2V0-642Free trialFree trial

By vmware
Aug, 2025

Verified

25Q per page

Question 1

Which virtual machine does VMware recommended be manually excluded from the Distributed Firewall?

  • A: NSX Manager
  • B: Microsoft SQL Server
  • C: vRealize Automation Appliance
  • D: vCenter Server

Question 2

A network administrator has been tasked with deploying a 3-tier application across two data centers. Tier-1 and tier-2 will be located in Datacenter-A and tier-3 will be located in Datacenter-B.
Which NSX components are needed to make this deployment functional?

  • A: A universal transport zone deployed with a universal distributed logical router (UDLR), a universal logical switch and two local logical switches connected to the UDLR.
  • B: A universal transport zone deployed with a universal distributed logical router (UDLR), two universal logical switches and a single logical switch connected to the UDLR.
  • C: A universal transport zone deployed with a universal distributed logical router (UDLR) and three universal logical switches connected to the UDLR.
  • D: A universal transport zone, a universal distributed logical router (UDLR) and three local switches in each data center connected to the UDLR

Question 3

In a Cross-vCenter NSX deployment, what are two requirements that must be met in order for an administrator to deploy both universal logical switches and local logical switches within the same vCenter instance? (Choose two.)

  • A: A universal distributed logical router must be created
  • B: A logical distributed router must be created
  • C: A universal transport zone must be created.
  • D: A local transport zone must be created

Question 4

The fact that NSX Data Security has visibility into sensitive data provides which two benefits? (Choose two)

  • A: It helps address compliance and risk management requirements.
  • B: It acts as a forensic tool to analyze TCP and UDP connections between virtual machines
  • C: It is able to trace packets between a source and destination without requiring access to the guestOS
  • D: It eliminates the typical agent footprint that exists with legacy software agents

Question 5

Which NSX component can validate that security policies at your organization are being enforced correctly?

  • A: Activity Monitoring
  • B: Flow Monitoring
  • C: ERSPAN
  • D: Distributed firewalls

Question 6

How many vCenter Server environments can a single NSX Manager serve at one time?

  • A: 2000 vCenter Servers
  • B: 10 vCenier Servers
  • C: 1 vCenler Server
  • D: 2 vCenter Servers

Question 7

What is the function of NSX Data Security?

  • A: Prevents sensitive data in your virtualized environment from being copied
  • B: Prevents sensitive data in your virtualized environment from being modified
  • C: Identifies sensitive data in your virtualized environment based upon regulation security policies
  • D: Identifies sensitive data in your virtualized environment based upon regulation violation reports

Question 8

An administrator enables the NSX Ticket Logger to track infrastructure changes. The administrator logs out for lunch, returns and logs back in to complete the task. What is the status of ticket logger when the administrator logs back in?

  • A: The ticket logger still tracks changes until it is turned off by the administrator.
  • B: The ticket logger is turned off.
  • C: The ticket logger will prompt the user if they still want to continue tracking changes.
  • D: The ticket logger will display an error.

Question 9

A Service Provider is using VMware vCloud Director with VMware vCloud Networking and Security (VCNS) on vSphere. Which two products will be impacted by the upgrade of VCNS to VMware NSX? (Choose two)

  • A: ESXi hosts
  • B: NSX Controller Cluster
  • C: vShield Manager
  • D: vCenter Server

Question 10

Which tool is used to detect rogue services?

  • A: NSX Logical Firewall
  • B: NSX Logical Router
  • C: Activity Monitoring
  • D: Flow Monitoring

Question 11

Which two NSX Data Security roles could be assigned to view configured policies and violation reports? (Choose two.)

  • A: Security Administrator
  • B: NSX Administrator
  • C: Auditor
  • D: Enterprise Administrator

Question 12

You are creating a Universal Segment ID Pool for a three site Cross-vCenter environment.
The three sites are designated as Site A, Site B and Site C,

  • Site A has a local Segment ID pool of 5000-5999
  • Site B has a local Segment ID pool of 6000-6999
  • Site C has a local Segment ID pool of 7000-7999
    Which of the following ranges would be valid for the Universal Segment ID pool?
  • A: 5000-7999
  • B: 7000-8999
  • C: 4000-4999
  • D: 2000000-2000999

Question 13

Which two are accurate statements with regards to Guest Introspection installation? (Choose two.)

  • A: The service virtual machine performs data security and activity monitoring.
  • B: The installation deploys a virtual machine to hosts prepared for VMware NSX.
  • C: A security policy weight of 4300 is assigned to hosts prepared to Guest Introspection.
  • D: Guest Introspection is deployed with NSX Data Security by default.

Question 14

Which three services could be provided by an NSX Edge Service Gateway? (Choose three.)

  • A: NTP
  • B: AAA
  • C: SSL VPN-Plus
  • D: L2 VPN
  • E: Firewall

That’s the end of your free questions

You’ve reached the preview limit for 2V0-642

Consider upgrading to gain full access!

Page 1 of 3 • Questions 1-25 of 69

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!