In a Cross-vCenter environment, where is information about local logical switches and local logical routers maintained?
A. Local Controller Cluster
B. Local Transport Zone
C. Universal Controller Cluster
D. Platform Services Controller
正解:C
質問 2:
A user has configured a specific distributed firewall rule preventing VM-A (172.16.10.11) on the Web-Logical Switch to communicate to VM-B (172.16.20.11), running on the same switch. After the changes, the user is still able to communicated to VM-A from VM-B.
To debug this anomaly, the user will need to obtain logs from which component?
A. The Edge Services Gateway
B. The appropriate ESXi Hosts(s)
C. The Distributed Logical Router
D. The appropriate NSX Controller(s)
正解:B
質問 3:
A virtualized application needs access to a physical database. Both servers are on the 172.168.3.0/24 subnet.
NSX has been deployed across the entire virtual environment.
What method can be used to allow access between the servers?
A. Configure a DLR with an L2 bridge instance for 172.168.3.0/24 VXLAN to VLAN traffic.
B. Route 172.168.3.0/24 to the NSX Edge where the logical switch of the application exists.
C. Configure the logical switch to bridge 172.168.3.0/24 to the physical router of the database.
D. Configure a NAT rule for 172.177.13.0/24 for the database physical router.
正解:A
質問 4:
An administrator is attempting to troubleshoot a routing issue between the Edge Services Gateway (ESG) and the Distributed Logical Router (DLR).
Based on the exhibit, which method CANNOT be used to troubleshoot the issue?
A. SSH session into 192.168.100.3 on the ESG.
B. Console session into the ESG.
C. SSH session into 192.168.10.5 on the DLR.
D. Console session into the DLR.
正解:C
質問 5:
Which NSX component can validate that security policies at your organization are being enforced correctly?
A. Activity Monitoring
B. Flow Monitoring
C. ERSPAN
D. Distributed firewalls
正解:A
質問 6:
What is a requirement of NSX Data Security?
A. NSX manager must be configured for Active Directory integration.
B. AN IP Pool must be created.
C. Guest Introspection must be installed on the cluster.
D. The Global Flow Collection Status must be set to Enabled.
正解:C
質問 7:
What is the function of NSX Data Security?
A. Identifies sensitive data in your virtualized environment based upon regulation violation reports.
B. Identifies sensitive data in your virtualized environment based upon regulation security policies.
C. Prevents sensitive data in your virtualized environment from being modified.
D. Prevents sensitive data in your virtualized environment from being copied.
正解:A
質問 8:
An administrator enables the NSX Ticket Logger to track infrastructure changes. The administrator logs out for lunch, returns and logs back in to complete the task. What is the status of ticket logger when the administrator logs back in?
A. The ticket logger still tracks changes until it is turned off by the administrator.
B. The ticket logger is turned off.
C. The ticket logger will display an error.
D. The ticket logger will prompt the user if they still want to continue tracking changes.
正解:B
奈须** -
先日購入した2V0-642を利用して受験をし、合格しました。
貴社ホームページに記載のとおり、高い合格率がありますよね。ありがとうございました。