[Free] 2019(Nov) EnsurePass VMware 1V0-642 Dumps with VCE and PDF 31-40

Get Full Version of the Exam

Question No.31

What is the total volume of traffic per Distributed Logical Router (DLR) that issupported by the Equal Cost Multipath (ECMP) model?

  1. 20GB

  2. 50 GB

  3. 80 GB

  4. 40 GB

Correct Answer: A

Question No.32

What are the two operational modes available with VMware NSX balancer? (Choose two.)

  1. Proxy

  2. Setup

  3. Baseline

  4. inline

Correct Answer: AD

Question No.33

Which NSX component enforces security rules between two virtual machines that are on the same Layer 2 segment?

  1. NSX Manager

  2. Distributed Router

  3. NSX distributed Firewall

  4. NSX Controller

Correct Answer: C

Question No.34

One of the advantages of using VXLAN over VLAN is its high scalability. What is the maximum number of logical network IDs that is handled by VXLAN?

  1. 16 million

  2. 10 million C. 4,096

D. 12 million

Correct Answer: A

Question No.35

Which VMware product can virtualize user desktops so that the desktops reside as virtual machines in the data center?

  1. VMware Horizon View

  2. VMware vRealize Log Insight

  3. VMware Mirage

  4. VMware Workspace

Correct Answer: A

Question No.36

What is the default TCP port through which the Layer 2 VPN client makes an outgoing connection request in the Layer 2 VPN tunnel architecture?









Correct Answer: A

Question No.37

What is the maximum number of instances that VMware NSX can extend for the networking and security of either within or across data centers?

  1. Nine

  2. Eight

  3. Seven

  4. Five

Correct Answer: D

Question No.38

Which logical networking service does NSX Edge use to change source of destination IP addresses and TCP/UDP port numbers that are found in the flow of a packet header?

  1. Load balancing

  2. Dynamic Host Configuration Protocol (DHCP)

  3. Network Address Translation (NAT)

  4. VPN

Correct Answer: C

Question No.39

A security policy is a collection of security services of firewall rules, or both. Which security service is applied to virtual machines to ensure data security?

  1. Virtual machine

  2. Guest Introspection

  3. Network Introspection

  4. SpoofGuard

Correct Answer: B

Question No.40

Which setback is NOT related to the hardware-centric legacy of networking?

  1. Unpredicted downtime occurrences.

  2. Insufficient and weak perimeter security.

  3. Increased capital and operational costs.

  4. Complexity in service deployment.

Correct Answer: B

Get Full Version of the Exam
1V0-642 Dumps
1V0-642 VCE and PDF