Professional Documents
Culture Documents
Nutanix NCP MCI 6.5
Nutanix NCP MCI 6.5
NCP-MCI-6.5
Nutanix Certified
Professional -
Multicloud
Infrastructure
(NCP-MCI) v6.5 exam
Version: 4.1
Web: www.dumpscafe.com
Email: support@dumpscafe.com
IMPORTANT NOTICE
Feedback
We have developed quality product and state-of-art service to ensure our customers interest. If you have any
suggestions, please feel free to contact us at feedback@dumpscafe.com
Support
If you have any questions about our product, please provide the following items:
exam code
screenshot of the question
login id/email
please contact us at support@dumpscafe.com and our technical experts will provide support within 24 hours.
Copyright
The product of each order has its own encryption code, so you should use it independently. Any unauthorized
changes will inflict legal punishment. We reserve the right of final explanation for this statement.
Pass Exam Nutanix - NCP-MCI-6.5
Question #:1
Answer: B
Explanation
When a VM is connected to a Nutanix managed network, the IP address is assigned when the VM is powered
on. A Nutanix managed network is a network that is created and managed by Prism Central using IP address
management (IPAM). IPAM allows Prism Central to automatically assign IP addresses to VMs from a pool of
available addresses in a subnet. IPAM also tracks the IP address usage and availability across clusters and
networks4.
When a VM is connected to a Nutanix managed network, the administrator can choose one of the following
assignment types for the IP address:
Assign Static IP: This option allows the administrator to manually specify a static IP address for the VM
from the subnet range. The IP address will not change unless the administrator changes it.
Assign with DHCP: This option allows Prism Central to dynamically assign an IP address for the VM
from the subnet range using DHCP. The IP address may change depending on the DHCP lease time and
availability.
No Private IP: This option allows the administrator to skip assigning an IP address for the VM. This
option is useful for scenarios where the administrator wants to use an external IPAM solution or assign
an IP address later5.
Regardless of the assignment type, the IP address is assigned when the VM is powered on. This is because
Prism Central needs to communicate with the hypervisor (AHV or ESXi) to configure the virtual NIC (vNIC)
of the VM with the IP address information. This communication can only happen when the VM is in a
powered on state6.
References: 4: IP Address Management - Prism Central Guide 5: Creating a New Report - Prism Central
Guide 6: IP Address Assignment - AHV Networking Guide
Question #:2
An administrator migrates a VM onto a new Nutanix cluster- After the migration, the administrator observes
the following conditions:
Which two changes should the administrator make to improve VM performance? (Choose two.)
D. Replace high core count CPUs with high clock rate CPUs.
Answer: A C
Explanation
According to the CPU (%) - VMware Docs web search result2, one of the possible causes of high CPU ready
% is over-provisioning vCPUs for a VM or having too many VMs on a host. CPU ready % indicates the
percentage of time that the VM was ready, but could not get scheduled to run on the physical CPU. High CPU
ready % can lead to VM performance problems, such as slow response time or application latency. To improve
VM performance, the administrator should reduce the number of vCPUs assigned to VMs or reduce the
number of VMs on the hosts, so that there is less contention for CPU resources.
Question #:3
Refer to Exhibit.
What will the new values in the data resiliency dashboard be for FAILURES TOLERABLE for the Zookeeper
and Extent Groups components?
Answer: C
Explanation
According to the web search results, the cluster redundancy factor (RF) determines how many copies of the
cluster metadata and configuration data are stored on different nodes. By default, the cluster RF is 2, which
means that there are three copies of the Zookeeper and Cassandra data on the cluster. If the cluster RF is
increased to 3, then there will be five copies of the Zookeeper and Cassandra data on the cluster12. This means
that the Zookeeper component can tolerate two failures, as it can still operate with a quorum of three nodes out
of five3.
However, the container replication factor (RF) determines how many copies of the VM data and oplog are
stored on different nodes. The container RF can be set independently for each container, and it can be different
from the cluster RF. For example, a container can have RF 2 even if the cluster has RF 34. In this case, the
container will only have two copies of the VM data and oplog on the cluster, regardless of the cluster RF. This
means that the Extent Groups component can only tolerate one failure, as it needs at least one copy of the VM
data and oplog to be available5.
Therefore, if the administrator increases the cluster RF to 3, but does not modify the containers, then the new
values in the data resiliency dashboard will be Zookeeper = 2 and Extent Groups = 1.
Question #:4
The Linux Admin role has been created to manage only Linux VMs in the environment. However, the Admin1
user does not have access to all Linux VMs.
B. Grant the admin1 user the viewer role (or the cluster.
Answer: D
Explanation
According to the Nutanix Prism Central Guide, role-based access control (RBAC) in Prism Central allows you
to create custom roles and assign them to users or groups based on the categories of the entities they need to
manage1. Categories are key-value pairs that you can assign to entities such as VMs, hosts, clusters, images,
etc. to group them logically2. For example, you can create a category key called “OS” and assign values such
as “Linux” or “Windows” to different VMs based on their operating system.
In the exhibit, the Linux Admin role has been created with the following settings:
The role has the “VM Admin” permission, which allows the user to perform all actions on VMs3.
The role has been scoped to the entities that have the category key “OS” and the value “Linux”.
However, the admin1 user does not have access to all Linux VMs in the environment. This means that some of
the Linux VMs do not have the proper category assigned to them. To grant the proper access, the administrator
should add the category key “OS” and the value “Linux” to each Linux VM that needs to be managed by the
Linux Admin role. This can be done either individually or in bulk through Prism Central4. Once the categories
are added, the admin1 user will be able to see and manage all Linux VMs in the environment.
Question #:5
The Stargate service becomes unavailable on a single CVM on an AHV node. What is used to maintain I/O
operations in the cluster?
A. Route injection
B. iSCSl redirector
C. Hypervisor HA
D. ha.py
Answer: A
Explanation
According to the Nutanix Support & Insights web search result1, route injection is used to maintain I/O
operations in the cluster when the Stargate service becomes unavailable on a single CVM on an AHV node.
Route injection is a mechanism that allows the CVMs to communicate with each other and redirect the I/O
requests to another healthy CVM in the cluster. Route injection uses the Linux kernel routing table to add or
delete routes dynamically, based on the availability of the Stargate service on each CVM.
Question #:6
An administrator manages a cluster and notices several failed components shown in the exhibit.
What two options does the administrator have to run all NCC checks manually? (Choose two.)
A. Using the Actions drop-down menu in the Health dashboard of Prism Element.
B.
C. Using the action action drop-down menu in the Health dashboard of Prism Central
Answer: A B
Explanation
Prism Element and NCC are two ways to run all NCC checks manually on a Nutanix cluster. Prism Element is
the web console that provides management and monitoring capabilities for a single Nutanix cluster. Prism
Element has a Health dashboard that shows the status of various components and services in the cluster, such
as disks, nodes, CVMs, NCC, and alerts. The Health dashboard also allows the administrator to run NCC
checks manually by using the Actions drop-down menu on the right side of the screen. The administrator can
choose to run all NCC checks or specific checks based on the category or severity. The NCC checks will run
in the background and generate a report that can be viewed or downloaded from the Summary tab. This
method is easier and faster than running NCC from the command line on the CVM.
NCC stands for Nutanix Cluster Check, which is a framework of scripts that performs system checks and
validations on Nutanix clusters. NCC can detect issues related to hardware, software, configuration,
hypervisor, networking, and more. NCC can be run from the command line interface (CLI) of any CVM in the
cluster by using the ncc command. To run all NCC checks manually, the administrator can use the command
ncc health_checks run_all, which will execute all available checks and display the results on the screen. This
method is more comprehensive and detailed than running NCC from Prism Element.
References: : [Health Dashboard - Prism Element Guide] : [Nutanix Cluster Check (NCC) - Nutanix Support
& Insights] : [Running NCC Checks - Nutanix Support & Insights]
Question #:7
Refer to Exhibit:
An administrator needs to enable inline deduplication for a pre-existing storage container. When trying to
enable deduplication on the storage container. this feature is grayed-out.
B. The cluster has less than 5 nodes which is the minimum node-count to enable deduplication.
D. The cluster has hybrid storage and deduplication is supported only on all-flash clusters.
Answer: D
Explanation
Nutanix supports two types of deduplication: post-process and inline. Post-process deduplication runs
periodically on a schedule and can be enabled on any cluster. Inline deduplication runs in real time before data
is written to disk and can be enabled only on all-flash clusters.
Therefore, by checking the type of storage and the type of deduplication, you can determine if you can enable
inline deduplication on a storage container or not.
Nutanix inline deduplication is a feature that reduces the stored size and avoids duplicate data on a storage
container1. It is recommended only on some specific scenarios, such as when using Nutanix Files or virtual
desktop infrastructure (VDI) workloads12.
Question #:8
An administrator needs to limit the amount of storage space that data stored in single container can consume.
Answer: B
Explanation
The best way for the administrator to limit the amount of storage space that data stored in a single container
can consume is to set an advertised capacity for the container. This will ensure that the data stored in the
container doesn't exceed the set limit, and it will also help prevent any potential performance issues due to
resource contention. Additionally, the administrator should consider thick provisioning the container, which
will pre-allocate the amount of storage space that can be used by the container. This will help ensure that the
data stored in the container doesn't exceed the advertised capacity.
Question #:9
Which change can be made on a cluster with software-based Data-at-Rest Encryption enabled?
Answer: D
Question #:10
An administrator would like to leverage the Reliable Event Logging Protocol (RELP) with their Remote
Syslog Server. After completing the configuration, it is observed that RELP logging is not working as
expected.
B. The GENESIS was the only one chosen to forward log information.
C. The Remote Syslog Server was configure using TCP as the protocol.
Answer: D
Explanation
According to the Red Hat Customer Portal, to use RELP with Rsyslog, you need to install the rsyslog-relp
package on both the server and the client. If the remote server does not have rsyslog-relp installed, RELP
logging will not work as expected.
Question #:11
Administrator is creating a Windows 10 VM that will be used for a virtual desktop template. After creating the
VM and booting to the ISO, the administrator is unable to install Windows and receives the following error.
What steps does the administrator need to take to install the OS?
Answer: D
Explanation
Answer: D. Load the Virtual SCSI pass-through controller.
The error message shown in the image indicates that Windows 10 setup cannot find any drives to install the
OS. This is because the Nutanix AHV hypervisor uses a virtual SCSI pass-through controller to present disks
to the VMs, and Windows 10 does not have a built-in driver for this device. Therefore, the administrator needs
to load the Nutanix VirtIO driver for the virtual SCSI pass-through controller during the OS installation
process. The Nutanix VirtIO driver package contains various drivers that are specifically used by Windows
VMs hosted in the Nutanix environment to enhance their stability and performance1. The administrator can
download the latest Nutanix VirtIO driver package from the VirtIO downloads page of the Nutanix support
portal. The administrator can then follow these steps to load the driver and install the OS2:
Insert a USB drive or mount an ISO image that contains the Nutanix VirtIO driver package.
Browse to the location of the driver package and select the folder that matches the OS architecture
(32-bit or 64-bit).
Select the disk where you want to install Windows 10 and click Next.
Question #:12
An administrator is setting up a Nutanix cluster and needs to configure the default VLAN.
A. Vlan.0
B. Vlan.1
C. Vlan.2
D. Vlan.7
Answer: B
Explanation
Nutanix cluster is a group of Nutanix nodes that share data and resources across a network1. A VLAN is a
virtual LAN that allows devices on different physical LANs to communicate as if they were on the same
network2.
by default, a virtual NIC (VM NIC) on a guest VM operates in access mode and can send and receive traffic
only over its own specified VLAN. The default VLAN ID for access mode interfaces is 1.
Therefore, by choosing Vlan.1 as the default VLAN, you can simplify the network configuration and avoid
potential issues with other VLAN IDs.
Question #:13
An administrator wants to replace and old node with a node of newer generation in a 3-node cluster. The
administrator has already chosen the appropriate node. But unable to remove it from the cluster.
C. It is not possible to remove a node from a the cluster using Prism Central
Answer: D
Explanation
A Nutanix cluster requires a minimum of three nodes to maintain quorum and data availability. Removing a
node from a 3-node cluster would violate the redundancy factor and cause data loss. Therefore, it is not
possible to remove a host from a 3-node cluster using Prism or CLI. The only way to replace a node in a
3-node cluster is to use the Foundation tool, which will erase the existing cluster configuration and create a
new cluster with the new node1.
Question #:14
Which Nutanix service control ncli, the HTML5 UI, and Rest API?
A. Prism
B. Cassandra
C. Zookeeper
D. Chronos
Answer: A
Explanation
Prism is the central service control used by Nutanix to manage the clusters. It provides a unified view of the
entire system, and it is used to control the HTML5 UI, the nCLI, and the REST API. Prism is used to manage
the resources of the system, such as the nodes, storage, and networks, as well as to monitor the performance of
the system and the applications running on it.
https://www.nutanixbible.com/2f-book-of-basics-cluster-components.html
· Prism is the management gateway for components and administrators to configure and monitor the Nutanix
cluster. This includes Ncli, the HTML5 UI, and REST API.
· Prism runs on every node in the cluster and uses an elected leader like all components in the cluster. All
requests are forwarded to the leader using Linux Iptables. This allows access to PRISM using any CVM Ip
address.
· Prism communicates with Zeus for cluster configuration data and Cassandra for statistics to present to the
user. It also communicates with the ESXi hosts for VM status and related information
These are only some of the essential services that make up the CVM functionality. For more information on all
the services and various Nutanix Cluster components, refer to the portal documentation.
Question #:15
Async DR is configured between two sites. A network outage occurs at the primary site.
Which steps must the administrator perform to bring the VMs back into service at the backup site?
Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the
item requirements. Not all procedures are valid. Identify any invalid procedures using the drop-down option.
Answer:
Question #:16
Answer: A
Explanation
This is because there is no GUI method to unregister a cluster from Prism Central, so the process requires SSH
access to the PC VM as well as to a CVM of the cluster2. The unregistration process involves getting the
UUID of the cluster from the CVM and then using that to trigger de-registration from PC command line2. The
unregistration process also involves cleaning up any associated metadata and configuration on both PC and
PE2. Therefore, the administrator needs to use a Host SSH session to perform this task.
Question #:17
In which two scenarios is Native Key Management Server supported? (Choose two)
Answer: B D
Question #:18
Refer to exhibit:
Answer: D
Explanation
Nutanix anomaly detection is a feature that monitors seasonal trends for time-series data (e.g. CPU usage,
memory usage, latency, etc.) and establishes a “band” of expected values based on historical data12. Only
values that hit outside the “band” will trigger an event / alert1.
Nutanix leverages a method for determining the bands called ‘Generalized Extreme Studentized Deviate Test’.
A simple way to think about this is similar to a confidence interval where the values are between the lower and
upper limits established by the algorithm.
Another web source3 shows an example of how anomaly detection works in Nutanix Prism Central. In the
video, you can see that when the observed value of a metric deviates significantly from the predicted value
based on historical data, an anomaly event is triggered and displayed on a chart.
Therefore, by comparing the observed values with the predicted values based on historical data, Nutanix
anomaly detection can identify abnormal behavior and alert you accordingly.
Question #:19
An administrator needs to periodically send information about cluster efficiency via email to a set of users.
Answer: D
Explanation
To periodically send information about cluster efficiency via email to a set of users, the administrator can
follow these steps:
Create a report in Prism Central that contains the relevant information about cluster efficiency.
Add a schedule to the report to generate and send the report via email to the set of users at a specified
frequency.
This will ensure that the users receive regular updates about the cluster efficiency without the need for manual
intervention.
Question #:20
An administrator is not able to log into Prism Central by using a new Active Directory user account. After
Logging with the local user, the administrator verified that Directory Services and Role Mapping setting are
valid.
Answer: A
Explanation
The change password at next logon attribute is a setting that forces a user to change their password when they
log on to a domain for the first time or after their password has expired. This attribute is enabled by default for
new Active Directory user accounts or when an administrator resets a user’s password4.
However, Prism Central does not support this attribute for Active Directory authentication. Users with this
attribute enabled will not be able to log on to Prism Central using their Active Directory credentials. They will
receive an error message saying “Invalid credentials” or “Authentication failed” when they try to log on5.
Therefore, if an administrator is not able to log on to Prism Central using a new Active Directory user account,
the most likely cause of this issue is that the change password at next logon attribute is set for that user
account. To resolve this issue, the administrator should disable this attribute for the user account or log on to a
domain workstation first and change their password before accessing Prism Central6.
Question #:21
How many SSL certificates are used by Prism Element on a Nutanix cluster?
A. 1
B. 5
C. 256
D. 2048
Answer: A
Explanation
According to the Nutanix Prism Element Guide, Prism Element uses a single SSL certificate on a Nutanix
cluster. The certificate is used to secure the communication between the web browser and the Prism web
console. The certificate is also used to authenticate the cluster to external services, such as Active Directory,
SMTP, and SNMP. The certificate can be either self-signed or signed by a trusted certificate authority (CA).
The certificate can be replaced or renewed through the Prism web console or the ncli command-line interface.
Question #:22
An administrator wants to have a VM on an AHV cluster with access to multiple VLANs. What is the most
efficient way to achieve this?
A. Update a vNIC on the VM to operate in trunked mode for all desired VLANs.
B. Create a network in AHV associated with all those VLANs on all hosts.
Answer: A
Explanation
According to the Nutanix Support & Insights web search result2, VM NICs on AHV can operate in two
modes: Access and Trunked. Access NICs are the default, and allow one VLAN on the NIC. Trunked NICs
allow multiple VLANs on a single NIC for VMs that are VLAN aware. If you must use trunked NICs, follow
the steps described in the web search result2. Therefore, the most efficient way to have a VM on an AHV
cluster with access to multiple VLANs is to update a vNIC on the VM to operate in trunked mode for all
desired VLANs.
Question #:23
What is the most efficient action an administrator should take to ensure it is in a supported state?
B. Add the node to the cluster and leave the existing AOS version in place
C. Perform standalone reimage of the new node and then add to cluster
D. Add the node to the cluster and reboot all running VMs to use new release
Answer: C
Explanation
According to the web search results, the most efficient action an administrator should take to ensure a
supported state when adding a node with a higher AOS release to an existing cluster is to perform a standalone
reimage of the new node and then add it to the cluster1. This way, the new node will have the same AOS
version as the existing nodes, and there will be no compatibility issues or downtime. Therefore, option C is
correct, while options A, B, and D are not.
Question #:24
An administrator wants to ensure that data in a container is stored in the most space efficient manner as
quickly as possible after being written,
A. Inline Compression
B. Thin Provisioning
C. Cache Deduplication
D. Erasure Coding
Answer: A
Explanation
inline compression is a technique that compresses all incoming write I/O operations over 4 KB inline in the
persistent write buffer (oplog)23. This approach enables you to use oplog capacity more efficiently and helps
drive sustained performance2. From AOS 5.18 onward, inline compression (compression delay=0) is enabled
by default for all new containers24.
https://portal.nutanix.com/page/documents/solutions/details?targetId=TN-2032-Data-Efficiency:TN-2032-Data-Efficien
Question #:25
An administrator needs to create a new Linux image and will to do the following as part of the VM
deployment:
* Add keys
What package needs to be installed in the Linux image to facilitate this automation?
A. CloudInit
B. Sysprep
Answer: A
Explanation
CloudInit is a package that contains utilities for early initialization of cloud instances. It allows you to
customize virtual machines provided by a cloud vendor by modifying the generic OS configuration on
boot. You can use CloudInit to set the OS hostname, add custom users, add keys, run custom scripts, and
more2. CloudInit is supported by most major Linux and FreeBSD operating systems and works across
different cloud platforms3. Sysprep is a tool for Windows operating systems that prepares an installation for
cloning, auditing, and customer delivery4.
References: 1: Replacing Nodes in Nutanix Cluster - Nutanix Support & Insights 2: Customize a Linux VM
with cloud-init in Azure - Azure Virtual Machines 3: Cloud-Init - The standard for customising cloud
instances 4: Sysprep (Generalize) a Windows installation
Question #:26
Refer to Exhibit:
Answer: B
Explanation
when you create a custom alert policy, you can choose between two types of thresholds: Static Threshold and
Behavioral Anomaly. Static Threshold allows you to set a fixed value for the metric that triggers the alert.
Behavioral Anomaly allows you to use machine learning to detect abnormal behavior based on historical data.
If you select Behavioral Anomaly as the threshold type, you cannot set a warning level for the alert. You can
only set a critical level that indicates how much deviation from normal behavior is considered an anomaly 3.
Therefore, the Alert warning if field is greyed out when you select Behavioral Anomaly.
Question #:27
A. To carry all traffic between the user VMs and the upstream network.
B. To carry management and storage communication between user VMs and the CVM.
C. To carry management and storage communication between user VMs and AHV host.
D. To carry storage communication between the guest VMs and the CVM
Answer: C
Explanation
http://www.vstellar.com/2019/01/10/ahv-networking-part-1
-basics/#:~:text=AHV%20Network%20Architecture&text=virbr0%20is%20an%20internal%20switch,virbr0)%20have%
Question #:28
An Administrator has been asked to deploy VMs using a specific image. The image has been configured with
settings and applications that will be used by engineering to develop a new product by the company.
The image is not available on the desired cluster, but it is available in other cluster associated with Prism
Central.
Answer: D
Explanation
When a placement policy is enforced, images are only allowed to be deployed on clusters that are part of
categories that are associated with the policy. If the desired cluster is not associated with the policy, then the
image will not be available for deployment.
https://next.nutanix.com/how-it-works-22/image-management-for-ahv-clusters-and-dealing-with-the-inactive-image-37
Question #:29
An administrator is tasked with configuring networking on an AHV cluster and needs to optimize for
maximum single VM throughput.
B. Active-Active
C. Active-Backup
D. No Uplink Bond
Answer: B
Explanation
Active-Active is a bond mode that allows all uplinks in the bond to be used simultaneously for traffic
transmission and reception. This bond mode provides load balancing and increased bandwidth for the AHV
host and its VMs. Active-Active bond mode uses a hashing algorithm based on source MAC addresses to
distribute traffic across different uplinks in the bond. Each individual VM NIC uses only a single bond
member interface at a time, but multiple VM NICs are spread across different bond member interfaces. As a
result, it is possible for a Nutanix AHV node with two 10 Gb interfaces to use up to 20 Gbps of network
throughput, while individual VMs have a maximum throughput of 10 Gbps6.
Therefore, if an administrator needs to optimize for maximum single VM throughput, they should select
Active-Active bond mode for their AHV cluster. This bond mode can be configured using Prism Element UI
or manage-ovs commands on each AHV host7. No additional configuration is required on the upstream switch
side, as long as the switches are interconnected physically or virtually and both uplinks trunk the same
VLANs8.
Question #:30
Which best practice should be followed when creating a bond in a Nutanix cluster?
C. Only utilize NICs of the same speed within the same bond
Answer: A
Question #:31
An administrator needs to boot a VM to a bootable CD. The administrator tries to configure the VM to boot to
it, select to add disk, and goes to the images available. The image for the bootable CD is unavailable.
C. The VM needs to have a standard disk attached before it can boot to a CD.
Answer: B
Question #:32
A Nutanix cluster is equipped with four nodes. Four VMs on this cluster have been configured with a VM-VM
anti-affinity policy and are each being hosted by a different node.
What occurs to the cluster and these VMs during an AHV upgrade?
A. One node hosts two VMs while the node being upgraded is in maintenance mode.
B. One VM out of the four powers down when the node hosting it reboots.
C. The AHV pre-upgrade checks fail until the administrator disables the anti-affinity policy.
D. The AHV pre-upgrade checks fail until the four VMs are powered off.
Answer: A
Explanation
One node hosts two VMs while the node being upgraded is in maintenance mode. This is because Nutanix
supports a feature called Rolling Upgrade that allows upgrading AHV on a cluster without any downtime or
impact to the VMs. The Rolling Upgrade feature performs the upgrade one node at a time, by putting the node
in maintenance mode, evacuating the VMs to other nodes, upgrading AHV, and then bringing the node back
online. The VM-VM anti-affinity policy ensures that the four VMs are not placed on the same node during the
evacuation process, so one node will host two VMs temporarily while the other node is being upgraded.
Question #:33
After configuring modules for a Remote Syslog Server, the settings are as shown. The administrator notices
that even though the level parameter is set to EMERGENCY, that all monitor logs are being sent.
B. Having the Module Name set to STARGATE sends all monitor logs regardless of the level.
C.
D. The true setting for Include Monitor Logs sends all monitor logs regardless of the level.
Answer: D
Explanation
This means that the rsyslog server is configured to include all monitor logs in addition to the messages with
EMERGENCY level.
It has a level parameter that specifies the severity of messages to be logged2. The level parameter can have
one of eight values: EMERG (emergency), ALERT, CRIT (critical), ERR (error), WARNING, NOTICE,
INFO (informational), and DEBUG2.
Question #:34
Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness?
B. Copy-on-Write
C. Split-mirror
D. Redirect-On-Write
Answer: B
Explanation
According to the Dell Unity: Data Reduction Technical White Paper1, snapshots and clones on Dell Unity use
the Copy-on-Write (CoW) algorithm to maximize efficiency and effectiveness. CoW is a technique that defers
the copying of data until it is modified. This means that snapshots and clones only consume space when
changes are made to the source or the clone, respectively. CoW also preserves the original data in case of a
rollback or recovery operation.
Question #:35
An administrator wants to reduce the largest amount of alert emails received from Prism Central.
Which two settings should the administrator customize to meet this requirement? (Choose two)
C. Dally Digest
D. Email Recipients
Answer: C D
Explanation
According to the Nutanix Support & Insights website1, you can configure alert emails through Prism Central
by enabling or disabling customer email notification for each alert. You can also modify or create custom alert
policies for different entities and clusters23.
Question #:36
An administrator needs to run a mixed Exchange and SQL workload with a guaranteed amount of container
Answer: D
Question #:37
A. Destroy a cluster.
B. Upgrade a cluster
C. Migrate a cluster
Answer: A D E
Explanation
https://portal.nutanix.com/page/documents/details/?targetId=Web_Console_Guide-Prism_v4_7:lic_licensing_managing
You can reclaim and optionally re-apply licenses for nodes in your clusters:
You must reclaim licenses when you plan to destroy a cluster. First reclaim the licenses, then destroy the
cluster. You do not need to reclaim Starter licenses. These licenses are automatically applied whenever
you create a cluster, including after you have destroyed a cluster.
Return licenses to your inventory when you remove one or more nodes from a cluster. Also, if you move
nodes from one cluster to another, first reclaim the licenses, move the nodes, then re-apply the licenses.
You can reclaim licenses for nodes in your clusters in cases where you want to make modifications or
downgrade licenses. For example, applying an Ultimate license to all nodes in a cluster where some
nodes are currently licensed as Pro and some nodes are licensed as Ultimate. You might also want to
transition nodes from Ultimate to Pro licensing.
You must reclaim licenses when you renew licenses. First reclaim the expired licenses, then apply new
licenses.
Question #:38
Which two private key types are supported by the Nutanix SSL certificate implementation? (Choose two.)
A. ECDSA
B. ECDH
C. ED25519
D. RSA
Answer: A D
Question #:39
Answer: D
Question #:40
Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the
item requirements. Not all procedures are valid. Identify any invalid procedures using the drop-down option.
Answer:
Explanation
Step 1 ---> Login into Prism Element.
Step 2 ---> Select the Gear Icon at top right of the page.
Invalid:-
Question #:41
An administrator needs to relocate an AHV cluster to a new datacenter during a maintenance window. The
cluster will use the same IPs in the new datacenter.
Which two steps should be taken to prepare for this task? (Choose two.)
Answer: B D
Explanation
According to the web search results, two steps that should be taken to prepare for relocating an AHV cluster to
a new datacenter during a maintenance window are:
Shut down all user VMs in the cluster: This step is necessary to ensure that there is no data loss or
corruption during the relocation process. The user VMs can be shut down either individually or in bulk
by using the Prism Element web console or the acli command-line interface1.
Stop all Nutanix Files clusters: If the AHV cluster hosts any Nutanix Files clusters, they should be
stopped before relocating the cluster. Nutanix Files clusters are composed of one or more virtual
machines that provide file services to clients. Stopping a Nutanix Files cluster will stop all the file server
VMs and release the resources they consume2. The Nutanix Files clusters can be stopped by using the
Prism Element web console or the ncli command-line interface3.
Question #:42
An administrator has a Custom backup application that requires a 2TB disk and runs m Windows. Throughput
is considerably lower than expected.
• 4GB of Memory
Answer: C
Explanation
According to the web search results, one recommended configuration change to improve throughput for a
custom backup application that requires a 2TB disk and runs on Windows is to span the 2TB disk across four
vDisks. Spanning is a technique that allows you to create a single logical disk from multiple physical
disks. Spanning can improve throughput by distributing I/O requests across multiple disks and reducing
contention5. To span a disk across four vDisks, the administrator should create four vDisks of equal size (500
GB each) and attach them to the VM. Then, in Windows Disk Management, create a spanned volume from the
four vDisks and format it as NTFS6.
Question #:43
A. Node
B. Data Center
C. Block
D. Rack
Answer: C D
Explanation
Nutanix clusters are resilient to a drive, node, block, and rack failures because they use redundancy factor 2 by
default, allowing Nutanix clusters to self-heal2. Failure scenarios can be thought of in terms of fault domains,
which are the physical or logical parts of a computing environment or location that are adversely affected
when a device or service experiences an issue or outage3. There are four fault domains in a Nutanix cluster:
Disk, Node, Block, and Rack4. Block and Rack are two options that are available for expanding the failure
domain level of a cluster. Block fault tolerance is enabled by default and ensures that data is replicated across
different blocks in a cluster5. Rack fault tolerance has to be configured manually and ensures that data is
replicated across different racks in a cluster4.
References: 1: Behavioral Learning Tools - Prism Central Resource Management - Nutanix 2: How Nutanix
Handles Failures | Node Failure 3: Failure Domain Considerations - Nutanix Support & Insights 4:
[Understanding Fault Domains and Rack Awareness - Nutanix] 5: [Nutanix Cluster Architecture Overview -
Nutanix Bible]
Question #:44
Which AOS process determine if an I/O from a user will be written to OpLog or to an Extent Store?
A. Stargate
B. Curtor
C. Cassandara
D. Zeus
Answer: A
Explanation
Stargate is the AOS process that handles all I/O operations for the cluster. It is responsible for determining
whether an I/O from a user will be written to the OpLog or to the Extent Store, based on the type and size of
the I/O. Stargate also performs data tiering, compression, deduplication, and erasure coding1. Stargate runs on
every CVM and communicates with other Stargates to ensure data locality and redundancy2.
Question #:45
A. 1
B. 2
C. 3
D. 5
Answer: C
Explanation
According to the Nutanix Files Guide, Nutanix Files instances are composed of a set of VMs (called FSVMs).
Files requires at least three FSVMs running on three nodes to satisfy a quorum for high availability. By
default, Files deploys three FSVMs when you create a file server instance.
Question #:46
Upon logging into Prism Central, an administrator notices high cluster latency.
How can the administrator analyze data with the least number of steps or actions?
C. Take note of the duster name and create a new Analysis chart.
Answer: B
Explanation
According to the Nutanix Prism Central Guide, you can click on any chart in a widget to expand it and view
more details about the data elements.
Question #:47
What is the expected behavior of the VMs residing on that host when a controller VM becomes unavailable?
B. The host will automatically redirect I/O and VMs will continue running.
Answer: B
Explanation
According to the Nutanix Support & Insights web search result1, if the owner Controller VM becomes
unavailable, the address moves to another Controller VM, ensuring that it is always available. This IP address
is also used as a cluster-wide address by clients configured as part of Nutanix Files and other products.
Therefore, the host will automatically redirect I/O and VMs will continue running without any interruption.
Question #:48
Which two steps should the administrator take first to achieve this? (Choose two)
A. Use acli
C. SSH to CVM.
D. Update VM dialog.
Answer: A C
Explanation
Explanation/Reference:
Question #:49
Refer to exhibit:
An administrator needs to update some images that were previously uploaded to their Nutanix cluster, while
logged into Prism Element when trying to update the images, the update icon is not enabled.
A. RBAC is configured and the administrator's user doesn't have the right privileges.
B. The files were ISO but were uploaded as disk images hence cannot be used or edited.
Answer: D
Explanation
According to Nutanix Support & Insights1, image create, update, and delete (CUD) behavior depends on
whether a cluster (also known as Prism Element) is registered to Prism Central. Images created on a Prism
Element reside on Prism Element and can be managed from Prism Element. For better centralized
management, you can migrate images manually to Prism Central by using the image import feature.
Question #:50
Answer: B
Question #:51
Answer: B
Explanation
A bond is a logical interface that combines two or more physical interfaces on an AHV host. A bond provides
high availability and load balancing for the network traffic of the host and its VMs. A bond can have different
modes that determine how the traffic is distributed and how the bond handles failures of the physical
interfaces. The most common bond modes are active-backup, active-active, and LACP1.
Nutanix recommends including at least two physical interfaces in every bond to ensure high availability and
redundancy. If one of the physical interfaces fails or is disconnected, the other interface can take over the
traffic without affecting the connectivity of the host or its VMs. Having at least two physical interfaces in a
bond also allows for maintenance operations such as firmware upgrades or cable replacements without
downtime2.
Nutanix does not recommend including NIC models from different vendors in the same bond, as this may
cause compatibility issues or performance degradation. Nutanix also does not recommend using only one
physical interface in a bond, as this provides no redundancy or load balancing benefits3.
Question #:52
An administrator needs to ensure logs, alerts and information is consistent across clusters that are located in
different countries.
A. SMTP
B. DNS
C. SNMP
D. NTP
Answer: D
Explanation
NTP service needs to be configured to ensure logs, alerts and information is consistent across clusters that are
located in different countries. NTP stands for Network Time Protocol and it is used to synchronize the clocks
of all the nodes in a cluster1. This helps to maintain accurate timestamps for logs, alerts and other information
that are generated by Nutanix clusters1.
Question #:53
Which two types of granular RBAC does Nutanix provide for AHV hosts? (Choose two.)
A. Category based
B. Project based
C. Disk based
D. Cluster based
Answer: A D
Explanation
Nutanix provides two types of granular RBAC for AHV hosts: category based and cluster based3. Category
based RBAC allows administrators to assign roles to users or groups based on categories, which are key-value
pairs that can be applied to various entities in Prism Central, such as clusters, hosts, VMs, images, and
networks. Categories can be used to group entities by different criteria, such as department, project,
environment, or location. For example, an administrator can create a category key named Department and
assign different values to it, such as Finance, Marketing, or Engineering. Then, the administrator can apply this
category to different clusters or hosts and assign roles to users or groups based on this category. This way,
users or groups can have different levels of access to different clusters or hosts depending on their
department4.
Cluster based RBAC allows administrators to assign roles to users or groups based on specific clusters
registered in Prism Central. For example, an administrator can create a role named Cluster Admin and assign it
to a user or group for a particular cluster. This way, the user or group can have full access to that cluster and
its hosts and VMs, but not to other clusters5.
Question #:54
A vDisk is read by multiple VMs. The cluster creates immutable copies of the vDisk. What are these vDisk
copies called?
A. Disk Clones
B. Golden Images
C. Volume Groups
D. Shadow Clones
Answer: D
Explanation
According to the Nutanix Support & Insights web search result3, shadow clones are vDisk copies that are
created by the cluster when a vDisk is read by multiple VMs. Shadow clones are immutable copies of a vDisk
that are stored in different nodes in the cluster, and are used to improve read performance and reduce network
traffic. Shadow clones are automatically created and deleted by the cluster, based on the demand and
availability of resources.
Question #:55
A. Storage Only
B. Hyper Converged
C. Compute Only
D. All Flash
Answer: C
Explanation
A Compute Only node is a node that does not have any local storage devices and only provides compute
resources to the cluster2. A Compute Only node does not run a CVM, but instead relies on the CVMs of other
nodes to access the distributed storage fabric2
Question #:56
An administrator is reviewing performance of a core banking system that routinely has 20,000 concurrent
users. During, business hours, the CPU on the applications servers runs at close to 100%. The administrator
needs to determine if there is a performance issue specific to the app servers, the database servers, or all
servers on the cluster.
C. Cluster IO, CPU, Memory and Database and App Server CPU
Answer: D
Explanation
In this case, the administrator wants to investigate the performance of a core banking system that consists of
application servers and database servers. The application servers have high CPU utilization during business
hours, which may indicate a bottleneck or a resource contention issue. The administrator needs to review
multiple metrics in Prism Analysis Graphs to identify the root cause and determine if there is a problem with
the app servers only, or with other components as well.
Cluster IO: This metric shows the input/output operations per second (IOPS) and throughput (MBps) of
the cluster. It can help to understand if there is a high demand for disk IO from the VMs or if there is
Cluster CPU: This metric shows the CPU utilization (%) and load average of the cluster. It can help to
understand if there is enough CPU capacity in the cluster to handle the workload or if there is any
imbalance or contention among hosts.
Cluster Memory: This metric shows the memory utilization (%) and available memory (GB) of the
cluster. It can help to understand if there is enough memory capacity in the cluster to support the VMs or
if there is any pressure or swapping in the memory layer.
Network: This metric shows the network throughput (MBps) and packets per second (pps) of the cluster.
It can help to understand if there is enough network bandwidth in the cluster to transfer data between
hosts and VMs or if there is any congestion or packet loss in the network layer.
App Server CPU: This metric shows the CPU utilization (%) and load average of each application server
VM. It can help to understand if there is any variation or anomaly in the performance of each app server
or if there is any correlation with other metrics.
Database Server CPU: This metric shows the CPU utilization (%) and load average of each database
server VM. It can help to understand if there is any variation or anomaly in the performance of each
database server or if there is any correlation with other metrics.
Question #:57
A. Cloud Connect
B. Controller VM
C. Prism Element
D. Prism Central
Answer: D
Explanation
Terminology
Availability Zone – it is represented by all resources (Nutanix Clusters) connected to Prism Central or
Xi Leap Availability zone. Depends on the architecture, Availability zone can represent geographic
territory, datacenter or server room in the datacenter. Protection policies – in protection policies you set
up (RPO, Retention), rules to auto-apply policies to virtual machines
https://vmwaremine.com/2019/02/08/nutanix-leap-runbooks-part-1/#sthash.VwrzSzhQ.dpbs
Question #:58
Refer to Exhibit:
An administrator is attempting to create an additional virtual switch on a newly deployed AHV cluster, using
the two currently disconnected interfaces. The administrator is unable to select the disconnected interfaces
when creating the virtual switch.
Answer: C
Explanation
when you create a new virtual switch on AHV, you need to select one or more uplink interfaces that are
connected to a physical network. You cannot select an interface that is already assigned to another virtual
switch. By default, AHV creates a virtual switch called br0 that uses all available interfaces on the host2.
Therefore, if you want to use some of those interfaces for another virtual switch, you need to remove them
from br0 first.
https://masteringnutanix.com/2020/06/13/how-to-create-an-ahv-virtual-switch-with-single-uplink/
Question #:59
A newly-hired Nutanix administrator was tasked by the CIO to create a single VM on a test network. The
network administrator stated that a native VLAN was used on the Cisco TOR switches with the following
parameters:
IP address:172,16.1.2
VLAN:1
The same parameters were used to create a network profile on Nutanix, but the when the VM was on …
Answer: B
Explanation
A native VLAN is a VLAN that is assigned to untagged traffic on a trunk port of a switch. A trunk port can
carry traffic from multiple VLANs, but it needs to have a native VLAN to handle traffic that does not have a
VLAN tag. The native VLAN is usually VLAN 1 by default on most switches, but it can be changed to any
other VLAN number2. When creating a network profile on Nutanix, the administrator needs to specify the
VLAN ID that matches the VLAN configuration on the physical switch. However, if the network profile uses
the same VLAN ID as the native VLAN on the switch, it will cause network connectivity issues for the VMs
connected to that network profile. This is because Nutanix AHV uses 802.1Q tagging for all network traffic,
including traffic in the native VLAN. The switch will expect untagged traffic in the native VLAN and will
drop any tagged traffic in that VLAN3. To fix this issue, the administrator needs to change the VLAN field
from vlan. 1 to vlan. 0 in the network profile on Nutanix. This will tell Nutanix AHV to send untagged traffic
for that network profile and match the native VLAN configuration on the switch4.
Question #:60
Answer: D
Explanation
The best way for the administrator to configure Prism to send encrypted messages to a set of recipients is to set
the SMTP Security Mode to STARTTLS. This will ensure that all messages sent over SMTP are encrypted
and secure. Additionally, the administrator should consider installing SSL certificates on Prism Central to
ensure that the messages are being sent securely. Finally, the administrator should consider configuring Prism
Central to use Cluster Lockdown, which will help ensure that the messages are only sent to the intended
recipients.
Question #:61
Which two permission assignment tasks can be accomplished via Prism Element? (Choose two.)
Answer: B D
Explanation
Prism Element is a management interface that allows administrators to assign permissions to users and groups
on a per-cluster, per-VM, or per-storage container basis.
https://www.nutanix.com/content/dam/nutanix/resources/support/ncp-mci-ds.pdf
Question #:62
An administrator is configuring data protection and DR for a multi-tier application. All VMs must be protected
at the same time.
A.
B. Create a consistency group for the application and place all VMs in it
C. Create a protection domain for the application and select auto-protect related entities
Answer: B
Explanation
According to the web search results, a consistency group is a group of related applications or services that
must be recovered together in order to work properly, and this means more than being recovered at the same
time67. They also typically need to be recovered to the same point in time6. Therefore, to meet the
requirement of protecting all VMs of a multi-tier application at the same time, the administrator must create a
consistency group for the application and place all VMs in it8. This way, the administrator can apply data
protection policies and schedules to the entire consistency group as a single unit8.
Question #:63
CPU utilization climbs above 90% on several VMs. This causes performance degradation for a
business-critical application.
How can alerts be configured to notify the administrator before VM CPU utilization hits 90%?
A. On a CVM, use ncli to set the VM CPU Check threshold for the critical VMs to a value below 90%.
B. On the Health dashboard, locate the VM CPU Check and lower the alert threshold below 90%.
C. On a CVM, configure a cron job to run the VM CPU Check more frequently and email the result.
D. On the Alerts dashboard, ensure that the VM CPU usage alert is not set to auto-resolve.
Answer: B
Question #:64
C. Snap Clones
D. Shadow Clones
Answer: D
Explanation
Shadow Clones is a Nutanix feature that provides effective caching optimization in VDI environments. VDI
stands for Virtual Desktop Infrastructure, which is a technology that allows users to access virtual desktops
hosted on a centralized server. VDI environments typically have a high degree of similarity among desktop
images, which means that many VMs access the same data blocks from the storage layer. Shadow Clones
leverages this similarity by creating read-only copies of frequently accessed data blocks on each node’s SSD
tier, reducing network traffic and improving performance. Shadow Clones works automatically and
transparently without any configuration or intervention from the administrator.
References: : [Fault Tolerance - Nutanix Bible] : [Block Awareness - Nutanix Bible] : [Block Awareness -
Nutanix Support & Insights] : [Shadow Clones - Nutanix Bible] : [Shadow Clones - Nutanix Support &
Insights] : [Shadow Clones - Nutanix Community]
Question #:65
How will an HDD failure affect VMs with data on the failed device?
A. The VMs will crash, and will be restarted once the failed HDD has been replaced and the data has been
restored.
B. A live migration will be initiated, moving the affected VMs to a host that contains the replica data.
C. The VMs will remain operational on that host and continue to function normally with no noticeable
impact
D. An HA event will occur, causing the affected VMs to restart on a node that contains the replica data.
Answer: D
Explanation
According to the Troubleshooting hosted disk I/O performance problems (1008885), when using VMware
hosted products, consider that both the virtual machines and host operating system often share the same disk
resources and hardware. If a hard disk fails, the virtual machines that have data on the failed device will
experience an HA event, causing them to restart on a node that contains the replica data.
Question #:66
An administrator has been alerted to a VM that has high I/O latency and wants to determine if there are any
other factors, such as insufficient network or memory resources that correlate, as part of a troubleshooting
process.
Which type of chart should the administrator create to allow all relevant data to be easily exported to CSV for
later analysis?
C.
Answer: D
Question #:67
Answer: C
Explanation
network segmentation on Nutanix clusters refers to creating a separate network for service-specific
communication and isolating different types of traffic over selected VLANs or physical interfaces.
https://next.nutanix.com/ncm-intelligent-operations-formerly-prism-pro-ultimate-26/network-segmentation-isolating-se
https://next.nutanix.com/how-it-works-22/network-segmentation-basics-38414
Question #:68
An administrator is performing validation testing of a new-deploy cluster. During this test, the administrator
disconnect each LAN interface from each of the nodes while pinging the hypervisor and guest VMs.
When the first interface is disconnected, pings continue as expected to the hypervisor, but pings stop
responding from the guest. Pings continue when the interface is reconnected. When the second interface is
disconnected, pings continue to both the hypervisor and guest VMs.
Answer: B
Explanation
switch ports are configured with different VLANs could be the cause of this error. If the switch ports are not
configured with the same VLANs as the network interfaces on each node, then there could be a mismatch in
network connectivity when one interface is disconnected1. This could affect the guest VMs that are using a
different VLAN than the hypervisor.
Question #:69
After running an LCM inventory it is noticed that there are a number of firmware and software updates
available. The administrator would like to avoid any host reboots, but would like to apply some of the
available updates?
Which two updates can be done while avoiding a host reboot? (Choose two.)
A. M.2 Drives
B. AHV
C. Data Drives
D. AOS
Answer: A D
Explanation
AOS and M.2 Drives are two updates that can be done while avoiding a host reboot. AOS is the Acropolis
Operating System that includes the hypervisor, storage and management components of the Nutanix cluster,
and firmware and software updates can also be applied to it without requiring any host reboots
Question #:70
A VM in a 12-node Nutanix cluster is hosting an application that has specific Physical GPU requirements.
Only three nodes in the cluster meet this requirement.
The administrator wants to allow a general workload to be distributed across all nodes in the cluster and must
make sure that the node hosting the VM meets its requirements.
A. Create a sperate three-node cluster using the nodes that meet the requirement.
B. Configure VM-Host affinity for the nodes that meet the application's GPU requirement.
D. Configure anti-affinity rules between the application VM and the other VMs running on the cluster.
Answer: B
Explanation
Configure VM-Host affinity for the nodes that meet the application’s GPU requirement. This is because
VM-Host affinity allows the administrator to specify which nodes a VM can run on or must not run on1. By
creating a VM-Host affinity rule that binds the application VM to the three nodes that have the physical GPU,
the administrator can ensure that the VM will always run on a node that meets its requirement, regardless of
any HA or migration events. This also allows the other nodes in the cluster to host other VMs without any
restrictions.
Question #:71
Which scenario would benefit most from Erasure Coding being enabled on a container?
A. Long term storage of data which is written once and read infrequently
Answer: A
Explanation
The correct answer is A. Long term storage of data which is written once and read infrequently.
Erasure Coding is a feature that increases the usable capacity on a Nutanix cluster by reducing the amount of
data replication. Instead of replicating data, Erasure Coding uses parity information to rebuild data in the event
of a disk failure. The capacity savings of Erasure Coding is in addition to deduplication and compression
savings1.
Erasure Coding is most beneficial for scenarios where the data is written once and read infrequently, such as
long term storage of archival data, backup data, or cold data. This is because Erasure Coding has some
trade-offs and limitations that may affect the performance and availability of the cluster. Some of these
trade-offs and limitations are2:
Erasure Coding requires more CPU and memory resources than replication, as it involves more complex
calculations for encoding and decoding data.
Erasure Coding increases the network bandwidth consumption, as it involves more data transfers
between nodes for encoding and decoding data.
Erasure Coding reduces the resiliency of the cluster, as it can tolerate fewer node failures than
replication. For example, a cluster with redundancy factor 2 can tolerate one node failure with
replication, but only two disk failures with Erasure Coding.
Erasure Coding is not effective for workloads that have many overwrites or random writes, as it involves
more overhead for updating the parity information.
Erasure Coding is not supported for some features, such as volume groups, file server VMs, or Metro
Availability.
Therefore, if an administrator needs to configure a container on a Nutanix cluster, they should enable Erasure
Coding only if the container will store data that is written once and read infrequently. This way, they can
maximize the capacity savings of Erasure Coding without compromising the performance and availability of
the cluster.
Question #:72
An administrator wants to use Volumes to connect to physical servers that are not able to be virtualized.
Which three things must be configured for Volumes to support iSCSI clients? (Choose three)
Answer: B D E
Explanation
https://portal.nutanix.com/page/documents/details/?targetId=Web-Console-Guide-Prism-v51:wc-block-services-c.html
Question #:73
An administrator has received reports of users being disconnected from remote desktop sessions to a specific
VM.
B. Swap-Out Rate
Answer: D
Explanation
Virtual NIC receive packet dropped is the most useful VM metric for isolating the cause of users being
disconnected from remote desktop sessions to a specific VM. This metric shows the number of packets that are
dropped by the virtual NIC of the VM due to insufficient buffer space or other reasons. Packet drops can
indicate network congestion, misconfiguration, or performance issues that can affect the quality and
availability of remote desktop sessions. Packet drops can also cause retransmissions, delays, and errors in
TCP-based protocols such as RDP2. To view this metric in Prism, go to Entities > Compute & Storage > VMs
> Summary View and select a VM. Then, in the Details View, go to Metrics > Performance and select Virtual
NIC receive packet dropped from the drop-down menu3.
Question #:74
Which method can be used to migrate a VM configured for UEFI-boot from a Nutanix Hyper-V cluster to
AHV?
A. Live Migration
B. Storage vMotion
C. Nutanix Move
D. Cloud Connect
Answer: C
Explanation
Nutanix Move is a tool that allows you to migrate VMs from different sources to Nutanix AHV with minimal
downtime and complexity. Nutanix Move supports migration from Hyper-V to AHV, including VMs
configured for UEFI-boot. UEFI stands for Unified Extensible Firmware Interface, which is a standard for the
software interface between the operating system and the firmware. UEFI-boot is a mode of booting that uses
UEFI instead of BIOS (Basic Input/Output System) to load the operating system. UEFI-boot offers some
advantages over BIOS-boot, such as faster boot time, larger disk support, and better security features1.
To migrate a VM configured for UEFI-boot from a Nutanix Hyper-V cluster to AHV, you need to use Nutanix
Move and follow these steps2:
Download and deploy the Nutanix Move appliance on the AHV cluster.
Log in to the Nutanix Move web console and add the source Hyper-V environment and the target AHV
environment.
Create a migration plan and select the VMs that you want to migrate. You can choose either automatic
or manual preparation mode for the migration.
Start the migration plan and monitor the progress. The migration plan will perform data seeding, which
is the process of copying the VM data from the source to the target in the background.
When the data seeding is complete, perform a cutover, which is the process of shutting down the source
VMs and powering on the target VMs. The cutover will also configure the boot device for the
UEFI-boot VMs on AHV.
References: 1: UEFI Boot - Nutanix Support & Insights 2: Hyper-V to AHV and Hyper-V to Nutanix Clusters
on AWS VM Migration - Nutanix Support & Insights
Question #:75
An administrator is implementing a VDI solution. The workload will be a series of persistent desktops in a
dedicated storage container within a four-node cluster Storage optimizations should be set on the dedicated
storage container to give optimal performance including during a node failure event
Which storage optimizations should the administrator set to meet the requirements?
A. Compression only
Answer: D
Explanation
According to the web search results, three storage optimizations that should be set on a dedicated storage
container for a VDI solution with persistent desktops are compression, deduplication and erasure coding.
Compression is a technique that reduces the size of data by removing redundant information. Deduplication is
a technique that eliminates duplicate copies of data blocks and stores only unique blocks. Erasure coding is a
technique that increases usable capacity by reducing the replication factor of data blocks and using parity
information instead7. These three optimizations can improve performance and save storage space for VDI
workloads, especially during a node failure event when data needs to be rebuilt from parity information8. The
administrator can enable these optimizations by using Prism Element web console or ncli command-line
interface9.
Question #:76
An administrator needs to configure a new subnet on an AHV cluster and want to ensure that VMs will
automatically be assigned an IP address at creation time.
A. Dynamic Network
B. Unmanaged Network
C. Managed Network
D. DHCP Network
Answer: C
Explanation
A managed network is a type of network that can be created on an AHV cluster and allows VMs to
automatically be assigned an IP address at creation time. A managed network uses the Nutanix IP Address
Management (IPAM) service, which provides DHCP and DNS functionality for the VMs on the network. A
managed network can be configured with a subnet range, a default gateway, and DNS servers. The IPAM
service will allocate IP addresses from the subnet range to the VMs and register their hostnames in the DNS
servers. The IPAM service will also release the IP addresses when the VMs are deleted or moved to another
network1.
To create a managed network on an AHV cluster, the administrator can use Prism Element or Prism
Central. The steps are as follows2:
In Prism Element, go to the Network Configuration page and click Create Network.
Enter the subnet range, default gateway, and DNS servers for the network.
Optionally, enable VLAN tagging and enter a VLAN ID for the network.
Click Save.
Question #:77
An administrator is commissioning a Nutanix Enterprise Cloud. Once the user VMs have been deployed and
are running, the administrator finds that VMs on the same host are able to communicate, but are unable to
communicate between hosts.
Answer: C
Explanation
According to the web search results, one possible cause of inter-VM communication failure between hosts is
that the switch is not configured to allow VLAN 15 traffic. VLAN 15 is the default VLAN ID used by AHV
for internal communication between CVMs and hosts. If the switch blocks or drops VLAN 15 packets, it will
prevent inter-VM communication across hosts4. To enable full inter-VM communication, the administrator
should update the switch to specifically allow VLAN 15 traffic on the ports connected to the AHV hosts.
Question #:78
A. iSER
B. CHAP
C. SAML
D. LDAP
Answer: B
Explanation
https://portal.nutanix.com/page/documents/details/?targetId=Web-Console-Guide-Prism-v50:wc-block-services-enablin
Provision storage on the Nutanix cluster by creating a volume group. Create a client whitelist to enable access
to the volume group by using the IP addresses or client initiator IQNs in a whitelist (as part of the volume
group configuration). Create a secret for the volume group if you are using CHAP authentication.
Question #:79
The Linux administration team has requested access rights to any current or future Linux VM in the
environment
A. Image
B. AHV Cluster
C. Category
D. Project
Answer: C
Explanation
Categories are key-value pairs that can be used to tag entities such as VMs, images, networks, and projects in
Prism Central. Categories can be used to create dynamic groups of entities based on their attributes, and assign
roles and permissions to those groups3. In this case, a category such as OS=Linux can be used to group all
Linux VMs and grant access rights to the Linux administration team.
Question #:80
A user running a Computer Aided Design (CAD) application is complaining about slow response time within
the VM, particular when moving windows or rendering images.
Which VM metric will guide the administrator toward diagnosing the problem?
B. GPU Usage
C. Swap in Rate
Answer: B
Explanation
A GPU (graphics processing unit) is a specialized hardware device that can accelerate graphics rendering and
computation for applications that use APIs such as DirectX, OpenGL, CUDA, and OpenCL. A GPU can also
offload the CPU from encoding and decoding tasks for remote display protocols such as Frame Remote
Desktop Protocol (FRP). A VM can use a GPU either by directly accessing a physical GPU (pGPU) on the
host or by using a virtual GPU (vGPU) that shares a pGPU with other VMs. A user running a computer aided
design (CAD) application may benefit from using a GPU or a vGPU to improve the performance and
responsiveness of the application, especially when moving windows or rendering images. However, if the
GPU or vGPU is not properly configured or provisioned, the user may experience slow response time within
the VM. Therefore, to diagnose the problem, the administrator should monitor the GPU Usage metric for the
VM. The GPU Usage metric shows the percentage of GPU resources that are consumed by the VM over
time3. The administrator can use Prism Central to view the GPU Usage metric for each VM in a chart or a
widget4. The administrator can also use Prism Central to view other metrics related to GPU performance, such
as GPU Memory Usage, GPU Encoder Usage, and GPU Decoder Usage3. By analyzing these metrics, the
administrator can determine if the VM is using the GPU efficiently and optimally, or if it needs more or less
GPU resources.
Question #:81
When VM HA Reservation is enabled, what is the expected behavior for all failed VMs in the event of a host
failure?
Answer: C
Question #:82
An administrator has been tasked with increasing security on Nutanix cluster by disabling password
authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH,
What is the easiest way for the administrator to meet these needs?
Answer: C
Explanation
"An administrator has been tasked with increasing security on Nutanix cluster by disabling password
authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH, What is the
easiest way for the administrator to meet these needs? Enable Cluster Lockdown and provide an RSA key."
Cluster Lockdown mode disables password authentication when accessing the CVM and AHV hosts and
instead requires key-based SSH. To enable Cluster Lockdown mode, you need to provide an RSA key.
Therefore, by enabling Cluster Lockdown mode and providing an RSA key, you can increase security on
Nutanix cluster by disabling password authentication when accessing the CVM and AHV hosts and instead
moving to key-based SSH with minimal effort.
https://next.nutanix.com/how-it-works-22/streamlined-login-and-increase-security-key-based-ssh-login-37397
Question #:83
Refer to Exhibit:
An administrator is trying to put a node into maintenance mode but receives the message shown in the exhibit.
Answer: A
Explanation
According to the Nutanix Community1, host maintenance mode is used to safely migrate all the user virtual
machines (VMs) in the host and make sure no VMs are running on the node. If a VM can’t be migrated to
another host, you need to shut down the VM for the host to enter into maintenance mode.
According to The Virtualist2, a storage container is a logical segmentation of a storage pool that can be
mounted as an NFS datastore on ESXi hosts. You can choose a replication factor (RF) for each storage
container, which determines how many copies of data are stored across different nodes.
Question #:84
In the event of a disk failure, which process will immediately ad automatically scans Cassandra to find all data
previously hosted on the failed disk, and all disks in that node?
A. Curator
B. Stargate
C. Genesis
D. Prism
Answer: A
Explanation
Curator is the process that runs on every node in a Nutanix cluster and is responsible for data management
tasks such as deduplication, compression, erasure coding, and replication factor compliance. Curator also
handles disk failure recovery by scanning Cassandra to find all data previously hosted on the failed disk, and
all disks in that node. Curator then rebuilds the data on other nodes in the cluster using the distributed storage
fabric1.
Question #:85
Which two predefined views can be added to a report to identify inefficient VMs?
Answer: B D
Explanation
Zombie VMs and overprovisioned VMs are two types of inefficient VMs that can waste resources and
increase costs in a Nutanix environment. Zombie VMs are VMs that are powered on but have no activity or
utilization for a long period of time. Overprovisioned VMs are VMs that have more resources allocated than
they actually need or use. Both types of VMs can be identified by adding predefined views to a report in Prism
Central.
A predefined view is a template that defines what data is displayed and how that data is represented in a
report. Prism Central provides several predefined views for different purposes, such as capacity planning,
performance analysis, anomaly detection, and efficiency optimization. To add a predefined view to a report, go
to Operations > Reports > New Report and select the desired view from the list1.
The Zombie VMs List view shows the list of zombie VMs in the environment based on the CPU usage,
memory usage, disk IOPS, and network throughput metrics. The view also shows the amount of resources
wasted by these VMs and the potential savings that can be achieved by deleting or resizing them2.
The Overprovisioned VMs List view shows the list of overprovisioned VMs in the environment based on the
CPU usage, memory usage, disk IOPS, and network throughput metrics. The view also shows the amount of
resources wasted by these VMs and the potential savings that can be achieved by resizing them3.
By adding these two views to a report, an administrator can identify inefficient VMs and take appropriate
actions to optimize resource utilization and reduce costs.
References: 1: Reports Management - Prism Central Guide 2: Zombie VMs List - Prism Central
Guide 3: Overprovisioned VMs List - Prism Central Guide
Question #:86
When a configuring a syslog server in Prism Central, what two pieces information are required? (Choose two.)
A. HTTPS URL
B. Encryption secret
C. Transport protocol
D. IP address/port
Answer: C D
Explanation
According to the Nutanix Prism Central Guide, to configure a syslog server in Prism Central, you need to
specify the transport protocol (TCP or UDP) and the IP address/port of the syslog server.
Question #:87
An administrator was reviewing various AOS logs when a it was noticed that the time of the logs were off by
several hours.
Which initial step was missed during the post process cluster configuration?
Answer: B
Explanation
The cluster time zone is a setting that determines the time zone used by all CVMs in the cluster. The cluster
time zone affects the timestamps of Nutanix logs, events, alerts, and reports. The cluster time zone also affects
the scheduling of tasks such as snapshots, replication, and upgrades. By default, the cluster time zone is set to
UTC (Coordinated Universal Time) when the cluster is created3.
To change the cluster time zone, the administrator needs to use the ncli (Nutanix command-line interface) on
any CVM in the cluster. The steps are as follows4:
Run ncli cluster get-timezone to check the current cluster time zone.
Run ncli cluster set-timezone timezone=<timezone> to change the cluster time zone,
where <timezone> is a valid time zone identifier (for example, America/New_York).
Run ncli cluster get-timezone again to verify that the cluster time zone has been changed.
Note that changing the cluster time zone does not affect the time zone of Prism Element or Prism Central
VMs. To change their time zone, the administrator needs to use Prism Element UI or Prism Central UI
respectively5.
Question #:88
Which two capabilities does IPAM provide in a Nutanix networking configuration? (Choose two.)
Answer: B C
Explanation
According to the Nutanix Support & Insights, IPAM enables AHV to assign IP addresses automatically to
VMs using DHCP. You can configure each virtual network and associated VLAN with a specific IP subnet,
associated domain settings, and group of IP address pools available for assignment.
Question #:89
What is the expected operation during node addition when the new node has a different AOS version?
C. The addition fails and forces the administrator to image using standalone Foundation.
D. The node is automatically re-imaged using the software currently running in the cluster.
Answer: D
Explanation
The node is automatically re-imaged using the software currently running in the cluster. This is because
Nutanix supports a feature called Auto Re-Image that allows adding nodes with different AOS versions to an
existing cluster without manual intervention. The Auto Re-Image feature detects the AOS version mismatch
and automatically downloads and installs the same AOS version as the cluster on the new node. This ensures
that the cluster remains in a consistent state and avoids any compatibility issues.
Question #:90
An administrator needs to shut down an AHV cluster to relocate hardware. The administrator upgrades NCC
and runs health checks.
Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the
item requirements.
Answer:
Question #:91
An administrator responsible for a VDl environment needs to investigate reports of slow logins. The
administrator finds that increasing the number of vCPUs from 2 to 4 will reduce the login times. Production
workloads are consuming 75% of the host CPU on the cluster. The administrator increases the vCPU count on
all of the VDl VMs.
Answer: C D
Explanation
According to the web search results, the two impacts on the cluster that will result from increasing the vCPU
count on all of the VDI VMs are:
Increase CPU utilization%: CPU utilization is the percentage of time that a CPU is busy executing
instructions5. By increasing the vCPU count on all of the VDI VMs, the administrator will increase the
demand for CPU resources on the cluster, which will increase the CPU utilization percentage6.
Increase CPU ready%: CPU ready is the percentage of time that a vCPU is ready to run but is waiting
for a physical CPU to become available5. By increasing the vCPU count on all of the VDI VMs, the
administrator will increase the contention for physical CPU resources on the cluster, which will increase
the CPU ready percentage6. A high CPU ready percentage can indicate performance issues such as
latency or slowdowns5.
Question #:92
An administrator is troubleshooting vDisk performance issues in a Nutanix cluster with hybrid disks. The VMs
all have Flash Mode enabled.
D. Data size for flash mode exceeds 25% of the SSD capacity.
Answer: D
Explanation
data size for flash mode exceeds 25% of the SSD capacity could cause the performance issues. Flash mode is a
feature that allows vDisks to be pinned to SSDs for faster access, but it has a limit of 25% of the SSD capacity
per node. If this limit is exceeded, some vDisks may be evicted from flash mode and cause disk latency 2.
Question #:93
A cluster has RF2. The cluster loses two drives on different nodes in the same storage tier.
Answer: A
Question #:94
In Nutanix clusters, which feature ensures VMs can be migrated and restarted on another host in case of
failure?
A. High Availability
B. Protection Domain
D. Availability Zone
Answer: A
Question #:95
How should an administrator correct an SSL error when connecting to a Nutanix cluster?
B. Create a new self-signed certificate for the cluster with a 4096 bit key
C. Create a new SSL certificate for the cluster signed by an AD certificate authority
D. Add the SSL certificate to an AD group policy applied to all computer objects
Answer: C
Question #:96
Which two initial cluster configuration tasks were missed during the deployment process? (Choose two.)
Answer: A D
Explanation
According to the image description, the exhibit shows a screenshot of a computer screen with a table of data.
The table has 6 columns and 4 rows. The columns are labeled “Date”, “Time”, “Status”, “Details”,
“Configuration”, and “Duration”. The rows contain information about different configurations and their
statuses. The background is a light blue color. There is a pop-up message on the bottom right corner of the
screen that reads “This question has been answered. Click here to enable the edit button.”
Based on the table data, it seems that the screenshot is taken from the Prism Central web console, showing the
results of a cluster health check report. The report shows that there are four failed checks: Host Password
Policy, CVM Password Policy, NTP Configuration, and Cluster Time Skew2. These checks indicate that some
initial cluster configuration tasks were missed during the deployment process.
The Host Password Policy check verifies that the host passwords are not set to default values and are
compliant with the password policy defined in Prism Central3. The CVM Password Policy check verifies that
the CVM passwords are not set to default values and are compliant with the password policy defined in Prism
Central4. These checks are important for ensuring the security and compliance of the cluster. Therefore,
changing the host and CVM passwords from their default values and following the password policy guidelines
are two initial cluster configuration tasks that were missed.
References: 1: VM Details View - Nutanix Support & Insights 2: Cluster Health - Nutanix Support &
Insights 3: Host Password Policy - Nutanix Support & Insights 4: CVM Password Policy - Nutanix Support &
Insights
Question #:97
Refer to Exhibit:
B. Because the blue band range increased over the last 2 days
Answer: A
Explanation
Nutanix leverages a method for determining the bands called ‘Generalized Extreme Studentized Deviate Test’.
A simple way to think about this is similar to a confidence interval where the values are between the lower and
upper limits established by the algorithm.
Another web source3 shows an example of how anomaly detection works in Nutanix Prism Central. In the
video, you can see that when the observed value of a metric deviates significantly from the predicted value
based on historical data, an anomaly event is triggered and displayed on a chart.
Therefore, by comparing the observed values with the predicted values based on historical data, Nutanix
anomaly detection can identify abnormal behavior and alert you accordingly.
Question #:98
Answer: C
Explanation
Flow Networking is a feature that enables software-defined networking for AHV clusters. It allows users to
create and manage virtual private clouds (VPCs), subnets, and network services such as NAT, DHCP, routing,
and VPN. Flow Networking also supports service insertion and chaining, which enables integration with
third-party network functions such as firewalls and load balancers. Flow Networking is built on top of the
microservices infrastructure (MSP) in Prism Central, which provides the platform for running various Nutanix
services such as Calm, Karbon, and Objects. Therefore, to enable Flow Networking, the MSP must be enabled
first on Prism Central1. The MSP can be enabled from the Prism Central settings page or from the command
line interface (CLI) of the Prism Central VM2. Enabling the MSP will also enable Flow Microsegmentation,
which is another feature that provides network security and visibility for AHV clusters.
Question #:99
A. ISCSI
B. SMB
C. FCOE
D. NFS
Answer: B D
Explanation
According to the Network File System web search result3, NFS (Network File System) is a distributed file
system protocol that allows a user on a client computer to access files over a network in a manner similar to
how local storage is accessed. NFS is one of the access protocols supported by Files. According to the
[MS-WPO]: File Access Services Protocols web search result4, SMB (Server Message Block) is a Windows
file sharing protocol that enables applications to discover, access, and share files that are hosted on or made
available by a file server, using a network between them, in a secure and managed environment. SMB is
another access protocol supported by Files. Therefore, SMB and NFS are two access protocols supported by
Files.
Question #:100
A. Subnet
B. Catalog
C. Vm
D. Category
Answer: C
Explanation
A storage policy can be associated with a VM. A storage policy is a set of rules that define how data objects
are stored and protected. It specifies the characteristics of storage, data protection, and data placement for
virtual disks that are assigned to a VM. Subnets, catalogs, and categories are not associated with storage
policies.https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-vpc_2022_6:mul-cluster-stor
Question #:101
What are two minimum prerequisites for live migration to succeed? (Choose two.)
Answer: A D
Explanation
According to section 5 of the exam blueprint guide1, one of the topics covered is live migration. Live
migration is the process of moving a running VM from one host to another without any downtime or
interruption of service. To perform live migration, there are some prerequisites that must be met, such as:
The source and destination hosts have enough resources to accommodate the VM
Question #:102
When creating a VM on an AHV cluster, how is the initial placement of the VM determined?
A. AHV uses a round robin algorithm, placing new VMs onto hosts based on the numerical order of their
UUID
B. The administrator right clicks on the desired host and selects Power on VM from the dropdown menu
C. The Acropolis Dynamic Scheduler selects a host which provides adequate resources for the VMs
configuration
D. Placement is determined by the host that holds the new_VM token at the time of VM creation
Answer: C
Explanation
According to section 6 of the exam blueprint guide1, one of the topics covered is VM placement options.
When creating a new VM on an AHV cluster, there are two ways to determine its initial placement:
Automatic placement: The Acropolis Dynamic Scheduler (ADS) selects a host that provides adequate
resources for the VM’s configuration, such as CPU, memory, disk space, and network bandwidth. ADS
also considers factors such as host load, power state, availability domains, and affinity rules.
Manual placement: The administrator can specify a host or a host group where they want to place the
VM.
Question #:103
AHV IPAM assigns an IP address from the address pool when creating a managed VM NIC.
At which two instances does the address release back to the pool? (Choose two)
D. The VM is deleted.
Answer: B D
Explanation
https://portal.nutanix.com/page/documents/solutions/details/?targetId=BP-2029_AHV:BP-2029_AHV
Administrators can use Acropolis with IPAM to deliver a complete virtualization deployment, including
network management, from the unified Prism interface. This capability radically simplifies the traditionally
complex network management associated with provisioning VMs and assigning network addresses. To avoid
address overlap, be sure to work with your network team to reserve a range of addresses for VMs before
enabling the IPAM feature.
The Acropolis master assigns an IP address from the address pool when creating a managed VM NIC; the
address releases back to the pool when the VM NIC or VM is deleted.
Question #:104
An administrator is working with Nutanix Support and needs to provide logs for troubleshooting an issue. The
cluster is located in a secure environment. Data such as IP addresses and VM names cannot be shared.
Which method should be used to anonymize the log data sent to Nutanix Support?
A)
B)
C)
D)
A. Option A
B. Option B
C.
C. Option C
D. Option D
Answer: D
Question #:105
An administrator needs to report on any alerts generated by a Nutanix cluster that affected the cluster's
availability over the past 10 days.
A. On the Health dashboard, use the Log Collector to export data based on time stamp.
C. On the Alerts dashboard, filter based on Impact Type and the desired Time Range.
D. Configure an Alert Policy to generate an email with the data on the Health dashboard.
Answer: C
Question #:106
An administrator has been asked to enable block awareness and increase the fault tolerance to FT2 on a
Nutanix AHV cluster with the following configuration:
Four blocks
Answer: D
Explanation
Fault tolerance (FT) is the ability of a cluster to withstand node failures and maintain data availability. FT is
determined by the replication factor (RF) of the data, which is the number of copies of each data block stored
on different nodes. FT = RF - 1, meaning that the cluster can tolerate as many node failures as one less than
the RF. Block awareness is a feature that enhances fault tolerance by ensuring that data copies are distributed
across different blocks, which are groups of nodes that share a power source and network switch. Block
awareness requires a minimum of three blocks and a minimum of six nodes in the cluster.
In this scenario, the administrator has been asked to enable block awareness and increase the fault tolerance to
FT2 on a Nutanix AHV cluster with the following configuration: Four blocks, One node per block. The
administrator will not be able to accomplish these tasks because:
To enable block awareness, the cluster needs at least six nodes, but it only has four nodes.
To increase the fault tolerance to FT2, the cluster needs at least five nodes per RF3 or seven nodes per
RF4, but it only has four nodes.
Therefore, the administrator will need to add more nodes to the cluster before enabling block awareness and
increasing the fault tolerance to FT2.
Question #:107
An administrator recently added new SSDs to a Nutanix cluster and knows the firmware will be out of date,
Due to security constraints, the cluster does not have access to the Internet.
Which two steps must be completed to update the firmware? (Choose two.)
D. update the LCM Source and URL to access the firmware bundle.
Answer: B C
Select Upgrade Software, then upload the firmware bundle using the Direct Upload option in LCM1.
Question #:108
An administrator logs in to Prism Element goes to the Network view, and sees the output shown in the exhibit.
Which three steps must the administrator take to increase throughput to the host? (Choose three.)
C. Remove any 1Gb interfaces still connected from the default bond.
D. Add a new switch to the network and connect 1Gb interfaces to it.
Answer: A B C
Explanation
These are the three steps that the administrator must take to increase throughput to the host. According to the
network diagram, the host has two 10Gb interfaces and two 1Gb interfaces in the default bond, but only one of
the 10Gb interfaces is connected to a switch. The other 10Gb interface is disconnected and has a red “X” on it.
The two 1Gb interfaces are also disconnected and have dotted lines. This means that the host is using only one
10Gb interface for all its network traffic, which limits its maximum bandwidth to 10 Gbps.
To increase the throughput, the administrator should connect both 10Gb interfaces to the physical switch,
preferably to different switches for redundancy and high availability. This will allow the host to use both 10Gb
interfaces for network traffic, which can increase its maximum bandwidth to 20 Gbps. However, this also
requires changing the bond mode from active-backup to balance-slb or balance-tcp, which are load balancing
modes that distribute network traffic across multiple interfaces based on source MAC address or TCP
session1. The default bond mode of active-backup only uses one interface at a time and switches to another
interface only when the active one fails2.
Finally, the administrator should remove any 1Gb interfaces still connected from the default bond, as they are
not needed and may cause performance issues or conflicts with the load balancing modes. The 1Gb interfaces
can be used for other purposes, such as management or backup networks, by creating separate bonds or
bridges for them3. Alternatively, they can be left disconnected if they are not required.
Question #:109
A customer wants to isolate a group of VMs within their Nutanix environment for security reasons. The
customer creates a VM with two NICs to act as a firewall and installs the appropriate software and certificates.
Answer: C
Explanation
One of the NICs needs to be configured on the internal VLAN. This is because the VMs that are isolated need
to communicate with the firewall VM through a private network, and the firewall VM needs to communicate
with the external network through a public network. The internal VLAN is a logical network that can be
created and managed by AHV1. If the firewall VM does not have a NIC on the internal VLAN, it will not be
able to route traffic between the isolated VMs and the outside world.
Question #:110
During an AHV upgrade, an administrator finds that a critical VM was powered off rather than migration to
another host.
Answer: D
Explanation
An agent VM is a special type of VM that is used for running services or applications that are not affected by
high availability (HA) events or host maintenance. An agent VM is never migrated to any other host in the
cluster. If an HA event occurs or the host is put in maintenance mode, agent VMs are powered off and are
powered on on the same host once that host returns to a normal state. This behavior is different from regular
VMs, which are migrated to another host in the cluster if possible, or restarted on the same host if not
possible1.
Therefore, during an AHV upgrade, an administrator may find that a critical VM was powered off rather than
migrated to another host if the VM was marked as an agent VM. This can be done either from the Prism web
console by selecting the Use this VM as an agent VM option in the Update VM dialog box, or from the aCLI
by using the vm.create or vm.update commands with the agent_vm=true parameter2. To avoid this situation,
the administrator should ensure that any critical VMs are not marked as agent VMs before starting the AHV
upgrade.
Question #:111
A recently configured cluster is leveraging NearSync with a recovery schedule of 15 minutes. It is noticed that
the cluster is consistently transitioning in an Out of NearSyne.
Answer: A
Explanation
One of the possible reasons for a cluster to transition out of NearSync is insufficient network bandwidth
between the source and target clusters. NearSync requires a minimum network bandwidth of 10 Mbps per VM
for replication3. If the network bandwidth is lower than the required amount, the replication of recovery points
may take longer than the configured RPO, resulting in an Out of NearSync condition. To address this issue,
you can increase the network bandwidth between the clusters or reduce the number of VMs protected by
NearSync4.
Question #:112
B. All operations and services on the Node B are shut down and go into a waiting state.
D. Node B sends a leadership request to the Witness VM and goes into single-node mode.
Answer: D
Explanation
According to the Nutanix Support & Insights, in a two-node ROBO cluster with a witness VM, if one node
goes down, the other node sends a leadership request to the witness VM and goes into single-node mode. The
cluster remains available and can tolerate another failure of either the witness VM or the network link.
Question #:113
A.
Answer: B
Explanation
The number of Prism Central instances required to deploy Leap is one per customer environment. Prism
Central is a multi-cluster manager that provides a single, centralized management interface for Nutanix
environments3. Leap is a native cloud extension that provides disaster recovery as a service (DRaaS) for
Nutanix environments4. To use Leap, customers need to have one Prism Central instance deployed in their
primary site, and register it with their Xi Cloud Services account5. This Prism Central instance can manage
multiple Nutanix clusters across different physical sites or availability zones6.
Question #:114
What is the name of the internal bridge used by AHV nodes and CVMs?
A. vnet0
B. br1
C. br0
D. virbr0
Answer: C
Explanation
According to the Nutanix Support & Insights web search result1, the name of the internal bridge used by
AHV nodes and CVMs is br0. The internal bridge is an Open vSwitch (OVS) bridge that connects the AHV
host management interface, the CVM interface, and the VM vNICs. The internal bridge also acts as a gateway
for the CVM and VM traffic to reach the external network through the host physical NICs.
Question #:115
D.
Answer: D
Question #:116
Which three configuration scenarios are valid for the deployment of Prism Central? (Choose three.)
Answer: A B C
Explanation
Prism Central is a multi-cluster manager that provides a single, centralized management interface for Nutanix
environments1. Prism Central can be deployed in different configuration scenarios, depending on the network
and security requirements of the environment. Some of the valid scenarios are:
Environments use Network Address Translation (NAT): NAT is a method of mapping one IP address
space to another by modifying network address information in IP datagram packet headers while they
are in transit across a traffic routing device2. NAT can be used to enable communication between Prism
Central and Prism Elements that are in different networks or subnets3. For example, Prism Central can
be deployed in a public cloud and use NAT to access Prism Elements that are in a private data center3.
Prism Elements and Prism Central are in different subnets: A subnet is a logical subdivision of an IP
network that allows multiple networks to share a single physical network4. Prism Elements and Prism
Central can be in different subnets as long as they can communicate with each other through routing or
NAT3. For example, Prism Central can be deployed in a management subnet and access Prism Elements
that are in different application subnets3.
Environments do not have Internet access: Internet access is not required for the deployment of Prism
Central, as long as the environment meets the prerequisites and considerations for installing or
upgrading Prism Central. For example, Prism Central can be deployed in a dark site, which is an
environment that does not have Internet access or has restricted Internet access. In this case, the
administrator needs to manually enable microservices infrastructure and download the required software
packages from another source.
Question #:117
When configuring Prism Central, which two log modules are able to forward messages to an external syslog
server? (Choose two.
A. API Audit
B. Flow
C. DNS
D. NTP Synchronization
Answer: A B
Question #:118
Which two methods are available when migrating a VM from a legacy 3-tier solution using VMware ESXi to
AHV? (Choose two.)
Answer: A C
Explanation
Deploy the Move appliance and Import the .vmdk into the Image Service. These are two methods that can be
used to migrate a VM from VMware ESXi to AHV2. The Move appliance is a tool that automates the
migration process by converting the VM disks and configuration to AHV format and transferring them to the
Nutanix cluster3. The Image Service is a feature that allows users to upload and manage disk images that can
be used to create or clone VMs on AHV4. By importing the .vmdk file of the VMware VM into the Image
Service, users can create a new AHV VM from that image.
Question #:119
A configuration is single domain, single forest, and does not use SSL.
A. 389
B. 3269
C. 636
D. 3268
Answer: A
Explanation
Port 389 is the default port for LDAP without SSL encryption. Port 636 is used for LDAP over SSL
(LDAPS). Port 3268 and 3269 are used for Global Catalog (GC) and Global Catalog over SSL (GCSSL),
respectively2.
Question #:120
B. Memory usage is less than 1% and memory swap rate is equal to 0 Kbps for the past 21 days.
D. Fewer than 30 1/Os and less than 1000 bytes per day of network traffic for the past 21 days
Answer: D
Explanation
The correct answer is D. Fewer than 30 I/Os and less than 1000 bytes per day of network traffic for the past 21
days.
A zombie VM is a type of inactive VM that is powered on but does very little activity. A zombie VM wastes
host resources such as CPU, memory, disk, and network that could be used by other VMs. A zombie VM can
be identified by using the VM Profile feature in Prism Central. The VM Profile feature analyzes the resource
utilization of each VM and assigns it a profile based on its efficiency and impact on other VMs. The profiles
are as follows1:
Over-provisioned: The VM has more resources than it needs and has low resource utilization.
Constrained: The VM has less resources than it needs and has high resource utilization.
Bully: The VM has high resource utilization and causes contention for other VMs.
The VM does fewer than 30 read or write I/Os (total) per day for the past 21 days.
The VM receives or transfers fewer than 1000 bytes per day of network traffic for the past 21 days.
To identify a zombie VM, the administrator can use Prism Central to view the VM Profile dashboard and filter
by profile type. The dashboard shows the number of VMs in each profile type, as well as their resource
consumption and efficiency score. The administrator can also drill down into each VM to see its detailed
metrics and recommendations for optimization.
Question #:121
Which data savings technique utilizes stripes and parity calculation in a Nutanix cluster?
A. Compression
B. Parity strip
C. Erasure coding
D. Deduplication
Answer: C
Explanation
According to the Nutanix Support & Insights web search result1, erasure coding is a data savings technique
that utilizes stripes and parity calculation in a Nutanix cluster. Erasure coding increases the usable capacity on
a cluster by reducing the replication factor of data blocks. Instead of replicating data, erasure coding uses
parity information to rebuild data in the event of a disk or node failure. Erasure coding can save up to 50% of
storage space compared to replication factor 2, and up to 75% compared to replication factor 32.
Question #:122
An administrator notices that most of the VMs in the cluster are on one host. Users report that an application
seems to respond slowly. The application server VM has significantly more memory assigned to it than other
VMs.
Answer: A
Explanation
According to the Troubleshoot high memory issues on Azure virtual machines web search result2, one of the
common factors in a low memory situation is over-provisioning memory for a VM. Over-provisioning
memory can cause memory pressure, which leads to swapping and degraded performance. Therefore, to fix
this issue, the administrator should reduce the amount of memory assigned to the VM, based on the average
hardware requirements for that operating system and application load.
Question #:123
An administrator logs into the Nutanix Support Portal and notices there is a new version of the LCM
Framework available. In an effort ensure LCM is providing the latest features, the administrator would like to
upgrade LCM.
B. Upload the latest LCM Framework as an image in the image Configuration in Prism
C. Upload the latest LCM Framework bundle via Upgrade Software in Prism
D. Upgrade AOS
Answer: A
Explanation
LCM (Life Cycle Manager) is a feature that allows Nutanix administrators to perform one-click firmware and
software upgrades for Nutanix clusters and components. LCM fetches inventory and update information from
a pre-configured URL that contains the latest versions of firmware and software packages. However,
upgrading Nutanix AOS does not automatically update the fetch URL. To update the fetch URL, the
administrator needs to update the LCM framework. The LCM framework is the core component of LCM that
provides the logic and functionality for inventory, download, and upgrade operations1.
To upgrade the LCM framework, the administrator needs to perform an LCM inventory. An LCM inventory is
a process that scans the cluster and its components for their current firmware and software versions and
compares them with the available versions from the fetch URL. If there is a newer version of the LCM
framework available, it will be shown as an update option under Cluster Software Component in the Available
Updates page. The administrator can then select and apply the LCM framework update to upgrade it to the
latest version2.
The administrator can perform an LCM inventory using Prism Element or Prism Central. The steps are as
follows3:
In Prism Element, go to the Network Configuration page and click Life Cycle Management.
In Prism Central, go to the Services page and click Life Cycle Management.
Click Inventory in the toolbar and select Perform Inventory from the drop-down menu.
Wait for the inventory process to complete and check for any available updates.
Question #:124
After configuring Active Directory as the desired authentication service, an administrator is not able to login
B. Role Mapping
D. Cluster Lockdown
Answer: B
Explanation
According to the Nutanix Community1, users can authenticate using their Active Directory credentials when
Active Directory support is enabled for Prism Central. To enable Active Directory support, you need to
configure Role Mapping12, which defines how Active Directory groups map to Prism Central roles.
https://next.nutanix.com/ncm-intelligent-operations-formerly-prism-pro-ultimate-26/configuring-authentication-38051
Question #:125
Which inefficient VM Profile can be used to identify a VM that consumes too many resources and causes
other VMs to starve?
A. Over-provisioned VM
B. Inactive VM
C. Bully VM
D. Constrained VM
Answer: C
Explanation
A bully VM is a VM that consumes too many resources and causes other VMs to starve. A bully VM can
affect the performance and availability of other VMs on the same host or cluster by hogging CPU, memory,
disk, or network resources. A bully VM can be identified by using the VM Profile feature in Prism Central2.
The VM Profile feature analyzes the resource utilization of each VM and assigns it a profile based on its
efficiency and impact on other VMs. The profiles are as follows3:
Over-provisioned: The VM has more resources than it needs and has low resource utilization.
Constrained: The VM has less resources than it needs and has high resource utilization.
Bully: The VM has high resource utilization and causes contention for other VMs.
To identify a bully VM, the administrator can use Prism Central to view the VM Profile dashboard and filter
by profile type. The dashboard shows the number of VMs in each profile type, as well as their resource
consumption and efficiency score. The administrator can also drill down into each VM to see its detailed
metrics and recommendations for optimization.
Question #:126
Based on the VM performance metric, what is the most likely cause of this behavior?
Answer: C
Explanation
one of the key metrics to consider for VM performance is IOPS (Input/Output Operations Per Second), which
is a measure of the number of input/output requests a device processes per second3. Another metric
is throughput, which is a measure of how much data a device transfers per second3.
Question #:127
An administrator needs to bring down a host in a Nutanix Cluster for maintenance reasons. The administrator
puts the host in maintenance mode.
Answer: A
Explanation
According to the How to use the cvm_shutdown script web search result3, the cvm_shutdown script signals
HA when shutting down the CVM (Controller VM) to forward the storage traffic to another healthy CVM.
Instead of using sudo shutdown or sudo reboot commands, this script should be used to minimize I/O hits in
user VMs running on the present hypervisor host. The cvm_shutdown -P now command will initiate the
shutdown process on the CVM immediately. Therefore, if the administrator needs to perform an orderly
shutdown of the CVM, they should execute this command from the CVM.
Question #:128
Which capability refers to the storage of VM data on the node where the VM is running and ensure that the
read I/O does not have to traverse the network?
A. Intelligent Locally
B. Data Locality
C. Intelligent Tiering
D. Data Tiering
Answer: B
Explanation
Data locality is the capability of storing VM data on the node where the VM is running and ensuring that the
read I/O does not have to traverse the network. Data locality is a unique feature of Nutanix that provides high
performance and low latency for VMs by minimizing network traffic and crosstalk. Data locality works by
writing one copy of the data local to the VM and the other copy (or copies) on other nodes. When a VM
migrates to another node, Nutanix also moves its data to the new node and serves all I/O requests locally. Data
locality also adapts to changing workloads and access patterns by dynamically moving data to where it is
needed most1.
Question #:129
The Update Source for LCM has been configured as shown in the exhibit. Inventory is failing consistently.
Answer: B
Explanation
Answer: B. Port 80 is blocked by a firewall.
According to the image description, the update source for LCM is configured to use the Nutanix Portal URL,
which is a web address that requires internet access. The LCM inventory operation needs to download the
latest manifest file and module files from the Nutanix Portal URL using port 801. If port 80 is blocked by a
firewall, the LCM inventory will fail with an error message such as “Failed to get size of file at 5” or “The
requested URL returned error: 403 Forbidden” as shown in the web search results23. To resolve this issue, the
firewall rules need to be updated to allow port 80 traffic from the CVMs to the Nutanix Portal URL1.
References: 1: LCM Requirements - Nutanix Support & Insights 2: LCM Operation failed. Reason: Inventory
setup failed. - Mastering Nutanix 3: LCM: Perform Inventory Fails with error: Pre-check test_cluster_status
failed - Nutanix Support & Insights
Question #:130
An administrator is concerned about the amount of data that a VM reading and writing to the storage fabric.
Answer: D
Explanation
The correct answer is D. VM Storage Controller Bandwidth.
VM Storage Controller Bandwidth is a metric that measures the amount of data that a VM is reading and
writing to the storage fabric. The storage fabric is the network of storage controllers (CVMs) that provide
distributed and fault-tolerant storage services to the VMs on the Nutanix cluster. The VM Storage Controller
Bandwidth metric shows the read and write bandwidth in megabytes per second (MBps) for each VM. The
higher the bandwidth, the more data the VM is transferring to and from the storage fabric1.
The administrator can use Prism Central to view the VM Storage Controller Bandwidth metric for each VM in
a chart or a widget. The administrator can also use Prism Central to view other metrics related to the VM’s
storage performance, such as VM Storage Controller IOPS, VM Storage Controller Latency, and VM Disk
Usage2.
Question #:131
Which three upgrades should an administrator be able to perform using Lifecycle Management? (Choose
Three)
A. AOS
B. BMC
C. BIOS
D. Hypervisor
E. HBA Firmware
Answer: B C E
Question #:132
B. Container creation
Answer: C
Explanation
According to the web search results, Prism Central is a multi-cluster manager that provides a single,
centralized management interface for Nutanix environments12. One of the features of Prism Central is
multi-cluster Single Sign On (SSO), which allows users to log in once and access multiple clusters without
re-entering credentials3.
Question #:133
An administrator is trying to implement the solution that is shown in the exhibit, but has been unsuccessful.
A. A remote Witness VM
C. Network latency
D. Unsupported hypervisor
Answer: C
Explanation
The correct answer is C. Network latency.
The diagram shows a solution that uses synchronous replication between two remote protection domains,
cluster site A and cluster site B. Synchronous replication is a feature that allows near-zero RPO (recovery
point objective) by replicating data to the remote site before acknowledging writes to the local site. However,
synchronous replication has some requirements and limitations that must be met for it to work properly. One
of these requirements is that the network latency between the two sites must be less than or equal to 5 ms1. If
the network latency is higher than 5 ms, the synchronous replication will fail and the protection policy will be
suspended2.
Therefore, based on the diagram, the most likely cause of the issue is that the network latency between cluster
site A and cluster site B is higher than 5 ms, which prevents the synchronous replication from working. To
verify this, the administrator can use the “ncli cluster ping” command to measure the network latency between
the two sites3. If the network latency is indeed higher than 5 ms, the administrator can either improve the
network performance or switch to a different replication mode, such as near-synchronous or asynchronous.
Question #:134
The customer is seeing high memory utilization on a mission critical VM. Users report that the application is
unavailable. The guest OS does not support hot add components.
*Open acli
*Choose Update
Answer: B
Explanation
The best way to fix this issue is to increase the amount of memory assigned to the VM from the Prism web
console. This option allows the administrator to modify the VM configuration without accessing the CVM or
shutting down the VM. The Prism web console provides a simple and intuitive interface for managing Nutanix
clusters and VMs1. To change the memory allocation for a VM, the administrator can follow these steps2:
Go to the VM dashboard
Choose Update
Click Save
Question #:135
An administrator needs to deploy an application with a large amount of data connected via Nutanix volumes.
Which two actions should the administrator take when designing the Volume Group? (Choose two.)
Answer: A B
Explanation
According to the Nutanix Volumes - Recommendations And Best Practices web search result3, two actions
that the administrator should take when designing the Volume Group are:
Distribute workload across multiple virtual disks: Use multiple disks rather than a single large disk for
an application. Consider using a minimum of one disk per Nutanix node to distribute the workload
across all nodes in a cluster. Multiple disks per Nutanix node may also improve an application’s
performance. For performance-intensive environments, we recommend using between four and eight
disks per CVM for a given workload.
Enable RSS (Receive Side Scaling): Receive-side scaling (RSS) allows the system to use multiple CPUs
for network activity. With RSS enabled, multiple CPU cores process network traffic, preventing a single
CPU core from becoming a bottleneck. Enabling RSS within hosts can be beneficial for heavy iSCSI
workloads. For VMs running in ESXi environments, RSS requires VMXNET3 VNICs. For Hyper-V
environments, enable VMQ to take full advantage of Virtual RSS.
Question #:136
Which command should an administrator run from the CLI to view the uplink state of all AHV nodes in the
cluster?
A. allssh show_uplinks
B. manage_ovs show_uplinks
Answer: C
Explanation
According to section 4 of the exam blueprint guide1, one of the topics covered is AHV networking
components and configuration settings. One of these components is Open vSwitch (OVS), which is a software
switch that provides network connectivity between VMs and physical networks. OVS has two types of ports:
Uplink ports: These are physical ports that connect to external networks or switches.
Internal ports: These are virtual ports that connect to VMs or other internal networks.
To view the uplink state of all AHV nodes in the cluster, an administrator can use the manage_ovs command
with the show_uplinks option. This command displays information such as port name, link state, speed, duplex
mode, MTU size, bond mode, and bond status. However, this command only works on a single node. To run
the command on all nodes in the cluster, an administrator can use the allssh command, which executes a
command on all CVMs in parallel. Therefore, the correct command is:
Question #:137
An administrator needs to increase bandwidth available to the AHV host and to the CVM.
A.
D. Use manage-ovs commands to create br1 and add any remaining uplinks
Answer: B
Explanation
The default network configuration for AHV hosts and CVMs is a bond named br0-up with two or more
uplinks in active-backup mode. This means that only one uplink is active at a time, while the others are in
standby mode. This provides high availability, but not load balancing or increased bandwidth. To increase the
bandwidth available to the AHV host and the CVM, the administrator can change the bond mode to
Active-Active, which allows all uplinks to be used simultaneously. This can be done using the manage-ovs
commands on each AHV host. The steps are as follows1:
Enter maintenance mode on the CVM by running allssh 'cluster status | grep -i cvm | grep -i down'.
Question #:138
An administrator is tasked with configuring network on an AHV cluster and wants to maximize throughput for
the host with many small VMs while minimizing network switch configuration.
A. Active-active
C. Active-Backup
D. No-Uplink Bond
Answer: A
Explanation
According to the Nutanix AHV Networking Guide, active-active bond mode provides load balancing and fault
tolerance for network traffic by distributing packets across multiple interfaces using a hashing algorithm based
on source and destination MAC addresses, IP addresses, and TCP/UDP ports. This mode does not require any
special configuration on the network switch and can improve throughput for hosts with many small VMs.
Question #:139
A. Reboot the VM
Answer: C
Explanation
A constrained VM is one that does not have enough resources for the demand and can lead to performance
bottlenecks. A VM is considered constrained when it exhibits one or more of the following baseline values,
based on the past 21 days: CPU usage > 90% (moderate), 95% (severe) CPU ready time > 5%, 10% Memory
usage > 90%, 95% Memory swap rate > 0 Kbps1. To provide adequate host resources, resize (increase) the
constrained VMs1.
Question #:140
What is the default network bond setting for an AHV host configuration?
A. active-backup
B. active-active
C. balance-slb
D. balance-tcp
Answer: A
Explanation
https://next.nutanix.com/blog-40/network-load-balancing-with-acropolis-hypervisor-6463
Question #:141
While installing Windows 2019 on a new VM on an AHV cluster, an administrator notices there aren’t any
drives listed for the install.
A. VirtIO drivers have not yet been installed and the disks are IDE disks.
B. VirtIO drivers have not yet been installed and the disks are SCSI disks.
Answer: B
Explanation
VirtIO drivers are device drivers that are specifically designed for virtualized environments. They allow the
guest operating system to communicate directly with the underlying hardware, bypassing the emulation layer.
This improves the performance and efficiency of the virtual machines. VirtIO drivers are supported by various
hypervisors, including Nutanix AHV1.
Nutanix AHV uses SCSI disks for VMs by default. However, Windows does not have native support for SCSI
disks and requires VirtIO drivers to recognize them. Therefore, if an administrator is installing Windows 2019
on a new VM on an AHV cluster, they need to install the VirtIO drivers before selecting the destination disk
for the installation. Otherwise, they will not see any drives listed for the install2.
To install the VirtIO drivers during Windows installation, the administrator can use one of the following
methods3:
Use a VirtIO ISO image that contains the driver files. The administrator can download the VirtIO ISO
image from the Nutanix support portal and upload it to the AHV image service. Then, they can attach
the VirtIO ISO image to the VM as a CD-ROM device and load the driver from it during Windows
installation.
Use a Nutanix Guest Tools (NGT) ISO image that contains the driver files and other tools. The
administrator can download the NGT ISO image from Prism Element or Prism Central and attach it to
the VM as a CD-ROM device. Then, they can load the driver from it during Windows installation.
Use a floppy disk image that contains only the driver files. The administrator can create a floppy disk
image using tools such as WinImage or WinRAR and upload it to the AHV image service. Then, they
can attach the floppy disk image to the VM as a floppy device and load the driver from it during
Windows installation.
Question #:142
An administrator has an AHV cluster that is comprised of 4 nodes with the following configuration in each
node:
Memory: 256GB
Answer: C
Explanation
The best way to configure the VM for optimal performance is to set it up with 2 vNUMA nodes. This will
ensure that the VM is configured to take advantage of the CPU and memory resources available in each node,
and it will also ensure that all of the cores are utilized for the best performance. Additionally, the administrator
should ensure that the VM has an affinity policy set up so that the vCPUs are evenly distributed across the four
nodes. Finally, Flash Mode should be enabled in order to take advantage of the high-performance SSDs that
are available in the cluster
Question #:143
Answer: B
Explanation
When a node with Erasure Coding fails, the cluster will automatically rebuild the missing data using
replication factor (RF) 2 or 3, depending on the cluster configuration. This means that the data that was
previously stored using Erasure Coding will now be stored using full copies, which may increase the amount
of data stored in the SSD tier1.
Question #:144
After logging into Prism Element, an administrator presses the letter A on the Keyboard.
Answer: D
Explanation
API Explorer page will launch when an administrator presses the letter A on the keyboard after logging into
Prism Element. This is one of the keyboard shortcuts that Prism Element provides for accessibility and ease of
use1. API Explorer is a tool that allows users to explore and test Nutanix REST APIs within Prism Element1.
https://www.nutanixbible.com/3b-book-of-prism-navigation.html
Question #:145
Answer: D
Question #:146
An administrator adds a node with older generation processors to an existing AHV cluster with newer
generation processors. What is the effect on live migration?
A. Live migration continues to function as expected and VMs can move to any AHV host.
B. Live migration is prevented until the administrator enables the legacy migration option.
C. Live migration is prevented until the administrator manually changes the newer processor level.
Answer: D
Explanation
According to the Migration to a different processor web search result2, live migration of VMs depends on the
source and destination hosts having the same CPU functions (CPU flags). Live migration requires the source
and destination hosts to have CPUs from the same manufacturer, and only CPU functions which both hosts
support are provided (same CPU generation, or by using VMware Enhanced vMotion Compatibility (EVC)).
If the administrator adds a node with older generation processors to an existing AHV cluster with newer
generation processors, then live migration of VMs is prevented between newer and older processors, unless
EVC is enabled.
Question #:147
C. Oracle RAC
D. Exchange DAG
Answer: B
Explanation
The only option that requires iSCSI initiator configuration in the guest OS to use Volumes is Microsoft
Windows Failover Cluster. Volumes is an enterprise-class, software-defined block storage solution that
exposes storage resources directly to virtualized guest operating systems or physical hosts using the iSCSI
protocol7. To use Volumes, customers need to configure iSCSI initiators on their hosts or guest OSes.
However, some applications or services can use native storage adapters instead of iSCSI initiators when
running on AHV VMs. These include:
SQL Server Always On Availability Group: This is a high availability and disaster recovery solution for
SQL Server databases that uses Windows Server Failover Clustering (WSFC) and Availability Groups
(AGs) as its core components. When running on AHV VMs, SQL Server Always On Availability Group
can use native storage adapters instead of iSCSI initiators.
Oracle RAC: This is a clustered database system that provides high availability and scalability for
Oracle databases. When running on AHV VMs, Oracle RAC can use native storage adapters instead of
iSCSI initiators.
Exchange DAG: This is a group of up to 16 mailbox servers that hosts a set of databases and provides
automatic database-level recovery from failures that affect individual servers or databases. When
running on AHV VMs, Exchange DAG can use native storage adapters instead of iSCSI initiators.
Question #:148
Several VMs have been created, and the administrator notices that the can successfully communicate with
other VMs on that VLAN.
Provided they are on the host, but cannot communicate with VMs that reside on different hosts in the cluster.
B. VLANS12 is a reserved VLAN ID, and not usable for guest VMs.
Answer: C
Explanation
The correct answer is C. The VLAN was not created on the upstream switches.
A VLAN (virtual local area network) is a logical segmentation of a physical network that allows devices on
the same VLAN to communicate with each other, regardless of their physical location. A VLAN also isolates
the devices on different VLANs from each other, unless there is a router or a layer 3 switch that can route
traffic between VLANs. To create a VLAN, the administrator needs to configure the network devices that are
involved in the VLAN, such as switches, routers, and hosts. The administrator also needs to assign a unique
VLAN ID to each VLAN, which is a number between 1 and 4094 that identifies the VLAN1.
In Nutanix AHV, the administrator can create a Nutanix managed network with a specific VLAN ID for guest
VMs. This network can be assigned to VM NICs using Prism Element or Prism Central. However, creating a
Nutanix managed network does not automatically create the VLAN on the upstream switches that connect the
AHV hosts. The administrator needs to manually configure the upstream switches to allow the VLAN traffic
on the ports that connect to the AHV hosts. The administrator also needs to ensure that the upstream switches
are interconnected physically or virtually and can forward traffic between different VLANs if needed2.
Therefore, if an administrator has created a Nutanix managed network with a VLAN ID of 512 and notices
that the VMs on that network can only communicate with other VMs on the same host, but not with VMs on
different hosts in the cluster, the most likely cause of this issue is that the VLAN was not created on the
upstream switches. This means that the switches are dropping or blocking the traffic with VLAN ID 512 and
preventing it from reaching other hosts or VMs. To resolve this issue, the administrator should create the
VLAN on the upstream switches and allow it on the ports that connect to the AHV hosts3.
Question #:149
An administrator has set up a local web server accessible to the Nutanix clusters.
Which two steps are required to set up LCM for an environment without Internet access? (Choose two.)
A.
A. Download the lcai_disconnecced_version. tar.gz LCM bundle from the support portal.
B. Edit LCM Advanced Settings in Prism Element and enter the address of the web server.
C. Edit LCM Advanced Settings m Prism Central and enter the address of the web server.
D. Download the lcm_dark_site_version. tar . gz LCM bundle from the support portal.
Answer: B D
Question #:150
Which component ensures uniform distribution of data throughout the cluster to eliminate hot spots and speed
up rebuilds?
A. Cassandra
C. High Availability
Answer: B
Explanation
According to the web search results, Distributed Storage Fabric (DSF) is the scale-out storage technology that
makes HCI and cloud possible45. DSF pools the storage devices that are directly attached to a cluster of
servers and presents them to applications across a variety of storage protocols4. DSF also manages and
protects data by a fine-grained, distributed metadata system that ensures uniform distribution of data
throughout the cluster to eliminate hot spots and speed up rebuilds
Question #:151
An administrator is preparing to deploy a new application on an AHV cluster, Security requirements dictate
that all virtual servers supporting this application must be prevented from communicating with unauthorized
hosts.
A. Create a new VLAN, create a subnet on the cluster with the VLAN tag, deploy servers with vNlCs in the
new subnet.
B. Create a new Application Security Policy restricting communication to the authorized hosts and apply it
to the servers in enforce mode.
C. Create a new solation Environment policy apply it to the new servers and all authorized hosts.
D. Create new' subnet and assign to an existing VPC assign the IP prefix and gateway for the subnet,
Answer: B
Explanation
An Application Security Policy is a security feature in Nutanix AHV that can be used to restrict network
communication between virtual servers based on a variety of criteria, such as IP address, port, and protocol.
By creating a policy that restricts communication to authorized hosts and applying it to the servers in enforce
mode, the administrator can prevent unauthorized communication between virtual servers.
https://www.nutanix.com/products/ahv
Question #:152
A customer has a newly-deployed AHV cluster with nodes that have 2.x 10 GBE and 2.x interface. The
customer wants to use all available network interfaces to provide connectivity to the VMs.
Which option should the administrator use to achieve this while remaining consistent with Nutanix
recommendations?
C. Create a second bond on br0 on each host and assign the 1 GbE interfaces to it.
D. Create a second bridge on each host and assign the 1GbE interfaces to it.
Answer: D
Explanation
According to the web search results, one of the best practices for Nutanix AHV networking is to create a
second bridge on each host and assign the 1GbE interfaces to it3. This way, the customer can use both 10GbE
and 1GbE interfaces for VM traffic, and also benefit from network isolation and redundancy.
Question #:153
A. Virtual Machines
B. Volume Groups
C. VM Templates
D. Storage Containers
Answer: A
Explanation
According to the Nutanix Prism Central Guide, Prism Central allows you to apply storage policies on a per
VM basis using Category, so that the VM uses the storage configuration defined in the storage policy. Using a
storage policy, you can manage parameters of VMs, such as encryption, type of or lack of data compression,
and IOPS or Throughput throttling values to be applied to the entities.
Question #:154
An administrator manages an AHV cluster that is dedicated to a dev/test environment. The administrator
receiving complaints from users that they are unable to create new VMs on the cluster.
After the reviewing the cluster, the administrator finds that the memory resources are almost fully utilized,
with many VMs over-provisioned on memory.
What option is the most efficient resolution to enable additional VMs to be created?
Answer: A
Explanation
Enable Memory Overcommit on the over-provisioned VMs is the most efficient resolution to enable additional
VMs to be created. Memory overcommit allows VMs to use more memory than physically available on a host
by compressing and swapping memory pages to storage1. This can improve memory utilization and increase
VM density on a cluster1. However, memory overcommit is not supported when HA is configured to use
reserved hosts, so you may need to disable HA reservation on the cluster before enabling memory overcommit
1.
Question #:155
Which three disk images must be downloaded from the portal for the Prism Central VM? (Choose three.)
A. var
B. tmp
C. boot
D. home
E.
E. data
Answer: C D E
Explanation
https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-Prism-v5_10:mul-pc-install-scratch-c
According to the Nutanix Support & Insights web search result4, Prism Central can be installed manually on
an AHV cluster by using three disk images: boot, home, and data. These disk images must be downloaded
from the portal for the Prism Central VM and uploaded to an image service on the AHV cluster. The boot
image contains the operating system and kernel for Prism Central. The home image contains the configuration
files and logs for Prism Central. The data image contains the database and application files for Prism Central.
Question #:156
The administrator wants a container to be displayed and limited to 1TB in the hypervisor.
A. Advertised Capacity
B. Reserved Capacity
C. Advertised Quota
D. Reserved Quota
Answer: A
Explanation
According to the Nutanix Support & Insights web search result3, advertised capacity is an advanced container
setting that allows the administrator to reserve an advertised storage space for a storage container. An
advertised capacity setting gives the hypervisor a maximum storage size that the storage container can use.
This setting can be any arbitrary value greater than or equal to the resiliency required. The hypervisor ensures
that the storage container storage doesn’t go beyond the advertised capacity. If the administrator wants a
container to be displayed and limited to 1TB in the hypervisor, they should set the advertised capacity to 1TB.
Question #:157
An administrator is configuring cross-hypervisor DR from an ESXi cluster to a new AHV cluster. When the
administrator migrates a protection domain to the AHV cluster, the VMs fail to boot.
Answer: C
Explanation
According to the web search results, one of the requirements for cross-hypervisor disaster recovery (CHDR) is
to install and configure Nutanix Guest Tools (NGT) on all the VMs2. NGT configures the VM with all the
required drivers for VM portability. Without NGT, the VMs may fail to boot after being migrated to a
different hypervisor type.
Question #:158
Which two actions should the administrator perform to determine if the current cluster can accommodate the
new VMs? (Choose two)
Answer: B C
Explanation
According to the web search results, the two actions that the administrator should perform to determine if the
current cluster can accommodate the new VMs are:
Utilize Optimize Resources for VM efficiency: Optimize Resources is a feature in Prism Central that
helps the administrator improve the efficiency and performance of their VMs by identifying and
resolving issues such as overprovisioning, inactivity, constraints, or bullying3. By using Optimize
Resources, the administrator can reclaim unused resources and optimize the resource allocation for their
VMs3.
Determine utilization with Cluster Runway: Cluster Runway is a feature in Prism Central that helps the
administrator estimate how long their cluster can continue to run normally based on the current
consumption rate of CPU, memory, and storage resources4. By using Cluster Runway, the administrator
can see how adding more VMs will affect the resource utilization and capacity of their cluster4.
Question #:159
A user is complaining about slowness of a mission-critical MSSQL Server. The administrator logs into Prism
Element to investigate the VM performance and observes what is shown in the diagram.
Answer: B
Explanation
Prism Element is a graphical user interface that allows you to manage Nutanix clusters1. You can use Prism
Element charts to understand Nutanix cluster workloads and troubleshoot performance related issues2.
memory optimized virtual machine sizes offer the best performance for SQL Server workloads on Azure VMs.
Adding more RAM to the user VM can help reduce paging and improve query execution times.
SQL Server performance can be affected by disk latency and throughput. By creating separate virtual disks for
data and logs, you can spread activity across multiple spindles and reduce disk contention.
https://next.nutanix.com/how-it-works-22/differences-between-prism-element-prism-central-and-prism-pro-37137
Question #:160
When installing Nutanix Guest Tools (NGT) on an ESXi-hosted VM, which port should be enabled on the VM
to allow communication with the NGT-Controller VM service?
A. 2000
B. 2074
C. 8080
D. 9943
Answer: D
Explanation
NGT is a software package that enables advanced VM management features provided by Nutanix, such as
file-level restore, VM mobility, and application-consistent snapshots12. To use NGT, you need to enable the
NGT feature for a VM in the Prism Element web console, mount the NGT installer (ISO disk file) in the VM,
and install NGT in the VM1. However, before installing NGT, you need to ensure that the VM can
communicate with the NGT-Controller VM service, which runs on the Controller VM (CVM) of each Nutanix
node3. The NGT-Controller VM service listens on port 9943 for incoming requests from the guest VMs3.
Therefore, you need to enable port 9943 on the ESXi-hosted VM to allow communication with the
NGT-Controller VM service.
Question #:161
An administrator is adding a new node to a cluster. The node has been imaged to the same versions of AHV
and AOS that the cluster running, configured with appropriate IP addresses, and br0-up has been configured
the same the existing uplink bonds
When attempting to add the node to the cluster with the Expand Cluster function in Prism , the cluster is
unable to find the new node.
Based on the above output from the new node, what is most likely the cause of this issue?
A. The ports on the upstream switch are not configured for LACP.
Answer: B
Explanation
The correct answer is B. The existing and the expansion node are on different VLANs.
The output shows that the new node has a br0-up bond with four interfaces: eth0, eth1, eth2, and eth3. The
bond is configured with LACP active and LACP fallback set to false. This means that the bond will only work
if the upstream switch supports LACP and is configured to form an LACP group with the four interfaces.
However, the output also shows that the bond has no IP address assigned to it, which indicates that the bond is
not operational. One possible reason for this is that the existing and the expansion node are on different
VLANs, and the upstream switch is not configured to allow the VLAN traffic on the LACP group. This would
prevent the new node from communicating with the cluster and being discovered by the Expand Cluster
function in Prism.
To verify this, the administrator can check the VLAN configuration on the upstream switch and compare it
with the existing nodes. Alternatively, the administrator can use the “manage_ovs show_uplinks” command on
an existing node and compare the output with the new node. If there is a VLAN mismatch, the administrator
can either change the VLAN configuration on the switch or on the new node to match the existing nodes.
Question #:162
An administrator needs to provide access for a user to view real-time performance metric for all VMs on all
clusters across the datacenter.
Which method accomplishes this with the least effort and ongoing maintenance?
A. Configure IDP authentication and assign the user to the Cluster Admin role in Prism Central.
B. Configure AD authentication and assign the user to the Viewer role in Prism Element.
C. Configure AD authentication create a custom role, assign the user to the role, and apply the role to all
clusters and VMs
Answer: C
Explanation
The best method to provide access for a user to view real-time performance metrics for all VMs on all clusters
across the datacenter is to configure AD authentication create a custom role, assign the user to the role, and
apply the role to all clusters and VMs. This method accomplishes this with the least effort and ongoing
maintenance because:
AD authentication allows Nutanix Prism Central to integrate with an existing Active Directory (AD)
domain and use AD users and groups for authentication and authorization5. This simplifies user
management and avoids creating local users on Prism Central.
Creating a custom role allows Nutanix Prism Central to define granular permissions for different actions
and entities based on specific needs6. This ensures that users only have access to what they need and
nothing more.
Assigning the user to the custom role allows Nutanix Prism Central to grant access rights for that user
based on the role definition7. This avoids assigning permissions individually for each user.
Applying the role to all clusters and VMs allows Nutanix Prism Central to propagate the access rights
for that role across all entities in scope8. This ensures that users can view real-time performance metrics
for all VMs on all clusters without having to configure each entity separately.
References: 1: Health Dashboard - Prism Element Guide 2: Understanding Native VLANs - Cisco 3: VMs
may lose network connectivity if connected to virtual network with … - Nutanix Support & Insights 4: VLAN
Configuration - AHV Networking Guide 5: Active Directory Authentication - Prism Central Guide 6: Create
Custom Roles - Prism Central Guide 7: Assign Roles - Prism Central Guide 8: Apply Roles - Prism Central
Guide
Question #:163
System Non-Root Partition Usage shows a warning or critical alert The administrator needs to change the
frequency of checks and alerts to respond more quickly.
Where in Prism Element should the administrator change the frequency of checks and alerts?
B.
Answer: C
Explanation
According to the Nutanix Support & Insights web search result1, the administrator can change the frequency
of checks and alerts for the System Non-Root Partition Usage in Prism Element by going to the Health
Dashboard > Manage Checks > Schedule. The administrator can select the check name, such as
disk_usage_check, and click on Edit Schedule. The administrator can then choose the desired frequency, such
as every 15 minutes, every hour, or every day, and click on Save. This will change how often the check runs
and alerts are generated.
Question #:164
What is the minimum time a newly created Deduplication storage policy takes to apply to the VMs in the
container?
A. 5 Minutes
B. 10 minutes
C. 30 minutes
D. 60 minutes
Answer: D
Explanation
Deduplication is a feature that reduces space usage by consolidating duplicate data blocks on Nutanix storage.
Deduplication can be enabled on a storage container for either cache or capacity, or both. Cache deduplication
is performed on the data in memory and SSD, while capacity deduplication is performed on the data in
HDD. Capacity deduplication is not enabled by default and is available if you have purchased a Pro or higher
license2. When you enable capacity deduplication on a storage container, it takes effect after 60 minutes3.
This delay allows the system to identify the best candidates for deduplication and avoid unnecessary overhead.
Question #:165
Microsegmentation was recently enabled in a Nutanix environment. The administrator wants to leverage Prism
Central to create a policy that will block all traffic regardless of direction, between two groups of VMs
identified by their category.
B. A Quarantine Policy
C. A Whitelist-Based Policy
Answer: D
Explanation
According to the web search results, the policy that should be used to meet this requirement is an Isolation
Environment Policy. An Isolation Environment Policy is a type of security policy that can be created in Prism
Central using Flow Network Security, which is a feature that provides microsegmentation and network
security for Nutanix environments1. An Isolation Environment Policy allows the administrator to isolate a
group of VMs from another group of VMs based on their categories, and block all traffic between them
regardless of direction2. This policy can be useful for creating isolated environments for testing, development,
or compliance purposes2.
Question #:166
An administrator has been notified by a user that a Microsoft SQL Server instance is not performing well.
When reviewing the utilization metrics, the following concerns are noted:
Memory consumption has been spiking to 100% for the last five days
When logging into Prism Central, how could the administrator quickly verify if this VM has performance
bottlenecks?
B. Filter VM by Efficiency.
Answer: B
Explanation
This will allow the administrator to quickly identify VMs that are overprovisioned or underutilized based on
their performance metrics.
https://www.nutanix.com/support-services/training-certification/certifications/certification-details-nutanix-certified-pro
Question #:167
Answer: C
Explanation
https://portal.nutanix.com/page/documents/details/?targetId=Prism-Central-Guide-Prism-v510:mul-alert-policies-user-d
Question #:168
An administrator wants to receive an environment summary report when a host failure occurs.
D. Create a playbook
Answer: C
Explanation
An alert policy can be configured to send out an environment summary report when a host failure occurs. This
can be done by creating a policy that triggers an alert whenever a host fails and then configuring the policy to
send out a report that provides a summary of the environment in which the failure occurred. This will allow
the administrator to quickly get a view of the environment after a failure occurs, allowing them to take the
necessary steps to address the issue.
https://www.nutanix.com/support-services/training-certification/certifications/certification-details-nutanix-certified-pro
Question #:169
In which two scenarios is an automated live migration likely to occur? (Choose two)
B. AOS upgrade
C. Network upgrade
D. Hypervisor upgrade
Answer: A B
Explanation
Automated live migration is a feature of Nutanix that allows the cluster to automatically move VMs from one
host to another without any downtime, in order to optimize the performance and availability of the
cluster. According to the Nutanix documentation1, automated live migration can occur in the following
scenarios:
Cluster resource hotspot: When a host or a group of hosts experience high resource utilization, such as
CPU, memory, or network, the cluster can automatically migrate some VMs to other hosts with lower
utilization, in order to balance the load and avoid performance degradation.
AOS upgrade: When upgrading the Nutanix software (AOS), the cluster can automatically migrate the
VMs from the host that is being upgraded to another host in the same availability zone, in order to
maintain the VM availability and minimize the impact of the upgrade process.
AHV host maintenance mode: When putting an AHV host into maintenance mode, the cluster can
automatically migrate all the VMs from that host to another host in the same availability zone, in order
to prepare the host for maintenance operations such as hardware replacement or firmware update.
Question #:170
A customer has a 24-node cluster with all containers configured with RF3. Two different nodes have incurred
a simultaneous HDD failure.
A. The cluster runs in a degraded state until the failed drives are replaced and the data has been restored to
three replicas.
B. Sixty minutes after the failures a rebuild of the lost data can remaining HDDs begins to restore to three
replicas.
C. The VMs with data on those drives crash, and an HA event occurs, restarting them on a remaining
healthy node.
D. The Nutanix cluster recognizes the failures and immediately begins to rebuild lost data to three replicas.
Answer: D
Explanation
This is because Nutanix uses a distributed storage fabric (DSF) that replicates data across multiple nodes and
drives to ensure data resiliency. When a drive fails, the cluster detects the failure and initiates a data rebuild
process to restore the replication factor (RF) of the affected containers. The data rebuild process does not
affect the availability or performance of the VMs, as they can still access their data from other replicas on
other nodes or drives. Therefore, there is no need to wait for 60 minutes, use a shared volume group, or trigger
an HA event.
Question #:171
The administrator recently had a node fail in an AHV Nutanix cluster. All of the VMs restarted on other nodes
in the cluster, but they discovered that the VMs that make up a SQL cluster were running on the failed host.
The administrator has been asked to take measures to prevent a SQL outage in the future.
What affinity option will prevent the SQL VMs from running on the same hos?
Answer: A
Explanation
Answer: A. VM-VM anti-Affinity policy
A VM-VM anti-Affinity policy is a rule that ensures that two or more VMs don’t run on the same AHV host.
It’s useful when an application provides HA and an AHV host can’t be an application’s single point of
failure1. In this case, the SQL cluster VMs should have a VM-VM anti-Affinity policy configured to prevent
them from running on the same host and causing an outage if that host fails. A VM-VM anti-Affinity policy
can be created using the aCLI commands2. The other options are not relevant for this scenario.
References: 1: Affinity Policies - Nutanix Support & Insights 2: Affinity Policies Help | Nutanix Community
We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially
Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on.
We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses listed
below.
Sales: sales@dumpscafe.com
Feedback: feedback@dumpscafe.com
Support: support@dumpscafe.com
Any problems about IT certification or our products, You can write us back and we will get back to you within 24
hours.