getcertified4sure.com

2V0-642 Exam

Shortcuts To 2V0-642(1 to 10)




Act now and download your VMware 2V0-642 test today! Do not waste time for the worthless VMware 2V0-642 tutorials. Download Most recent VMware VMware Certified Professional 6 - Network Virtualization 6.2 Exam exam with real questions and answers and begin to learn VMware 2V0-642 with a classic professional.

Q1. Which three methods can be used by the NSX Distributed Firewall to discover IP addresses? (Choose three )

A. DHCP Snooping

B. IP Sets

C. Spoofguard configured forTrust on First Use.

D. VMware Tools installed on every guest virtual machine.

E. ARP Spoofing

Answer: A,C,D

Explanation:

Referencehttps://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2125437


Q2. A network administrator is troubleshooting an issue and needs to observe an injected packet as it passes through the physical and logical network.

Which tool will accomplish this?

A. Traceflow

B. NetFlow

C. Flow Monitoring

D. Activity Monitoring

Answer: A

Explanation:

Referencehttps://pubs.vmware.com/NSX-62/index.jsp?topic=%2Fcom.vmware.nsx.admin.doc%2FGUID-05647D5E-B669-40A8- 8B84-02C18781186F.html


Q3. An administrator is attempting to troubleshoot a routing issue between the Edge Services Gateway (ESG) and the Distributed Logical Router (DLR).

Based on the exhibit, which method CANNOT be used to troubleshoot the issue?

A. SSH session into 192.168.100.3 on the ESG.

B. Console session into the ESG.

C. Console session into the DLR.

D. SSH session into 192.168.10.5 on the DLR.

Answer: A


Q4. An administrator has been asked to provide single failure redundancy. What is the minimum supported number of NSX Controllers needed to meet this requirement?

A. 2

B. 3

C. 1

D. 5

Answer: B

Explanation:

Referencehttp://www.vmwarearena.com/vmware-nsx-installation-part-4-deploying-nsx- controller/


Q5. An administrator has implemented VMware NSX on a leaf-spine underlay. They have deployed the following in the data center:

• Two racks for a management cluster that is not prepared for VMware NSX

• Six racks for compute clusters

• Two racks for an Edge cluster which holds a DLR control VM for bridging, and North/South Edge Service Gateways

Which three of the following are true regarding the physical and logical networking of the environment? (Choose three )

A. At least one VXLAN segment spans across all the racks

B. VXLAN segments span the compute and Edge racks

C. At least one VLAN spans the compute racks

D. At least one VLAN spans across the two management racks

E. At least 2 VLANs span across the two Edge racks.

Answer: B,C,D


Q6. Which details can an administrator verify from the Summary tab of the VMware NSX Manager? (Choose three)

A. Current time

B. Average MTBF

C. Version

D. Storage utilization

E. Health Score

Answer: A,C,E


Q7. What are two things that should be done before upgrading from vCloud Networking and Security to NSX? (Choose two.)

A. Power off vShield Manager

B. Deploy NSX Manager virtualappliance

C. Uninstall vShield Data Security

D. Ensure that forward and reverse DNS is functional

Answer: C,D

Explanation:

Referencehttps://pubs.vmware.com/NSX- 62/index.jsp?topic=%2Fcom.vmware.nsx.upgrade.endpoint.doc%2FGUID-0D1B18B1-B5CC-483B-8BC0-95A2E8C025B9.html


Q8. Which two network services are abstracted from the underlying hardware by NSX? (Choose two.)

A. Virtual Private Networks

B. Multiprotocol Label Switching

C. Load Balancing

D. Overlay Transport Virtualizations

Answer: A,C

Explanation:

Referencehttp://www.altaro.com/vmware/vmware-nsx-abstracting-the-network-layer/


Q9. A virtualized application needs access to a physical database. Both servers are on the 172.168.3.0/24 subnet. NSX has been deployed across the entire virtual environment.

What method can be used to allow access between the servers?

A. Configure a DLR with an L2 bridge instance for 172.168.3.0/24 VXLAN to VLAN traffic.

B. Route 172.168.3.0/24 to the NSX Edge where the logical switch of the applicationexists.

C. Configure a NAT rule for 172.177.13/024 for the database physical router.

D. Configure the logical switch to bridge 172.168.3.0/24 to the physical router of the database.

Answer: D


Q10. Internet access is required from virtual machines located on any logical switch Direct access from the internet to these virtual machines is NOT permitted

Which perimeter NSX Edge feature would achieve this with the least configuration?

A. LB

B. VPN

C. SNAT

D. DNAT

Answer: D