Master the 2V0-642 VMware Certified Professional 6 - Network Virtualization 6.2 Exam content and be ready for exam day success quickly with this Actualtests 2V0-642 latest exam. We guarantee it!We make it a reality and give you real 2V0-642 questions in our VMware 2V0-642 braindumps.Latest 100% VALID VMware 2V0-642 Exam Questions Dumps at below page. You can use our VMware 2V0-642 braindumps and pass your exam.

Q25. What is the purpose of a DHCP Relay Agent in an NSX Edge configuration?

A. Configures virtual machine interfaces to which DHCP messages are relayed.

B. Configures Edge interfaces from which DHCP messages are relayed.

C. Configures Edge interfaces to which DHCP messages are relayed.

D. Configures virtual machine interfaces from which DHCP messages are relayed.

Answer: B

Explanation:

Referencehttp://pubs.vmware.com/NSX-61/index.jsp#com.vmware.nsx.admin.doc/GUID-C655D21F-C800-4C7F-A887-F5733810DF34.html


Q26. An application requires load balancing with minimal impact to network performance. An NSX administrator is deploying a load balancer to meet the stated requirements.

Which load balancing engine should be deployed?

A. Layer 5

B. Layer 6

C. Layer 7

D. Layer 4

Answer: D

Explanation:

https://www.icc-usa.com/resources/vmw-nsx-network-virtualization-design-guide.pdf


Q27. What are two benefits of the NSX Distributed Firewall? (Choose two )

A. VMs are protected even as they are vMotioned

B. Each VM is individually protected by a L2-L4 stateful firewall

C. ESXi hosts are automatically protected by a distributed firewall

D. VXLANs are automatically protected by the Transport Zone definition

Answer: A,C


Q28. When specifying a source for a security rule, what is the purpose of the Negates Source check box?

A. IfNegate Sourceis selected, the rule is sent to only the objects identified under object type.

B. IfNegate Sourceis selected, the rule is applied to traffic coming from all sources except for the source identified under the object type.

C. IfNegate Sourceis not selected, the rule is applied to traffic comingfrom all sources except for the source identified under the object type.

D. ifNegate Sourceis not selected, the rule is sent to only the objects identified under the object type.

Answer: B

Reference: https://pubs.vmware.com/NSX-6/index.jsp?topic=%2Fcom.vmware.nsx.admin.doc%2FGUID-C7A0093A-4AFA-47EC- 9187-778BDDAD1C65.html


Q29. What are the correct steps for connecting a virtual machine to a logical switch?

A. Select the logical switch, click the Add Virtual Machine Icon, select the VM, select the

vNIC to connect B. Select the Add Virtual Machine icon, select the logical switch, vNIC to connect

B. Select the logical switch, select the virtual machine, click the Add Virtual Machine .con. select the vNIC to connect

C. Select the vNIC, click the Add Virtual Machine Icon, select the logical switch

Answer: A

Explanation: https://docs.vmware.com/en/VMware-NSX-for-vSphere/6.2/com.vmware.nsx.admin.doc/GUID-571237B3-1665-4B92-A3A9- 51C078EC601D.html


Q30. What is a requirement of NSX Data Security?

A. NSX manager must be configured for Active Directory integration

B. The Global Flow Collection Status must be set to Enabled

C. Guest Introspection must be installed on the cluster

D. AN IP Pool must be created.

Answer: C

Explanation:

Referencehttp://pubs.vmware.com/NSX-61/index.jsp?topic=%2Fcom.vmware.nsx.install.doc%2FGUID-62B22E0C-ABAC-42D8-93AA-BDFCD0A43FEA.html


Q31. An organization is planning to use NSX as part of a disaster recovery project to provide consistent networking between two sites. Each site has one vCenter server. The organization requires universal objects and requires components to function during a site outage.

What is the minimum total instances of NSX Manager(s) and NSX Controller(s) that must be deployed across both sites to supporting the required functionality?

A. Two NSX Managers and two NSX Controllers

B. Two NSX Managers and six NSX Controllers

C. Two NSX Managers and three NSX Controllers

D. Two NSX Managers and four NSX Controllers

Answer: C


Q32. The fact that NSX Data Security has visibility into sensitive data provides which two benefits? (Choose two )

A. It helps address compliance and risk management requirements.

B. It acts as a forensic tool to analyze TCP and UDP connections between virtual machines

C. It is able to trace packets between a source and destination without requiring access to the guest OS

D. It eliminates the typical agent footprint that exists with legacy software agents

Answer: A,B