<< Prev Question Next Question >>

Question 11/51

An NSX administrator is creating a Tier-1 Gateway configured In Active-Standby High Availability Mode. In the event of node failure, the failover policy should not allow the original tailed node to become the Active node upon recovery.
Which failover policy meets this requirement?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (51q)
Question 1: Refer to the exhibit. An administrator configured NSX Advanc...
Question 2: When a stateful service is enabled for the first lime on a T...
Question 3: An NSX administrator Is treating a NAT rule on a Tler-0 Gate...
Question 4: Where does an administrator configure the VLANs used In VRF ...
Question 5: What are two supported host switch modes? (Choose two.)...
Question 6: A company Is deploying NSX micro-segmentation in their vSphe...
Question 7: An NSX administrator would like to create an L2 segment with...
Question 8: Which three selections are capabilities of Network Topology?...
Question 9: Refer to the exhibit. An administrator would like to change ...
Question 10: Which VPN type must be configured before enabling a L2VPN?...
Question 11: An NSX administrator is creating a Tier-1 Gateway configured...
Question 12: Which CLI command on NSX Manager and NSX Edge is used to cha...
Question 13: Which two of the following are used to configure Distributed...
Question 14: An NSX administrator is reviewing syslog and notices that Di...
Question 15: Which choice is a valid insertion point for North-South netw...
Question 16: An NSX administrator is troubleshooting a connectivity issue...
Question 17: Which two statements are correct about East-West Malware Pre...
Question 18: Which three security features are dependent on the NSX Appli...
Question 19: An administrator needs to download the support bundle for NS...
Question 20: What are two valid options when configuring the scope of a d...
Question 21: A security administrator needs to configure a firewall rule ...
Question 22: How does the Traceflow tool identify issues in a network?...
Question 23: Which two statements describe the characteristics of an Edge...
Question 24: When running nsxcli on an ESXi host, which command will show...
Question 25: Which two built-in VMware tools will help Identify the cause...
Question 26: Where is the insertion point for East-West network introspec...
Question 27: What are the four types of role-based access control (RBAC) ...
Question 28: When a stateful service is enabled for the first lime on a T...
Question 29: Which field in a Tier-1 Gateway Firewall would be used to al...
Question 30: An administrator has a requirement to have consistent policy...
Question 31: What is the VMware recommended way to deploy a virtual NSX E...
Question 32: What are two valid BGP Attributes that can be used to influe...
Question 33: Which TraceFlow traffic type should an NSX administrator use...
Question 34: When collecting support bundles through NSX Manager, which f...
Question 35: Which is an advantages of a L2 VPN In an NSX 4.x environment...
Question 36: An administrator has been tasked with implementing the SSL c...
Question 37: Match the NSX Intelligence recommendations with their correc...
Question 38: Which troubleshooting step will resolve an error with code 1...
Question 39: Refer to the exhibit. Which two items must be configured to ...
Question 40: What should an NSX administrator check to verify that VMware...
Question 41: Sort the rule processing steps of the Distributed Firewall. ...
Question 42: Which VMware GUI tool is used to identify problems in a phys...
Question 43: Which command Is used to test management connectivity from a...
Question 44: Which CLI command is used for packet capture on the ESXi Nod...
Question 45: Which three protocols could an NSX administrator use to tran...
Question 46: Which command is used to set the NSX Manager's logging-level...
Question 47: Which command is used to display the network configuration o...
Question 48: What must be configured on Transport Nodes for encapsulation...
Question 49: Which three DHCP Services are supported by NSX? (Choose thre...
Question 50: Which two statements are true for IPSec VPN? (Choose two.)...
Question 51: A company security policy requires all users to log Into app...