What are three common problems for administrators when managing application with network security models that are not virtualized? (Choose three.)
A. Lack of Interoperability and automation creates error-prone manual work.
B. Integration of third-party security products with home products is not possible.
C. Deploying and managing third-party security products become difficult.
D. Load balancing by vMotion is not possible.
E. There is limited visibility into a workload's security posture and policies.
Why is VMware NSX the most secure environment against threats and vulnerabilities?
A. Does not require high-end security protocols due to trie isolated arrangements or virtual machines.
B. Offers a threat-free network because each virtual machine is managed by customized security policies.
C. Offers no risk from unrelated streams of data communicating with each other.
D. Handles threats efficiently through the use of alerts and notifications, before any honzontal impact is created to the adjacent virtual machine
How can the legacy physical network be simple, stable and reliable when network abstraction is implemented?
A. By leveraging the existing physical devices without configuration changes
B. By automating services for provisioning new services.
C. By configuring new VLANs.
D. By integrating third-party devices with the existing infrastructure.
Which setback is NOT related to the hardware-centric legacy of networking?
A. Unpredicted downtime occurrences.
B. Insufficient and weak perimeter security.
C. Increased capital and operational costs.
D. Complexity in service deployment.
How do virtual networks that are natively isolated from each other provide support for overlapping IP address in a multi-tenant environment?
A. By enabling isolation without using access control lists and firewall rules.
B. By enabling isolation with the help of Active Directory (AD).
C. By employing the spanning tree protocol.
D. By implementing load balancing.
Which component of NSX logical firewall, offers by the NSX Edge Services Gateway (ESG), focuses on North-South traffic enforcement at the data center perimeter or tenant perimeter?
A. Distributed firewall
B. Centralized NSX Edge firewall
C. NSX controller cluster
D. Distributed logical router
How does Software-Defined Data Center (SDDC) facilitate easy provisioning and management of the underlying physical resources?
A. Organizes physical resources into logical pools.
B. Calculate the number of users.
C. Organizes physical resources into clusters
D. Uses predetermined policies and rules.
What is the advantage of live migration of virtual machines with VMware Site Recovery Manager and VMware NSX?
A. Micro-segmentation security.
B. Networking beyond data center.
C. Simplified application deployment.
D. Reduced Recovery Time Objective (RTO) by 80 percent.
What is the default virtual standard switch that is created when ESXi is installed on a hypervisor?
A. vSwitch 1
B. vSwitch
C. vSwitch0
D. vSwitcj2
Which component of NSX logical firewall, offered by the NSX Edge Services Gateway (ESG), focuses on North-South traffic enforcement perimeter or tenant pen meter?
A. Distributed firewall
B. Centralized NSX Edge firewall
C. NSX controller cluster
D. Distributed logical router