Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

An administrator is not able to log into Prism Central by using a new Active Directory user account. After Logging with the local user, the administrator verified that Directory Services and Role Mapping setting are valid.

What is the most likely cause of this issue?

A.

Change password at next logon attribute is set.

B.

User does not belong to the Administrators group.

C.

Active Directory functional level of wrong.

D.

Prism Element authentication is not configured.

Full Access
Question # 5

When a configuring a syslog server in Prism Central, what two pieces information are required? (Choose two.)

A.

HTTPS URL

B.

Encryption secret

C.

Transport protocol

D.

IP address/port

Full Access
Question # 6

An administrator needs to create a new Linux image and will to do the following as part of the VM deployment:

* Set the OS hostname

* Add custom users

* Add keys

* Run custom scripts

What package needs to be installed in the Linux image to facilitate this automation?

A.

CloudInit

B.

Sysprep

C.

Kickstart

D.

NGT

Full Access
Question # 7

The administrator wants a container to be displayed and limited to 1TB in the hypervisor.

What advanced container setting must the administrator set?

A.

Advertised Capacity

B.

Reserved Capacity

C.

Advertised Quota

D.

Reserved Quota

Full Access
Question # 8

An administrator wants to ensure that data in a container is stored in the most space efficient manner as quickly as possible after being written,

Which space efficiency too meets this requirement?

A.

Inline Compression

B.

Thin Provisioning

C.

Cache Deduplication

D.

Erasure Coding

Full Access
Question # 9

Microsegmentation was recently enabled in a Nutanix environment. The administrator wants to leverage Prism Central to create a policy that will block all traffic regardless of direction, between two groups of VMs identified by their category.

Which policy should be used to meet this requirement?

A.

An Application Security Policy

B.

A Quarantine Policy

C.

A Whitelist-Based Policy

D.

An Isolation Environment Policy

Full Access
Question # 10

An administrator has been alerted to a VM that has high I/O latency and wants to determine if there are any other factors, such as insufficient network or memory resources that correlate, as part of a troubleshooting process.

Which type of chart should the administrator create to allow all relevant data to be easily exported to CSV for later analysis?

A.

A VM entity chart with each of the relevant metrics.

B.

A cluster metric chart for each of the relevant metrics

C.

A cluster entity chart with each of the relevant metrics

D.

A VM metric chart for each of the relevant metrics

Full Access
Question # 11

An administrator has set up a local web server accessible to the Nutanix clusters.

Which two steps are required to set up LCM for an environment without Internet access? (Choose two.)

A.

Download the lcai_disconnecced_version. tar.gz LCM bundle from the support portal.

B.

Edit LCM Advanced Settings in Prism Element and enter the address of the web server.

C.

Edit LCM Advanced Settings m Prism Central and enter the address of the web server.

D.

Download the lcm_dark_site_version. tar . gz LCM bundle from the support portal.

Full Access
Question # 12

What is the minimum time a newly created Deduplication storage policy takes to apply to the VMs in the container?

A.

5 Minutes

B.

10 minutes

C.

30 minutes

D.

60 minutes

Full Access
Question # 13

Which two methods are available when migrating a VM from a legacy 3-tier solution using VMware ESXi to AHV? (Choose two.)

A.

Deploy the Move appliance.

B.

Use Cross-Hypervisor DR.

C.

Import the .vmdk into the Image Service.

D.

Use shared nothing live migration.

Full Access
Question # 14

Refer to Exhibit:

An administrator is attempting to create an additional virtual switch on a newly deployed AHV cluster, using the two currently disconnected interfaces. The administrator is unable to select the disconnected interfaces when creating the virtual switch.

What is the likely cause of this issue?

A.

Only one interface is available on the selected hosts.

B.

Interfaces must be connected to the network before they can be assigned.

C.

The disconnected interfaces are currently assigned to virtual switch 0,

D.

Interfaces must be assigned to virtual switches via the cli

Full Access
Question # 15

An administrator has created several custom alert policies, which are applied to the same entities. Prism Central displays a message that a similar policy exists.

In what order of precedence are overlapping policies evaluated?

Full Access
Question # 16

In Files, how many FSVMs are deployed by default?

A.

1

B.

2

C.

3

D.

5

Full Access
Question # 17

What requires iSCSI initiator configuration in the guest OS to use Volumes?

A.

SQL Server Always On Availability Group

B.

Microsoft Windows Failover Cluster

C.

Oracle RAC

D.

Exchange DAG

Full Access
Question # 18

A customer has a 24-node cluster with all containers configured with RF3. Two different nodes have incurred a simultaneous HDD failure.

What is the result?

A.

The cluster runs in a degraded state until the failed drives are replaced and the data has been restored to three replicas.

B.

Sixty minutes after the failures a rebuild of the lost data can remaining HDDs begins to restore to three replicas.

C.

The VMs with data on those drives crash, and an HA event occurs, restarting them on a remaining healthy node.

D.

The Nutanix cluster recognizes the failures and immediately begins to rebuild lost data to three replicas.

Full Access
Question # 19

When configuring Prism Central, which two log modules are able to forward messages to an external syslog server? (Choose two.

A.

API Audit

B.

Flow

C.

DNS

D.

NTP Synchronization

Full Access
Question # 20

An administrator is adding a node with a higher AOS release to an existing cluster.

What is the most efficient action an administrator should take to ensure it is in a supported state?

A.

Destroy cluster and foundation with the new node in place

B.

Add the node to the cluster and leave the existing AOS version in place

C.

Perform standalone reimage of the new node and then add to cluster

D.

Add the node to the cluster and reboot all running VMs to use new release

Full Access
Question # 21

An administrator responsible for a VDl environment needs to investigate reports of slow logins. The administrator finds that increasing the number of vCPUs from 2 to 4 will reduce the login times. Production workloads are consuming 75% of the host CPU on the cluster. The administrator increases the vCPU count on all of the VDl VMs.

What are two impacts on the cluster? (Choose two)

A.

Increasing CPU counts will decrease memory utilization

B.

Increase memory utilization%

C.

Increase CPU utilization%

D.

Increase CPU ready%

Full Access
Question # 22

Which baseline is used to identify a Zombie VM?

A.

VM is powered off for the past 21 days.

B.

Memory usage is less than 1% and memory swap rate is equal to 0 Kbps for the past 21 days.

VM has no logins for the past 21 days

C.

VM has no logins for the past 21 days

D.

Fewer than 30 1/Os and less than 1000 bytes per day of network traffic for the past 21 days

Full Access
Question # 23

An administrator needs to configure Prism to send encrypted messages to a set of recipients.

Which setting must be applied?

A.

Use SMTP Port 25

B.

Configure Prism Central to use Cluster Lockdown

C.

Install SSL certificates on Prism Central

D.

Set SMTP Security Mode to STARTTLS

Full Access
Question # 24

Refer to Exhibit:

The Update Source for LCM has been configured as shown in the exhibit. Inventory is failing consistently.

What is the likely cause of this issue?

A.

Port 433 Is blocked by a firewall.

B.

Port 80 is blocked by a firewall.

C.

The administrator does not have a valid portal account.

D.

The license assigned to the cluster has expired.

Full Access
Question # 25

What does Nutanix recommend when setting up the node networkring?

A.

Include NIC models from different vendors in the same bond

B.

Include at least two physically interfaces in every bond.

C.

Combine NIC models from different vendors in the same bond.

D.

Combine NIC models from different vendors in the same bond.

Full Access
Question # 26

Which component can be associated with a storage policy?

A.

Subnet

B.

Catalog

C.

Vm

D.

Category

Full Access
Question # 27

An administrator wants to reduce the largest amount of alert emails received from Prism Central.

Which two settings should the administrator customize to meet this requirement? (Choose two)

A.

Skip empty digest email

B.

Every Single Alert

C.

Dally Digest

D.

Email Recipients

Full Access
Question # 28

A Nutanix cluster is equipped with four nodes. Four VMs on this cluster have been configured with a VM-VM anti-affinity policy and are each being hosted by a different node.

What occurs to the cluster and these VMs during an AHV upgrade?

A.

One node hosts two VMs while the node being upgraded is in maintenance mode.

B.

One VM out of the four powers down when the node hosting it reboots.

C.

The AHV pre-upgrade checks fail until the administrator disables the anti-affinity policy.

D.

The AHV pre-upgrade checks fail until the four VMs are powered off.

Full Access
Question # 29

An administrator needs to deploy an application with a large amount of data connected via Nutanix volumes.

Which two actions should the administrator take when designing the Volume Group? (Choose two.)

A.

Distribute workload across multiple virtual disks

B.

Enable RSS (Receive Side Scaling)

C.

Use multiple subnets for iSCSI traffic

D.

Enable thick provisioning on the Volume Group(s)

Full Access
Question # 30

What is a requirement to enable Flow Networking?

A.

A dedicated virtual switch has been created for Flow Networking.

B.

Flow Micro segmentation must be enabled.

C.

Microservices infrastructure must be enabled.

D.

Prims Central is using a three-node scale-out deployment

Full Access
Question # 31

What is Prism Central primarily used for?

A.

Multi-cluster network configuration

B.

Container creation

C.

Multi-cluster Single Sign On

D.

Data reduction configuration

Full Access
Question # 32

In which two scenarios is an automated live migration likely to occur? (Choose two)

A.

Cluster resource hotspot

B.

AOS upgrade

C.

Network upgrade

D.

Hypervisor upgrade

Full Access
Question # 33

CPU utilization climbs above 90% on several VMs. This causes performance degradation for a business-critical application.

How can alerts be configured to notify the administrator before VM CPU utilization hits 90%?

A.

On a CVM, use ncli to set the VM CPU Check threshold for the critical VMs to a value below 90%.

B.

On the Health dashboard, locate the VM CPU Check and lower the alert threshold below 90%.

C.

On a CVM, configure a cron job to run the VM CPU Check more frequently and email the result.

D.

On the Alerts dashboard, ensure that the VM CPU usage alert is not set to auto-resolve.

Full Access
Question # 34

How many Prism Central instances are required to deploy Leap:'

A.

One per availability zone

B.

One per customer environment

C.

One per physical site

D.

One per AHV cluster

Full Access
Question # 35

An administrator wants to have a VM on an AHV cluster with access to multiple VLANs. What is the most efficient way to achieve this?

A.

Update a vNIC on the VM to operate in trunked mode for all desired VLANs.

B.

Create a network in AHV associated with all those VLANs on all hosts.

C.

Use SFPs that allow the needed VLANs.

D.

Use one vNIC per VLAN for the VM.

Full Access
Question # 36

An administrator needs to shut down an AHV cluster to relocate hardware. The administrator upgrades NCC and runs health checks.

Which steps should the administrator perform next?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements.

Full Access
Question # 37

An administrator is preparing to deploy a new application on an AHV cluster, Security requirements dictate that all virtual servers supporting this application must be prevented from communicating with unauthorized hosts.

Which option would achieve this goal?

A.

Create a new VLAN, create a subnet on the cluster with the VLAN tag, deploy servers with vNlCs in the new subnet.

B.

Create a new Application Security Policy restricting communication to the authorized hosts and apply it to the servers in enforce mode.

C.

Create a new solation Environment policy apply it to the new servers and all authorized hosts.

D.

Create new' subnet and assign to an existing VPC assign the IP prefix and gateway for the subnet, deploy servers with vNlC5 in the new subnet.

Full Access
Question # 38

An administrator is troubleshooting vDisk performance issues in a Nutanix cluster with hybrid disks. The VMs all have Flash Mode enabled.

But users are reporting disk latency.

What could cause the performance issues?

A.

Flash mode is disabled when a node fails.

B.

Compression is disabled on the vDisk storage container.

C.

The VMs vDisks are in multiple containers.

D.

Data size for flash mode exceeds 25% of the SSD capacity.

Full Access
Question # 39

A customer has a newly-deployed AHV cluster with nodes that have 2.x 10 GBE and 2.x interface. The customer wants to use all available network interfaces to provide connectivity to the VMs.

Which option should the administrator use to achieve this while remaining consistent with Nutanix recommendations?

A.

Create separate VLANs that map 10GbE and 1GbE interfaces.

B.

Createbond1 on virbr0 and add the 1GbE interfaces to it for VM use.

C.

Create a second bond on br0 on each host and assign the 1 GbE interfaces to it.

D.

Create a second bridge on each host and assign the 1GbE interfaces to it.

Full Access
Question # 40

When installing Nutanix Guest Tools (NGT) on an ESXi-hosted VM, which port should be enabled on the VM to allow communication with the NGT-Controller VM service?

A.

2000

B.

2074

C.

8080

D.

9943

Full Access
Question # 41

Where should an administrator unregister Prism Element from Prism Central?

A.

From a Host SSH session

B.

From the Prism Central web console

C.

From the Prism Element web console

D.

From a CVM SSH session

Full Access
Question # 42

A customer wants to isolate a group of VMs within their Nutanix environment for security reasons. The customer creates a VM with two NICs to act as a firewall and installs the appropriate software and certificates.

However, no one from the outside can access the application.

What is the likely cause of this problem?

A.

A shared volume group must be used by all isolated VMs

B.

More than one NIC cannot be added to a VM

C.

One of the NICs needs to be configured on the internal VLAN

D.

Wireshark is installed on the NAT VM

Full Access
Question # 43

An administrator wants to use Volumes to connect to physical servers that are not able to be virtualized.

Which three things must be configured for Volumes to support iSCSI clients? (Choose three)

A.

Enable external client access

B.

Client OS iSCSI initiator

C.

iSCSI Multipathing I/O

D.

Cluster Virtual IP address

E.

Data Services IP address

Full Access
Question # 44

Refer to the exhibit.

An administrator is trying to implement the solution that is shown in the exhibit, but has been unsuccessful.

Based on the diagram, what is causing the issue?

A.

A remote Witness VM

B.

Active containers in both sites

C.

Network latency

D.

Unsupported hypervisor

Full Access
Question # 45

An administrator is setting up a Nutanix cluster and needs to configure the default VLAN.

Which configuration should the administrator choose?

A.

Vlan.0

B.

Vlan.1

C.

Vlan.2

D.

Vlan.7

Full Access
Question # 46

Which scenario would benefit most from Erasure Coding being enabled on a container?

A.

Long term storage of data which is written once and read infrequently

B.

High performance database where all is relatively hot.

C.

VDI use cases where a single VM is cloned 100’s of times

D.

WEB and API Servers

Full Access
Question # 47

Refer to Exhibit:

Why has an anomaly been triggered?

A.

Because the CPU usage crossed the blue band.

B.

Because the blue band range increased over the last 2 days

C.

Because the CPU usage dropped belon' 20%

D.

Because the CPU usage reached 100%

Full Access
Question # 48

A user is complaining about slowness of a mission-critical MSSQL Server. The administrator logs into Prism Element to investigate the VM performance and observes what is shown in the diagram.

Which action would best improve VM performance?

A.

Disable hyperthreading in the BIOS.

B.

Add additional RAM to the user VM.

C.

Add additional RAM to the host on which the VM is running.

D.

Ensure the host's CPUs ere not excessively overcommitted.

Full Access
Question # 49

Async DR is configured between two sites. A network outage occurs at the primary site.

Which steps must the administrator perform to bring the VMs back into service at the backup site?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements. Not all procedures are valid. Identify any invalid procedures using the drop-down option.

Full Access
Question # 50

Where can an administrator change a CVM password?

A.

KMS Server Terminal

B.

CVM setting in Prism Element

C.

CVM setting in Prism Central

D.

Prism CVM VM Console

Full Access
Question # 51

How should an administrator correct an SSL error when connecting to a Nutanix cluster?

A.

Add the SSL certificate to the workstation’s trusted people store

B.

Create a new self-signed certificate for the cluster with a 4096 bit key

C.

Create a new SSL certificate for the cluster signed by an AD certificate authority

D.

Add the SSL certificate to an AD group policy applied to all computer objects

Full Access
Question # 52

AHV IPAM assigns an IP address from the address pool when creating a managed VM NIC.

At which two instances does the address release back to the pool? (Choose two)

A.

The IP address lease expires

B.

The VM NIC is deleted.

C.

The IP address is changed to static.

D.

The VM is deleted.

Full Access