Where does an administrator configure the VLANs used in VRF Lite? (Choose two.)
bc
How does the Traceflow tool identify issues in a network?
d
Which statement is true about an alarm in a Suppressed state?
a
Which three of the following describe the Border Gateway Routing Protocol (BGP) configuration on a Tier-0 Gateway? (Choose three.)
acd
A company is deploying NSX micro-segmentation in their vSphere environment to secure a simple application composed of web, app, and database tiers.
The naming convention will be:
WKS-WEB-SRV-XXX
WKY-APP-SRR-XXX
WKI-DB-SRR-XXX What is the optimal way to group them to enforce security policies from NSX?
b
A customer has a network where BGP has been enabled and the BGP neighbor is configured on the Tier-0 Gateway. An NSX administrator used the get gateways command to retrieve this information:
Which two commands must be executed to check BGP neighbor status? (Choose two.)
af
Which two statements are true about IDS Signatures? (Choose two.)
cd
Which VPN type must be configured before enabling a L2VPN?
b
Which two of the following features are supported for the Standard NSX Application Platform Deployment? (Choose two.)
ab
What is the VMware recommended way to deploy a virtual NSX Edge Node?
c