Operator

G.
  Auditor

Page 5 out of 15 Pages
PreviousNext
34567
2V0-41.24 Practice Test Home