Exam Details

  • Exam Code
    :2V0-641
  • Exam Name
    :VMware Certified Professional 6 - Network Virtualization Beta
  • Certification
    :VMware Certifications
  • Vendor
    :VMware
  • Total Questions
    :110 Q&As
  • Last Updated
    :Dec 18, 2024

VMware VMware Certifications 2V0-641 Questions & Answers

  • Question 31:

    Which service cannot be included in a Security Policy using Service Composer?

    A. Endpoint Services

    B. Firewall Rules

    C. Virtual Private Network Services

    D. Network Introspection Services

  • Question 32:

    Which action is not an option for adding Virtual Machines to a Security Group?

    A. Adding Virtual Machines to a Security Group and nesting it within another Security Group.

    B. Defining Dynamic Membership in the Security Group.

    C. Adding Virtual Machines to a Security Policy and associating it with a Security Group.

    D. Selecting objects to include within a Security Group.

  • Question 33:

    Which Virtual Machine cannot be protected by the Distributed Firewall?

    A. A Virtual Machine connected to a vDS Portgroup running on an ESXi 5.1 host.

    B. A Virtual Machine connected to a vSS Portgroup running on an ESXi 5.5 host.

    C. A Virtual Machine connected to a vDS Portgroup running on an ESXi 5.5 host.

    D. A Virtual Machine connected to a logical switch running on an ESXi 5.1 host.

  • Question 34:

    Which two options are valid SpoofGuard operational modes? (Choose two.)

    A. Allow Local Address as Valid Address in This Namespace

    B. Allow and Approve DHCP Requests Regardless of Enabled Mode

    C. Automatically Trust IP Assignments on Their First Use

    D. Manually Inspect and Approve All IP Assignments Before Use

  • Question 35:

    An administrator wants to perform Activity Monitoring on a large group of virtual machines in an NSX

    environment.

    How would this task be accomplished with minimal administrative effort?

    A. Create a PowerCLI script to enable virtual machine data collection on each virtual machine.

    B. Create a security group in Service Composer and add the virtual machines to the security group.

    C. Add the virtual machines to the pre-defined Activity Monitoring security group in Service Composer.

    D. Add the virtual machines to a VM folder in vCenter Server and enable data collection.

  • Question 36:

    An administrator has deployed NSX in an environment containing a mix of vSphere 5 hosts. The implementation includes the Distributed Firewall Service, but the administrator finds that rules are not being applied to all affected virtual machines.

    What two conditions would cause this behavior? (Choose two.)

    A. Some hosts have not been prepared for NSX.

    B. Only ESXi 5.5 and later hosts can push the rules to the virtual machines.

    C. Only ESXi 5.1 and later hosts can push the rules to the virtual machines.

    D. Some hosts are blocking the port used for rule distribution.

  • Question 37:

    If a Security Group is the Source for a General Logical Firewall Rule, which Virtual Machines will be affected by the rule?

    A. Each Virtual Machine defined in the Security Group.

    B. Each Virtual Machine defined in the Source and Destination fields of the Logical Firewall Rule.

    C. Each Virtual Machine identified in the Applied To field of the Logical Firewall Rule.

    D. Each Virtual Machine identified in the Destination field of the Logical Firewall Rule.

  • Question 38:

    An administrator wishes to control traffic flow between two virtual machines. The virtual machines are in the same subnet, but are located on separate ESXi hosts. The administrator deploys an Edge Firewall to one of the hosts and verifies the default firewall rule is set to deny, but the two virtual machines can still communicate with each other.

    What task will correct this issue?

    A. Configure both ESXi host firewalls to deny traffic from the virtual machine on the other host.

    B. Deploy another Edge Firewall on the host running the second virtual machine.

    C. Remove any other firewall appliances that may exist on either of the ESXi hosts.

    D. Deploy a Distributed Firewall with firewall rules to prevent traffic between the virtual machines.

  • Question 39:

    Which is not a valid Destination option for a General Logical Firewall rule?

    A. Datacenter

    B. Virtual App

    C. MAC Set

    D. Network

  • Question 40:

    How are Logical Firewall rules applied to affected virtual machines?

    A. They are pushed by the NSX Controllers to all the ESXi hosts in the same Transport Zone.

    B. They are pushed by the NSX Manager to the ESXi hosts running the source and/or destination virtual machines.

    C. They are pushed by the NSX Controllers to the ESXi hosts running the destination virtual machines.

    D. They are pushed by the NSX Manager to all the ESXi hosts in the NSX environment.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only VMware exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 2V0-641 exam preparations and VMware certification application, do not hesitate to visit our Vcedump.com to find your solutions here.