Actualtests 2V0-642 Questions are updated and all 2V0-642 answers are verified by experts. Once you have completely prepared with our 2V0-642 exam prep kits you will be ready for the real 2V0-642 exam without a problem. We have Renew VMware 2V0-642 dumps study guide. PASSED 2V0-642 First attempt! Here What I Did.
2026 New 2V0-642 Exam Dumps with PDF and VCE Free: https://www.2passeasy.com/dumps/2V0-642/
Q1. Which three methods can be used by the NSX Distributed Firewall to discover IP addresses? (Choose three )
A. DHCP Snooping
B. IP Sets
C. Spoofguard configured forTrust on First Use.
D. VMware Tools installed on every guest virtual machine.
E. ARP Spoofing
Answer: A,C,D
Explanation:
Referencehttps://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2125437
Q2. An NSX administrator is validating the setup for a new NSX implementation and inputs this command:
A. It helps verify that VXLAN segments are functional and the transport network supports the proper MTU size for NSX.
B. It helps verify that the source virtual machine is configured with the proper MTU size for NSX.
C. It helps verify that the NSX Controller is communicating with the destination VTEP.
D. It helps verify that the NSX Logical Switch is routing packets to the destination host.
Answer: A
Explanation:
Referencehttps://www.viktorious.nl/2014/12/02/nsx-basics-creating-logical-switch/
Q3. A virtualized application needs access to a physical database. Both servers are on the 172.168.3.0/24 subnet. NSX has been deployed across the entire virtual environment.
What method can be used to allow access between the servers?
A. Configure a DLR with an L2 bridge instance for 172.168.3.0/24 VXLAN to VLAN traffic.
B. Route 172.168.3.0/24 to the NSX Edge where the logical switch of the applicationexists.
C. Configure a NAT rule for 172.177.13/024 for the database physical router.
D. Configure the logical switch to bridge 172.168.3.0/24 to the physical router of the database.
Answer: D
Q4. Which three NSX services are available for synchronization in a Cross-vCenter implementation? (Choose three.)
A. Spoofguard
B. Distributed Firewall
C. Edge Firewall
D. Logical Switch
E. Transport Zone
Answer: B,D,E
Explanation:
Referencehttps://pubs.vmware.com/NSX- 62/topic/com.vmware.ICbase/PDF/nsx_62_cross_vc_install.pdf
Q5. What are the correct steps for connecting a virtual machine to a logical switch?
A. Select the logical switch, click the Add Virtual Machine Icon, select the VM, select the
vNIC to connect B. Select the Add Virtual Machine icon, select the logical switch, vNIC to connect
B. Select the logical switch, select the virtual machine, click the Add Virtual Machine .con. select the vNIC to connect
C. Select the vNIC, click the Add Virtual Machine Icon, select the logical switch
Answer: A
Explanation: https://docs.vmware.com/en/VMware-NSX-for-vSphere/6.2/com.vmware.nsx.admin.doc/GUID-571237B3-1665-4B92-A3A9- 51C078EC601D.html
Q6. Which is a best practice to secure system traffic, ensure optimal performance and satisfy prerequisites for NSX?
A. Configure a single VMkernel and a single distributed port group for all the system traffic.
B. Configure a single distributed port group with a single VMkernel for Management and iSCSI traffic, a separate VMkernel for vMotion and VSAN traffic.
C. Dedicate separate VMkernel adapters for each type of system traffic. Dedicate separate distributed port groups for each VMkernel adapter and isolate the VLANs for each type of system traffic.
D. Dedicate separate VMkernel adapters for each type ofsystem traffic and dedicate separate standard switches for each type of system traffic connected to a single physical network.
Answer: B
Q7. When deploying a standalone NSX Edge as a Layer 2 VPN client, which port needs to be configured on the client vSphere Distributed Switch?
A. Trunk port
B. Span port
C. Sink port
D. Mirror port
Answer: A
Explanation:
Referencehttps://pubs.vmware.com/NSX-62/index.jsp?topic=%2Fcom.vmware.nsx.admin.doc%2FGUID-C9E2B0E4-F1C1-44A7- B142-F814F801FA42.html
Q8. What is the function of NSX Data Security?
A. Prevents sensitive data in your virtualized environment from being copied
B. Prevents sensitive data in your virtualized environment from being modified
C. Identifies sensitive data in your virtualized environment based upon regulation security policies
D. Identifies sensitive data in your virtualized environment based upon regulation violation reports
Answer: D
Q9. An application requires load balancing with minimal impact to network performance. An NSX administrator is deploying a load balancer to meet the stated requirements.
Which load balancing engine should be deployed?
A. Layer 5
B. Layer 6
C. Layer 7
D. Layer 4
Answer: D
Explanation:
https://www.icc-usa.com/resources/vmw-nsx-network-virtualization-design-guide.pdf
Q10. Which two methods does VMware NSX offer to integrate with third-party partners? (Choose two )
A. Integration Manager
B. Service Chaining
C. VMwareNSXAPIs
D. Universal Synchronization Service
Answer: A,C
Explanation: https://docs.vmware.com/en/VMware-NSX-for-vSphere/6.3/com.vmware.nsx.admin.doc/GUID-EA477D96-E2D3-488B-90AA- 2F19B4AE327D.html#GUID-EA477D96-E2D3-488B-90AA-2F19B4AE327D