Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Which Mechanism that works by data striping and parity calculation?

A.

Compression

B.

Deduplication

C.

Erasure Coding

Full Access
Question # 5

An administrator is restarting a node and the CVM has not automatically restarted.

Which command should be used to start the CVM?

A.

cvm start cvm_name

B.

virsh start block-ID-(Node Letter)

C.

cvm start block-ID-(Node Letter)

D.

virsh start cvm name

Full Access
Question # 6

A node has two SSDs in Slot0 and Slot 1. The SSD in Slot 1 fails.

What is the result?

A.

The CVM reboots. Other running VMs do not reboot, and the SSD capacity is reduced.

B.

The CVM and other running VMs do not reboot, and the SSD capacity is reduced.

C.

The CVM is down. AHV takes over serving storage to the node, and the SSD capacity is reduced.

D.

The CVM is down. Another CVM takes over serving storage to the node, and the SSD capacity is reduced.

Full Access
Question # 7

An administrator is configuring cross-hypervisor DR from an ESXi cluster to a new AHV cluster. When the administrator migrates a protection domain to the AHV cluster, the VMs fail to boot.

What should the administrator do to correct this problem?

A.

Increase the snapshot frequency to more than 6 hours.

B.

Uninstall VMware Tools from the VMs.

C.

Install Nutanix Guest Tools in the protected VMs.

D.

Add all VMs into a single consistency group.

Full Access
Question # 8

Which two access protocols are supported by Files? (Choose two.)

A.

ISCSI

B.

SMB

C.

FCOE

D.

NFS

Full Access
Question # 9

What is the name of the internal bridge used by AHV nodes and CVMs?

A.

vnet0

B.

br1

C.

br0

D.

virbr0

Full Access
Question # 10

Where are Leap Availability Zones configured?

A.

Cloud Connect

B.

Controller VM

C.

Prism Element

D.

Prism Central

Full Access
Question # 11

A two-node ROBO cluster is configured with a witness VM.

What happens when Node A goes down?

A.

The- cluster becomes unavailable and goes into read-only mode.

B.

All operations and services on the Node B are shut down and go into a waiting state.

C.

The cluster is unaffected and no administrator intervention is required.

D.

Node B sends a leadership request to the Witness VM and goes into single-node mode.

Full Access
Question # 12

Which three cluster operations require an administrator to reclaim licenses?(Choose three)

A.

Destroy a cluster.

B.

Upgrade a cluster

C.

Migrate a cluster

D.

Remove a Node from a cluster

E.

Move Nodes between clusters.

Full Access
Question # 13

An administrator sets the default session timeout for admin users in Prism Ul Settings.

What is the maximum timeout in minutes?

A.

15

B.

30

C.

60

D.

120

Full Access
Question # 14

An administrator is reviewing performance of a core banking system that routinely has 20,000 concurrent users. During, business hours, the CPU on the applications servers runs at close to 100%. The administrator needs to determine if there is a performance issue specific to the app servers, the database servers, or all servers on the cluster.

Which metrics should the administrator review in Prism Analysis Graphs?

A.

Cluster IO, Network, Database and App Server CPU

B.

Cluster CPU and Memory Only

C.

Cluster IO, CPU, Memory and Database and App Server CPU

D.

Cluster IO, CPU, Memory, Network, App Server CPU

Full Access
Question # 15

Refer to the exhibit.

The Linux Admin role has been created to manage only Linux VMs in the environment. However, the Admin1 user does not have access to all Linux VMs.

What step should be taken to grant the proper access?

A.

Add the hosts to the entities KM for the role.

B.

Grant the admin1 user the viewer role (or the cluster.

C.

Add the role to the Linux images.

D.

Add the proper category to each Linux VM.

Full Access
Question # 16

Refer to Exhibit.

An administrator increases the cluster RF to 3. The containers are not modified.

What will the new values in the data resiliency dashboard be for FAILURES TOLERABLE for the Zookeeper and Extent Groups components?

A.

Zookeeper = 1 and Extent Groups = 1

B.

Zookeeper = 2 and Extent Groups = 2

C.

Zookeeper = 2 and Extent Groups = 1

D.

Zookeeper = 1 and Extent Groups = 2

Full Access
Question # 17

Which best practice should be followed when creating a bond in a Nutanix cluster?

A.

Place NICs of different speeds within the same bond

B.

Configure the bond to use LACP

C.

Only utilize NICs of the same speed within the same bond

D.

Use the default bond configuration after installation

Full Access
Question # 18

An administrator wants to connect a VM to Volumes

Which network should the VM be connected to for iSCSI access?

A.

Controller VM Network

B.

Storage Network

C.

Backup Network

D.

Production Network

Full Access
Question # 19

An administrator is implementing a VDI solution. The workload will be a series of persistent desktops in a dedicated storage container within a four-node cluster Storage optimizations should be set on the dedicated storage container to give optimal performance including during a node failure event

Which storage optimizations should the administrator set to meet the requirements?

A.

Compression only

B.

Deduplication and Erasure Coding

C.

Compressoion and Deduplication

D.

Compression Deduplication and Erasure Coding

Full Access
Question # 20

What is the default network bond setting for an AHV host configuration?

A.

active-backup

B.

active-active

C.

balance-slb

D.

balance-tcp

Full Access
Question # 21

How should an administrator configure a custom alert for a specific VM in Prism?

A.

Modify an existing alert to only alert on the specific VM.

B.

Modify VM settings to add the custom alert.

C.

Modify the alerts to add a new custom alert policy.

D.

Modify node settings to add the custom alert.

Full Access
Question # 22

How should an administrator enable secure access to Volumes using a password?

A.

iSER

B.

CHAP

C.

SAML

D.

LDAP

Full Access
Question # 23

How many Prism Central instances are required to deploy Leap:'

A.

One per availability zone

B.

One per customer environment

C.

One per physical site

D.

One per AHV cluster

Full Access
Question # 24

When creating a VM on an AHV cluster, how is the initial placement of the VM determined?

A.

AHV uses a round robin algorithm, placing new VMs onto hosts based on the numerical order of their UUID

B.

The administrator right clicks on the desired host and selects Power on VM from the dropdown menu

C.

The Acropolis Dynamic Scheduler selects a host which provides adequate resources for the VMs configuration

D.

Placement is determined by the host that holds the new_VM token at the time of VM creation

Full Access
Question # 25

An administrator needs to report on any alerts generated by a Nutanix cluster that affected the cluster's availability over the past 10 days.

Which method should be used to locate these events?

A.

On the Health dashboard, use the Log Collector to export data based on time stamp.

B.

Export the cluster event log to a CSV on the Alerts dashboard.

C.

On the Alerts dashboard, filter based on Impact Type and the desired Time Range.

D.

Configure an Alert Policy to generate an email with the data on the Health dashboard.

Full Access
Question # 26

Async DR is configured between two sites. A network outage occurs at the primary site.

Which steps must the administrator perform to bring the VMs back into service at the backup site?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements. Not all procedures are valid. Identify any invalid procedures using the drop-down option.

Full Access
Question # 27

A vDisk is read by multiple VMs. The cluster creates immutable copies of the vDisk. What are these vDisk copies called?

A.

Disk Clones

B.

Golden Images

C.

Volume Groups

D.

Shadow Clones

Full Access
Question # 28

An administrator needs to bring down a host in a Nutanix Cluster for maintenance reasons. The administrator puts the host in maintenance mode.

What should the administrator do to perform an orderly shutdown of the CVM?

A.

Execute the cvm_shutdown -P new command from the CVM.

B.

Enter Fever off Server - immediate from the IPMI console.

C.

Enter Fewer off Server-orderly Shutdown from the IPMI console.

D.

Execute the cvm_shutdown -P now command from the host.

Full Access
Question # 29

An administrator wants to use Volumes to connect to physical servers that are not able to be virtualized.

Which three things must be configured for Volumes to support iSCSI clients? (Choose three)

A.

Enable external client access

B.

Client OS iSCSI initiator

C.

iSCSI Multipathing I/O

D.

Cluster Virtual IP address

E.

Data Services IP address

Full Access
Question # 30

What action should an administrator take to verify the ability to receive email alerts from a Nutanix cluster?

A.

Click the configuration for SNMP and add a destination.

B.

Pull the first SSD out of the node.

C.

Add an email address to the alert configuration list.

D.

Click the test button on the SMTP configuration.

Full Access
Question # 31

An administrator needs to convert an existing node to be a Compute Only node. Which two steps should the administrator take? (Choose two.)

A.

Update the license file

B.

Enable CO mode using aCLI

C.

Image the node as CO using Foundation

D.

Add the node to the cluster using Prism Element

Full Access
Question # 32

Which two features require the Nutanix Guest Tools package is installed (Choose Two)

A.

Self-Service Restore

B.

Volume Snapshot Services

C.

Network Visualization

D.

Image service

E.

Prism Central

Full Access
Question # 33

through what interfaces is/are (anti-)affinity rules configured. (Choose three)

A.

affinity :cli

B.

anti-affinity :cli

C.

affinity :prism

D.

anti-affinity :prism

Full Access
Question # 34

Which SSL Files required for Importing Key and certificate (Choose 2)

A.

Public Certificate

B.

Private Certificate

C.

CA Certificate

D.

Private Key

Full Access
Question # 35

Which Nutanix product or feature would support the replacement of a storage appliance for shared home directories?

A.

Storage container

B.

Volumes

C.

Files

D.

Leap

Full Access
Question # 36

SSH access can be completely locked down by disabling remote login and completing which other step?

A.

Deleting all self-signed keys

B.

Replacing all CA keys

C.

Replacing all keys

D.

Deleting all keys

Full Access
Question # 37

what ahv provides hot spot detection and invokes live migration?

A.

acropolis dfs

B.

acropolis dynamic scheduler

C.

acropolis data replicator

D.

acropolis management fabric

Full Access
Question # 38

What is the default network bond name for a Nutanix node?

A.

bro

B.

bro-up

C.

bri

D.

bond0

Full Access
Question # 39

In the event of failed CVM, what happens to the physically attached storage for the node and the VMs running on it?

A.

The drives for that node are inaccessible. The VMs reboot.

B.

The drives for that node are inaccessible. The VMs continue to run.

C.

The hypervisor regains control of the drives. VMs on that node reboot.

D.

The hypervisor regain control of the drives. VMs on that node continue to run.

Full Access
Question # 40

In respective to 1 GbE and 10 GbE interfaces (physical host), which statements are true?

A.

Do not include the 1 GbE interlaces in the same bond as the 10 GbE interlaces. Also, to avoid loops, do not

add the 1 GbE interlaces to bridge brO, either individually or in a second bond. Use them on other bridges.

B.

If you want to use the 1 GbE interfaces for guest VM connectivity, follow the hypervisor manulacturer's switch '— port and networking configuration guidelines.

C.

If you want to use the 10 GbE interfaces for guest VM traffic, make sure that the guest VMs do not use the

VLAN over which the Controller VM and hypervisor communicate.

Full Access
Question # 41

what information is shared through pulse? multi answer

A.

system level statistics

B.

metadata

C.

identification data

D.

system alerts

Full Access