Your success in VMware 2V0-642 is our sole target and we develop all our 2V0-642 braindumps in a way that facilitates the attainment of this target. Not only is our 2V0-642 study material the best you can find, it is also the most detailed and the most updated. 2V0-642 Practice Exams for VMware VCP6-NV 2V0-642 are written to the highest standards of technical accuracy.

Q1. A network administrator is troubleshooting an issue and needs to observe an injected packet as it passes through the physical and logical network.

Which tool will accomplish this?

A. Traceflow

B. NetFlow

C. Flow Monitoring

D. Activity Monitoring

Answer: A

Explanation:

Referencehttps://pubs.vmware.com/NSX-62/index.jsp?topic=%2Fcom.vmware.nsx.admin.doc%2FGUID-05647D5E-B669-40A8- 8B84-02C18781186F.html


Q2. An organization is planning to use NSX as part of a disaster recovery project to provide consistent networking between two sites. Each site has one vCenter server. The organization requires universal objects and requires components to function during a site outage.

What is the minimum total instances of NSX Manager(s) and NSX Controller(s) that must be deployed across both sites to supporting the required functionality?

A. Two NSX Managers and two NSX Controllers

B. Two NSX Managers and six NSX Controllers

C. Two NSX Managers and three NSX Controllers

D. Two NSX Managers and four NSX Controllers

Answer: C


Q3. Which details can an administrator verify from the Summary tab of the VMware NSX Manager? (Choose three)

A. Current time

B. Average MTBF

C. Version

D. Storage utilization

E. Health Score

Answer: A,C,E


Q4. An NSX administrator is validating the setup for a new NSX implementation and inputs this command:

A. It helps verify that VXLAN segments are functional and the transport network supports the proper MTU size for NSX.

B. It helps verify that the source virtual machine is configured with the proper MTU size for NSX.

C. It helps verify that the NSX Controller is communicating with the destination VTEP.

D. It helps verify that the NSX Logical Switch is routing packets to the destination host.

Answer: A

Explanation:

Referencehttps://www.viktorious.nl/2014/12/02/nsx-basics-creating-logical-switch/


Q5. Which are two uses of the NSX DLR protocol address? (Choose two.)

A. When configuring BGP the protocol address is used to forward traffic to peers.

B. When configuringBGP the protocol address is used by the protocol to form adjacencies with peers.

C. When configuring OSPF the protocol address is used to forward traffic to peers.

D. When configuring OSPF the protocol address is used by the protocol to form

adjacencies with peers.

Answer: B,D

Explanation:

For a logical router

a

Click Edit at the top right corner of the window. 

b

Click Enable OSPF. 

c

In Forwarding Address, type an IP address that is to be used by the router datapath module in the hosts to forward datapath packets.

d

In Protocol Address, type a unique IP address within the same subnet as the Forwarding Address. Protocol address is used by the protocol to form adjacencies with the peers

From <https://pubs.vmware.com/NSX-6/topic/com.vmware.nsx.admin.doc/GUID-6E985577-3629-42FE-AC22-C4B56EFA8C9B.html>


Q6. Which load balancing algorithm is only available on a vSphere Distributed Switch?

A. Route Based on Source MAC Hash

B. Route Based on Originating Virtual Port

C. Route Based on IP Hash

D. Route Based on Physical NIC Load

Answer: D

Explanation: https://docs.vmware.com/en/VMware-vSphere/6.5/com.vmware.vsphere.networking.doc/GUID-959E1CFE-2AE4-4A67-B4D4- 2D2E13765715.html


Q7. When specifying a source for a security rule, what is the purpose of the Negates Source check box?

A. IfNegate Sourceis selected, the rule is sent to only the objects identified under object type.

B. IfNegate Sourceis selected, the rule is applied to traffic coming from all sources except for the source identified under the object type.

C. IfNegate Sourceis not selected, the rule is applied to traffic comingfrom all sources except for the source identified under the object type.

D. ifNegate Sourceis not selected, the rule is sent to only the objects identified under the object type.

Answer: B

Reference: https://pubs.vmware.com/NSX-6/index.jsp?topic=%2Fcom.vmware.nsx.admin.doc%2FGUID-C7A0093A-4AFA-47EC- 9187-778BDDAD1C65.html


Q8. An administrator is attempting to troubleshoot a routing issue between the Edge Services Gateway (ESG) and the Distributed Logical Router (DLR).

Based on the exhibit, which method CANNOT be used to troubleshoot the issue?

A. SSH session into 192.168.100.3 on the ESG.

B. Console session into the ESG.

C. Console session into the DLR.

D. SSH session into 192.168.10.5 on the DLR.

Answer: A


Q9. An administrator wants to perform Activity Monitoring on a large group of virtual machines in an NSX environment.

How would this task be accomplished with minimal administrative effort?

A. Create a PowerCLI script to enable virtual machine data collection on each virtual machine.

B. Create a security group in Service Composer and add the virtual machines to the security group.

C. Add the virtual machines to the pre-defined Activity Monitoring security group in Service

Composer.

D. Add the virtual machines to a VM folder in vCenter Server and enable data collection.

Answer: C


Q10. What is a requirement of NSX Data Security?

A. NSX manager must be configured for Active Directory integration

B. The Global Flow Collection Status must be set to Enabled

C. Guest Introspection must be installed on the cluster

D. AN IP Pool must be created.

Answer: C

Explanation:

Referencehttp://pubs.vmware.com/NSX-61/index.jsp?topic=%2Fcom.vmware.nsx.install.doc%2FGUID-62B22E0C-ABAC-42D8-93AA-BDFCD0A43FEA.html


Q11. Which is a best practice to secure system traffic, ensure optimal performance and satisfy prerequisites for NSX?

A. Configure a single VMkernel and a single distributed port group for all the system traffic.

B. Configure a single distributed port group with a single VMkernel for Management and iSCSI traffic, a separate VMkernel for vMotion and VSAN traffic.

C. Dedicate separate VMkernel adapters for each type of system traffic. Dedicate separate distributed port groups for each VMkernel adapter and isolate the VLANs for each type of system traffic.

D. Dedicate separate VMkernel adapters for each type ofsystem traffic and dedicate separate standard switches for each type of system traffic connected to a single physical network.

Answer: B


Q12. Internet access is required from virtual machines located on any logical switch Direct access from the internet to these virtual machines is NOT permitted

Which perimeter NSX Edge feature would achieve this with the least configuration?

A. LB

B. VPN

C. SNAT

D. DNAT

Answer: D


Q13. A customer has Cisco Nexus 1000V switches in their environment and is looking at deploying NSX

Which statement is correct?

A. The environment must be migrated from the Nexus 1000V to vSphere Distributed Switches.

B. The environment must be configured for VXLAN over the Nexus 1000V.

C. The environment can use the Nexus 1000V switches for the NSX deployment.

D. The environment must be migrated from the Nexus 1000V to vSphere Standard Switches.

Answer: A


Q14. What is the best practice workflow for a NSX installation to support logical switching?

A. Deploy NSX Manager, Configure Logical Switches, Register with vCenter, Deploy Controllers. Prepare hosts

B. Deploy NSX Manager, Deploy Controllers, Configure Logical Switches, Register withvCenter, Prepare hosts

C. Deploy NSX Manager, Register with vCenter, Prepare hosts, Deploy Controllers, Configure Logical Switches

D. Deploy NSX Manager, Register with vCenter, Deploy Controllers, Prepare hosts, Configure Logical Switches

Answer: B


Q15. Which two methods does VMware NSX offer to integrate with third-party partners? (Choose two )

A. Integration Manager

B. Service Chaining

C. VMwareNSXAPIs

D. Universal Synchronization Service

Answer: A,C

Explanation: https://docs.vmware.com/en/VMware-NSX-for-vSphere/6.3/com.vmware.nsx.admin.doc/GUID-EA477D96-E2D3-488B-90AA- 2F19B4AE327D.html#GUID-EA477D96-E2D3-488B-90AA-2F19B4AE327D


Q16. What are the correct steps for connecting a virtual machine to a logical switch?

A. Select the logical switch, click the Add Virtual Machine Icon, select the VM, select the

vNIC to connect B. Select the Add Virtual Machine icon, select the logical switch, vNIC to connect

B. Select the logical switch, select the virtual machine, click the Add Virtual Machine .con. select the vNIC to connect

C. Select the vNIC, click the Add Virtual Machine Icon, select the logical switch

Answer: A

Explanation: https://docs.vmware.com/en/VMware-NSX-for-vSphere/6.2/com.vmware.nsx.admin.doc/GUID-571237B3-1665-4B92-A3A9- 51C078EC601D.html