An NSX Administrator is examining traffic on the network shown below.
What is the packet flow when VM1 communicates to VM5?
A.
Host A will perform a destination lookup, route the packet, switch the packet onto segment 5002, then
encapsulate and send the packet to Host C.
B.
Host A will perform a destination lookup, switch the packet onto segment 5002, route the packet, then
encapsulate the packet and send it to the DLR control VM.
C.
Host A will encapsulate the packet, send the encapsulated packet to host C, Host C will perform a
destination lookup and switch the packet onto segment 5002.
D.
Host A will encapsulate the packet, perform a destination lookup, route the packet to the DLR control VM,
the control DLR will bridge the packet onto segment 5002.
B is not correct — “send it to the DLR control VM.” packet not going to DLR VM
D is not correct — “route the packet to the DLR control VM” — nothing goes to DLR VM
C is not correct — “Host C will perform a destination lookup” — as source is doing the destination lookup
A is correct
Yes. You are correct.
https://docs.vmware.com/en/VMware-NSX-for-vSphere/6.2/com.vmware.nsx.troubleshooting.doc/GUID-3D5B1AAC-6408-4B41-8691-7D5D51A51D23.html
2017/11/1 New 2V0-642 QUESTIONS:
QUESTION 291
A security administrator needs to create a Security Group based on an Active Directory group. However, AD Groups are not available as an option. What must the administrator configure before AD Groups are available?
A. Guest Introspection virtual machines must be joined to the domain
B. Inventory Service must be registered with a domain account
C. NSX Manager must be registered with Active Directory
D. NSX Controller must be registered with Active Directory
Answer: C
QUESTION 292
What is one of the benefits of a spine-leaf network topology?
A. A loop prevention protocol is not required
B. Automatic propagation of security policies to all nodes
C. Allows for VXl ANs to be defined in h traditional network topology
D. Network virtualization relies on spine leaf topologies to create logical switches
Answer: D
QUESTION 293
What is the most restrictive NSX role that can be used to create and publish security policies and install virtual appliances?
A. Security Administrator
B. NSX Administrator
C. Auditor
D. Enterprise Administrator
Answer: D
QUESTION 294
In a Cross-vCenter NSX deployment, what are two requirements that must be met in order for an administrator to deploy both universal logical switches and local logical switches within the same vCenter instance? (Choose two.)
A. A universal distributed logical router must be created
B. A logical distributed router must be created
C. A universal transport zone must be created.
D. A local transport zone must be created
Answer: CD
QUESTION 295
The fact that NSX Data Security has visibility into sensitive data provides which two benefits? (Choose two)
A. It helps address compliance and risk management requirements.
B. It acts as a forensic tool to analyze TCP and UDP connections between virtual machines
C. It is able to trace packets between a source and destination without requiring access to the guestOS
D. It eliminates the typical agent footprint that exists with legacy software agents
Answer: AB
MORE NEW QUESTIONS:https://www.braindump2go.com/2v0-642.html