Download as pdf or txt
Download as pdf or txt
You are on page 1of 23

(4) An administrator has created several custom alert policies, which are applied to the same

entities. Prism central displays a message that a similar policy exists.

In what order of precedence are overlapping policies evaluated?

First preference: Policy is applied to a specific entity

Second preference: Policy is applied to an entity type in a category

Third preference: Policy is applied to an entity type in a cluster

Fourth preference: Policy is applied to all entities of an entity type

Options:

a) Policy is applied to a specific entity.


b) Policy is applied to an entity type in a category.
c) Policy is applied to an entity type in a cluster.
d) Policy is applied to all entities of an entity type.

(5) Which scenario would benefit most from Erasure Coding being enabled on a container?

a) VDI use cases where a single VM is Cloned 100's of times.


b) Long term storage of data which is written once and read infrequently.
c) High performance databases where all data is relatively hot.
d) WEB and API Servers.

(6) What does Nutanix recommend when setting up the node networking?

a) Combine 1 GbE interfaces and 10 GbE interfaces in the same bond.


b) Include at least two physical interfaces in every bond.
c) Include NIC models from different vendors in the same bond.
d) Combine NIC models from different vendors in the same bond.

(7) An administrator wants to expand the Failure Domain level of a cluster.

What two options are available? (Choose two)

a) Block
b) Node
c) Rack
d) Data Center

(8) On a Nutanix Cluster, what does Network Segmentation refer to?

a) Isolating intra-cluster traffic from guest VM traffic.


b) Isolating management traffic from storage replication traffic.
c) A distributed firewall for securing VM to VM traffic.
d) Physically separating management traffic from guest VM traffic.
(9) Upon logging into Prism Central, an administrator notices high cluster latency.

How can the administrator Analyze data with the least number of steps or actions?

a) Click on the chart in the widget to expand the data elements.


b) Take note of the cluster name and create a new analysis chart.
c) Click the cluster name in the cluster quick access widget.
d) Modify Data Density in the main Prism Central Dashboard.

(11) An administrator needs to limit the amount of storage space that data stored in single container
can consume.

Which action should the administrator take?

a) Thick provision the container.


b) Store VM snapshots in a different container.
c) Enable reservations for rebuild capacity.
d) Set an advertised capacity for the container.

(12) An administrator was reviewing various AOS logs when it was noticed that the time of the logs
was off by several hours.

Which initial step was missed during the post process cluster configuration?

a) Setting the cluster time zone via CVM ACLI.


b) Setting the cluster time zone via PC GUI.
c) Setting the cluster time zone via PE GUI.
d) Setting the cluster time zone via CVM NCLI.

(13) While installing Windows 2019 on a new VM on an AHV cluster, an administrator notices there
aren't any drives listed for the install.

What might the problem be?

a) VirtIO drivers must be installed on AHV for installations of Windows.


b) VirtIO drivers have not yet been installed and the disks are SCSI disks.
c) VirtIO drivers aren't supported on this version of Windows 2019.
d) VirtIO drivers have not yet been installed and the disks are IDE disks.

(14) Which AOS process determines if an I/O from a user VM will be written to OpLog or to an Extent
Store?

a) Stargate
b) Zeus
c) Curator
d) Cassandra
(15) An administrator has been notified by a user that a Microsoft SQL Server instance is not
performing well.

When reviewing the utilization metrics, the following concerns are noted:

 Memory consumption has been above 95% for several months.


 Memory consumption has been spiking to 100% for the last five days.
 CPU Usage is 45%.
 Storage latency is 2ms.

When logging into Prism Central, how could the administrator quickly verify if this VM has
performance bottlenecks?

a) See Capacity Runway.


b) Update Capacity Configurations.
c) Perform Entity Sync.
d) Filter VM by Efficiency.

(16) Refer to the exhibit.

admin@NTNX:~$ manage_ovs show_uplinks

Bridge: br0

Bond: br0-up

bond_mode: balance-tcp

interfaces: eth3 eth2 eth1 eth0

lacp: active

lacp-fallback: false

lacp_speed: fast

admin@NTNX:~$

An administrator is adding a new node to a cluster. The node has been imaged to the same versions
of AHV and AOS that the cluster is running, configured with appropriate IP addresses, and br0-up has
been configured in the same manner as the existing uplink bonds.

When attempting to add the node to the cluster with the Expand Cluster function in Prism, the
cluster is unable to find the new node.

Based on the above output from the new node, what is most likely the cause of this issue?

a) The ports on the upstream switch are not configured for LACP.
b) There is a firewall blocking the discovery traffic from the cluster.
c) LACP configuration must be completed after cluster expansion.
d) The existing cluster and the expansion node are on different VLANs.
(17) What Nutanix feature provides effective caching optimization in VDI environments?

a) Shadow Clone
b) Remote Protection Group
c) Local Protection Group
d) Snap Clones

(18) An administrator is not able to log into Prism Central by using a new Active Directory user
account. After logging in with the local user, the administrator verified that Directory Services and
Role Mapping settings are valid.

What is the most likely cause of this issue?

a) Prism Element authentication is not configured.


b) Change password at next logon attribute is set.
c) Active Directory functional level is wrong.
d) User does not belong to the Administrators group.

(20) What is a requirement to enable Flow Networking?

a) A dedicated virtual switch has been created for Flow Networking.


b) Flow Microsegmentation must be enabled.
c) Prism Central is using three-node scale-out deployment.
d) Microservices infrastructure (CMSP) is enabled.

(21) An administrator is tasked with configured networking on an AHV cluster and needs to optimize
for maximum single VM throughput.

Which bond mode should the administrator select?

a) Active-Backup
b) Active-Active
c) No Uplink Bond
d) Active-Active with Mac Pinning

(22) A user running a Computer Aided Design (CAD) application is complaining about slow response
time within the VM, particularly when moving windows or rendering images.

Which VM metric will guide the administrator toward diagnosing the problem?

a) Hypervisor Memory Usage (%)


b) Storage Controller Latency
c) GPU Usage
d) Swap In Rate

(24) Which Nutanix service controls ncli, the HTML5 UI, and REST API?

a) Prism
b) Cassandra
c) Zookeeper
d) Chronos
(25) What is the recommended approach for a constrained VM?

a) Delete the VM.


b) Decrease the VM resources.
c) Reboot the VM.
d) Increase the VM resources.

(26) An administrator has received reports of users being disconnected from remote desktop
sessions to a specific VM.

Which VM metric is most useful for isolating the cause of the issue?

a) Hypervisor CPU Ready Time (%)


b) Swap-Out Rate
c) Storage Controller Bandwidth.
d) Virtual NIC receive packets dropped.

(27) A newly-hired Nutanix administrator was tasked by the CIO to create a single VM on a test
network. The network administrator stated that a native VLAN was used on the Cisco TOR switches
with the following parameters:

 IP address: 172.16.1.2
 Network Mask: 255.255.252.0
 Default gateway: 172.16.1.1
 VLAN: 1

The same parameters were used to create a network profile on Nutanix but when the VM was
created it had no L3 connectivity.

What should the Nutanix administrator do to fix this issue?

a) Enable IPv6 on the VM.


b) Use DHCP as opposed to static IP.
c) Nutanix removed support for native VLAN.
d) Change VLAN field from vlan.1 to vlan0.

(30) The administrator is creating a Windows 10 VM that will be used for a virtual desktop template.
After creating the VM and booting to the ISO, the administrator is unable to install Windows and
receives the following error.

We couldn't find any drives, to get a storage driver, click load driver.

What steps does the administrator need to take to install the OS?

a) Load the Nutanix VirtIO Serial Bus Driver.


b) Load the VirtIO SCSI pass-through controller.
c) Load the VirtIO Network Ethernet Adapter.
d) Load the Nutanix VirtIO Balloon Driver.
(31) After the initial configuration and upgrade of NCC, the administrator notices these critical alerts:

 IPMI 10.7.133.33 is using default password.


 Host 10.7.133.25 is using default password.
 CVM 10.7.133.31 is using default password.

Which two initial cluster configuration tasks were missed during the deployment process?
(Choose two)

a) CVM password changes.


b) Host password changes.
c) Password policy changes.
d) BIOS password changes.

(32) Which two types of granular RBAC does Nutanix provide for AHV hosts? (Choose two)

a) Cluster based.
b) Category based.
c) Project based.
d) Disk based.

(33) Which two permission assignment tasks can be accomplished via Prism Element (Choose two)

a) Grant an active directory group permission to perform backup operations.


b) Grant a user permission to create and delete snapshots on a specific VM.
c) Grant a user permission to create VMs on a specific storage container.
d) Grant a user permission to view details of all VMs on a specific cluster.

(34) An administrator has created a Nutanix managed network and assigned it a VLAN ID of 512.

Several VMs have been created, and the administrator notices that the VMs can successfully
communicate with other VMs on that VLAN, provided they are on the same host, but cannot
communicate with VMs that reside on different hosts in the cluster.

What is most likely the cause of this issue?

a) VLAN512 is a reserved VLAN ID, and not usable for guest VMs.
b) The VLAN was not created on the upstream switches.
c) There is a firewall rule blocking VLAN512 traffic.
d) The administrator did not create the VLAN on all hosts.

36. Which Inefficient VM Profile can be used to identify a VM that consumes too many resources
and causes other VMs to Starve?

a) Constrained VM

b) Over-provisioned VM

c) Bully VM

d) Inactive VM
37. An administrator needs to increase bandwidth available to the AHV host and to the CVM.

How should the administrator complete this task?

a) In prism, create a vs1 interface and add remaining uplinks.


b) Use manage_ovs commands to update br0 to change the configuration to Active-Active.
c) In Prism, update vs0 to change the configuration to Active-Active.
d) Use manage_ovs commands to create br1 and add any remaining uplinks.

38. An administrator has been tasked with increasing security on a Nutanix cluster by disabling
password authentication when accessing the CVM and AHV hosts and instead moving to key-based
SSH.

What is the easiest way for the administrator to meet these needs?

a) Enable Cluster Lockdown and provide an RSA key.


b) Configure LDAP authentication through a secure server.
c) Restrict access with User Management in Prism.
d) Enable STIGs via command line on SSH to a CVM.

39. An administrator logs into the Nutanix Support Portal and notices there is a new version of the
LCM framework available.

In an effort to ensure LCM is providing the latest features, the administrator would like to upgrade
LCM.

How can the LCM Framework be upgraded?

a) Perform an LCM inventory.


b) Upgrade AOS.
c) Upload the latest LCM framework as an image in the Image Configuration in Prism.
d) Upload the latest LCM framework bundle via Upgrade Software in Prism.

40. An administrator needs to configure Prism to send encrypted messages to a set of recipients.

Which setting must be applied?

a) Use SMTP Port 25.


b) Install SSL certificates on Prism Central.
c) Set SMTP Security Mode to STARTTLS.
d) Configure Prism Central to use Cluster Lockdown.

41. After configuring Active Directory as the desired authentication service, an administrator is not
able to login into Prism Central using a privileged account.

Which configuration must be checked first?

a) Account lock status


b) Local user account
c) Role Mapping
d) Cluster Lockdown
43. During an AHV upgrade, an administrator finds that a critical VM was powered off rather than
migrated to another host.

Which scenario explains this behaviour?

a) No AHV hosts were able to be scheduled.


b) The VM was marked as an agent VM.
c) The VM OS hung during migration.
d) The VM was on the same host as the acropolis leader.

46. When configuring a syslog server in Prism Central, what two pieces of information are required?
(Choose Two)

a) IP address/port
b) Transport protocol
c) Encryption secret
d) HTTPS URL

48. An administrator has been asked to deploy VMs using a specific image. The image has been
configured with settings and applications that will be used by engineering to develop a new product
by the company.

The image is not available on the desired cluster, but it is available in other clusters associated with
Prism Central.

Why isn't the image available?

a) The image placement policy was configured with soft enforcement.


b) The cluster should be removed from all categories.
c) The image bandwidth policy has prevented the image upload.
d) The cluster has not been added to the correct category.

49. An administrator needs to configure a new subnet on an AHV cluster and wants to ensure that
VMs will automatically be assigned an IP address at creation time.

Which type of network does the administrator need to create?

a) Managed Network
b) DHCP Network
c) Dynamic Network
d) Unmanaged Network

50. An administrator is concerned about the amount of data that a VM is reading and writing to the
storage fabric.

Which metric will provide that data?

a) Host Disk IOPS


b) Host Hypervisor IO Bandwidth.
c) VM Storage Controller Bandwidth.
d) VM Storage Controller IOPS.
51. Which component can be associated with a storage policy?

a) Category
b) Catalog
c) VM
d) Subnet

52. A recently configured cluster is leveraging NearSync with a recovery schedule of 15 minutes. It is
noticed that the cluster is consistently transitioning in and out of NearSync.

What action should be taken to potentially address this issue?

a) Increase network bandwidth.


b) Add vCPUs to the user VMs.
c) Change the NearSync schedule to 30 minutes.
d) Configure a secondary schedule in the same Protection Domain.

53. An administrator needs to create a new Linux image and will need to be the following as part of
the VM deployment.

 Set the OS hostname.


 Add custom users.
 Add keys.
 Run custom scripts.

What package needs to be installed in the Linux image to facilitate this automation?

a) NGT
b) Sysprep
c) CloudInit
d) Kickstart

55. An administrator manages an AHV cluster that is dedicated to a dev/test environment. The
administrator is receiving complaints from users that they are unable to create new VMs on the
cluster. After reviewing the cluster, the administrator finds that the memory resources are almost
fully utilized, with many VMs over-provisioned on memory.

What option is the most efficient resolution to enable additional VMs to be created?

a) Upgrade the nodes with additional memory DIMMs.


b) Enable Memory Overcommit on the over-provisioned VMs.
c) Enable Memory HA on the over-provisioned VMs.
d) Disable HA Reservation on the cluster.
56. An administrator has been asked to enable block awareness and increase the fault tolerance to
FT2 on a Nutanix AHV cluster with the following configuration:

 Four blocks
 One node per block

Will the administrator be able to accomplish these tasks?

a) Yes - Block awareness requires a minimum of three blocks.


b) Yes - FT2 requires a minimum of three nodes.
c) No - Fault tolerance changes are not supported.
d) No - FT2 requires a minimum of five nodes.

58. Refer the exhibit.

--------------Image not found--------------------------------------

An administrator receives complaints of poor performance in a particular VM.

Based on the VM performance metrics, what is the most likely cause for this behaviour?

a) Oplog is full and cannot server IO request from this VM.


b) The host's CPU is severely overloaded.
c) The VM needs more vCPUs.
d) SSD tier is not big enough to serve workloads' IOPS demand.

(59) An administrator recently added new SSDs to a Nutanix cluster and knows the firmware will be
out of date. Due to security constraints the cluster does not have access to the internet.

Which two steps must be completed to update the firmware? (Choose two)

a) Update the LCM Source and URL to access the firmware bundle.
b) Download a darksite bundle and deploy it on an internal webserver.
c) Select Upgrade Software, then upload the firmware bundle.
d) Download the disk firmware from the OEM's website.

(61) An administrator is setting up a Nutanix cluster and needs to configure the default VLAN.

Which configuration should the administrator choose?

a) vlan.0
b) vlan.1
c) vlan.2
d) vlan.7
(62) An administrator is performing validation testing of a newly-deployed cluster. During this test,
the administrator disconnects each LAN interface from each of the nodes while pinging the
hypervisor and guest VMs.

When the first interface is disconnected, pings continue as expected to the hypervisor, but pings
stop responding from the guest. Pings continue when the interface is reconnected. When the second
interface is disconnected, pings continue to both the hypervisor and guest VMs.

What could be the cause of this error?

a) Switch ports are configured with different VLANs.


b) Portfast is not enabled on the switch ports.
c) One of the Network interfaces has a bad patch cable.
d) This is normal behaviour for a LAN Failover.

(63) What is the minimum time a newly created Deduplication storage policy takes to apply to the
VMs in the container?

a) 5 minutes
b) 10 minutes
c) 30 minutes
d) 60 minutes

(64) An administrator needs to ensure logs, alerts and information is consistent across clusters that
are located in different countries.

Which service needs to be configured?

a) SMTP
b) SNMP
c) NTP
d) DNS

(65) Which capability refers to the storage of VM data on the node where the VM is running and
ensures that the read I/O does not have to traverse the network?

a) Data Locality
b) Intelligent Tiering
c) Data Tiering
d) Intelligent Locality

(66) An administrator wants to receive an environment summary report when a host failure occurs.

Which action would address the administrator's need?

a) Enable App Discovery.


b) Configure an alert policy.
c) Create a playbook.
d) Edit report schedule.
(67) After running an LCM inventory, it is noticed that there are a number of firmware and software
updates available. The administrator would like to avoid any host reboots but would like to apply
some of the available updates.

Which two updates can be done while avoiding a host reboot? (Choose two)

a) AOS
b) Data Drives
c) AHV
d) M.2 Drives

(68) In the event of a disk failure, which process will immediately and automatically scan Cassandra
to find all data previously hosted on the failed disk, and all disks in that node?

a) Prism
b) Curator
c) Genesis
d) Stargate

(69) An administrator has an AHV cluster that is comprised of 4 nodes with the following
configuration in each node.

 CPU: 2 each 2.4GHz, 12 core


 Memory: 256GB
 Disk: 6 each 1.92 SSD

A VM with 16 vCPUs and 96GB of RAM is being created on the cluster.

How should the administrator configure the VM to assure optimal performance?

a) With Flash Mode enabled


b) With 2 vNUMA nodes
c) With an affinity policy
d) With memory overcommit

(70) An administrator needs to provide access for a user to view real-time performance metrics for
all VMs on all clusters across the datacentre.

Which method accomplishes this with the least effort and ongoing maintenance?

a) Configure a local account and assign the new user to the Viewer role in Prism Central.
b) Configure AD authentication, create a custom role, assign the user to the role, and apply
the role to all clusters and VMs.
c) Configure IDP authentication and assign the user to the Cluster Admin role in Prism
Central.
d) Configure AD authentication and assign the user to the Viewer role in Prism Element.
(71) The administrator recently had a node fail in an AHV Nutanix cluster. All of the VMs restarted on
other nodes in the cluster, but they discovered that the VMs that make up a SQL cluster were
running on the failed host. The administrator has been asked to take measures to prevent a SQL
outage in the future.

What affinity option will prevent the SQL VMs from running on the same host?

a) Create Affinity Project.


b) VM-Host Affinity Policy.
c) VM-VM Anti-Affinity Policy.
d) Create Affinity Category.

(72) Which baseline is used to identify a Zombie VM?

a) VM has no logins for the past 21 days.


b) VM is powered off for the past 21 days.
c) Fewer than 30 I/Os an less than 1000 bytes per day of network traffic for the past 21
days.
d) Memory usage is less than 1% and memory swap rate is equal to 0 kbps for the past 21
days.

(73) An administrator is tasked with configuring networking on an AHV cluster and wants to
maximize throughput for the host with many small VMs while minimizing network switch
configuration.

Which bond mode should the administrator select?

a) Active-Active
b) Active-Active with Mac Pinning
c) No Uplink Bond
d) Active-Backup

(74) An administrator is managing several two-node clusters at ROBO locations and needs to enable
Data-at-Rest Encryption for theses clusters.

What two options are available for Key Management Servers? (Choose two)

a) Internal KMS
b) External KMS
c) Native KMS (local)
d) Native KMS (remote)

(75) A 5-node Replication Factor 3 Nutanix cluster is hosting a Files instance, which archive images
generated by a Picture archiving and communication system.

The cluster is running out of space and the administrator needs to find a viable solution to address
the issue.

Which option could solve the problem?

a) Enable Erasure Coding at storage container level.


b) Delete any Dead and Zombie VMs.
c) Enable compression at share level.
d) Revert storage container to RF2.
(76) An administrator is setting up a Nutanix cluster for a mission critical workload. All of the VMs in
the cluster must have capacity to continue to run even if there is a hardware failure.

What should the administrator enable to achieve this requirement?

a) Change the redundancy factor to 3.


b) Change the fault tolerance level to block.
c) Enable Degraded Node Detection.
d) Enable HA Reservation in Prism Element.

(77) An administrator wishes to perform LCM updates as quickly as possible due to time constraints
with maintenance windows.

Which action should the administrator take prior to beginning an LCM update, to minimize delays?

a) Manually migrate VMs to a single host.


b) Enable automatic NCC updates.
c) Add vCPUs to each CVM.
d) Disable any VM affinity rules.

(3) An administrator is troubleshooting vDisk performance issues in a Nutanix Cluster with hybrid
disks. The VMs all have flash Mode enabled, but users are reporting disk latency.

What could cause these performance issues?

a) Compression is disabled on the vDisk storage container.


b) The VMs vDisks are in multiple containers.
c) Flash mode is disabled when a node fails.
d) Data size for flash mode exceeds 25% of the SSD capacity.

After logging into Prism Element, an administrator presses the letter A on the keyboard,
what is the expected outcome of this input?
a) Alerts page will launch.
b) Analysis
c) About Nutanix
d) API explorer
(19) Refer the Exhibit.

An administrator is trying to implement the solution that is shown in the exhibit. but has
been unsuccessful Based On the diagram, what is causing the issue?
a) A remote Witness VM
b) Active containers in both sites
c) Network latency
d) Unsupported hypervisor
(44) Refer exhibit.

The Update Source for LCM has been configured as shown in the exhibit. inventory failing
consistently. What the likely cause of this issue?
a) Port 443 is blocked by a firewall.
b) Port 80 is blocked by a firewall.
c) Administrator does not have a valid portal account.
d) The license assigned to the duster has expired.
An Administrator wants to replace an old node with a node of a newer generation in a 3-
node cluster. The administrator has already chosen the appropriate node, but unable to
remove it from the cluster.
why is the Remove Host option not shown in the exhibit?
a) The host needs to place into Maintenance Mode before.
b) It is only possible to remove a from a cluster using Cli.
c) The host needs to be removed from the cluster using Prism Central.
d) It is not possible to remove a node from a 3 -node cluster.

Refer the Exhibit.

After the initial configuration and upgrade of NCC the administrator nonces critical alerts.
as shown in the exhibit.
Which two initial cluster configuration tasks missed during the deployment process?
(Choose two.)
a) Host password changed.
b) Password policy changed.
c) BIOS password change.
d) CVM password changed.

(57) Refer the exhibit.

After configuring modules for a Remote Syslog Server. the settings are as shown the
administrator notices that even though the level parameter is set to EMERGENCY, that all
monitor logs are being sent.
What is the likely cause of this issue?
a) A second rsyslog server is configured to Send all monitor logs.
b) Having the Module Name set to STARGATE sends all monitor logs regardless of the
level.
c) A Log Level of emergency includes all monitor logs.
d) The true setting for Include Monitor Logs sends all monitor logs regardless of the
level.
(45) Refer the exhibit.

An administrator manages a cluster and notices several failed components shown in the
exhibit.
What two options does the administrator have to run all NCC checks manually? (Choose two)
a) Using the action drop-down menu in the health dashboard of Prism Element.
b) Running ncc health_checks run_all on the CVM.
c) Using the action drop-down menu in the Health dashboard of Prism Element.
d) Running ncc health_checks run_all on the PC VM.

Which component is supported by Prism Central storage policies?


a) Virtual Machines
b) Volume Groups
c) VM Templates
d) Storage Containers

An administrator would like to leverage the Reliable Event Logging Protocol (RELP) with
their Remote Syslog Server. After completing the configuration, it is observed that RELP
logging is not working as expected,
What is the likely cause of this issue?
a) The cluster does not have RELP installed.
b) The GENESIS module was the only onychoses to forward log information.
c) The Remote Syslog Server was configured using TCP as the protocol.
d) The remote server does not have rsyslog-relp installed.

Which two predefined views can be added to a report to identify inefficient VMs? (Choose
two)
a) Under provisioned VMS
b) List Zombie VMS List
c) Constrained VMS List
d) Overprovisioned VMS List

When a VM is connected to a Nutanix managed network when the IP addressed assigned.


a) When the vNlC is created on the VM.
b) When the VM is powered On.
c) When the guest OS sends a DHCP request.
d) When the guest OS receives a DHCP acknowledge.
(54) Refer the exhibit.

A user is complaining about slowness of a mission-critical MSSQL Server. The administrator


logs into Prism Element to investigate the VM performance and observes what is shown in
the diagram.
Which action would best improve VM performance?
a) Disable hyperthreading in the BIOS.
b) Add additional RAM to the user VM.
c) Add additional RAM to the host on which the VM is running.
d) Ensure the host's CPUs ere not excessively overcommitted.

(47) Refer the exhibit.

Why has an anomaly been triggered?


a) Controller reached 2500 IOPS.
b) Observed IOPS exceed normal values.
c) Normal Controller behaviour has increased.
d) Observed values do not match predicted values.
(42) Refer the exhibit.

Why has an anomaly been triggered?


a) Because the CPU usage crossed the blue band.
b) Because the blue band range increased over the last 2 days.
c) Because the CPU usage dropped belon' 20%.
d) Because the CPU usage reached 100%.

(60) Refer the exhibit.

An administrator needs to enable inline deduplication for a pre-existing storage container.


When trying to enable deduplication on the storage container. this feature is greyed-out.
What is the reason for this behaviour?
a) Replication Factor 1 is configured on the storage container.
b) The cluster has less than 5 nodes which is the minimum node-count to enable
deduplication.
c) Capacity reservation is not enabled on the storage container.
d) The cluster has hybrid storage and deduplication is supported only on all-flash
clusters.
Refer the exhibit.

An administrator is trying to create a custom alert policy for all VMs.


Why is the Alert warning if field greyed cut?
a) The Alert critical if threshold is set.
b) The Behavioural Anomaly threshold is set.
c) The Enable Policy option checked.
d) The Auto resolve alerts option is checked.

(23) Refer the exhibit.

An administrator is attempting to create an additional virtual switch on a newly deployed


AHV cluster, using the two currently disconnected interfaces. The administrator is unable to
select the disconnected interfaces when creating the virtual switch.
What is the likely cause of this issue?
a) Only one interface is available on the selected hosts.
b) Interfaces must be connected to the network before they can be assigned.
c) The disconnected interfaces are currently assigned to virtual switch 0.
d) Interfaces must be assigned to virtual switches via the cli.
Refer the exhibit.

An administrator is trying to put a node into maintenance mode but receives the message
shown in the exhibit.
What is a potential reason for this dialog?
a) LinuxVM1 uses a vDisks stored in a RFI Datastore.
b) LinuxVM1 uses a Volume Group.
c) LinuxVM1 uses a virtual GPU.
d) LinuxVM1 uses e vDisks stored in a RF3 Datastore.
Refer the exhibit.

An administrator needs to update some images that were previously uploaded to their
Nutanix cluster, while logged into Prism Element when trying to update the images, the
update icon is not enabled.
What could be the cause for this behaviour?
a) RBAC is configured and the administrator's user doesn't have the right privileges.
b) The files were ISO but were uploaded as disk images hence cannot be used or edited.
c) Images are corrupted and must be re-uploaded.
d) Images were imported into Prism Central.

Refer the exhibit.

An administrator wants to reduce the largest amount of alert emails received from Prism
Central.
Which two settings should the administrator customize to meet this requirement? (Choose
two)
a) Skip empty digest email.
b) Every Single Alert.
c) Daily Digest.
d) Email Recipients
An administrator needs to periodically send information about cluster efficiency via email to
a set of users.
What should be configured to accomplish this task?
a) Configure Efficiency widget in Prism Central.
b) Create a new' prism Central project.
c) update Capacity Configurations in Prism Central.
d) Add a schedule to Prism Central reports.

An administrator wants to ensure that data in a container is stored in the most space efficient
manner as quickly as possible after being written.
Which space efficiency too meets this requirement?
a) Inline Compression
b) Thin Provisioning
c) Cache Deduplication
d) Erasure Coding

An administrator is preparing to deploy a new application on an AHV cluster, Security


requirements dictate that all virtual servers supporting this application must be prevented
from communicating with unauthorized hosts.
Which option would achieve this goal?
a) Create a new VLAN, create a subnet on the cluster with the VLAN tag, deploy
servers with vNlCs in the new subnet.
b) Create a new Application Security Policy restricting communication to the authorized
hosts and apply it to the servers in enforce mode.
c) Create a new solation Environment policy apply it to the new servers and all
authorized hosts.
d) Create new' subnet and assign to an existing VPC assign the IP prefix and gateway for
the subnet, deploy servers with vNlC5 in the new subnet.

You might also like