2V0-642 Premium Bundle

2V0-642 Premium Bundle

VMware Certified Professional 6 - Network Virtualization 6.2 Exam Certification Exam

4.5 
(16440 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
December 4, 2024Last update

VMware 2V0-642 Free Practice Questions

Q1. An NSX environment requires physical NIC redundancy for all dvPortGroups when connecting hosts to the physical network. There are two 10Gb NIC's per host.

Which two teaming methods should be used to ensure both links are utilized simultaneously? (Choose two )

A. Virtual Port Channel

B. LACP Port-Channel

C. Static Port-Channel

D. Explicit Failover Order

Answer: A,B

Q2. Exhibit:

Which would best describe a workload in Compute Cluster 1 attached to a logical switch port group?

A. Within Compute Cluster 1, Layer 2 would function, but Layer 3 would fail.

B. Within Compute Cluster 1, Layer 2 would fail, and Layer 3 would fail.

C. Within ComputeCluster 1, Layer 2 would fail, but Layer 3 would function.

D. Within Compute Cluster 1, Layer 2 would function, and Layer 3 would function.

Answer: A

Explanation:

This has an interesting side effect: if you didn’t add all clusters of a given DVS to the TZ, those clusters you haven’t added will still have access to that Logical Switch. Let’s have a look at the following diagram:

From <https://telecomoccasionally.wordpress.com/2014/12/27/nsx-for-vsphere- understanding-transport-zone-scoping/>

his means that in out hypothetical case, if we were to create a DLR and connect to it that

LS we’ve created earlier, DLR instance would get created on hosts in clusters Comp B and

Mgmt / Edge, but not on hosts in clusteCr omp A:

From <https://telecomoccasionally.wordpress.com/2014/12/27/nsx-for-vsphere-understanding-transport-zone-scoping/

Q3. When specifying a source for a security rule, what is the purpose of the Negates Source check box?

A. IfNegate Sourceis selected, the rule is sent to only the objects identified under object type.

B. IfNegate Sourceis selected, the rule is applied to traffic coming from all sources except for the source identified under the object type.

C. IfNegate Sourceis not selected, the rule is applied to traffic comingfrom all sources except for the source identified under the object type.

D. ifNegate Sourceis not selected, the rule is sent to only the objects identified under the object type.

Answer: B

Reference: https://pubs.vmware.com/NSX-6/index.jsp?topic=%2Fcom.vmware.nsx.admin.doc%2FGUID-C7A0093A-4AFA-47EC- 9187-778BDDAD1C65.html

Q4. An NSX Edge Service Gateway has two interfaces:

• Internal interface named Internal Access

-- IP address = 10.10.10.1

-- Network mask = 255.255.255.0

• Uplink interface named Physical Uplink

-- IP address = 20.20.20.1

-- Network mask = 255.255.255.0

A vSphere administrator wants to add a SNAT rule to allow traffic from the internal network segment to access external resources via the uplink interface.

Which three steps should the vSphere administrator do to add the SNAT rule? (Choose three.)

A. Apply the SNAT rule to the Internal Access interface.

B. Select 10.10.10.1 as the translated source IP.

C. Apply the SNAT rule on the Physical Uplink interface.

D. Select 10.10.10.0/24 as the original subnet.

E. Choose 20.20.20.2 as the translated source IP address.

Answer: C,D,E

Q5. What is required before running an Activity Monitoring report?

A. Enable data collection on the NSX Controller.

B. Enable data collection on the vCenter Server.

C. Enable data collection on the NSX Manager.

D. Enable data collection on the virtual machine.

Answer: D

Q6. What is the best practice workflow for a NSX installation to support logical switching?

A. Deploy NSX Manager, Configure Logical Switches, Register with vCenter, Deploy Controllers. Prepare hosts

B. Deploy NSX Manager, Deploy Controllers, Configure Logical Switches, Register withvCenter, Prepare hosts

C. Deploy NSX Manager, Register with vCenter, Prepare hosts, Deploy Controllers, Configure Logical Switches

D. Deploy NSX Manager, Register with vCenter, Deploy Controllers, Prepare hosts, Configure Logical Switches

Answer: B

Q7. Which two methods does VMware NSX offer to integrate with third-party partners? (Choose two )

A. Integration Manager

B. Service Chaining

C. VMwareNSXAPIs

D. Universal Synchronization Service

Answer: A,C

Explanation: https://docs.vmware.com/en/VMware-NSX-for-vSphere/6.3/com.vmware.nsx.admin.doc/GUID-EA477D96-E2D3-488B-90AA- 2F19B4AE327D.html#GUID-EA477D96-E2D3-488B-90AA-2F19B4AE327D

Q8. An NSX administrator is creating a filter as shown below.

What would be the purpose of creating a filter?

A. To quickly add a new rule.

B. To temporarily filter traffic.

C. To quickly remove a rule.

D. To quickly identify rules.

Answer: D

Q9. A network administrator is troubleshooting an issue and needs to observe an injected packet as it passes through the physical and logical network.

Which tool will accomplish this?

A. Traceflow

B. NetFlow

C. Flow Monitoring

D. Activity Monitoring

Answer: A

Explanation:

Referencehttps://pubs.vmware.com/NSX-62/index.jsp?topic=%2Fcom.vmware.nsx.admin.doc%2FGUID-05647D5E-B669-40A8- 8B84-02C18781186F.html

Q10. A workload was attached to a logical switch port group in Compute Cluster 1. Users are complaining that I hey can communicate with other workloads on that port group in the cluster, but not with other workloads on different networks.

What is the most probable cause?

A. The distributed firewall has a default rule set to deny all

B. The Distributed Logical Router was not configured on Compute Cluster 1

C. Compute Cluster 1 is NOT a member of the Transport Zone

D. An NSX Edge has NOT been deployed into Compute Cluster 1

Answer: A

Q11. Which two networking and security components are contained m the backup configuration data of an NSX Manager backup file? (Choose two )

A. vSphere Distributed Switch

B. Resource Pools

C. Edge Services Gateway

D. Grouping Objects

Answer: C,D

Q12. Which two statements are true about NSX Data Security support? (Choose two )

A. It supports HIPAA and PCI-DSS compliance policies as well as U.S. Driver License and Social Security numbers.

B. It supports both Windows and Linux-based virtual machines.

C. It only supports HIPAA and PCI-DSS compliance policies.

D. It only supports Windows-based virtual machines.

Answer: B,C

Explanation:

Referencehttps://www.vmware.com/products/nsx.html

Q13. What is a requirement of NSX Data Security?

A. NSX manager must be configured for Active Directory integration

B. The Global Flow Collection Status must be set to Enabled

C. Guest Introspection must be installed on the cluster

D. AN IP Pool must be created.

Answer: C

Explanation:

Referencehttp://pubs.vmware.com/NSX-61/index.jsp?topic=%2Fcom.vmware.nsx.install.doc%2FGUID-62B22E0C-ABAC-42D8-93AA-BDFCD0A43FEA.html

Q14. Which tool is used to detect rogue services?

A. NSX Logical Firewall

B. NSX Logical Router

C. Activity Monitoring

D. Flow Monitoring

Answer: D

Q15. What are two things that should be done before upgrading from vCloud Networking and Security to NSX? (Choose two.)

A. Power off vShield Manager

B. Deploy NSX Manager virtualappliance

C. Uninstall vShield Data Security

D. Ensure that forward and reverse DNS is functional

Answer: C,D

Explanation:

Referencehttps://pubs.vmware.com/NSX- 62/index.jsp?topic=%2Fcom.vmware.nsx.upgrade.endpoint.doc%2FGUID-0D1B18B1-B5CC-483B-8BC0-95A2E8C025B9.html

Q16. Which are two uses of the NSX DLR protocol address? (Choose two.)

A. When configuring BGP the protocol address is used to forward traffic to peers.

B. When configuringBGP the protocol address is used by the protocol to form adjacencies with peers.

C. When configuring OSPF the protocol address is used to forward traffic to peers.

D. When configuring OSPF the protocol address is used by the protocol to form

adjacencies with peers.

Answer: B,D

Explanation:

For a logical router

a

Click Edit at the top right corner of the window. 

b

Click Enable OSPF. 

c

In Forwarding Address, type an IP address that is to be used by the router datapath module in the hosts to forward datapath packets.

d

In Protocol Address, type a unique IP address within the same subnet as the Forwarding Address. Protocol address is used by the protocol to form adjacencies with the peers

From <https://pubs.vmware.com/NSX-6/topic/com.vmware.nsx.admin.doc/GUID-6E985577-3629-42FE-AC22-C4B56EFA8C9B.html>

START 2V0-642 EXAM