Download VMware Certified Professional 6 - Network Virtualization (NSX v6.2).2V0-642.PracticeTest.2018-11-26.74q.vcex

Vendor: VMware
Exam Code: 2V0-642
Exam Name: VMware Certified Professional 6 - Network Virtualization (NSX v6.2)
Date: Nov 26, 2018
File Size: 3 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
When specifying a source for a security rule, what is the purpose of the Negate Source check box? 
  
  1. If Negate Source is selected, the rule is sent to only the objects identified under object type.
  2. If Negate Source is selected, the rule is applied to traffic coming from all sources except for the source identified under the object type.
  3. If Negate Source is not selected, the rule is applied to traffic coming from all sources except for the source identified under the object type.
  4. if Negate Source is not selected, the rule is sent to only the objects identified under the object type.
Correct answer: B
Explanation:
Reference: https://pubs.vmware.com/NSX-6/index.jsp?topic=%2Fcom.vmware.nsx.admin.doc%2FGUID-C7A0093A-4AFA-47EC-9187-778BDDAD1C65.html
Reference: https://pubs.vmware.com/NSX-6/index.jsp?topic=%2Fcom.vmware.nsx.admin.doc%2FGUID-C7A0093A-4AFA-47EC-9187-778BDDAD1C65.html
Question 2
Which vSphere network object abstracts the physical network, provides access-level switching in the hypervisor and enables support for overlay networking?
  1. Standard Switch
  2. Distributed Port Group
  3. Distributed Switch
  4. Logical Switch
Correct answer: C
Explanation:
Reference: https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/products/nsx/vmw-nsx-network-virtualization-design-guide.pdf
Reference: https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/products/nsx/vmw-nsx-network-virtualization-design-guide.pdf
Question 3
A network administrator has been tasked with deploying a 3-tier application across two data centers. Tier-1 and tier-2 will be located in Datacenter-A and tier-3 will be located in Datacenter-B. 
Which NSX components are needed to make this deployment functional?
  1. A universal transport zone deployed with a universal distributed logical router (UDLR), a universal logical switch and two local logical switches connected to the UDLR.
  2. A universal transport zone deployed with a universal distributed logical router (UDLR), two universal logical switches and a single logical switch connected to the UDLR.
  3. A universal transport zone deployed with a universal distributed logical router (UDLR) and three universal logical switches connected to the UDLR.
  4. A universal transport zone, a universal distributed logical router (UDLR) and three local switches in each data center connected to the UDLR.
Correct answer: C
Question 4
Which two are accurate statements with regards to Guest Introspection installation? (Choose two.)
  1. The service virtual machine performs data security and activity monitoring.
  2. The installation deploys a virtual machine to hosts prepared for VMware NSX.
  3. A security policy weight of 4300 is assigned to hosts prepared to Guest Introspection.
  4. Guest Introspection is deployed with NSX Data Security by default.
Correct answer: AB
Question 5
Which three objects are supported for universal synchronization in a Cross-vCenter NSX deployment? (Choose three.)
  1. IP Pools
  2. IP Sets
  3. L2 bridges
  4. MAC Sets
  5. Transport Zones
Correct answer: BDE
Explanation:
Reference: https://pubs.vmware.com/NSX-62/index.jsp?topic=%2Fcom.vmware.nsx-cross-vcenter-install.doc%2FGUID-35831055-57D8-4F2F-95BA-8EFE5362746C.html
Reference: https://pubs.vmware.com/NSX-62/index.jsp?topic=%2Fcom.vmware.nsx-cross-vcenter-install.doc%2FGUID-35831055-57D8-4F2F-95BA-8EFE5362746C.html
Question 6
An organization has a PCI compliant application deployed as part of a larger NSX environment. Every year a team of contractors evaluates the security of the environment and recommends changes. 
What NSX Role and Scope should the contractors be given to minimize access but still allow them to fulfill the stated requirement?
  1. NSX Administrator, Limit access scope
  2. Enterprise Administrator, Limit access scope
  3. Auditor, Limit access scope
  4. Security Administrator, No restrictions
Correct answer: C
Question 7
When creating a new security policy how is the default weight determined?
  1. The default weight is equal to the highest defined weight minus 1000.
  2. The default weight is equal to the highest defined weight plus 1000.
  3. The default weight is equal to the highest defined weight.
  4. The default weight is incremented by 100, starting at 0.
Correct answer: B
Explanation:
Reference: https://pubs.vmware.com/NSX-6/index.jsp?topic=%2Fcom.vmware.nsx.admin.doc%2FGUID-607C399F-0D11-4B95-90DA-A6E17E8C906E.html
Reference: https://pubs.vmware.com/NSX-6/index.jsp?topic=%2Fcom.vmware.nsx.admin.doc%2FGUID-607C399F-0D11-4B95-90DA-A6E17E8C906E.html
Question 8
What is the effect on NSX Edge virtual machines when NSX Edge high availability is configured but vSphere HA is NOT configured?
  1. The active-standby NSX Edge pair will survive one failure. However, the virtual machines must reside on the same host to prevent NSX Edge availability from being compromised.
  2. The active-standby NSX Edge HA pair will survive multiple failures.
  3. The active-standby NSX Edge HA pair will survive one failure. However, if another failure happens before the second Edge appliance is restored, NSX Edge availability can be compromised.
  4. The active-standby NSX Edge HA pair will survive two failures. However, the virtual machines must reside on two different hosts.
Correct answer: C
Explanation:
Reference: https://pubs.vmware.com/NSX-6/index.jsp?topic=%2Fcom.vmware.nsx.admin.doc%2FGUID-6C4F0C33-C6DD-432B-AA91-10AD6B449125.html
Reference: https://pubs.vmware.com/NSX-6/index.jsp?topic=%2Fcom.vmware.nsx.admin.doc%2FGUID-6C4F0C33-C6DD-432B-AA91-10AD6B449125.html
Question 9
An administrator creates a SpoofGuard policy for specific networks. 
Which two modes are associated with this type of policy? (Choose two.)
  1. Automatically trust IP assignments on their first use
  2. Manually inspect and approve all IP assignments before use
  3. Manually approve IP assignments listed in the Host file before use
  4. Automatically inspect and trust IP assignments on every use
Correct answer: AB
Explanation:
Reference: http://www.virtually-limitless.com/vcix-nv-study-guide/create-modify-or-delete-spoofguard-policies/
Reference: http://www.virtually-limitless.com/vcix-nv-study-guide/create-modify-or-delete-spoofguard-policies/
Question 10
Which would best describe a workload in Compute Cluster 1 attached to a logical switch port group? 
  
  1. Within Compute Cluster 1, Layer 2 would function, but Layer 3 would fail.
  2. Within Compute Cluster 1, Layer 2 would fail, and Layer 3 would fail.
  3. Within Compute Cluster 1, Layer 2 would fail, but Layer 3 would function.
  4. Within Compute Cluster 1, Layer 2 would function, and Layer 3 would function.
Correct answer: A
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!