An administrator is working in an IT infrastructure where traditional routing methods are followed for routing network traffic. What are the three challenges for an administrator in this infrastructure? (Choose three.)
A. The use of East-West traffic is not secure within a data center.
B. North-South routing methods limit data center scalability.
C. The complexity of routing increases in a multi-tenant environment.
D. A suboptimal traffic route is used to reach destination.
E. Adding new servers to an isolated network became difficult.
What is the advantage of live migration of virtual machines with VMware Site Recovery Manager and VMware NSX?
A. Micro-segmentation security.
B. Networking beyond data center.
C. Simplified application deployment.
D. Reduced Recovery Time Objective (RTO) by 80 percent.
What is the default virtual standard switch that is created when ESXi is installed on a hypervisor?
A. vSwitch 1
B. vSwitch
C. vSwitch0
D. vSwitcj2
Which component of NSX logical firewall, offers by the NSX Edge Services Gateway (ESG), focuses on North-South traffic enforcement at the data center perimeter or tenant perimeter?
A. Distributed firewall
B. Centralized NSX Edge firewall
C. NSX controller cluster
D. Distributed logical router
How does Software-Defined Data Center (SDDC) facilitate easy provisioning and management of the underlying physical resources?
A. Organizes physical resources into logical pools.
B. Calculate the number of users.
C. Organizes physical resources into clusters
D. Uses predetermined policies and rules.
How do virtual networks that are natively isolated from each other provide support for overlapping IP address in a multi-tenant environment?
A. By enabling isolation without using access control lists and firewall rules.
B. By enabling isolation with the help of Active Directory (AD).
C. By employing the spanning tree protocol.
D. By implementing load balancing.
Which port in a vSphere Standard Switch is used to connect Virtual NIC (vNIC)?
A. vNIC
B. Physical
C. Uplink
D. VMKernel
Which internet security protocol does NSX Edge use to interoperate with all major VPN vendors' equipment?
A. TLS
B. TCP/IP
C. HTTPS
D. IPSec
Which three statements are true about NSX Distributed Firewall? (Choose three.)
A. ft provides East-West stateful Layer 2 - Layer 4 firewall
B. it allows you to create access control policies based on VMware vCenter Server objects
C. such as data centers and clustersDC ft works as perimeter security firewall.
D. It provides North-South stateful Layer 3 - Layer 4 firewall.
E. It is virtualization-aware firewall.
Which security service applies rules at the Virtual NIC (vNIC) level to define the traffic allowed to and from a security group?
A. Distributed firewall rules
B. Network firewall rules.
C. Network introspection services.
D. Guest introspection services
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only VMware exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 1V0-642 exam preparations and VMware certification application, do not hesitate to visit our Vcedump.com to find your solutions here.