PrepAway - Latest Free Exam Questions & Answers

What is the packet flow when VM1 communicates to VM5?

An NSX Administrator is examining traffic on the network shown below.

What is the packet flow when VM1 communicates to VM5?

PrepAway - Latest Free Exam Questions & Answers

A.
Host A will perform a destination lookup, route the packet, switch the packet onto segment 5002, then
encapsulate and send the packet to Host C.

B.
Host A will perform a destination lookup, switch the packet onto segment 5002, route the packet, then
encapsulate the packet and send it to the DLR control VM.

C.
Host A will encapsulate the packet, send the encapsulated packet to host C, Host C will perform a
destination lookup and switch the packet onto segment 5002.

D.
Host A will encapsulate the packet, perform a destination lookup, route the packet to the DLR control VM,
the control DLR will bridge the packet onto segment 5002.

3 Comments on “What is the packet flow when VM1 communicates to VM5?

  1. Aria says:

    B is not correct — “send it to the DLR control VM.” packet not going to DLR VM
    D is not correct — “route the packet to the DLR control VM” — nothing goes to DLR VM
    C is not correct — “Host C will perform a destination lookup” — as source is doing the destination lookup
    A is correct




    8



    0
  2. Jessica says:

    2017/11/1 New 2V0-642 QUESTIONS:

    QUESTION 291
    A security administrator needs to create a Security Group based on an Active Directory group. However, AD Groups are not available as an option. What must the administrator configure before AD Groups are available?

    A. Guest Introspection virtual machines must be joined to the domain
    B. Inventory Service must be registered with a domain account
    C. NSX Manager must be registered with Active Directory
    D. NSX Controller must be registered with Active Directory

    Answer: C

    QUESTION 292
    What is one of the benefits of a spine-leaf network topology?

    A. A loop prevention protocol is not required
    B. Automatic propagation of security policies to all nodes
    C. Allows for VXl ANs to be defined in h traditional network topology
    D. Network virtualization relies on spine leaf topologies to create logical switches

    Answer: D

    QUESTION 293
    What is the most restrictive NSX role that can be used to create and publish security policies and install virtual appliances?

    A. Security Administrator
    B. NSX Administrator
    C. Auditor
    D. Enterprise Administrator

    Answer: D

    QUESTION 294
    In a Cross-vCenter NSX deployment, what are two requirements that must be met in order for an administrator to deploy both universal logical switches and local logical switches within the same vCenter instance? (Choose two.)

    A. A universal distributed logical router must be created
    B. A logical distributed router must be created
    C. A universal transport zone must be created.
    D. A local transport zone must be created

    Answer: CD

    QUESTION 295
    The fact that NSX Data Security has visibility into sensitive data provides which two benefits? (Choose two)

    A. It helps address compliance and risk management requirements.
    B. It acts as a forensic tool to analyze TCP and UDP connections between virtual machines
    C. It is able to trace packets between a source and destination without requiring access to the guestOS
    D. It eliminates the typical agent footprint that exists with legacy software agents

    Answer: AB

    MORE NEW QUESTIONS:https://www.braindump2go.com/2v0-642.html




    0



    2

Leave a Reply