Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
 

VMware 1V0-642 Exam Actual Questions

The questions for 1V0-642 were last updated on July 3, 2024.
  • Viewing page 1 out of 14 pages.
  • Viewing questions 1-4 out of 55 questions

Topic 1 - Single Topic

Question #1 Topic 1

A security policy is a collection of security services of firewall rules, or both. Which security service is applied to virtual machines to ensure data security?

  • A. Virtual machine
  • B. Guest Introspection
  • C. Network Introspection
  • D. SpoofGuard
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️
Reference:
http://blogs.vmware.com/consulting/2015/01/automating-security-policy-enforcement-nsx-service-composer.html

Question #2 Topic 1

Which NSX component enforces security rules between two virtual machines that are on the same Layer 2 segment?

  • A. NSX Manager
  • B. Distributed Router
  • C. NSX distributed Firewall
  • D. NSX Controller
Reveal Solution Hide Solution   Discussion  

Correct Answer: (page 3)C 🗳️
Reference:
http://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/whitepaper/products/nsx/vmware-nsx-network-virtualization-platform-white- paper.pdf

Question #3 Topic 1

How do virtual networks that are natively isolated from each other provide support for overlapping IP address in a multi-tenant environment?

  • A. By enabling isolation without using access control lists and firewall rules.
  • B. By enabling isolation with the help of Active Directory (AD).
  • C. By employing the spanning tree protocol.
  • D. By implementing load balancing.
Reveal Solution Hide Solution   Discussion  

Correct Answer: A 🗳️
Network virtualization eliminates the need for IT to change IP addresses. With virtual networks natively isolated from each other and from the underlying physical hardware, network virtualization supports overlapping IP addresses in a multi-tenant environment. That means the same IP addresses can be used in separate enterprise networks that run over the same physical infrastructure.
Reference:
https://www.vmware.com/ciovantage/article/the-virtues-of-network-virtualization

Question #4 Topic 1

An administrator has deployed Distributed Firewall to protect their infrastructure from security threats. Due to extreme loads on the network the CPU is saturated and the memory becomes full.
In this scenario, which mode does the Distributed Firewall enter?

  • A. Secondary
  • B. Fail open
  • C. Proxy
  • D. Fail close
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️
Reference:
http://www.infosecurityeurope.com/__novadocuments/90945?v=635709318795000000
(slide 7)

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
ex Want to SAVE BIG on Certification Exam Prep?
close
ex Unlock All Exams with ExamTopics Pro 75% Off
  • arrow Choose From 1000+ Exams
  • arrow Access to 10 Exams per Month
  • arrow PDF Format Available
  • arrow Inline Discussions
  • arrow No Captcha/Robot Checks
Limited Time Offer
Ends in