This page was exported from New Exam Dumps for All Certification Exams
[
https://www.dumps4cert.net
]
Export date: Fri Mar 29 8:03:24 2024 / +0000 GMT
New Updated 2V0-642 Exam Questions from PassLeader 2V0-642 PDF dumps! Welcome to download the newest PassLeader 2V0-642 VCE dumps: https://www.passleader.com/2v0-642.html (313 Q&As) Keywords: 2V0-642 exam dumps, 2V0-642 exam questions, 2V0-642 VCE dumps, 2V0-642 PDF dumps, 2V0-642 practice tests, 2V0-642 study guide, 2V0-642 braindumps, VMware Certified Professional 6 -- Network Virtualization (NSX v6.2) Exam P.S. New 2V0-642 dumps PDF: https://drive.google.com/open?id=0B-ob6L_QjGLpbVl3X1hXbUdteHc NEW QUESTION 1 A. Integration Manager Answer: AC NEW QUESTION 2 A. Route Based on Source MAC Hash Answer: D NEW QUESTION 3 A. Adding Virtual Machines to a Security Group and nesting it within another Security Group. Answer: C NEW QUESTION 4 A. show service loadbalancer pool Answer: B NEW QUESTION 5 A. In the IPFix collector's interface Answer: A NEW QUESTION 6 A. Step 1 Remove the NSX manager from Datacenter-1 and Datacenter-3 Answer: D NEW QUESTION 7 A. Guest Introspection virtual machines must be joined to the domain Answer: C NEW QUESTION 8 A. A loop prevention protocol is not required Answer: D NEW QUESTION 9 A. Security Administrator Answer: D NEW QUESTION 10 A. A universal distributed logical router must be created. Answer: CD NEW QUESTION 11 A. It helps address compliance and risk management requirements. Answer: AB NEW QUESTION 12 Download the newest PassLeader 2V0-642 dumps from passleader.com now! 100% Pass Guarantee! 2V0-642 PDF dumps & 2V0-642 VCE dumps: https://www.passleader.com/2v0-642.html (313 Q&As) (New Questions Are 100% Available and Wrong Answers Have Been Corrected! Free VCE simulator!) P.S. New 2V0-642 dumps PDF: https://drive.google.com/open?id=0B-ob6L_QjGLpbVl3X1hXbUdteHc
Which two methods does VMware NSX offer to integrate with third-party partners? (Choose two.)
B. Service Chaining
C. VMware NSX APIs
D. Universal Synchronization Service
Explanation:
https://docs.vmware.com/en/VMware-NSX-forvSphere/6.3/com.vmware.nsx.admin.doc/GUID-EA477D96-E2D3-488B-90AA-2F19B4AE327D.html#GUID-EA477D96-E2D3-488B-90AA-2F19B4AE327D
Which load balancing algorithm is only available on a vSphere Distributed Switch?
B. Route Based on Originating Virtual Port
C. Route Based on IP Hash
D. Route Based on Physical NIC Load
Explanation:
https://docs.vmware.com/en/VMware-vSphere/6.5/com.vmware.vsphere.networking.doc/GUID-959E1CFE-2AE4-4A67-B4D4-2D2E13765715.html
Which action is not an option for adding Virtual Machines to a Security Group?
B. Defining Dynamic Membership in the Security Group.
C. Adding Virtual Machines to a Security Policy and associating it with a Security Group.
D. Selecting objects to include within a Security Group.
From the NSX Edge CLI, which command would show VIP statistics?
B. show service loadbalancer virtual
C. show service loadbalancer monitor
D. show service loadbalancer
Explanation:
https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2122708
An NSX administrator notices that when configuring Flow Monitoring, the graphs do not include the IPFix flows. Where are these flows displayed?
B. In the Flow Monitor UI
C. In the vRealize Operations UI
D. In the IPFix tab of the NSX Manager UI
Explanation:
https://docs.vmware.com/en/VMware-NSX-forvSphere/6.3/com.vmware.nsx.admin.doc/GUID-4C085DAE-A671-44A3-B9D1-62BC7966B388.html
An administrator is deploying NSX in a Cross-vCenter configuration across three data centers located 100 miles apart Datacenter-1 and Datacenter-3 already have NSX deployed locally and Datacenter-2 does not have NSX deployed yet. What is the correct order of steps to configure all three data centers for this solution?
Step 2 Reinstall all three NSX managers at the same time
Step 3 Deploy a universal transport zone
Step 4 Deploy a universal distributed logical router
B. Step 1 Deploy an NSX manager at Dataeenter-2
Step 2 Change the roles of the NSX managers in Datacentar-1 and Datacenter-3 to Transit Mode
Step 3 Deploy a universal transport zone
Step 4 Configure the Primary and Secondary roles on all three NSX managers
C. Step 1 Deploy an NSX manager in Datacenter 2
Step 2 Update the NSX manager role in Datacenter-1 to Primary
Step 3 Update the roles in Dafacenter-2 and Datacentar-3 to Secondary
Step 4 Deploy a universal transport zone
D. Step 1 Deploy the NSX manager at Datacenter-2
Step 2 Update the NSX manager role in Datacenter-1 to Primary
Step 3 Deploy a universal transport zone
Step 4 Deploy a universal distributed logical router
A security administrator needs to create a Security Group based on an Active Directory group. However, AD Groups are not available as an option. What must the administrator configure before AD Groups are available?
B. Inventory Service must be registered with a domain account
C. NSX Manager must be registered with Active Directory
D. NSX Controller must be registered with Active Directory
What is one of the benefits of a spine-leaf network topology?
B. Automatic propagation of security policies to all nodes
C. Allows for VXl ANs to be defined in h traditional network topology
D. Network virtualization relies on spine leaf topologies to create logical switches
What is the most restrictive NSX role that can be used to create and publish security policies and install virtual appliances?
B. NSX Administrator
C. Auditor
D. Enterprise Administrator
In a Cross-vCenter NSX deployment, what are two requirements that must be met in order for an administrator to deploy both universal logical switches and local logical switches within the same vCenter instance? (Choose two.)
B. A logical distributed router must be created.
C. A universal transport zone must be created.
D. A local transport zone must be created.
Explanation:
https://docs.vmware.com/en/VMware-NSX-forvSphere/6.3/com.vmware.nsx.cross-vcenter-install.doc/GUID-7F76BB1E-7E36-4E9DB8C2-798100E62192.html
The fact that NSX Data Security has visibility into sensitive data provides which two benefits? (Choose two.)
B. It acts as a forensic tool to analyze TCP and UDP connections between virtual machines.
C. It is able to trace packets between a source and destination without requiring access to the guestOS.
D. It eliminates the typical agent footprint that exists with legacy software agents.
......
Post date: 2017-11-02 03:30:59
Post date GMT: 2017-11-02 03:30:59
Post modified date: 2017-11-02 03:30:59
Post modified date GMT: 2017-11-02 03:30:59
Powered by [ Universal Post Manager ] plugin. MS Word saving format developed by gVectors Team www.gVectors.com