Top Practical 2V0-642 discount pack Tips!
Act now and download your VMware 2V0-642 test today! Do not waste time for the worthless VMware 2V0-642 tutorials. Download Far out VMware VMware Certified Professional 6 - Network Virtualization 6.2 Exam exam with real questions and answers and begin to learn VMware 2V0-642 with a classic professional.
Q11. What is a requirement of NSX Data Security?
A. NSX manager must be configured for Active Directory integration
B. The Global Flow Collection Status must be set to Enabled
C. Guest Introspection must be installed on the cluster
D. AN IP Pool must be created.
Q12. Which three methods can be used by the NSX Distributed Firewall to discover IP addresses? (Choose three )
A. DHCP Snooping
B. IP Sets
C. Spoofguard configured forTrust on First Use.
D. VMware Tools installed on every guest virtual machine.
E. ARP Spoofing
Q13. A customer has Cisco Nexus 1000V switches in their environment and is looking at deploying NSX
Which statement is correct?
A. The environment must be migrated from the Nexus 1000V to vSphere Distributed Switches.
B. The environment must be configured for VXLAN over the Nexus 1000V.
C. The environment can use the Nexus 1000V switches for the NSX deployment.
D. The environment must be migrated from the Nexus 1000V to vSphere Standard Switches.
Q14. An NSX environment requires physical NIC redundancy for all dvPortGroups when connecting hosts to the physical network. There are two 10Gb NIC's per host.
Which two teaming methods should be used to ensure both links are utilized simultaneously? (Choose two )
A. Virtual Port Channel
B. LACP Port-Channel
C. Static Port-Channel
D. Explicit Failover Order
Q15. When specifying a source for a security rule, what is the purpose of the Negates Source check box?
A. IfNegate Sourceis selected, the rule is sent to only the objects identified under object type.
B. IfNegate Sourceis selected, the rule is applied to traffic coming from all sources except for the source identified under the object type.
C. IfNegate Sourceis not selected, the rule is applied to traffic comingfrom all sources except for the source identified under the object type.
D. ifNegate Sourceis not selected, the rule is sent to only the objects identified under the object type.
Reference: https://pubs.vmware.com/NSX-6/index.jsp?topic=%2Fcom.vmware.nsx.admin.doc%2FGUID-C7A0093A-4AFA-47EC- 9187-778BDDAD1C65.html
Which would best describe a workload in Compute Cluster 1 attached to a logical switch port group?
A. Within Compute Cluster 1, Layer 2 would function, but Layer 3 would fail.
B. Within Compute Cluster 1, Layer 2 would fail, and Layer 3 would fail.
C. Within ComputeCluster 1, Layer 2 would fail, but Layer 3 would function.
D. Within Compute Cluster 1, Layer 2 would function, and Layer 3 would function.
This has an interesting side effect: if you didn’t add all clusters of a given DVS to the TZ, those clusters you haven’t added will still have access to that Logical Switch. Let’s have a look at the following diagram:
From <https://telecomoccasionally.wordpress.com/2014/12/27/nsx-for-vsphere- understanding-transport-zone-scoping/>
his means that in out hypothetical case, if we were to create a DLR and connect to it that
LS we’ve created earlier, DLR instance would get created on hosts in clusters Comp B and
Mgmt / Edge, but not on hosts in clusteCr omp A:
Q17. Which two options are correct regarding vSphere Distributed Switches? (Choose two )
A. A single vDS can span multiple vCenter Servers
B. A single host can be attached to multiple vDS
C. A single vDS can span multiple hosts across multiple clusters
D. A vDS is automatically created when a new 802.1Q trunk is configured
Q18. What are two things that should be done before upgrading from vCloud Networking and Security to NSX? (Choose two.)
A. Power off vShield Manager
B. Deploy NSX Manager virtualappliance
C. Uninstall vShield Data Security
D. Ensure that forward and reverse DNS is functional
Q19. Which tool is used to detect rogue services?
A. NSX Logical Firewall
B. NSX Logical Router
C. Activity Monitoring
D. Flow Monitoring
Q20. Which component automates the consumption of third-party services and provides mapping to virtual machines using a logical policy?
A. NSX Manager
B. Cloud Management Platform (CMP)
C. Service Composer
D. NSX Data Security