1V0-642.exam.30q Number: 1V0-642 Passing Score: 800 Time Limit: 120 min 1V0-642 VMware Certified Associate 6 Network Visualization Fundamentals Exam
Exam A QUESTION 1 Which is NOT a benefit of virtualized compute over traditional physical hardware for server deployments? A. Cost B. Deployment time C. Security D. Flexibility Correct Answer: C /Reference: QUESTION 2 What are the two operational modes available with VMware NSX balancer (Choose two.) A. Proxy B. Setup C. Baseline D. Inline D /Reference: Reference: http://blog.bertello.org/2016/02/14/nsx-for-newbies-part-11-load-balancing/ QUESTION 3
An organization has not yet implemented network virtualization in their IT infrastructure. What are the two common management challenges organizations meet in their day-to-day administration? (Choose two.) A. Be susceptible to malware and virus vulnerabilities in the network. B. Update physical network manually each time a new application is deployed. C. Spend more time in provisioning and decommissioning lab environments. D. Manage frequently occurring network requests manually. Correct Answer: BC /Reference: QUESTION 4 An administrator wants to provide seamless connectivity between on-premises and hybrid cloud resources. In this scenario which technologies can be incorporated to provide seamless connectivity? (Choose two.) A. VMware NSX L2 VPN B. VMware NSX L4-L7 VPN C. Site to Site VPN with TLS D. Site to site VPN with IPSec D /Reference: Reference: http://blogs.vmware.com/vcloud/2016/08/customer-onboarding-vmware-nsx-l2vpn-service-vcloud-air-network.html QUESTION 5 How do virtual networks support physical infrastructure Quality of Service (QoS)? A. By receiving the help of the NSX gateway. B. By marking the packets in the encapsulated header. C. By employing East-West traffic. D. By restricting the access of VLANs to specific pods.
Correct Answer: B /Reference: QUESTION 6 An administrator decides to implement logical switching to establish connectivity between virtual machines that reside on the same host. Which layer is used by logical switching to provide this connectivity? A. Layer 4 B. Layer 5 C. Layer 3 D. Layer 2 Correct Answer: D /Reference: QUESTION 7 What is the default virtual standard switch that is created when ESXi is installed on a hypervisor? A. vswitch 1 B. vswitch C. vswitch0 D. vswitcj2 Correct Answer: C /Reference: Reference: http://www.rustyhann.com/esxi-05-create-vswitch.pdf (page 3) QUESTION 8
Which service of VMware Integrated OpenStack has the ability to communicate with VMware NSX Controller, create logical switches and routers, and add new NSX virtual machines on demand? A. Neutron B. Proton C. Glance D. Nova /Reference: Reference: http://blog.scottlowe.org/2014/04/25/learning-nsx-part-12-integrating-vmware-nsx-with-openstack/ QUESTION 9 Which characteristic of VMware NSX enables secure intra-data center network traffic? A. Micro-segmentation B. Cloud pod architecture C. Elasticity D. Multi-tenant manageability /Reference: Reference: http://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/products/nsx/vmware-microsegmentation-solution-overview.pdf (page 2) QUESTION 10 Which security service applies rules at the Virtual NIC (vnic) level to define the traffic allowed to and from a security group?
A. Distributed firewall rules B. Network firewall rules. C. Network introspection services. D. Guest introspection services. /Reference: Reference: http://www.routetocloud.com/2015/04/nsx-distributed-firewall-deep-dive/ QUESTION 11 Which component of NSX logical firewall, offered by the NSX Edge Services Gateway (ESG), focuses on North-South traffic enforcement perimeter or tenant perimeter? A. Distributed firewall B. Centralized NSX Edge firewall C. NSX controller cluster D. Distributed logical router /Reference: Reference: http://blog.ipcraft.net/a-multi-tenant-topology-in-vmware-nsx/ QUESTION 12 Which plane of the VMware NSX architecture provides a single point of configuration and Representational State Transfer (REST) API entry points? A. Management B. Control C. Integration D. Data
/Reference: Reference: https://pubs.vmware.com/nsx-62/topic/com.vmware.icbase/pdf/nsx_62_api.pdf (page 24, management plane) QUESTION 13 How can the legacy physical network be simple, stable and reliable when network abstraction is implemented? A. By leveraging the existing physical devices without configuration changes. B. By automating services for provisioning new services. C. By configuring new VLANs. D. By integrating third-party devices with the existing infrastructure. /Reference: QUESTION 14 What are three common problems for administrators when managing application with network security models that are not virtualized? (Choose three.) A. Lack of Interoperability and automation creates error-prone manual work. B. Integration of third-party security products with home products is not possible. C. Deploying and managing third-party security products become difficult. D. Load balancing by vmotion is not possible. E. There is limited visibility into a workload s security posture and policies. CE /Reference: QUESTION 15 Which three statements are true about NSX Distributed Firewall? (Choose three.)
A. It provides East-West stateful Layer 2 Layer 4 firewall. B. It allows you to create access control policies based on VMware vcenter Server objects such as data centers and clusters. C. It works as perimeter security firewall. D. It provides North-South stateful Layer 3 Layer 4 firewall. E. It is virtualization-aware firewall. BE /Reference: QUESTION 16 Which is the VMware product through which VMware NSX, other than VMware vrealize Automation, provides automation of the entire data center? A. VRealize Operations manager B. VMware Integrated OpenStack C. VMware Site Recovery Manager D. VMware vrealize Log Insight. Correct Answer: B /Reference: QUESTION 17 Which mode does the NSX Edge router use to connect to the logical network for load balancing? A. One arm B. Transparent C. Inline D. Custom
/Reference: Reference: http://www.routetocloud.com/2014/10/nsx-load-balancing/ QUESTION 18 Which security technology is used by User World Agent (UWA) to communicate with VMware NSX Controller on the control plane? A. Tunneled Transport Layer Security (TTLS) B. Transport Layer Security (TLS) C. Secure Sockets Layer (SSL) D. IPsec Correct Answer: C /Reference: Reference: http://www.routetocloud.com/2014/04/nsx-home-lab-part-3/ QUESTION 19 Which component of VMware Horizon acts as a broker for client connections, providing authentication to users and directing incoming desktop requests from users to View virtualized desktops? A. View Client B. View Administrator C. View Composer D. View Connection Server Correct Answer: D
/Reference: Reference: https://pubs.vmware.com/horizon-7-view/index.jsp?topic=%2fcom.vmware.view.integration.doc%2fguid-345af3e0-a69a-4307-afc6- CB97CE99AA60.html QUESTION 20 Which component of NSX logical firewall, offers by the NSX Edge Services Gateway (ESG), focuses on North-South traffic enforcement at the data center perimeter or tenant perimeter? A. Distributed firewall B. Centralized NSX Edge firewall C. NSX controller cluster D. Distributed logical router /Reference: QUESTION 21 Which port in a vsphere Standard Switch is used to connect Virtual NIC (vnic)? A. vnic B. Physical C. Uplink D. VMKernel Correct Answer: C /Reference: Reference: https://www.pluralsight.com/blog/it-ops/virtual-networking-101-understanding-vmware-networking QUESTION 22 What is the common practice that I followed when a new application is deployed in legacy networking? A. The application is mapped to users upfront.
B. The physical network is updated by the network team each time. C. Recourse allocation is reconfigured based on the application requirement. D. Firewall and Intrusion Prevention System (IPS) solutions are switched off during the first deployment cycle. Correct Answer: C /Reference: QUESTION 23 Why is VMware NSX the most secure environment against threats and vulnerabilities? A. Does not require high-end security protocols due to the isolated arrangements or virtual machines. B. Offers a threat-free network because each virtual machine is managed by customized security policies. C. Offers no risk from unrelated streams of data communicating with each other. D. Handles threats efficiently through the use of alerts and notifications, before any horizontal impact is created to the adjacent virtual machine. Correct Answer: B /Reference: QUESTION 24 One of the advantages of using VXLAN over VLAN is its high scalability. What is the maximum number of logical network IDs that is handled by VXLAN? A. 16 million B. 10 million C. 4,096 D. 12 million /Reference:
Reference: http://whatis.techtarget.com/definition/vxlan QUESTION 25 What are the two advantages of deploying NSX Edge load balancer in a network? (Choose two.) A. Provides improved application availability in case of server failures. B. Enables application or service requests that are distributed across multiple back-end servers. C. Enables migration of virtual machines from one data to the other. D. Reduces the usage of public IP addresses in the network. Correct Answer: BD /Reference: QUESTION 26 Which operational mode does the NSX Edge router use to connect to the logical network for load balancing? A. One-arm B. Transparent C. Inline D. Custom /Reference: QUESTION 27 Which setback is NOT related to the hardware-centric legacy of networking? A. Unpredicted downtime occurrences. B. Insufficient and weak perimeter security. C. Increased capital and operational costs. D. Complexity in service deployment.
Correct Answer: B /Reference: QUESTION 28 What is the advantage of live migration of virtual machines with VMware Site Recovery Manager and VMware NSX? A. Micro-segmentation security. B. Networking beyond data center. C. Simplified application deployment. D. Reduced Recovery Time Objective (RTO) by 80 percent. Correct Answer: D /Reference: QUESTION 29 Which technique best explains the use of the grained policies and network to enable security inside the data center? A. Micro-division B. Bifurcation C. Dissection D. Micro-segmentation Correct Answer: D /Reference: Reference: https://vmworldeurope2015.lanyonevents.com/connect/sessiondetail.ww?session_id=2157 QUESTION 30
What are two advantages of embedding the security functions in the hypervisor? (Choose two.) A. Manages security posture of workloads at scale. B. Enables high throughput rates. C. Secure East-West traffic between each single virtual machine. D. Avoids hairpinning of resources. C /Reference: