March Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

The networking team makes changes to the Top of Rack switches to which the Nutanix cluster are attached. A few VMs are able to communicate with each other on the same node but are unable to connect to other parts of the network.

What is the likely cause of this issue?

A.

There is a VLAN misconfiguration on the VMs.

B.

The vNIC port is disconnected on the affected VMs.

C.

There is a VLAN misconfiguration on the switch.

D.

Jumbo Frame are misconfigured across ports.

Full Access
Question # 5

An administrator is deploying a new application to a Nutanix Enterprise Cloud. The application requires a security to prevent unauthorized access. The application also uses many non-standard ports that are unique to it. Security should not be changed for existing applications.

What should the administrator do to meet these requirement?

A.

Use existing categories for the VMs. and create new security policies to use the existing categories.

B.

Use existing categories for the VMs and modify existing security policies to include the specific port.

C.

Create new categories for the VMs, and create new security policies that include the new categories.

D.

Create new categories for the VMs, and modify existing security policies to include the new categories.

Full Access
Question # 6

An administrator is using Nutanix Move to migrate a Windows VM from ESXi to AHV. Automated guest preparation is failing with an error:

Account has UAC enabled error

The administrator is using the local built-in administrator account for the Windows VM Admin approval mode must remain enabled.

What should the administrator do to continue with the migration with Nutanix Move?

A.

Use a Domain Admin account for the Windows VM

B.

Reboot the Windows VM and try the migration again

C.

Follow manual VM preparation guidelines

D.

Place Windows VM in Maintenance Mode

Full Access
Question # 7

An administrator needs to relocate an AHV cluster to a new datacenter during a maintenance window. The cluster will use the same IPs in the new datacenter.

Which two steps should be taken to prepare for this task? (Choose two.)

A.

Stop all Nutanix Files clusters

B.

Relocate the linked LDAP servers

C.

Shut down all user VMs in the cluster

D.

Reconfigure IPMI for the new datacenter

Full Access
Question # 8

A guest VM is reported to have poor storage performance. It has an I/O profile of 80% read. 20% write, and the HDDs form more than 50% of the read source.

What should an administrator do to resolve this issue?

A.

Increase SSD capacity

B.

Increase the OPLOG

C.

Increase the write cache

D.

Use HDDs with higher RPM

Full Access
Question # 9

An administrator is monitoring the Nutanix v5.15-based AOS cluster performance logs and notices that a SQL server VM is greatly exceeding its intended maximum IOPS. The administrator has confirmed that a QoS policy was previously created for the group of VMs this server is a member of.

What are two reasons that this VM would exceed its maximum configured IOPS from the QoS Policy? (Choose two.)

A.

The VM is missing the required snapshot needed to implement the QoS Policy.

B.

The VM was not created as an AFS virtual machine.

C.

The SQL Server VM has volume groups attached.

D.

It was cloned from another SQL Server VM that was a member of the QoS Policy.

Full Access
Question # 10

An administrator wants to make sure there are enough Compute resources within the AHV-Based Nutanix Cluster. During any maintenance operation or a node failure. What configuration should the administrator change to achieve this task?

A.

Reserve 33% CPU and 33% memory

B.

Set virtual machine affinity rules

C.

Enable HA reservation

D.

Enable Degraded Node Detection

Full Access
Question # 11

Over the period of 2 to 3 weeks, a cluster displays the following:

•Periods where Warning Alerts of memory usage over 75% are asserted

•Periods where Critical Warnings of memory usage over 90% are asserted

•Periods of slow of frozen VDI desktops have caused work stoppage or slowdown

•VDI clones have periodically not powered up when called, causing work stoppage

Which steps should be used to prioritize the administrator’s troubleshooting efforts?

A.

•Assess resource health on Hardware page

•Review the Analysis page for memory usage demand

•Determine the VDI workload-to-host affinity across the cluster

B.

•Analyze Alert Pages for a root cause of memory problem

•Analyze VM table page to access the VM functionality

•Analyze the VDI Clone properties for possible VDI Workload stress

C.

•Check Analysis page for CPU demand

•Verify VDI workload property for memory subscription

•Review the Hardware page to determine if the cluster has sufficient RAM

D.

•Review Analysis Page for memory use pattern

•Alert with VDI workload demand

•Analyze current and future workload in the Capacity Runaway tab for sufficient resources

Full Access
Question # 12

An administrator deletes a large amount of data from a Volume Group presented to a Linux VM. The administrator notices that the deleted data has not been reclaimed as usable storage.

What action should be taken to reclaim the storage capacity?

A.

Shrink the Volume Group that is associated with the Linux VM

B.

Unmount the Volume Group and then Remount the Volume Group

C.

Enable the unman operation on the Linux VM

D.

Run Defrag on the Linux VM

Full Access
Question # 13

In a Nutanix cluster, a Protection Domain contains 50 entities that are replicated to a remote Single Node Replication Target.

The current schedule configuration is as follows:

• Repeat every 6 hours

• Local Retention Policy 1

• Remote Retention Policy 8

• Starting time 12 am

At 8 am on Monday, the administrator discovers that a protected VM is corrupted. The latest good state was Sunday 2 pm. The administrator needs to maintain current protection.

Which strategy should the administrator use to meet these requirements?

A.

From the Remote site, activate the Protection Domain, then re-protect the entity.

B.

From the Remote site, restore the VM from the local snapshot by selecting the correct snapshot

C.

From the local site, retrieve the correct remote snapshot, then restore the VM locally.

D.

From the local site, restore the VM from the local snapshot by selecting the correct snapshot.

Full Access
Question # 14

How should an administrator enable the recycle bin on a nutanix cluster?

A.

Select the Enable Recycle Bin checkbox on the storage Overview page

B.

select Retain Deleted VMs for 8h in the cluster Details Page of the cluster setting

C.

Select the enable recycle bin checkbox in the configure CVM page of the cluster setting

D.

Select Retain Deleted VMs for 24h in the cluster details page of the cluster setting

Full Access
Question # 15

An administrator needs to evaluate if the existing configuration of Protection Domains meets the specified corporate recovery policy for SQL Data. The corporate policy requires that all SQL Servers be recoverable at the DR site within 30 minutes, and must result in a maximum of 60 minutes of data loss. SQL data must be required.

The protection domain is configured as follows:

• Application consistent snapshots are enabled

• The SQL server VMs are assigned to the Protection Domain as their own Consistency Group

• The Protection Domain schedule is configured as snapshots taken every 90 minutes from 7 am until 8 pm

What must be changed to meet the required policy?

A.

Revise the schedule tc be 15 minutes

B.

Revise the schedule to be 60 minutes

C.

Revise the schedule to be 30 minutes

D.

Revise the schedule to be 45 minutes

Full Access
Question # 16

Refer to the exhibit.

A Nutanix host is connected as shown in the exhibit with br0-up set to active/backup. Physical Switch 1 experiences a power outage causing br0-up to failover to using eth2. The CVM and host become inaccessible. User VMs restart on other hosts in the cluster, which causes a disruption to those VMs.

Which configuration issue likely caused this outage?

A.

Bridge br0-up should be configured to use balance-tcp rather than active/backup.

B.

The CVM should have eth1 connected to the OVS.

C.

The upstream port for eth2 is missing a VLAN.

D.

The user VMs only have one NIC

Full Access
Question # 17

An Administrator is concerned that a VM on a hybrid Cluster with 8Gb RAM and 4 vCPU is performing poorly.

An Analysis of the VM indicates that CPU Utilization is at 50% ,memory utilization is at 30% , and disk latency is at 18ms.

What can the administrator do to improve performance?

A.

Increase vDisk Size

B.

add 4GB RAM

C.

Enable FLash Mode

Full Access
Question # 18

An administrator has a VM that consumes large amounts of storage and has the following characteristics:

• Create large / sequential writes

• Data must be kept for years

• Data is normally only accessed at the end of the year to run report

The administrator decides to use Erasure Coding to save space.

Which feature should the administrator utilize to save space for this VM?

A.

Inline Compression

B.

Flash Mode

C.

Cache Dedup

D.

Post-Process Compression

Full Access
Question # 19
A.

From the Life Cycle Management page in Prism Element, click Perform Inventory, then edit settings and set LCM Auto Inventory to Daily

B.

From the Life Cycle Management page in Prism Central, click Perform Inventory, then edit settings and click the Enable LCM Auto Inventory checkbox

C.

From the Life Cycle Management page in Prism Element, click Perform Inventory, then edit settings and click the Enable LCM Auto Inventory checkbox

D.

From the Life Cycle Management page in Prism Central, click Perform Inventory every Morning

Full Access
Question # 20

An administrator needs to provide data integrity at the application level for a VM that is replicated to a secondary site.

Which requirement will satisfy this task?

A.

1 VM per Availability Zone

B.

1 VM per Consistency Group

C.

1 VM per schedule

D.

1 VM per Protection Domain

Full Access
Question # 21

An administrator needs to configure snapshots for DR scenarios. The databases get refreshed on Friday nights regularly. The search service application re-indexes the new application on Saturday nights regularly. The remaining front-end and middle tier VMs are static but do get minor version updates weekly.

The administrator needs to have 2 weeks of daily snapshots for all the VMs in an app group and 2 weeks application consist local snapshots only on Fridays, Saturdays and Sundays on the same group of VMs.

Which two options should the administrator use to configure snapshots?

A.

Create a schedule in a protection domain for all applicable VMs to snap daily with application consistency enabled with 6 days of retention and with no application consistency and 14 days local retention.

B.

Create two consistency groups in a protection domain, one for front-end and middle tier apps with no application consistency, one for database and Search apps with application consistency, and apply the correct schedule to both groups.

C.

Create one protection domain for all VMs in an application group with scheduled daily non-application consistent snapshots and another protection domain for all VMs in an application group with scheduled Friday. Saturday, Sunday application consistent snapshots.

Full Access
Question # 22

An administrator receives reports that VDI desktop performance in an 8-node Nutanix VDI environment is poor. Opening applications takes between 1 and 2 minutes.

When investigating the issue, the following conditions are found:

• Cluster memory utilization: 80%

• Cluster SSD utilization: 70%

• Average VM CPU Wait Time: 11%

• CVM CPU utilization: 75%

Which action should be taken to improve VDI performance?

A.

Increase the amount of SSD storage in the cluster.

B.

Add memory to the nodes in the cluster.

C.

Add CPU resources to the cluster.

D.

Increase the number of vCPU cores allocated to the CVM.

Full Access
Question # 23

A systems administrator configures a protection domain replication between two Nutanix clusters. After the first successful replication, the administrator tests DR by clicking activate on the remote cluster.

While VMs are active on the remote cluster, the protection domain is marked as active on both clusters.

What steps are required to return both clusters to their original state?

A.

1. On the remote site, deactivate the Protection Domain using ncli

2. On the primary site, select the Protection Domain and dick migrate

B.

1. On the remote site, promote the Protection Domain

2. On the primary site, change the Protection Domain state from Decoupled to Disabled

3 Enable the original primary site as remote site

C.

1. On the prima7 site, suspend replications

2. On the remote site, deactivate the Protection Domain using ncli

3. On the remote site, migrate the protection domain back to the primary site

D.

1 On the remote site, restore the snapshots from the Protection Domain

2. On the remote site, select the Protection Domain and migrate to the primary site

Full Access
Question # 24

A customer has a four-node cluster and is using Volume Groups to provide storage services to a SQL cluster.

In the event of a CVM failure in the cluster, what is the expected IO path of the volume group’s iSCSI targets?

A.

vDisk directed at failure CVM are redirected to Data Services IP until CVM is reconnected

B.

vDisk directed to CVM that failed to disconnect and will not reconnect without manual intervention

C.

vDisk directed to failed CVM are redirected to another CVM and automatically reconnect

D.

vDisk directed at failed CVM will disconnect and reconnect when the failed CVM comes back online

Full Access
Question # 25

Which two advanced features Requires you to install Nutnaix Guest Tools NGT ? ( Choose Two)

A.

Disaster Recovery of a VM between AHV and ESXi Hypervisors

B.

Self-service file-level recovery from VM snapshots

C.

File recovery from a third-party backup

D.

Live Migration of a VM between AHV & other Hyervisors

Full Access