2V0-642 Practice Test | An organization has a PCI compliant

Question: 20

An organization has a PCI compliant application deployed as part of a larger NSX environment. Every year a team of contractors evaluates the security of the environment and recommends changes. What NSX Role and Scope should the contractors be given to minimize access but still allow them to fulfill the stated requirement?

A. NSX Administrator, Limit access scope
B. Enterprise Administrator, Limit access scope
C. Auditor, Limit access scope
D. Security Administrator, No restrictions

Answer: B

2V0-642 Practice Test | How is high availability

Question: 14

How is high availability of the NSX Edge Gateway accomplished?

A. HA Application Monitoring on the Edge Gateway sends a heartbeat to the ESXi host.
B. VMware Tools on the Edge Gateway sends a heartbeat to the ESXi host.
C. The Edge appliance sends a heartbeat through an uplink interface.
D. The Edge appliance sends a heartbeat through an internal interface.

Answer: D

2V0-642 Braindumps | Which two statements are true…

Questions: 13

Which two statements are true about NSX Data Security support? (Choose two )

A. It supports HIPAA and PCI-DSS compliance policies as well as U.S. Driver License and Social Security numbers.
B. It supports both Windows and Linux-based virtual machines.
C. It only supports HIPAA and PCI-DSS compliance policies.
D. It only supports Windows-based virtual machines.

Answer: BC

2V0-642 Exam Dumps | A virtualized application needs access…

Questions: 12

A virtualized application needs access to a physical database. Both servers are on the subnet. NSX has been deployed across the entire virtual environment. What method can be used to allow access between the servers?

A. Configure a DLR with an L2 bridge instance for VXLAN to VLAN traffic.
B. Route to the NSX Edge where the logical switch of the applicationexists.
C. Configure a NAT rule for 172.177.13/024 for the database physical router.
D. Configure the logical switch to bridge to the physical router of the database.

Answer: D

2V0-642 Braindumps | Which three statements ore valid…

Questions: 11

Which three statements ore valid methods of Link Aggregation Control Protocol negotiation? (Choose three.)

A. Switches activate one of the blocked paths and negotiate the forwarding path upon failure.
B. Every other switch on the LAN negotiates only one data path back to the root bridge.
C. Switches wait until they receive an aggregation request,negotiate the status of the links, and proceed.
D. One switch sends repeated requests to the other switch that is requesting the port aggregation status. The two switches negotiate the status of the links and proceed.
E. Switches with links enabled for port aggregation do the port aggregation themselves and must be manually configured to be compatible at each end of that link

Answer: ABC

Leave a Reply

Your email address will not be published. Required fields are marked *