[2017-Sep.-Updated]Free 2V0-642 PDF and VCE Offered by Braindump2go[37-50]
2017 September New 2V0-642 Exam Dumps with PDF and VCE Free Updated Today! Following are some new 2V0-642 Questions: 1.|2017 New 2V0-642 Exam Dumps (PDF & VCE) 284Q&As Download: https://www.braindump2go.com/2v0-642.html
2.|2017 New 2V0-642 Exam Questions & Answers Download: https://drive.google.com/drive/folders/0B75b5xYLjSSNaE94Q1l6MVFBbWM?usp=sharing QUESTION 37 Which two NSX Data Security roles could be assigned to view configured policies and violation reports? (Choose two.) A. Security Administrator B. NSX Administrator C. Auditor D. Enterprise Administrator Answer: AC QUESTION 38 Which port is used for NSX REST API Requests? A. 80 B. 443 C. 5480 D. 8443 Answer: B QUESTION 39 Which component automates the consumption of third-party services and provides mapping to virtual machines using a logical policy? A. NSX Manager B. Cloud Management Platform (CMP) C. Service Composer D. NSX Data Security Answer: C QUESTION 40 An administrator enables the NSX Ticket Logger to track infrastructure changes. The administrator logs out for lunch, returns and logs back in to complete the task. What is the status of ticket logger when the administrator logs back in? A. The ticket logger still tracks changes until it is turned off by the administrator. B. The ticket logger is turned off. C. The ticket logger will prompt the user if they still want to continue tracking changes. D. The ticket logger will display an error. Answer: B QUESTION 41 What is required before running an Activity Monitoring report? A. Enable data collection on the NSX Controller B. Enable data collection on the vCenter Server C. Enable data collection on the NSX Manager D. Enable data collection on the virtual machine Answer: D QUESTION 42 What is the function of NSX Data Security? A. Prevents sensitive data in your virtualized environment from being copied B. Prevents sensitive data in your virtualized environment from being modified C. Identifies sensitive data in your virtualized environment based upon regulation security policies D. Identifies sensitive data in your virtualized environment based upon regulation violation reports Answer: D QUESTION 43 Where are the distributed NSX firewall decisions logged? A. NSX Manager B. vCenter Server C. NSX Edge D. ESXi host Answer: D QUESTION 44 An administrator needs to perform a configuration backup of NSX. From which two locations can this task be performed? (Choose two.) A. Directly on the NSX Manager B. From the vSphere Web Client C. Using the NSX API D. Directly on each NSX Controller Answer: AC QUESTION 45 An administrator attempts to create an NSX configuration backup and receives an error. The current backup configuration displays the following information: What task does the administrator need to complete to perform a successful backup? A. Configure the FTP Server Settings B. Turn Scheduling on C. Enable exclusions D. Start the backup service Answer: A QUESTION 46 Which tool detects a VLAN misconfiguration between virtual and physical switches? A. esxtop B. esxcfg-vswitch C. VDS Health Check D. NSX Controller command line interface (CLI) Answer: C QUESTION 47 Which tool is used to display VXLAN connection information? A. pktcap-uw B. NSX Controller CLI C. esxtop D. VDS Health Check Answer: B QUESTION 48 An administrator has created a logical switch, but when attempting to select a transport zone, the dropdown box is empty. Which option is causing this issue? A. The transport zone has not been enabled on the NSX Controller B. A VXLAN has not been created C. A VLAN has not been created D. The transport zone has not been assigned an IP address pool Answer: B QUESTION 49 An administrator is troubleshooting a NSX controller cluster issue and runs the control- cluster command: What information can be determined from the output provided in the exhibit? A. This is the control cluster majority leader controller B. There are two controllers in the cluster C. This is not the control cluster majority leader controller D. The persistence_server role is not functioning correctly Answer: C QUESTION 50 Which Endpoint service cannot be leveraged using Service Composer? A. Antivirus B. Data Security C. Layer 2 Bridging D. Network Introspection Answer: C
!!!RECOMMEND!!! 1.|2017 New 2V0-642 Exam Dumps (PDF & VCE) 284Q&As Download: https://www.braindump2go.com/2v0-642.html
2.|2017 New 2V0-642 Study Guide Video:
YouTube Video: YouTube.com/watch?v=0xCh45McXQk 1
|