Tips to Pass 2V0-641 Exam (41 to 50)
Master the 2V0-641 VMware Certified Professional 6 – Network Virtualization Beta content and be ready for exam day success quickly with this Testking 2V0-641 answers. We guarantee it!We make it a reality and give you real 2V0-641 questions in our VMware 2V0-641 braindumps.Latest 100% VALID VMware 2V0-641 Exam Questions Dumps at below page. You can use our VMware 2V0-641 braindumps and pass your exam.
Q41. Your data center is made up of two VMware vCenter Server instances. Each vCenter Server manages three clusters with 16 hosts per cluster. In preparing for your VMware NSX deployment, how many vShield Endpoint instances will you have?
Q42. Which statement is correct when upgrading vShield Data Security to NSX Data Security?
A. NSX Data Security does not support a direct upgrade.
B. NSX Controller must be deployed before the upgrade.
C. The vCloud Network and Security Virtual Wires must have been upgraded.
D. vCould Network and Security must be at least version 5.1 before starting the upgrade.
Q43. If unicast mode is configured for the overlay transport in an NSX deployment, which two statements correctly define the network support that is required? (Choose two.)
A. Configure NSX High Availability.
B. Layer 2 switching support in theaccess and distribution layers
C. Layer 3 switching support in theaccess and distribution layers
D. Configure Jumbo Frame support
Answer: C, D
Q44. Which two statements are true regarding NSX? (Choose two.)
A. Workloads can be placed and moved independently of physical topology.
B. Operational efficiency can be achieved through automation of the physical network.
C. Workload deployments are non-disruptive over the existing physical network.
D. NSX implementation requires a VMware vSphere environment.
Answer: A, C
Q45. -- Exhibit --
-- Exhibit --Refer to the Exhibit. You are designing a network for NSX and your customer has stated that
virtual machine traffic needs to span the virtual and physical space. Based on the exhibit,
where should this requirement be configured?
A. Location A.
B. Location B
C. Location C
D. Locations B and C.
Q46. -- Exhibit --Your data center clusters are configured as shown in the exhibit. Core0 uses Virtual SAN and hosts virtual machines running the following components:
. vCenter Server
. Single Sign-On Server
. Update Manager
. SQL Server database Core1, Core2, and Core3 use a single Fibre Channel attached storage array. Core1 hosts over 500 virtual machines. Core2 hosts over 400 virtual machines. Core3 hosts 100 virtual machines. Following VMware's best practices, NSX Controller components should be deployed to which location(s)?
A. Deploy three NSX Controllers, one on each host of Core0.
B. Deploy four NSX controllers, one on each cluster in the data center.
C. Deploy 27 NSX controllers, one for each host in the data center
D. Deploy three NSX controllers. Deploy one in Core1, one in Core2, and one in Core3.
Q47. A company wants to deploy VMware NSX for vSphere and ensure the least amount of bandwidth consumption in the underlying physical architecture. Which replication mode should the logical switches be deployed with?
A. Multicast Replication Mode
B. Unicast Replication Mode
C. Hybrid Replication Mode
D. vSphere Replication Mode
Q48. A company has augmented its Data Center infrastructure by using vCloud Hybrid Service during peak hours. The company wants to extend their existing subnets into the cloud while workloads retain their existing IP addresses. The virtual machines in these subnets use an NSX Edge Gateway as their default gateway. Which solution should this company use?
A. Layer 2 VPN
B. MPLS VPN
C. IPSec VPN
D. SSL VPN
Q49. If a Security Group is the Source for a General Logical Firewall Rule, which Virtual Machines will be affected by the rule?
A. Each Virtual Machine defined in the Security Group.
B. Each Virtual Machine defined in the Source and Destination fields of the Logical Firewall Rule.
C. Each Virtual Machine identified in the Applied To field of the Logical Firewall Rule.
D. Each Virtual Machine identified in the Destination field of the Logical Firewall Rule.
Q50. An administrator manages a TFTP server virtual machine that is connected to a Logical Switch with a VNI of 7321. The TFTP server has been configured to use port 1069. An NSX Edge Service Gateway is connected to VNI 7321 and has an uplink interface with access to the physical network. Assume external users can reach the Service Gateway. What should the administrator configure to ensure external connections to the TFTP server are successful?
A. Create a DNAT rule with the original port of 69 and translated port of 1069.
B. Create a SNAT rule with the original port of 1069 and translated port of 69.
C. Create a SNAT rule with the original port of 69 and translated port of 1069.
D. Create a DNAT rule with the original port of 1069 and translated port of 69.