+ All Categories
Home > Documents > Testkings.2V0-641 - GRATIS EXAM · PDF fileD. VLANs are not required to separate traffic...

Testkings.2V0-641 - GRATIS EXAM · PDF fileD. VLANs are not required to separate traffic...

Date post: 10-Mar-2018
Category:
Upload: haanh
View: 214 times
Download: 0 times
Share this document with a friend
33
Testkings.2V0-641.88q Number : 2V0-641 Passing Score : 800 Time Limit : 120 min File Version : 4.8 http://www.gratisexam.com/ 2V0-641 VMware Certified Professional 6 – Network Virtualization Beta I had spent many precious hours of my life searching for some relevant test preparing material for the 2V0-641 exam. Finally, I came across this outstanding dump. Mostly questions are in this dumps and some questions from dumps were slightly changed to make it tricky. I found that the questions were geared for self-paced study
Transcript

Testkings.2V0-641.88q

Number: 2V0-641Passing Score: 800Time Limit: 120 minFile Version: 4.8

http://www.gratisexam.com/

2V0-641

VMware Certified Professional 6 – Network Virtualiz ation Beta

I had spent many precious hours of my life searching for some relevant test preparing material for the2V0-641 exam. Finally, I came across this outstanding dump. Mostly questions are in this dumps and some questions from dumps were slightly changed to make ittricky.I found that the questions were geared for self-paced study

Exam A

QUESTION 1Which statement is true regarding deploying NSX over a physical network?

A. OSPF can be used for Management traffic in a Layer 3 fabric design.B. NSX can implement IPv6 on an IPv4 physical network.C. Routing is supported on bridged interfaces.D. VLANs are not required to separate traffic between virtual machines.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 2How does NSX simplify physical network design?

A. VLANs are moved into the virtual network for virtual machine traffic, eliminating the need to use PrivateVLANs on the physical network.

B. Network administrators only need to configure routing on the physical network for virtual machine trafficsince all other network functions are moved to the virtual network.

C. Transport zones are created in the virtual network for virtual machine traffic, removing the need to makechanges to the physical network.

D. Virtual network integration can make changes to the physical network programmatically using RESTAPI calls which automates network changes and increases agility.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 3Which two statements are true regarding NSX? (Choose two.)

A. Workloads can be placed and moved independently of physical topology.B. Operational efficiency can be achieved through automation of the physical network.C. Workload deployments are non-disruptive over the existing physical network.D. NSX implementation requires a VMware vSphere environment.

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:

QUESTION 4What is the minimum MTU size recommended by VMware for the physical network when deploying NSX forvSphere?

A. 1550B. 1600C. 2148D. 9000

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 5A company wants to deploy VMware NSX for vSphere with no PIM and no IGMP configured in theunderlying physical network. This company also must ensure that non-ESXi hosts do not receive broadcast,unknown unicast or multicast (BUM) traffic.

Which replication mode should the logical switches be deployed with?

A. Unicast Replication ModeB. Multicast Replication ModeC. Hybrid Replication ModeD. Transport Zone Mode

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 6A company wants to deploy VMware NSX for vSphere and ensure the least amount of bandwidthconsumption in the underlying physical architecture.

Which replication mode should the logical switches be deployed with?

A. Multicast Replication ModeB. Unicast Replication ModeC. Hybrid Replication ModeD. vSphere Replication Mode

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 7What is the minimum number of vSphere Distributed Switches (vDS) that must be configured beforedeploying VMware NSX for vSphere?

http://www.gratisexam.com/

A. 0B. 1C. 2

D. 4

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 8Your data center is made up of two VMware vCenter Server instances. Each vCenter Server managesthree clusters with 16 hosts per cluster.

In preparing for your VMware NSX deployment, how many vShield Endpoint instances will you have?

A. 2B. 6C. 48D. 96

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 9Which option is VMware's best practice for the deployment of NSX Manager and NSX Controllercomponents?

A. Deploy the NSX Manager and NSX Controller components to a management cluster.B. Deploy the NSX Manager component to a management cluster and the NSX Controller components to

a resource cluster.C. Deploy the NSX Controller components to a management cluster and the NSX Manager component to

a resource cluster.D. Deploy the NSX Manager and NSX Controller components to a resource cluster.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 10You want to use an existing NSX Manager to extend logical networks to the ESXi hosts of a new cluster.

What should you do?

A. On the Installation > Host Preparation page of the Networking & Security section of the vSphere WebClient, click the Install link for the new cluster.

B. On the Installation > Host Preparation page of the Networking & Security section of the vSphere WebClient, click the Install link for each of the new hosts.

C. On the Installation > Management page of the Networking & Security section of the vSphere WebClient, click the green plus sign to deploy a new NSX controller node to the new cluster.

D. On the Installation > Logical Network Preparation page of the Networking & Security section of thevSphere Web Client, create a new Transport Zone for the new cluster.

Correct Answer: A

Section: (none)Explanation

Explanation/Reference:reliable answer.

QUESTION 11What is the earliest version of vCloud Network and Security (vCNS) that can be upgraded to VMware NSXfor vSphere 6.0?

A. vCNS 5.0B. vCNS 5.1C. vCNS 5.5D. vCNS 6.0

Correct Answer: CSection: (none)Explanation

Explanation/Reference:definite answer.

QUESTION 12Which is not a prerequisite to upgrade vCloud Network and Security Virtual Wires to Logical Switches?

A. vCloud Network and Security Manager has been upgraded to NSX Manager.B. vShield Data Security has been uninstalled.C. NSX Controllers have been deployed.D. The NSX Manager has been configured with the same IP as the vCloud Network and Security Manager.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 13Which statement is correct when upgrading vShield Data Security to NSX Data Security?

A. NSX Data Security does not support a direct upgrade.B. NSX Controller must be deployed before the upgrade.C. The vCloud Network and Security Virtual Wires must have been upgraded.D. vCould Network and Security must be at least version 5.1 before starting the upgrade.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 14A new ESXi 5.5 host is deployed in a vSphere environment with VMware NSX for vSphere.

How can the host be prepared for VMware NSX for vSphere?

A. By using Image Builder to pre-load the NSX for vSphere VIBs in the ESXi image in an Auto Deploysolution.

B. By leveraging VMware Update Manager to install the new NSX for vSphere VIBs into each of the hosts.

C. By creating a new VMkernel port in the host from the Host and Clusters inventory view in vSphere WebClient.

D. By entering the ESXi 5.5 management IP address in the NSX Controllers so the VIBs can be installed.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:exact answer.

QUESTION 15When preparing a vSphere host cluster to work with VMware NSX, which two options show VIBs that areinstalled and registered with all hosts within the prepared cluster? (Choose two.)

A. NSX VXLANB. NSX Distributed FirewallC. NSX EdgeD. NSX Data Security

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:

QUESTION 16What is a prerequisite to deploying a Logical Switch?

A. Configure the VXLAN Tunnel Endpoint's (VTEP) VLAN on the trunk in the physical switches.B. Add the ESXi hosts to the same vSphere Distributed Switch.C. Prepare and configure VTEPs on the ESXi hosts using the vSphere Web Client.D. Create a port group on the vSphere Distributed Switch.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 17After consulting with the network team, it is decided that Transport Zones will be configured with UnicastReplication Mode for a new NSX for vSphere deployment.

Which statement is true regarding the function of the VXLAN Tunnel End Points (VTEPs)?

A. The VTEPs will send unicast frames to the NSX Controllers when the VTEPs do not have a MACaddress in the MAC table.

B. The VTEPs will switch to Multicast Replication Mode for those VTEPs to which multicast path discoveryis successful.

C. The VTEPs will send multicast frames to all other VTEPs in the Transport Zone when the VTEPs do nothave a MAC address in the MAC table.

D. The VTEPs will send unicast frames to all local VTEPs and remote proxies in the Transport Zone whenthe VTEPs do not have a MAC address in the MAC table.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 18How is the Bridge Instance chosen?

A. It is chosen based on the ESXi host where the Logical Router Control VM is running.B. It is manually assigned by the vSphere administrator when the distributed portgroup is configured.C. During an election process among all ESXi hosts. The host with the highest MAC address is selected.D. The VTEP configured with the highest VXLAN Network Identifier (VNI) is selected.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 19Where is the layer 2 bridge instance deployed when configuring a bridge connection between a logicalswitch and a VLAN?

A. On the ESXi host running the logical routerB. On the ESXi host running the logical switchC. On both ESXi hosts that make up the layer 2 bridgeD. On each virtual machine that will utilize the layer 2 bridge

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 20Which two options are use cases of Layer 2 bridging in NSX for vSphere? (Choose two.)

http://www.gratisexam.com/

A. Extend the network security to physical devices in the physical network by use of the DistributedFirewall.

B. Extend physical services to Virtual Machines in virtual network.C. Allow clustering of multiple NSX Managers in a single vCenter Server instance.D. Allow physical devices in the physical network to use the NSX Edge Gateway as a default router.

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:

QUESTION 21

Which two components are required to enable layer 2 bridging? (Choose two.)

A. Distributed firewall rule to allow layer 2 traffic in the bridge.B. Deployed Logical Switch.C. Deployed Logical Router.D. VLAN trunk configured on logical switch.

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:

QUESTION 22A vSphere administrator added a new interface to a Distributed Router with a subnet of 172.16.10.0/24 andwants to make this subnet reachable to the rest of the network. How can the vSphere administrator achievethis?

A. Enable OSPF on the Distributed Router. Configure the uplink interface in the Backbone area andredistribute into OSPF the 172.16.10.0/24 subnet.

B. Enable OSPF on the Distributed Router. Configure the uplink interface in the normal area and the newinterface with the subnet 172.16.10.0/24 in a Backbone area.

C. Enable OSPF on the Distributed Router. Configure the uplink interface in the Backbone area andredistribute from OSPF the 172.16.10.0/24 subnet.

D. Enable OSPF on the Distributed Router. Configure the uplink interface in the Backbone area and thenew interface with the subnet 172.16.10.0/24 in a normal area.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 23How many Logical Interfaces can be assigned to a single Distributed Router instance?

A. 1B. 12C. 1000D. 1200

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 24A vSphere administrator wants to add a VLAN LIF to a Distributed Router. What must the vSphereadministrator do for the VLAN LIF to be added successfully?

A. The vSphere administrator must assign a VLAN number to the distributed portgroup that the VLAN LIFconnects to.

B. The vSphere administrator must assign a VLAN number to the Distributed Router that the LogicalSwitch connects to.

C. The vSphere administrator must assign a VLAN number to the Logical Switch that the DistributedRouter connects to.

D. The vSphere administrator must assign a VLAN number to the uplink on the distributed switch that theVLAN LIF connects to.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 25-- Exhibit --

-- Exhibit --

Refer to the Exhibit. You are designing a network for NSX and your customer has stated that virtualmachine traffic needs to span the virtual and physical space.

Based on the exhibit, where should this requirement be configured?

A. Location A.B. Location BC. Location CD. Locations B and C.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 26A company hosts an internal website on multiple virtual machines attached to a Logical Switch with VNI7321. A Distributed Router serves as the virtual machines' default gateway.

When a user resolves the URL for the website, the internal DNS server responds with the IP address of oneof the virtual machine's IP addresses in a round robin fashion. This approach results in some virtual

machines having a much higher number of user sessions than others.

The company wants to deploy a NSX Edge Service Load Balancer to improve on this situation. Whichdistribution method can be configured on the NSX Edge Load Balancer to meet the company's needs?

A. LEAST_CONNB. IP_HASHC. LEAST_LOADD. URI

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 27A vSphere administrator deploys the NSX Edge Load Balancer in Inline mode. Which is not a requirementfor the Load Balancer to operate correctly?

A. Perform Source NAT on the traffic from the clients.B. Connect the Load Balancer directly to the same subnet as the VMs that are part of the Server Pool.C. Perform Destination NAT on the traffic from the clients.D. Point the virtual machines in the Server Pool to the Load Balancer as their default gateway.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 28A vSphere administrator deployed an NSX Edge Load Balancer in High Availability (HA) mode. Whathappens in the event the Load Balancer has a failure?

A. The secondary NSX Edge Load Balancer assumes the role of primary. Existing Flows will need to havetheir connections reestablished.

B. HA will start the NSX Edge Load Balancer on another ESXi host in the cluster. All existing flows willneed to have their connections reestablished.

C. HA will start the NSX Edge Load Balancer on another ESXi host in the cluster. The NSX Controllercaches existing flows and hands them to the Load Balancer when it is back up.

D. The secondary NSX Edge Load Balancer assumes the role of primary. The NSX Controller cachesexisting flows and hands them to the Load Balancer when it is back up.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 29Which two statements are true regarding Layer 2 VPNs? (Choose two.)

A. Layer 2 VPNs are used to securely extend Ethernet segments over an untrusted medium.B. The NSX Edge Service Gateway can form a Layer 2 VPN with a standards-compliant physical

appliance.C. The Distributed Router can form a Layer 2 VPN to another Distributed Router or NSX Edge Service

Gateway.D. Layer 2 VPNs require the two VPN endpoints be in the same Layer 2 segment.

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:

QUESTION 30A vSphere administrator wants to setup an NSX Edge Service Gateway to provide traveling employeessecure access to company servers located in specific network segments within the corporate Data Center.The remote access solution must provide a method to authenticate the users.

Which two methods can be used with the NSX Edge Service Gateway? (Choose two.)

A. TACACS+B. MS-CHAPC. RSA Secure IDD. Active Directory

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:

QUESTION 31A company has augmented its Data Center infrastructure by using vCloud Hybrid Service during peakhours. The company wants to extend their existing subnets into the cloud while workloads retain theirexisting IP addresses. The virtual machines in these subnets use an NSX Edge Gateway as their defaultgateway.

Which solution should this company use?

A. Layer 2 VPNB. MPLS VPNC. IPSec VPND. SSL VPN

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 32A vSphere administrator wants to setup an NSX Edge Service Gateway to provide traveling employeessecure access to company servers located in specific network segments within the corporate Data Centers.The solution has to be as scalable as possible.

Which Virtual Private Network solution will satisfy the administrator's requirements?

A. SSL VPNB. MPLS VPNC. Layer 2 VPND. IPSec VPN

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 33Which statement is true regarding an NSX Edge gateway device configured with a DNS Server?

A. The NSX Edge will forward all DNS requests from virtual machines sent to it to the DNS Server.B. The NSX Edge configuration will override the DNS Server configured by the NSX Manager.C. The NSX Edge registers the DNS Server with the NSX Controller.D. The NSX Edge periodically synchronizes its DNS tables with the primary DNS Server.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 34An NSX Edge Service Gateway has two interfaces:

· Internal interface named Internal Access-- IP address = 10.10.10.1-- Network mask = 255.255.255.0· Uplink interface named Physical Uplink-- IP address = 20.20.20.1-- Network mask = 255.255.255.0

A vSphere administrator wants to add a SNAT rule to allow traffic from the internal network segment toaccess external resources via the uplink interface.

Which three steps should the vSphere administrator do to add the SNAT rule? (Choose three.)

A. Apply the SNAT rule to the Internal Access interface.B. Select 10.10.10.1 as the translated source IP.C. Apply the SNAT rule on the Physical Uplink interface.D. Select 10.10.10.0/24 as the original subnet.E. Choose 20.20.20.2 as the translated source IP address.

Correct Answer: CDESection: (none)Explanation

Explanation/Reference:

QUESTION 35An administrator manages a TFTP server virtual machine that is connected to a Logical Switch with a VNIof 7321. The TFTP server has been configured to use port 1069. An NSX Edge Service Gateway isconnected to VNI 7321 and has an uplink interface with access to the physical network. Assume externalusers can reach the Service Gateway.

What should the administrator configure to ensure external connections to the TFTP server are successful?

A. Create a DNAT rule with the original port of 69 and translated port of 1069.B. Create a SNAT rule with the original port of 1069 and translated port of 69.

C. Create a SNAT rule with the original port of 69 and translated port of 1069.D. Create a DNAT rule with the original port of 1069 and translated port of 69.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 36Which two actions take place when an active NSX Edge instance fails? (Choose two.)

A. Once the original NSX Edge instance is recovered, it preempts the other NSX Edge instance and takesover the active role.

B. The standby NSX Edge instance becomes the active instance and requests routing updates from therouting neighbors.

C. Once the original NSX Edge instance is recovered, the NSX Manager attempts to place it on a differenthost from the other NSX Edge instance.

D. The standby NSX Edge instance becomes the active instance and retains any routing neighboradjacencies.

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:

QUESTION 37Which two statements are true regarding NSX High Availability (HA)? (Choose two.)

A. NSX HA is configured as Active-Active.B. NSX HA is configured as Active-Standby.C. If an Active node fails, there is no service interruption during failover.D. If an Active node fails, there is a 15 second service interruption during failover.

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:

QUESTION 38High Availability (HA) was not initially configured when an administrator deployed an NSX Edge ServiceGateway. What should the administrator do to configure the NSX Edge with HA?

A. Select the NSX Edge instance from the NSX Edges view in Networking & Security. Go to Manage>Settings> Configuration and add a NSX Edge appliance.

B. Delete the NSX Edge instance and redeploy it with HA. The existing NSX Edge configuration data willbe lost.

C. Delete the NSX Edge instance and redeploy it with HA. The configuration data is retained by NSXManager and pushed to the new NSX Edge instance.

D. Select the NSX Edge appliance from the Virtual Machines and Templates view. Go to Actions> AllvCenter Actions> Enable HA to configure High Availability.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 39-- Exhibit ----

Exhibit --

An administrator has created an NSX network as shown in the exhibit.

Both VMs in the exhibit use the same distributed router for their default gateway. VM-B obtains its IPaddress via DHCP. VM-A wants to send a packet to VM-B.

How does VM-A learn VM-B's MAC address?

A. If Host-A is made aware by the NSX Controller of VM-B's MAC and IP addresses, Host-A replies directlyto VM-A with an ARP response.

B. If Host-A is made aware by Host-B of VM-B's MAC and IP addresses, Host-A replies directly to VM-Awith an ARP response.

C. If the NSX Controller is made aware by Host-B of VM-B's MAC and IP addresses, the NSX Controllerreplies directly to VM-A with an ARP response.

D. If Host-B is aware of VM-B's MAC and IP addresses, Host-B is able to reply directly to VM-A with anARP response.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 40-- Exhibit --

-- Exhibit --

An administrator has created the NSX network shown in the exhibit.

Both VMs use the same Distributed Router for their default gateway. VM-B receives an IP message fromVM-A.

What is the source MAC address of the IP message received by VM-B?

A. VM-A's MAC address.B. VM-B's default gateway's MAC Address.C. VM-A's default gateway's MAC address.D. Logical Switch 7321's MAC address

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 41

-- Exhibit --

-- Exhibit --

An NSX administrator creates the NSX network in the exhibit.

What destination IP address will Host-A use when sending a VXLAN frame to Host-B?

A. The IP address of one of Host-B's new vmkernel ports created during host configuration.B. The IP address of Host-B's management vmkernel port, which is also the VTEP IP address.C. The IP address of Host-B's NSX Controller. The NSX Controller forwards the VXLAN frame to Host-B.D. The IP address Host-B provided to Host-A during VXLAN tunnel setup negotiations.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 42-- Exhibit --

-- Exhibit --The Exhibit shows two possible physical network architectures. Each architecture provides a means indealing with the pictured failure.Based on the exhibit, which architecture provides the highest degree of connectivity in the event of thepictured failure?

A. Both designs will provide the same percentage of connectivty in times of failure.B. Neither design is properly architected to work around the displayed failure.C. Diagram A's architecture will provide the highest percentage of connectivity in times of failure.D. Diagram B's architecture will provide the highest percentage of connectivity in times of failure.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 43Where does the Distributed Logical Firewall enforce firewall rules?

http://www.gratisexam.com/

A. At the Virtual Machine's virtual Network Interface Card (vNIC).

B. At the Logical Switch virtual port that the Virtual Machine connects to.C. At the NSX Controller's firewall kernel module.D. At the ESXi host vmnic used by the vSphere Distributed Switch.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 44Which is not a valid Destination option for a General Logical Firewall rule?

A. DatacenterB. Virtual AppC. MAC SetD. Network

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 45How are Logical Firewall rules applied to affected virtual machines?

A. They are pushed by the NSX Controllers to all the ESXi hosts in the same Transport Zone.B. They are pushed by the NSX Manager to the ESXi hosts running the source and/or destination virtual

machines.C. They are pushed by the NSX Controllers to the ESXi hosts running the destination virtual machines.D. They are pushed by the NSX Manager to all the ESXi hosts in the NSX environment.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 46If a Security Group is the Source for a General Logical Firewall Rule, which Virtual Machines will beaffected by the rule?

A. Each Virtual Machine defined in the Security Group.B. Each Virtual Machine defined in the Source and Destination fields of the Logical Firewall Rule.C. Each Virtual Machine identified in the Applied To field of the Logical Firewall Rule.D. Each Virtual Machine identified in the Destination field of the Logical Firewall Rule.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 47An administrator wishes to control traffic flow between two virtual machines. The virtual machines are in the

same subnet, but are located on separate ESXi hosts. The administrator deploys an Edge Firewall to one ofthe hosts and verifies the default firewall rule is set to deny, but the two virtual machines can stillcommunicate with each other.

What task will correct this issue?

A. Configure both ESXi host firewalls to deny traffic from the virtual machine on the other host.B. Deploy another Edge Firewall on the host running the second virtual machine.C. Remove any other firewall appliances that may exist on either of the ESXi hosts.D. Deploy a Distributed Firewall with firewall rules to prevent traffic between the virtual machines.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 48An administrator has deployed NSX in an environment containing a mix of vSphere 5 hosts. Theimplementation includes the Distributed Firewall Service, but the administrator finds that rules are not beingapplied to all affected virtual machines.

What two conditions would cause this behavior? (Choose two.)

A. Some hosts have not been prepared for NSX.B. Only ESXi 5.5 and later hosts can push the rules to the virtual machines.C. Only ESXi 5.1 and later hosts can push the rules to the virtual machines.D. Some hosts are blocking the port used for rule distribution.

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:

QUESTION 49Which Virtual Machine cannot be protected by the Distributed Firewall?

A. A Virtual Machine connected to a vDS Portgroup running on an ESXi 5.1 host.B. A Virtual Machine connected to a vSS Portgroup running on an ESXi 5.5 host.C. A Virtual Machine connected to a vDS Portgroup running on an ESXi 5.5 host.D. A Virtual Machine connected to a logical switch running on an ESXi 5.1 host.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 50Which two options are valid SpoofGuard operational modes? (Choose two.)

A. Allow Local Address as Valid Address in This NamespaceB. Allow and Approve DHCP Requests Regardless of Enabled ModeC. Automatically Trust IP Assignments on Their First UseD. Manually Inspect and Approve All IP Assignments Before Use

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:

QUESTION 51An administrator wants to perform Activity Monitoring on a large group of virtual machines in an NSXenvironment.

How would this task be accomplished with minimal administrative effort?

A. Create a PowerCLI script to enable virtual machine data collection on each virtual machine.B. Create a security group in Service Composer and add the virtual machines to the security group.C. Add the virtual machines to the pre-defined Activity Monitoring security group in Service Composer.D. Add the virtual machines to a VM folder in vCenter Server and enable data collection.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 52Which service cannot be included in a Security Policy using Service Composer?

A. Endpoint ServicesB. Firewall RulesC. Virtual Private Network ServicesD. Network Introspection Services

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 53Which action is not an option for adding Virtual Machines to a Security Group?

A. Adding Virtual Machines to a Security Group and nesting it within another Security Group.B. Defining Dynamic Membership in the Security Group.C. Adding Virtual Machines to a Security Policy and associating it with a Security Group.D. Selecting objects to include within a Security Group.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 54A user needs to be given the ability to make configuration changes on a specific NSX Edge device. Whatrole and scope could be used to meet this requirement?

A. NSX Administrator role and Limit Access scope

B. Security Administrator role and Limit Access scopeC. NSX Administrator role and No restriction scopeD. Security Administrator role and No restriction scope

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 55Which component automates the consumption of third-party services and provides mapping to virtualmachines using a logical policy?

A. NSX ManagerB. Cloud Management Platform (CMP)C. Service ComposerD. NSX Data Security

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 56What is the function of NSX Data Security?

A. Prevents sensitive data in your virtualized environment from being copiedB. Prevents sensitive data in your virtualized environment from being modifiedC. Identifies sensitive data in your virtualized environment based upon regulation security policiesD. Identifies sensitive data in your virtualized environment based upon regulation violation reports

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 57Which NSX component can validate that security policies at your organization are being enforced correctly?

A. Activity MonitoringB. Flow MonitoringC. ERSPAND. Distributed firewalls

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 58Where does an administrator configure logging for the NSX Manager?

A. In the vSphere Web ClientB. In the NSX Manager GUIC. In the NSX Manager command line interface (CLI)D. In the vSphere Syslog Collector

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 59Which two options are pieces of information required to perform an NSX backup? (Choose two.)

A. Transfer protocolB. Default PortC. Number of backups retainedD. Filename prefix

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:

QUESTION 60An administrator needs to verify which port the switch manager is using. Which command should be used?

A. show controller-cluster statusB. show controller-cluster core statsC. show controller-cluster connectionsD. show controller-cluster logical-switches

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 61An administrator configures the IPSec VPN service on an NSX Edge instance, but the negotiation fails.Examining the log file, the administrator notices the following messagE.

INVALID_ID_INFORMATION

Which misconfiguration caused the error?

A. Pre-shared key (PSK) does not match.B. Diffie-Hellman (DH) Group does not match.C. Perfect Forward Secrecy (PFS) does not match.D. VPN tunnel address is incorrect.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 62You are tasked with designing a data center architecture that should maximize the use of vMotion withinyour environment. The design has these requirements:

· The network must utilize widely offered layer 2 switching and layer 3 switching services · Purchase of newequipment should be minimized

Which two network design architectures will provide the requirements for vMotion in your data center?(Choose two.)

A. Utilize layer 3 switching from the access layer through the core.B. Employ layer 2 multipathing using a standardized protocol.C. Deploy a flat, traditional layer 2 switched network.D. Deploy an overlay technology for the deployment of your virtual network.

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:

QUESTION 63Which two statements describe the benefits provided by firewall services deployed by NSX? (Choose two.)

A. Firewall services deployed using a software appliance will provide east-west traffic filtering and security.B. Firewall services deployed using a distributed kernel module will provide east-west traffic filtering and

security.C. Firewall services providing edge security services uses a virtual appliance and is centrally managed.D. Firewall services providing edge security services uses a distributed kernel module.

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:

QUESTION 64-- Exhibit --

-- Exhibit --

The Exhibit details the network connectivity from an NSX network and the supporting physical network.Locations C and D may be required to process packets with QoS tags.

Based on the exhibit, which statement details proper processing of packets if they are QoS tagged?

A. Locations C and D will trust the QoS tags of the encapsulated frame when passing packets.B. Location B should trust the QoS tags of the encapsulated frames that are switched.C. Location A will mark the inner header of the encapsulated frame.D. Location B should trust the QoS tags of the external header.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 65What are two advantages for using NSX for vSphere's Logical Switching? (Choose two.)

A. Expands the number of available VLANs.B. Allows for Layer 2 switching over Layer 3 infrastructure.C. Distributes Layer 3 data across multiple hypervisorsD. Provides for 10,000 logical segments.

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:

QUESTION 66Based on VMware's best practices, what two statements define the best solution for scaling layer 2 servicesfor the virtual network? (Choose two.)

A. Employ a layer 2 switched network.B. Employ a layer 3 switched network.C. Use GRE for an overlay network.D. Use VXLAN for an overlay network.

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:

QUESTION 67Which NSX service or feature provides optimized management of virtual machine broadcast (ARP) traffic?

A. NSX ControllerB. NSX ManagerC. Edge Services GatewayD. VTEP

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 68How does NSX simplify the underlying physical network?

A. All configuration and state information is available via the REST APIs to automate the configuration ofthe physical network.

B. All configuration and state information are readily accessible, as is the mapping between virtual networktopologies and the physical network.

C. All configuration and state information is stored in the local NSX BPDU database, eliminating the needfor Spanning Tree Protocol (STP) on the physical network.

D. All configuration and state information is cached by the NSX controllers, reducing the number of MAC/ARP table entries on the physical network.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 69Which statement best describes scaling a fault tolerant spine-leaf multipathing fabric architected for an

NSX deployment?

A. Scaling should be performed by replacing 1Gbps links in the architecture with 10Gbps links.B. Scaling should be performed by increasing the number of links from each leaf switch to the associated

spine switches in the architecture.C. Scaling should be performed by increasing the number of spine switches while maintaining point-to-

point connectivity between leafs and spines.D. Scaling should be performed by using layer 2 switching between the leaf and spine switches.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 70If unicast mode is configured for the overlay transport in an NSX deployment, which two statementscorrectly define the network support that is required? (Choose two.)

A. Configure NSX High Availability.B. Layer 2 switching support in theaccess and distribution layersC. Layer 3 switching support in theaccess and distribution layersD. Configure Jumbo Frame support

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:answer is true.

QUESTION 71Which two characteristics of the underlying physical network does VMware NSX require for robust IPtransport? (Choose two.)

A. The physical network should provide scalable network I/O using Layer 2 Multipathing (L2MP) andMultichassis Link Aggregation (MLAG).

B. The physical network should provide scalable network I/O using Equal Cost Multipathing (ECMP).C. QoS is not necessary since classification and marking will be done in the overlay.D. QoS classification and marking is required to provide end-to-end flow control.

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:

QUESTION 72In a data center using a leaf and spine architecture, which two statements define the connectivity betweenthe leaf and spine tiers required to provide optimal network connectivity for NSX? (Choose two.)

A. Links are required between leaf and spine switches, and from each spine switch to other spine switchesin the architecture.

B. Links are required between leaf and spine switches in the architecture to form a point-to-pointconnection between the two tiers.

C. High availalability and scalability should be achieved using NSX High Availability.D. High availability and scalability should be achieved using Equal Cost Multipathing (ECMP).

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:

QUESTION 73On a vSphere Standard Switch, how does teaming two or more physical network adapters provide loadbalancing when using the Load Balancing feature Route based on the originating virtual port ID?

A. They physical network adapter is chosen by use of a round robin based algorithm for each additionalvirtual port in the port group that becomes active.

B. The physical network adapter is chosen by using the source IP address of the virtual machine and thedestination IP address as variables in an algorithm.

C. The physical network adapter is chosen by using the source MAC address as a variable in an algorithm.D. The physical network adapter is chosen based on the workloads from each port and the number of

physical adapters.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 74What are two valid methods of configuring virtual machines to use a vSphere Distributed Switch (vDS) thatare currently using a vSphere Standard Switch (vSS)? (Choose two.)

A. Select each virtual machine and drag it to the vSphere Distributed Switch.B. Select the vSS in use by the virtual machines and select the Move to option on the right-click menu.C. Select each virtual machine and edit the virtual network adapter's connection settings.D. Use the Migrate Virtual Machine Networking option from the right-click menu of the vDS.

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:

QUESTION 75A network security administrator wants to monitor traffic on several VLANs configured on a vSphereDistributed Switch. The traffic will be sent to another distributed port.

What type of port mirroring session must be configured to meet these requirements?

A. Select the session type Distributed Port Mirroring when configuring the Port Mirroring session.B. Select the session type Remote Mirroring Source when configuring the Port Mirroring session.C. Select the session type Remote Mirroring Destination when configuring the Port Mirroring session.D. Select the session type Distributed Port Mirroring (legacy) when configuring the Port Mirroring session.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

http://www.gratisexam.com/

QUESTION 76What are three switch features found only on vSphere Distributed Switches? (Choose three.)

A. Network I/O ControlB. CDPC. LLDPD. SR-IOVE. Port Mirroring

Correct Answer: ACESection: (none)Explanation

Explanation/Reference:

QUESTION 77You have deployed a two-tiered application using four virtual machines:

· Two virtual machines are web application servers· Two virtual machines providing a clustered database service

What feature can you configure to provide the most accurate account for only the traffic between the webservers and the clustered database?

A. On the vSphere Distributed Switch, configure the use of a port mirroring session using the EncapsulatedRemote Mirroring (L3) Source session type.

B. On the vSphere Distributed Switch, configure the use of a port mirroring session using the RemoteMirroring Destination session type.

C. On the vSphere Distributed Switch, configure the use of an Isolated Private VLAN for the ports of thefour virtual machines.

D. On the vSphere Distributed Switch, configure Netflow for the distributed virtual port group and enableProcess internal flows only for the distributed switch.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 78Which three network policy settings can only be configured on a vSphere 5.5 Distributed Switch? (Choosethree.)

A. Access Control Lists (ACLs)B. Network I/O ControlC. LACP v2D. NetFlowE. DSCP Marking

Correct Answer: ACESection: (none)Explanation

Explanation/Reference:

QUESTION 79An administrator wishes to upgrade to NSX from the following infrastructurE.

· vCenter Server 4.1· vShield 5.0· ESXi hosts 4.1

What is a valid, minimum set of steps to properly upgrade this environment to NSX?

A. 1. Upgrade vCenter Server 4.1 to vCenter Server 5.5 2. Upgrade vShield 5.0 to vShield 5.5 3.Upgrade ESXi hosts to ESXi 5.1 or greater 4. Install the NSX upgrade bundle

B. 1. Upgrade vCenter Server 4.1 to vCenter Server 5.1 2. Upgrade vCenter Server 5.1 to vCenter Server5.5 3. Upgrade ESXi hosts to ESXi 5.1 or greater 4. Install the NSX upgrade bundle

C. 1. Upgrade vCenter Server 4.1 to vCenter Server 5.5 2. Upgrade ESXi hosts to ESXi 5.1 or greater 3.Install the NSX upgrade bundle

D. 1. Upgrade vCenter Server 4.1 to vCenter Server 5.5 2. Upgrade vShield 5.0 to vShield 5.5 3.Install the NSX upgrade bundle

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 80Layer 2 Multipathing (L2MP) and Multi-chassis Etherchannel (MEC) features have distinct scalingdifferences with the network switching and routing services provided by NSX.

Which two statements provide a proper contrast of these services? (Choose two.)

A. Multi-chassis Etherchannel features provide higher utilization of Ethernet links within a defined L2/L3distribution area.

B. Multi-Chassis Etherchannel features provide an easy ability to scale a VLAN across the data center.C. NSX provides a method to transparently deploy L2MP protocols upon existing data center installations

without service disruption.D. NSX provides a method to deploy scalable L2/L3 services on existing data center installations.

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:valid answer.

QUESTION 81Which two are valid statements regarding third-party services and NSX? (Choose two.)

A. Third party services are automatically registered with NSX Manager.B. Third party services can either be automatically or manually registered with NSX Manager.C. Third party services require the deployment of a virtual appliance.D. Third party services may or may not utilize a service virtual appliance.

Correct Answer: BD

Section: (none)Explanation

Explanation/Reference:

QUESTION 82Where must you go to manually register a third-party service with VMware NSX?

A. vSphere Web Client -> Networking & Security -> Installation -> Service Deployments tabB. vSphere Web Client -> Networking & Security -> Service Composer -> Service Deployments tabC. vSphere Web Client -> Networking & Security -> Service DefinitionsD. vSphere Web Client -> Networking & Security -> Distributed Firewall -> Service Definitions

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 83What two statements correctly describe the way NSX provides integration with Cloud ManagementPlatforms (CMPs)? (Choose two.)

A. OpenStack provides integration with the Cinder plug-in.B. OpenStack provides integration with the Neutron plug-in.C. VMware provides open source API plug-ins for their own CMP products such as vCloud Director and

vRealize Automation.D. VMware provides out of the box integration with their own CMP products such as vCloud Director and

vRealize Automation.

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:

QUESTION 84Which VMware NSX for vSphere component can be created on-demand using vRealize Automation?

A. The logical switchB. The logical distributed routerC. The distributed firewallD. The NSX Edge Services Gateway

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 85Which NSX feature provides the ability to audit network traffic, define and refine firewall polices, and identifythreats to the network?

A. ERSPANB. Flow Monitoring

C. Logical RoutersD. Service Composer

Correct Answer: BSection: (none)Explanation

Explanation/Reference:proper answer.

QUESTION 86-- Exhibit --

-- Exhibit --

An administrator is testing connectivity between two ESXi hosts and uses the ping utility, as shown in theExhibit.

Based on the results shown in the exhibit, which statement is correct?

A. Communication between the hosts is working correctly.B. The hosts are in separate subnets.C. The MTU size is too small.D. A logical router has not been deployed and configured.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 87What is the packet size of the VXLAN standard test packet when using the Ping test on the logical

switches?

A. 1500B. 1550C. 1575D. 1600

Correct Answer: BSection: (none)Explanation

Explanation/Reference:appropriate answer.

QUESTION 88-- Exhibit --

-- Exhibit --

An NSX administrator has deployed the network shown in the Exhibit.

Based on the exhibit, which statement describes a valid method for redirecting traffic around the fault?

A. Building this topology using a layer 2 switched fabric with connectivity between the leafs would allowtraffic to be redirected around the fault to another leaf.

B. Building this topology using a layer 3 routed fabric with connectivity between the leafs would allow trafficto be redirected around the fault to another leaf.

C. Building this topology using a layer 2 switched fabric with spanning tree will provide the quickest patharound the fault to another spine when connectivity is lost.

D. Building this topology using a layer 3 routed fabric will provide the quickest path around the fault toanother spine when connectivity is lost.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

http://www.gratisexam.com/


Recommended