What are two advantages of embedding the security functions in the hypervisor? (Choose two.)
A. Manages security posture of workloads at scale.
B. Enables high throughput rates.
C. Secure East-West traffic between each single virtual machine.
D. Avoids hairpinning of resources.
What are two functions of a DLR control VM (Choose two.)
A. Communicates with the NSX manager and sends routing updates to the NSX controller.
B. Performs Address Resolution Protocol (ARP) entry lookup.
C. Establishes routing protocol sessions with other routers.
D. Forms adjacencies with edge routing peers.
What is the total volume of traffic per Distributed Logical Router (DLR) that issupported by the Equal Cost Multipath (ECMP) model?
A. 20GB
B. 50 GB
C. 80 GB
D. 40 GB
In a Software-Defined Data Center (SDDC) that has a distributed firewall, where are the firewall policies enforced?
A. Guest operating system
B. Uplink ports
C. Virtual machine's virtual interface
D. Host
An administrator has deployed Distributed Firewall to protect their infrastructure from security threats. Due to extreme loads on the network the CPU is saturated and the memory becomes full.
In this scenario, which mode does the Distributed Firewall enter?
A. Secondary
B. Fail open
C. Proxy
D. Fail close
What are the two main limitations of a vSphere Standard Switch? (Choose two.)
A. Centralized management
B. Virtual machines per host
C. Complex installation procedure
D. Scalability
What are three critical demands that lead the way for the evolution of a networking model against the traditional legacy model (Choose three.)
A. Need for flexible movement of workloads within and across data centers
B. Cost effectiveness.
C. Decentralization of recourse management
D. Decentralization of recourse management
E. Decentralization of recourse management
A security policy is a collection of security services of firewall rules, or both. Which security service is applied to virtual machines to ensure data security?
A. Virtual machine
B. Guest Introspection
C. Network Introspection
D. SpoofGuard
Which of these allows static or dynamic grouping based on inclusion and exclusion of objects such as virtual machines, vNICs, cSphere clusters, and logical switches?
A. uplink
B. Active Directory (AD)
C. Port
D. Security group
What are the two operational modes available with VMware NSX balancer (Choose two.)
A. Proxy
B. Setup
C. Baseline
D. inline
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only VMware exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 1V0-642 exam preparations and VMware certification application, do not hesitate to visit our Vcedump.com to find your solutions here.