Which port is used for NSX REST API Requests?
A. 80
B. 443
C. 5480
D. 8443
Which component automates the consumption of third-party services and provides mapping to virtual machines using a logical policy?
A. NSX Manager
B. Cloud Management Platform (CMP)
C. Service Composer
D. NSX Data Security
An administrator enables the NSX Ticket Logger to track infrastructure changes. The administrator logs out for lunch, returns and logs back in to complete the task. What is the status of ticket logger when the administrator logs back in?
A. The ticket logger still tracks changes until it is turned off by the administrator.
B. The ticket logger is turned off.
C. The ticket logger will prompt the user if they still want to continue tracking changes.
D. The ticket logger will display an error.
What is required before running an Activity Monitoring report?
A. Enable data collection on the NSX Controller
B. Enable data collection on the vCenter Server
C. Enable data collection on the NSX Manager
D. Enable data collection on the virtual machine
What is the function of NSX Data Security?
A. Prevents sensitive data in your virtualized environment from being copied
B. Prevents sensitive data in your virtualized environment from being modified
C. Identifies sensitive data in your virtualized environment based upon regulation security policies
D. Identifies sensitive data in your virtualized environment based upon regulation violation reports
What is the most restrictive NSX role that can be used to create and publish security policies and install virtual appliances?
A. Security Administrator
B. NSX Administrator
C. Auditor
D. Enterprise Administrator
Which two NSX Data Security roles could be assigned to view configured policies and violation reports? (Choose two.)
A. Security Administrator
B. NSX Administrator
C. Auditor
D. Enterprise Administrator
An administrator has deployed NSX in an environment containing a mix of vSphere 5 hosts. The implementation includes the Distributed Firewall Service, but the administrator finds that rules are not being applied to all affected virtual machines.
What two conditions would cause this behavior? (Choose two.)
A. Some hosts have not been prepared for NSX.
B. Only ESXi 5.5 and later hosts can push the rules to the virtual machines.
C. Only ESXi 5.1 and later hosts can push the rules to the virtual machines.
D. Some hosts are blocking the port used for rule distribution.
An administrator wants to perform Activity Monitoring on a large group of virtual machines in an NSX environment. How would this task be accomplished with minimal administrative effort?
A. Create a PowerCLI script to enable virtual machine data collection on each virtual machine.
B. Create a security group in Service Composer and add the virtual machines to the security group.
C. Add the virtual machines to the pre-defined Activity Monitoring security group in Service Composer.
D. Add the virtual machines to a VM folder in vCenter Server and enable data collection.
Which action is not an option for adding Virtual Machines to a Security Group?
A. Adding Virtual Machines to a Security Group and nesting it within another Security Group.
B. Defining Dynamic Membership in the Security Group.
C. Adding Virtual Machines to a Security Policy and associating it with a Security Group.
D. Selecting objects to include within a Security Group.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only VMware exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your VCPN610 exam preparations and VMware certification application, do not hesitate to visit our Vcedump.com to find your solutions here.