Last Updated On : 7-Apr-2026
Which two choices are solutions offered by the VMware NSX portfolio? (Choose two.)
A. VMware Tanzu Kubernetes Grid
B. VMware Tanzu Kubernetes Cluster
C. VMware NSX Advanced Load Balancer
D. VMware NSX Distributed IDS/IPS
E. VMware Aria Automation
Which three DHCP Services are supported by NSX? (Choose three.)
A. Gateway DHCP
B. Segment DHCP
C. DHCP Relay
D. Port DHCP per VNF
E. VRF DHCP Server
As part of an organization’s IT security compliance requirement, NSX Manager must be
configured for 2FA (two-factor authentication).
What should an NSX administrator have ready before the integration can be configured?
A. Active Directory LDAP integration with ADFS
B. VMware Identity Manager with NSX added as a Web Application
C. VMware Identity Manager with an OAuth Client added
D. Active Directory LDAP integration with OAuth Client added
Which CLI command does an NSX administrator run on the NSX Manager to generate support bundle logs if the NSX UI is inaccessible?
A. esxcli system syslog config logger set --id=nsxmanager
B. get support-bundle file vcpnv.tgz
C. vm-support
D. set support-bundle file vcpnv.tgz
Which two choices are use cases for Distributed Intrusion Detection? (Choose two.)
A. Use agentless antivirus with Guest Introspection.
B. Quarantine workloads based on vulnerabilities.
C. Identify risk and reputation of accessed websites.
D. Gain Insight about micro-segmentation traffic flows.
E. Identify security vulnerabilities in the workloads.
Which two statements are true about IDS Signatures? (Choose two.)
A. Users can upload their own IDS signature definitions.
B. An IDS signature contains data used to identify known exploits and vulnerabilities.
C. An IDS signature contains data used to identify the creator of known exploits and vulnerabilities.
D. IDS signatures can be High Risk, Suspicious, Low Risk and Trustworthy.
E. An IDS signature contains a set of instructions that determine which traffic is analyzed.
When deploying an NSX Edge Transport Node, what two valid IP address assignment options should be specified for the TEP IP addresses? (Choose two.)
A. Use an IP Pool
B. Use RADIUS
C. Use a Static IP List
D. Use BootP
E. Use a DHCP Server
What are four NSX built-in rote-based access control (RBAC) roles? (Choose four.)
A. Network Admin
B. Enterprise Admin
C. Full Access
D. Read
E. LB Operator
F. None
G. Auditor
| Page 5 out of 15 Pages |
| 34567 |
| 2V0-41.24 Practice Test Home |