Which is a best practice to secure system traffic, ensure optimal performance and satisfy prerequisites for
NSX?
A.
Configure a single VMkernel and a single distributed port group for all the system traffic.
B.
Configure a single distributed port group with a single VMkernel for Management and iSCSI traffic, a
separate VMkernel for vMotion and VSAN traffic.
C.
Dedicate separate VMkernel adapters for each type of system traffic. Dedicate separate distributed port
groups for each VMkernel adapter and isolate the VLANs for each type of system traffic.
D.
Dedicate separate VMkernel adapters for each type of system traffic and dedicate separate standard
switches for each type of system traffic connected to a single physical network.
C
C makes more sense
it is B
C is correct.
https://docs.vmware.com/en/VMware-vSphere/6.5/com.vmware.vsphere.networking.doc/GUID-B57FBE96-21EA-401C-BAA6-BDE88108E4BB.html
should be C
New 2V0-642 Exam Questions and Answers (1/Nov/2017 Updated):
NEW QUESTION 2
Which load balancing algorithm is only available on a vSphere Distributed Switch?
A. Route Based on Source MAC Hash
B. Route Based on Originating Virtual Port
C. Route Based on IP Hash
D. Route Based on Physical NIC Load
Answer: D
NEW QUESTION 3
Which action is not an option for adding Virtual Machines to a Security Group?
A. Adding Virtual Machines to a Security Group and nesting it within another Security Group.
B. Defining Dynamic Membership in the Security Group.
C. Adding Virtual Machines to a Security Policy and associating it with a Security Group.
D. Selecting objects to include within a Security Group.
Answer: C
NEW QUESTION 4
From the NSX Edge CLI, which command would show VIP statistics?
A. show service loadbalancer pool
B. show service loadbalancer virtual
C. show service loadbalancer monitor
D. show service loadbalancer
Answer: B
NEW QUESTION 5
An NSX administrator notices that when configuring Flow Monitoring, the graphs do not include the IPFix flows. Where are these flows displayed?
A. In the IPFix collector’s interface
B. In the Flow Monitor UI
C. In the vRealize Operations UI
D. In the IPFix tab of the NSX Manager UI
Answer: A
NEW QUESTION 6
An administrator is deploying NSX in a Cross-vCenter configuration across three data centers located 100 miles apart Datacenter-1 and Datacenter-3 already have NSX deployed locally and Datacenter-2 does not have NSX deployed yet. What is the correct order of steps to configure all three data centers for this solution?
A. Step 1 Remove the NSX manager from Datacenter-1 and Datacenter-3
Step 2 Reinstall all three NSX managers at the same time
Step 3 Deploy a universal transport zone
Step 4 Deploy a universal distributed logical router
B. Step 1 Deploy an NSX manager at Dataeenter-2
Step 2 Change the roles of the NSX managers in Datacentar-1 and Datacenter-3 to Transit Mode
Step 3 Deploy a universal transport zone
Step 4 Configure the Primary and Secondary roles on all three NSX managers
C. Step 1 Deploy an NSX manager in Datacenter 2
Step 2 Update the NSX manager role in Datacenter-1 to Primary
Step 3 Update the roles in Dafacenter-2 and Datacentar-3 to Secondary
Step 4 Deploy a universal transport zone
D. Step 1 Deploy the NSX manager at Datacenter-2
Step 2 Update the NSX manager role in Datacenter-1 to Primary
Step 3 Deploy a universal transport zone
Step 4 Deploy a universal distributed logical router
Answer: D
NEW QUESTION 7
A security administrator needs to create a Security Group based on an Active Directory group. However, AD Groups are not available as an option. What must the administrator configure before AD Groups are available?
A. Guest Introspection virtual machines must be joined to the domain
B. Inventory Service must be registered with a domain account
C. NSX Manager must be registered with Active Directory
D. NSX Controller must be registered with Active Directory
Answer: C
NEW QUESTION 8
What is one of the benefits of a spine-leaf network topology?
A. A loop prevention protocol is not required
B. Automatic propagation of security policies to all nodes
C. Allows for VXl ANs to be defined in h traditional network topology
D. Network virtualization relies on spine leaf topologies to create logical switches
Answer: D
NEW QUESTION 9
What is the most restrictive NSX role that can be used to create and publish security policies and install virtual appliances?
A. Security Administrator
B. NSX Administrator
C. Auditor
D. Enterprise Administrator
Answer: D
NEW QUESTION 10
In a Cross-vCenter NSX deployment, what are two requirements that must be met in order for an administrator to deploy both universal logical switches and local logical switches within the same vCenter instance? (Choose two.)
A. A universal distributed logical router must be created.
B. A logical distributed router must be created.
C. A universal transport zone must be created.
D. A local transport zone must be created.
Answer: CD
NEW QUESTION 11
The fact that NSX Data Security has visibility into sensitive data provides which two benefits? (Choose two.)
A. It helps address compliance and risk management requirements.
B. It acts as a forensic tool to analyze TCP and UDP connections between virtual machines.
C. It is able to trace packets between a source and destination without requiring access to the guestOS.
D. It eliminates the typical agent footprint that exists with legacy software agents.
Answer: AB
NEW QUESTION 12
……
P.S. These New 2V0-642 Exam Questions Were Just Updated From The Real 2V0-642 Exam, You Can Get The Newest 2V0-642 Dumps In PDF And VCE From — https://www.passleader.com/2v0-642.html (313q VCE and PDF)
Good Luck!
By the way, part of that new 313Q 2V0-642 dumps are available here:
https://drive.google.com/open?id=0B-ob6L_QjGLpbVl3X1hXbUdteHc
Best Regards!
D