VMware 1V0-642 Exam Practice Questions (P. 1)
- Full Access (55 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
A security policy is a collection of security services of firewall rules, or both. Which security service is applied to virtual machines to ensure data security?
- AVirtual machine
- BGuest Introspection
- CNetwork Introspection
- DSpoofGuard
Correct Answer:
B
Reference:
http://blogs.vmware.com/consulting/2015/01/automating-security-policy-enforcement-nsx-service-composer.html
B
Reference:
http://blogs.vmware.com/consulting/2015/01/automating-security-policy-enforcement-nsx-service-composer.html
send
light_mode
delete
Question #2
Which NSX component enforces security rules between two virtual machines that are on the same Layer 2 segment?
- ANSX Manager
- BDistributed Router
- CNSX distributed Firewall
- DNSX Controller
Correct Answer:
(page 3)C
Reference:
http://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/whitepaper/products/nsx/vmware-nsx-network-virtualization-platform-white- paper.pdf
(page 3)C
Reference:
http://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/whitepaper/products/nsx/vmware-nsx-network-virtualization-platform-white- paper.pdf
send
light_mode
delete
Question #3
How do virtual networks that are natively isolated from each other provide support for overlapping IP address in a multi-tenant environment?
- ABy enabling isolation without using access control lists and firewall rules.
- BBy enabling isolation with the help of Active Directory (AD).
- CBy employing the spanning tree protocol.
- DBy implementing load balancing.
Correct Answer:
A
Network virtualization eliminates the need for IT to change IP addresses. With virtual networks natively isolated from each other and from the underlying physical hardware, network virtualization supports overlapping IP addresses in a multi-tenant environment. That means the same IP addresses can be used in separate enterprise networks that run over the same physical infrastructure.
Reference:
https://www.vmware.com/ciovantage/article/the-virtues-of-network-virtualization
A
Network virtualization eliminates the need for IT to change IP addresses. With virtual networks natively isolated from each other and from the underlying physical hardware, network virtualization supports overlapping IP addresses in a multi-tenant environment. That means the same IP addresses can be used in separate enterprise networks that run over the same physical infrastructure.
Reference:
https://www.vmware.com/ciovantage/article/the-virtues-of-network-virtualization
send
light_mode
delete
Question #4
An administrator has deployed Distributed Firewall to protect their infrastructure from security threats. Due to extreme loads on the network the CPU is saturated and the memory becomes full.
In this scenario, which mode does the Distributed Firewall enter?
In this scenario, which mode does the Distributed Firewall enter?
- ASecondary
- BFail open
- CProxy
- DFail close
Correct Answer:
B
Reference:
http://www.infosecurityeurope.com/__novadocuments/90945?v=635709318795000000
(slide 7)
B
Reference:
http://www.infosecurityeurope.com/__novadocuments/90945?v=635709318795000000
(slide 7)
send
light_mode
delete
Question #5
An administrator is working in an IT infrastructure where traditional routing methods are followed for routing network traffic. What are the three challenges for an administrator in this infrastructure? (Choose three.)
- AThe use of East-West traffic is not secure within a data center.
- BNorth-South routing methods limit data center scalability.
- CThe complexity of routing increases in a multi-tenant environment.
- DA suboptimal traffic route is used to reach destination.
- EAdding new servers to an isolated network became difficult.
Correct Answer:
ABE
ABE
send
light_mode
delete
All Pages