Summer Goodies - 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: av5rz84q

Exact2Pass Menu

Question # 4

Which two Nutanix cluster features and minimum revision levels are required to support up to 120 Tebibytes (TiB) of storage per node?

A.

Foundation 4.4

B.

AOS5.11

C.

Prism Central 5.10

D.

Files 5.11

Full Access
Question # 5

Which CVM service is primary responsible for handling all metadata operation with a Nutanix cluster?

A.

Stargate

B.

Zeus

C.

Genesis

D.

Cassandra

Full Access
Question # 6

An administrator is configuring a container for a VM that will perform a data processing workload. Which compression technology is preferred for this type of workload?

A.

Deduplication

B.

Post-process Compression

C.

Erasure Coding

D.

Inline Compression

Full Access
Question # 7

Which two steps are the minimum requited to perform an upgrade of AOS and AHV using a manual software upload? (Choose two.)

A.

Download the Foundation car.gz and metadata JSONfiles from the support portal.

B.

Download the AOS tar.gz and metadata JSON files from the support portal.

C.

Select Upload AOS Base Software Binary from the Life Cycle Manager page in Settings enter downloaded tar.gz and metadata JSON.

D.

Select Upload AOS Base Software Binary from the Upgrade Software page in Settings enter downloaded tar. gz and metadata JSON.

Full Access
Question # 8

Which Nutanix feature allows for a Less than 60 minutes RPO and leverages light weight snapshots (LWS)?

A.

Cloud Connect

B.

Nutanix Guest tools

C.

Near Sync

D.

Volume Group

Full Access
Question # 9

An administrator needs to determine current CPU usage across multiple clusters

Which method should the administrator use to get the information?

A.

Prism central home

B.

prism central home +ad widgtes

C.

Prism central explore clusters

D.

Prism central home manage dashboards.

Full Access
Question # 10

A customer creates a new AHV network within the cluster to provide VM connectivity for VLAN1001. Network traffic to VMs connected to it is inconsistent.

What should be validated as part of the customer´s troubleshooting process?

Full Access
Question # 11

In a Nutanix Cluster, l/Os are served by the host where the VM is running

Which Nutanix feature does this describe?

A.

Data Resiliency

B.

Data Locality

C.

Distributed File System

D.

Distributed Storage Fabric

Full Access
Question # 12

Which service performs snapshots in an AOS 5.15 implementations?

A.

Prism

B.

Stargate

C.

Zookeeper

D.

Medusa

Full Access
Question # 13

An administrator wants to connect a VM to Volumes

Which network should the VM be connected to for iSCSI access?

A.

Controller VM Network

B.

Storage Network

C.

Backup Network

D.

Production Network

Full Access
Question # 14

An administrator needs to shut down and relocate a Nutanix cluster.

Which step should the administrator take after shutting down all guest VMs on the cluster?

A.

Change the node and CVM IP addresses if necessary

B.

Execute the command: cluster stop on a CVM

C.

Put each host into maintenance mode

D.

Execute the command: cluster restart_genesis on a CVM

Full Access
Question # 15

Which options are available when a live migration is performed on a VM in an AOS 5.5 implementation?

A.

The VM can be moved on a different host

B.

the VM can be moved to a different host and a different storage container

C.

the VM can be moved to a different storage container

D.

the VM can be moved to a different (remote) site

Full Access
Question # 16

An administrator is deploying a SQL database that is licensed by the number of physical CPU cores available to the application.

Which feature can be used to minimize licensing costs?

A.

VM Anti-Affinity

B.

Host Profiles

C.

Virtual NUMA

D.

Host Affinity

Full Access
Question # 17

to build the vm on the ahv cluster, after amigration, what “Add Disk” operation(s) can be used? (Choose two)

A.

clone from ADSF file

B.

clone from storagepool

C.

clone from image service

D.

clone from vm list

Full Access
Question # 18

How many IP addresses are required for a new Files cluster deployment?

A.

Two for each FSVM plus one for the cluster

B.

Two for each FSVM plus two for the cluster

C.

One for each FSVM plus one for the cluster

D.

One for each FSVM plus two for the cluster

Full Access
Question # 19

When host affinity policies are enabled, how does this affect the AHV cluster?

A.

Micro segmentation rules will not be applied to VMs with affinity policies set on them.

B.

Metro Availability will no longer work as designed and will result in Split Brain.

C.

Host affinity rules do not affect any other aspects of the AHV cluster.

D.

The VM-host affinity cannot be applied on a cluster that has HA reservations configured.

Full Access
Question # 20

A Nutanix administrator needs to replace a self-signed SSL certificate with a CA generated certificate in Prism.

Which three files are required to install the CA generated certificate in Prism? (Choose three)

A.

CA Certificate or Chain (ca_chain_certs.cer)

B.

Public Certificate (PublicCert.ker)

C.

Certificate Signing Request (server.csr)

D.

Private Server Key (private_server.key)

E.

Public Server Key (public_server.key)

Full Access
Question # 21

After an unplanned primary site outage, an administrator Activates a protection domain at the backup site.

Which steps must the administrator perform to bring the production VMs back up at the primary site?

A.

1. Log into the CVM on the backup site

2. Power down VMs that are running in DR Mode

3. Log into Prism Element on the primary site

4. Power on VMs

B.

1. Log into the CVM on the primary site

2. Deactivate and destroy VMs

3. Log into the backup site, choose the Protection Domain and click Migrate

4. Power on VMs

C.

1. Log into Prism Element on the primary site

2. Navigate to the DR tab and choose the protection domain

3. Click Migrate

4. Power on VMs

D.

1. Log into Prism Element on the backup site

2. Navigate to the DR tab and select the protection domain

3. Click Migrate

4. Power on VMs

Full Access
Question # 22

The customer is seeing high memory utilization on a mission critical VM. Users report that the application is unavailable. The guest OS does not support hot add components.

How should the administrator fix this issue?

A.

Access the CVM on the host that is running the VM:

*Open acli

*Run a command to increase the amount of RAM assigned to the VM

B.

From the Prism web console:

*Go to the VM dashboard

*Select the VM from the VMs list

*Choose Update

*Adjust the amount of memory assigned to the VM

C.

Go to Control Panel in the VM:

*Select the Computer Properties

*Increase the amount of RAM assigned

D.

During the next maintenance window:

*Select the VM from the VMs list

*Perform a graceful shutdown

Full Access
Question # 23

Which three cluster operations require an administrator to reclaim licenses?(Choose three)

A.

Destroy a cluster.

B.

Upgrade a cluster

C.

Migrate a cluster

D.

Remove a Node from a cluster

E.

Move Nodes between clusters.

Full Access
Question # 24

Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness?

A.

Continuous Data Protection

B.

Copy-on-Write

C.

Split-mirror

D.

Redirect-On-Write

Full Access
Question # 25

Which two capabilities does IPAM provide in a Nutanix networking configuration? (Choose two.)

A.

Allows proxy server settings to be set up for a defined network

B.

Allows AHV to assign IP addresses automatically to VMs using DHCP

C.

Configures a VLAN with an IP subnet and assigns a group of IP addresses

D.

Configures firewall rules to prevent or allow certain TCP/IP traffic

Full Access
Question # 26

What requires iSCSI initiator configuration in the guest OS to use Volumes?

A.

SQL Server Always On Availability Group

B.

Microsoft Windows Failover Cluster

C.

Oracle RAC

D.

Exchange DAG

Full Access
Question # 27

An administrator responsible for a VDl environment needs to investigate reports of slow logins. The administrator finds that increasing the number of vCPUs from 2 to 4 will reduce the login times. Production workloads are consuming 75% of the host CPU on the cluster. The administrator increases the vCPU count on all of the VDl VMs.

What are two impacts on the cluster? (Choose two)

A.

Increasing CPU counts will decrease memory utilization

B.

Increase memory utilization%

C.

Increase CPU utilization%

D.

Increase CPU ready%

Full Access
Question # 28

Which best practice should be followed when creating a bond in a Nutanix cluster?

A.

Place NICs of different speeds within the same bond

B.

Configure the bond to use LACP

C.

Only utilize NICs of the same speed within the same bond

D.

Use the default bond configuration after installation

Full Access
Question # 29

An administrator wants to have a VM on an AHV cluster with access to multiple VLANs. What is the most efficient way to achieve this?

A.

Update a vNIC on the VM to operate in trunked mode for all desired VLANs.

B.

Create a network in AHV associated with all those VLANs on all hosts.

C.

Use SFPs that allow the needed VLANs.

D.

Use one vNIC per VLAN for the VM.

Full Access
Question # 30

A customer has a newly-deployed AHV cluster with nodes that have 2.x 10 GBE and 2.x interface. The customer wants to use all available network interfaces to provide connectivity to the VMs.

Which option should the administrator use to achieve this while remaining consistent with Nutanix recommendations?

A.

Create separate VLANs that map 10GbE and 1GbE interfaces.

B.

Createbond1 on virbr0 and add the 1GbE interfaces to it for VM use.

C.

Create a second bond on br0 on each host and assign the 1 GbE interfaces to it.

D.

Create a second bridge on each host and assign the 1GbE interfaces to it.

Full Access
Question # 31

In Nutanix clusters, which feature ensures VMs can be migrated and restarted on another host in case of failure?

A.

High Availability

B.

Protection Domain

C.

Host Affinity Rules

D.

Availability Zone

Full Access
Question # 32

An administrator needs to shut down an AHV cluster to relocate hardware. The administrator upgrades NCC and runs health checks.

Which steps should the administrator perform next?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements.

Full Access
Question # 33

What is the expected operation during node addition when the new node has a different AOS version?

A.

The entire cluster is upgraded to the latest one-click release.

B.

The node is added and a separate upgrade operation must be performed.

C.

The addition fails and forces the administrator to image using standalone Foundation.

D.

The node is automatically re-imaged using the software currently running in the cluster.

Full Access
Question # 34

CPU utilization climbs above 90% on several VMs. This causes performance degradation for a business-critical application.

How can alerts be configured to notify the administrator before VM CPU utilization hits 90%?

A.

On a CVM, use ncli to set the VM CPU Check threshold for the critical VMs to a value below 90%.

B.

On the Health dashboard, locate the VM CPU Check and lower the alert threshold below 90%.

C.

On a CVM, configure a cron job to run the VM CPU Check more frequently and email the result.

D.

On the Alerts dashboard, ensure that the VM CPU usage alert is not set to auto-resolve.

Full Access
Question # 35

What is the default network bond setting for an AHV host configuration?

A.

active-backup

B.

active-active

C.

balance-slb

D.

balance-tcp

Full Access
Question # 36

Refer to the exhibit.

System Non-Root Partition Usage shows a warning or critical alert The administrator needs to change the frequency of checks and alerts to respond more quickly.

Where in Prism Element should the administrator change the frequency of checks and alerts?

A.

Health Dashboard > Manage Crocks > Frequency

B.

Alerts Dashboard > Manage Checks > Schedule

C.

Health Dashboard > Manage Checks > Schedule

D.

Alerts Dashboard > Manage Checks > Frequency

Full Access
Question # 37

The Stargate service becomes unavailable on a single CVM on an AHV node. What is used to maintain I/O operations in the cluster?

A.

Route injection

B.

iSCSl redirector

C.

Hypervisor HA

D.

ha.py

Full Access
Question # 38

An administrator is working with Nutanix Support and needs to provide logs for troubleshooting an issue. The cluster is located in a secure environment. Data such as IP addresses and VM names cannot be shared.

Which method should be used to anonymize the log data sent to Nutanix Support?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 39

A Nutanix cluster is equipped with four nodes. Four VMs on this cluster have been configured with a VM-VM anti-affinity policy and are each being hosted by a different node.

What occurs to the cluster and these VMs during an AHV upgrade?

A.

One node hosts two VMs while the node being upgraded is in maintenance mode.

B.

One VM out of the four powers down when the node hosting it reboots.

C.

The AHV pre-upgrade checks fail until the administrator disables the anti-affinity policy.

D.

The AHV pre-upgrade checks fail until the four VMs are powered off.

Full Access
Question # 40

Which command should an administrator run from the CLI to view the uplink state of all AHV nodes in the

cluster?

A.

allssh show_uplinks

B.

manage_ovs show_uplinks

C.

allssh manage_ovs show_uplinks

D.

manage ovs show uplinks

Full Access
Question # 41

In which two scenarios is Native Key Management Server supported? (Choose two)

A.

XenServer and AHV mixed cluster.

B.

Hyper-V and AHV mixed cluster.

C.

KVM and AHV mixed cluster.

D.

ESXi and AHV mixed cluster.

Full Access
Question # 42

Microsegmentation was recently enabled in a Nutanix environment. The administrator wants to leverage Prism Central to create a policy that will block all traffic regardless of direction, between two groups of VMs identified by their category.

Which policy should be used to meet this requirement?

A.

An Application Security Policy

B.

A Quarantine Policy

C.

A Whitelist-Based Policy

D.

An Isolation Environment Policy

Full Access