aiotestking uk

2V0-642 Exam Questions - Online Test


2V0-642 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. What is the best practice workflow for a NSX installation to support logical switching?

A. Deploy NSX Manager, Configure Logical Switches, Register with vCenter, Deploy Controllers. Prepare hosts

B. Deploy NSX Manager, Deploy Controllers, Configure Logical Switches, Register withvCenter, Prepare hosts

C. Deploy NSX Manager, Register with vCenter, Prepare hosts, Deploy Controllers, Configure Logical Switches

D. Deploy NSX Manager, Register with vCenter, Deploy Controllers, Prepare hosts, Configure Logical Switches

Answer: B

Q2. When designing a multi-site NSX deployment, which capably requires Enhanced Linked Mode to function?

A. Creating Universal Transport Zones

B. Creating Universal Logical Switches

C. Cross-vCenter vMotion

D. Registering a Secondary NSX Manager

Answer: A

Explanation:

Referencehttps://pubs.vmware.com/NSX- 62/topic/com.vmware.ICbase/PDF/nsx_62_cross_vc_install.pdf

Q3. Which details can an administrator verify from the Summary tab of the VMware NSX Manager? (Choose three)

A. Current time

B. Average MTBF

C. Version

D. Storage utilization

E. Health Score

Answer: A,C,E

Q4. Which is a best practice to secure system traffic, ensure optimal performance and satisfy prerequisites for NSX?

A. Configure a single VMkernel and a single distributed port group for all the system traffic.

B. Configure a single distributed port group with a single VMkernel for Management and iSCSI traffic, a separate VMkernel for vMotion and VSAN traffic.

C. Dedicate separate VMkernel adapters for each type of system traffic. Dedicate separate distributed port groups for each VMkernel adapter and isolate the VLANs for each type of system traffic.

D. Dedicate separate VMkernel adapters for each type ofsystem traffic and dedicate separate standard switches for each type of system traffic connected to a single physical network.

Answer: B

Q5. Which tool is used to detect rogue services?

A. NSX Logical Firewall

B. NSX Logical Router

C. Activity Monitoring

D. Flow Monitoring

Answer: D

Q6. An administrator wants to perform Activity Monitoring on a large group of virtual machines in an NSX environment.

How would this task be accomplished with minimal administrative effort?

A. Create a PowerCLI script to enable virtual machine data collection on each virtual machine.

B. Create a security group in Service Composer and add the virtual machines to the security group.

C. Add the virtual machines to the pre-defined Activity Monitoring security group in Service

Composer.

D. Add the virtual machines to a VM folder in vCenter Server and enable data collection.

Answer: C

Q7. What are two things that should be done before upgrading from vCloud Networking and Security to NSX? (Choose two.)

A. Power off vShield Manager

B. Deploy NSX Manager virtualappliance

C. Uninstall vShield Data Security

D. Ensure that forward and reverse DNS is functional

Answer: C,D

Explanation:

Referencehttps://pubs.vmware.com/NSX- 62/index.jsp?topic=%2Fcom.vmware.nsx.upgrade.endpoint.doc%2FGUID-0D1B18B1-B5CC-483B-8BC0-95A2E8C025B9.html

Q8. An administrator is attempting to troubleshoot a routing issue between the Edge Services Gateway (ESG) and the Distributed Logical Router (DLR).

Based on the exhibit, which method CANNOT be used to troubleshoot the issue?

A. SSH session into 192.168.100.3 on the ESG.

B. Console session into the ESG.

C. Console session into the DLR.

D. SSH session into 192.168.10.5 on the DLR.

Answer: A

Q9. What is the function of NSX Data Security?

A. Prevents sensitive data in your virtualized environment from being copied

B. Prevents sensitive data in your virtualized environment from being modified

C. Identifies sensitive data in your virtualized environment based upon regulation security policies

D. Identifies sensitive data in your virtualized environment based upon regulation violation reports

Answer: D

Q10. What is a requirement of NSX Data Security?

A. NSX manager must be configured for Active Directory integration

B. The Global Flow Collection Status must be set to Enabled

C. Guest Introspection must be installed on the cluster

D. AN IP Pool must be created.

Answer: C

Explanation:

Referencehttp://pubs.vmware.com/NSX-61/index.jsp?topic=%2Fcom.vmware.nsx.install.doc%2FGUID-62B22E0C-ABAC-42D8-93AA-BDFCD0A43FEA.html