Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

A customer needs to meet the following requirements for their business critical application:

* SQL Servers must be on specific hosts to lower licensing costs.

* Oracle RAC servers must be on separate hosts for licensing reasons

Which policy or policies should be implemented to meet these requirements?

A.

Configure VM-VM anti-affinity policy.

B.

Configure VM-VM affinity policy.

C.

Configure both VM-Host and VM-VM affinity policy.

D.

Configure VM-Host affinity policy.

Full Access
Question # 5

An administrator is deploying several new application VMs to a Nutanix cluster. The application is very transactional with a 28/72 random, read/write ratio.

What should the administrator do?

A.

Add a minimum of four SSDs to each node toensure all writes go to the SSDs.

B.

Add a minimum of four virtual disks to each VM, and aggregate them on guest OS level.

C.

Add one large SSD to each node and enable Flash Mode for the VMs.

D.

Add one large virtual disk to each VM. and use it for all application data.

Full Access
Question # 6

A consultant runs the Foundation Applet and discovers all the nodes. The consultant wants to use the latest version of Foundation for imaging for support purposes and to cover the latest hardware and software hypervisor support.

What should the consultant do to upgrade Foundation on a node?

A.

Use crash cart and manually upgrade Foundation files on one node.

B.

Use latest version of Foundation to reimage all the nodes.

C.

Use the Foundation VM to upgrade Foundation on all nodes.

D.

Use the Foundation Applet to upgrade Foundation on a single node.

Full Access
Question # 7

A customer wants to know the details of network validation testing.

Where can the consultant find this information?

A.

Handover checklist

B.

Test plan

C.

Operations Guides

D.

As-Built Guide

Full Access
Question # 8

A customer needs a DR solution designed around the following requirements:

• There are 8 ms of latency between Sites A and B

• The administrator needs the shortest RPO/RTO possible

• Application consistent snapshots are required

• Use of NutanixVSS

Which Data Protection Method should be used?

A.

Async

B.

Metro Availability

C.

Near Sync

D.

Cloud Connect

Full Access
Question # 9

A consultant creates three storage containers (container-1, container-2, container-3). The customer requires that only container-1, which will be utilized as an NFS datastore, be presented to external hosts.

However, users are able to mount all three containers.

What is causing this problem?

A.

Compression was turned on for all containers.

B.

A Container-level whitelist entry was configured.

C.

Deduplication was turned on for all containers.

D.

A Global whitelist entry was configured.

Full Access
Question # 10

In a Nutanix cluster, a Protection Domain contains 50 entities that are replicated to a remote Single Node Replication Target.

The current schedule configuration is as follows:

• Repeat every 6 hours

• Local Retention Policy 1

• Remote Retention Policy 8

• Starting time 12 am

At 8 am on Monday, the administrator discovers that a protected VM is corrupted. The latest good state was Sunday 2 pm. The administrator needs to maintain current protection.

Which strategy should the administrator use to meet these requirements?

A.

From the Remote site, activate the Protection Domain, then re-protect the entity.

B.

From the Remote site, restore the VM from the local snapshot by selecting the correct snapshot

C.

From the local site, retrieve the correct remote snapshot, then restore the VM locally.

D.

From the local site, restore the VM from the local snapshot by selecting the correct snapshot.

Full Access
Question # 11

An administrator recently added in 3 nodes to an existing 5 node cluster. While 1 node came with its own block, theother 2 nodes where added to an existing share. After adding the nodes, the administrator sees that the hardware tab displays the correct number of nodes, but incorrect position in the diagram tab.

What should the administrator do to resolve the issue?

A.

Check the factory_config.json for all 3 nodes

B.

SSH into CVM and perform genesis restart on each CVM

C.

SSH into the CVMs and run genesis acropolis stop; cluster start

D.

Check the factory_config. json for the two single nodes.

Full Access
Question # 12

An administrator wants to utilize Network Visualization to monitor the physical and logical network on the Nutanix cluster. The first-hop switch has LLDP enabled. The network switch informationis still not being displayed.

What is causing this problem?

A.

The ISL between switches is not configured.

B.

SNMP is not configured properly.

C.

br0 and br1 are not defined.

D.

The cluster is using RDMA-enabled NICs.

Full Access
Question # 13

A Nutanix cluster has 10TB usable storage. The customer wants to create a 100GB datastore for ISO images to eliminate too much storage being consumed by unnecessary images.

Which setting should be used to accomplish this goal?

A.

From Container Advanced Settings, configure 100GB for advertised capacity.

B.

From Container Advanced Settings, enable erasure coding.

C.

From Container Advanced Settings, turn on compression and deduplication.

D.

From Container Advanced Settings, configure 100GB for reserved capacity.

Full Access
Question # 14

A VM is exhibiting one or more of the following baseline values based on the past 30 days:

• CPU usage < 20%

• CPU ready time < 5%

• Memory usage < 50% (moderately) or < 20% (severely)

• Memory swap rate = 0 Kbps

Which type of VM is being described?

A.

Constrained VM

B.

Inactive VM

C.

Bully VM

D.

Over-Provisioned VM

Full Access
Question # 15

A customer racks all nodes in the new cluster. The customer does not allow IPv6 for node discovery.

The consultant is not allowed to use the consultant’s own flat switch in the customer’s environment.

Which step should the consultant take to resolve this issue?

A.

Bare metal image all nodes with Foundation VM.

B.

Image each node individually with Foundation VM.

C.

Connect to the top of rack switch and discover the nodes with IPv4.

D.

Open a console to all nodes and statically assign IP addresses.

Full Access
Question # 16

Refer to the exhibit.

A Microsoft SQL 2016 deployment is shown in the exhibit. The administrator receives user reports that database queries take too long to return.

Which optimization should be made to this configuration to improve performance?

A.

Combine both of the OS and SQL Binaries disks

B.

Add a second SCSI controller for the Database.

C.

TempDB, andLogs disk Separate the Database. TempDB, and Logs onto their own disks

D.

Configure the VM to use a PCI disk controller

Full Access
Question # 17

Refer to the exhibits.

An administrator has reported that a new VM is not performing well.

After analyzing the information presented in the exhibits, which option shows the best conclusion regarding this workload?

A.

VM is CPU constrained since the hypervisor cannot provide the required resources.

B.

VM is CPU constrained because more CPU needs to be added to the VM.

C.

VM is Storage constrained, because the workload is waiting for storage access.

D.

VM is not CPU constrained, because the VM is not running, a multithreaded application.

Full Access
Question # 18

An administrator learns that some security settings in a cluster have been changed. The environment is out ofcompliance with required policies.

Which function should be used to revert any settings that have changed from the defaults and prevent further violations?

A.

Cluster Lockdown with strong password enforcement

B.

Advanced Intrusion Detection Environment (AIDE)

C.

Security Configuration Management Automation (SCMA)

D.

Defense Information Systems Agency STIG enforcement

Full Access
Question # 19

An administrator migrates a VM onto a new Nutanix cluster. After the migration, the administrator observes the following conditions:

• Cluster memory utilization: 64%

• Cluster CPU utilization: 19%

• Clusterstorage utilization: 32%

• Average VM CPU utilization: 25%

• Average VM CPU ready%: 24%

• Average VM memory utilization: 60%

Which two changes should the administrator make to improve VM performance? (Choose two.)

A.

Add more memory to the VMs.

B.

Reduce the number of vCPUs assigned to VMs.

C.

Replace high core count CPUs with high clock rate CPUs. (also can be but is physical invas)

D.

Reduce the number of VMs on the hosts.

Full Access
Question # 20

A guest VM is reported to have poor storage performance. It has an I/O profile of 80%read. 20% write, and the HDDs form more than 50% of the read source.

What should an administrator do to resolve this issue?

A.

Increase SSD capacity

B.

Increase the OPLOG

C.

Increase the write cache

D.

Use HDDs with higher RPM

Full Access
Question # 21

A consultant is deploying a two-node cluster at a remote branch office.

Which component must be available to complete cluster configuration?

A.

Prism Central

B.

Witness VM

C.

Remote Site

D.

Protection Domain

Full Access
Question # 22

After installation, network ports are properly configured with the default active-backup bonding.

One 10GbE port goes to switch 1. Another 10GbE port goes to switch 2. A consultant tests failover by manually pulling one of the cables and notices it is taking too much time to failover, which is causing excessive packet loss.

What should the consultant enable to resolve this issue?

A.

LACP on switch

B.

PAgP

C.

Portfast

D.

Jumbo frames

Full Access
Question # 23

A customer has NearSync configured. When the administrator tries to restore a snapshot from 3 minutes ago, it is not available. The snapshots are happening at15-minute intervals instead of at the 5-minute configured interval. When the protection domain was initially set up, the snapshots were happening at the expected 5-minute interval.

What should the customer do to enable the snapshots to happen at the expected interval?

A.

Utilize Metro Availability to meet this requirement

B.

Change the protection domain to use Async DR

C.

Fix a connectivity issue because the protection domain reverted to Async

D.

Configure the protection domain to take snapshots on15-minute intervals

Full Access
Question # 24

A consultant is imaging a Nutanix cluster with VMware ESXi. Foundation returns an error that the media is not a supported ISO. The consultant checks the whitelist file in Foundation and confirms that the version of the ISO is not listed.

Which three actions should the consultant take to resolve this issue? (Choose three.)

A.

Replace and save whitelist file in Foundation

B.

Obtain the MD5 checksum of the ISO and confirm MD5 checksum of ISO is listed.

C.

Download the iso_whitelist.json from the Support portal.

D.

Edit the whitelist file in Foundation.

E.

Restart the imaging process in Foundation.

Full Access
Question # 25

A consultant is planning a new cluster installation and needs to locate the Shared IPMI port for each of the specific nodes that the customer has bought.

Which Support Portal location contains the document that would identify the port?

A.

Solutions Documentation

B.

Hardware Replacement Documentation

C.

Software Documentation

D.

Knowledge Base

Full Access
Question # 26

An administrator receives an error indicating that the CVMs in the cluster are not syncing to any NTP servers. An investigation of the issue finds:

• The NTP servers are configured in Prism

• The time on all CVMs is the same

• Both the CVMs and AHV hosts are configured for the UTC time zone

Which two steps can be taken to troubleshoot this issue? (Choose two.)

A.

Confirm that the NTP servers are reachable from the CVMs.

B.

Restart genesis on all CVMs.

C.

On a CVM. run the command a Hash ntpq -pn.

D.

Restart the chronosservice on all CVMs.

Full Access
Question # 27

An administrator configure Active Directory (AD) authentication for their Nutanix environment. When login in using an AD user account, the login process takes more than one minute to complete. No delay occurs when logging a local account.

What should the administrator confirm to resolve this issue?

A.

The user search base for the group is configuredcorrectly

B.

The domain controller being used is configured as a global catalog server.

C.

Active directory lookups are configured to use Non-Recursive mode.

D.

The service Account Username is correct for the domain.

Full Access
Question # 28

A customer has an ESXi Cluster with two 10GbE NICs on each node with the following requirements:

* Solution must follow Nutanix Best Practices

* Network configuration should be redundant

* A vSphere Standard Switch must be utilized

Which load balancing method should be used?

A.

Route based on originating port ID

B.

Route based on physical NIC load

C.

Route based on IP hash

D.

Route based on source MAC hash

Full Access