VMware Certified Professional 6 – Network Virtualization NSX v6.2 (2V0-642) for VCP6-NV 2020 Exam Questions and Answers

Question 51: A workload was attached to a logical switch port group in Compute Cluster 1. Users are complaining that they can communicate with other workloads on that port group in the cluster, but not with other workloads on different networks.

What is the most probable cause?

A. The distributed firewall has a default rule set to deny all.
B. The Distributed Logical Router was not configured on Compute Cluster 1.
C. Compute Cluster 1 is NOT a member of the Transport Zone.
D. An NSX Edge has NOT been deployed into Compute Cluster 1.

Question 52: There is intermittent connectivity reported between virtual machines on separate hosts over logical switching.
What command-line tool can be used to test the MTU between two hosts?

A. netstat -1
B. esxcli network ip neighbor list
C. vmkping
D. traceroute

Question 53: A user needs to be given the ability to make configuration changes on a specific NSX Edge device. What role and scope could be used to meet this requirement?

A. NSX Administrator role and Limit Access scope
B. Security Administrator role and Limit Access scope
C. NSX Administrator role and No restriction scope
D. Security Administrator role and No restriction scope

Question 54: Which component automates the consumption of third-party services and provides mapping to virtual machines using a logical policy?

A. NSX Manager
B. Cloud Management Platform (CMP)
C. Service Composer
D. NSX Data Security

Question 55: Which load balancing algorithm is only available on a vSphere Distributed Switch?

A. Route Based on Source MAC Hash
B. Route Based on Originating Virtual Port
C. Route Based on IP Hash
D. Route Based on Physical NIC Load

Question 56: Which action is not an option for adding Virtual Machines to a Security Group?

A. Adding Virtual Machines to a Security Group and nesting it within another Security Group.
B. Defining Dynamic Membership in the Security Group.
C. Adding Virtual Machines to a Security Policy and associating it with a Security Group.
D. Selecting objects to include within a Security Group.

Question 57: An NSX administrator notices that when configuring Flow Monitoring, the graphs do not include the IPFix flows. Where are these flows displayed?

A. In the IPFix collector’s interface.
B. In the Flow Monitor UI.
C. In the vRealize Operations UI.
D. In the IPFix tab of the NSX Manager UI.

Question 58: An administrator is deploying NSX in a Cross-vCenter configuration across three data centers located 100 miles apart Datacenter-1 and Datacenter-3 already have NSX deployed locally and Datacenter-2 does not have NSX deployed yet. What is the correct order of steps to configure all three data centers for this solution?

A. 1. Remove the NSX manager from Datacenter-1 and Datacenter-3.
2. Reinstall all three NSX managers at the same time.
3. Deploy a universal transport zone.
4. Deploy a universal distributed logical router.
B. 1. Deploy an NSX manager at Dataсenter-2.
2. Change the roles of the NSX managers in Datacentar-1 and Datacenter-3 to Transit Mode.
3. Deploy a universal transport zone.
4. Configure the Primary and Secondary roles on all three NSX managers.
C. 1. Deploy an NSX manager in Datacenter 2.
2. Update the NSX manager role in Datacenter-1 to Primary.
3. Update the roles in Datacenter-2 and Datacentar-3 to Secondary.
4. Deploy a universal transport zone.
D. 1. Deploy the NSX manager at Datacenter-2.
2. Update the NSX manager role in Datacenter-1 to Primary.
3. Deploy a universal transport zone.
4. Deploy a universal distributed logical router.

Question 59: A security administrator needs to create a Security Group based on an Active Directory group. However, AD Groups are not available as an option. What must the administrator configure before AD Groups are available?

A. Guest Introspection virtual machines must be joined to the domain
B. Inventory Service must be registered with a domain account
C. NSX Manager must be registered with Active Directory
D. NSX Controller must be registered with Active Directory

Question 60: What is one of the benefits of a spine-leaf network topology?

A. A loop prevention protocol is not required.
B. Automatic propagation of security policies to all nodes.
C. Allows for VXLANs to be defined in a traditional network topology.
D. Network virtualization relies on spine leaf topologies to create logical switches.