Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

An administrator installs Nutanix-specific PowerShell cmdlets. The cmdlets fail to run.

Which two requirements should the administrator verify first? (Choose two)

A.

Windows 2016 r2 or later is installed

B.

The cmdlets have the proper permissions

C.

PowerShell 2.0 or later is installed

D.

.Net Framework 4.0 is installed

E.

Python 2.7 or greater is installed

Full Access
Question # 5

Which Prism Dashboard should be used to collect CPU/Memory and Disk I/O statistics over time?

A.

Health

B.

Alerts

C.

Hardware

D.

Analysis

Full Access
Question # 6

An administrator has just executed a maintenance window for some applications running on their nutanix cluster. After completing the maintenance, they want to assess the health of the cluster and make sure that there is no impact during the maintenance.

Which three dashboards in prism will assist the administrator in making this determination? (Choose Three)

A.

Data Protection

B.

Cluster Health

C.

Tasks

D.

Alerts

E.

Analysis

Full Access
Question # 7

what optimization feature can be configured at the storage container level? (Choose three)

A.

deduplication

B.

compression

C.

vDisk thin provisioning

D.

erasure coding

Full Access
Question # 8

An administrator needs to view and compare IOPs for VMs across multiple clusters.

Which two dashboards can the administrator use to find this information? (Choose two)

A.

Planning

B.

Apps

C.

Explore

D.

Analysis

E.

Home

Full Access
Question # 9

Two HDDs fail simultaneously on a single AHV host.

What are the chances of data loss?

A.

0%

B.

25%

C.

50%

D.

100%

Full Access
Question # 10

An Engineer logs into a CVM to troubleshoot connectivity loss between two CVMs and find the following interfaces subnets and WLANs configured.

-eth0 – VLAN10-10.1.10.0/24

eth01–No VLAN-192.168.5.0/24

eth2 – LAN20-10.1.20.0/24

Which two Nutanix networking features are being utilized? (Choose two)

A.

Internal vSwitch

B.

IP address management (IPAM)

C.

Network Load balancing

D.

Backplane LAN

Full Access
Question # 11

An administrator wants to configure key based SSH access for an AOS 5.5 Implementation. Which three components can be secured using this method? (Choose three)

A.

The hypervisor host***

B.

prism element

C.

the CVM**

D.

Guest virtual machine

E.

The cluster **

Full Access
Question # 12

An administrator needs to configure Acropolis File Service (AFS). The administrator is setting up AFS for the first time on the Nutanix cluster.

How many file services VMs are created by default?

A.

4

B.

3

C.

2

D.

1

Full Access
Question # 13

Which Nutanix Product combines the Distributed Storage Fabric & App Mobility Fabric?

A.

Xtract

B.

Prism

C.

Acropolis

D.

Calm

Full Access
Question # 14

An administrator is managing a highly active SQL workload that is writing I/Os in 2 MB chunks to a vDisk. The administrator wants to optimize capacity setting for the computer.

Which storage optimization technology should the administration select to meet these requirement?

A.

Erasure Coding

B.

Compression

C.

Capacity Deduplication

D.

Cache Deduplication

Full Access
Question # 15

An administrator needs to replace the default self-signed certificate in Prism with a certificate signed by a trusted Certificate Authority (CA).

Which option on the task menu should the administrator select to change this configuration?

A.

SSL Certificate

B.

Lifecycle Management

C.

UI Options

D.

Cluster Lockdown

Full Access
Question # 16

Which two methods are valid for migrating a VM from a Nutanix vSphere cluster to AHV? (Choose two.)

A.

Storage vMotion

B.

Live Migration

C.

Nutanix Move

D.

Cross-Hypervisor DR

Full Access
Question # 17

Write I/O that is deemed sequential will enter which component of the Distributed Storage Fabric first?

A.

Oplog

B.

Extent store

C.

Cache

D.

Metadata Ring

Full Access
Question # 18

An Administrator wants to present storage to an external non-Nutanix host via iSCSI.

Which construct should the administrator in configure to create the iSCSI volume?

A.

Volume Group

B.

Protection Domain

C.

Storage container

D.

Storage Pool

Full Access
Question # 19

A two-node ROBO cluster is configured with a witness VM.

What happens when Node A goes down?

A.

The- cluster becomes unavailable and goes into read-only mode.

B.

All operations and services on the Node B are shut down and go into a waiting state.

C.

The cluster is unaffected and no administrator intervention is required.

D.

Node B sends a leadership request to the Witness VM and goes into single-node mode.

Full Access
Question # 20

When VM HA Reservation is enabled, what is the expected behavior for all failed VMs in the event of a host failure?

A.

Restart on a best-effort basis if resources are available

B.

Perform a live migration to other hosts in the AHV cluster

C.

Restart on other hosts in the AHV cluster

D.

Perform a live migration on a best-effort basis if resources are available

Full Access
Question # 21

What is the function of the virbr0 bridge on AHV?

A.

To carry all traffic between the user VMs and the upstream network.

B.

To carry management and storage communication between user VMs and the CVM.

C.

To carry management and storage communication between user VMs and AHV host.

D.

To carry storage communication between the guest VMs and the CVM

Full Access
Question # 22

Refer to the exhibit.

The Linux Admin role has been created to manage only Linux VMs in the environment. However, the Adminl user does not have access to all Linux VMs.

What step should be taken to grant the proper access?

A.

Add the hosts to the entities list for the role.

B.

Grant the admin 1 user the viewer role tor the cluster.

C.

Add the role to the Linux images.

D.

Add the proper category to each Linux VM.

Full Access
Question # 23

Which component ensures uniform distribution of data throughout the cluster to eliminate hot spots and speed up rebuilds?

A.

Cassandra

B.

Distributed Storage Fabric

C.

Acropolis App Mobility Fabric

D.

High Availability

Full Access
Question # 24

A VM in a 12-node Nutanix cluster is hosting an application that has specific Physical GPU requirements. Only three nodes in the cluster meet this requirement.

The administrator wants to allow a general workload to be distributed across all nodes in the cluster and must make sure that the node hosting the VM meets its requirements.

How should the administrator perform this task?

A.

Create a sperate three-node cluster using the nodes that meet the requirement.

B.

Configure VM-Host affinity for the nodes that meet the application's GPU requirement.

C.

Over-Provision the application VM with additional virtual GPUs.

D.

Configure anti-affinity rules between the application VM and the other VMs running on the cluster.

Full Access
Question # 25

An administrator is reviewing performance of a core banking system that routinely has 20,000 concurrent

users. During business hours, the CPU on the applications servers runs at close to 100%. The

administrator needs to determine if there is a performance issue specific to the app servers, the database

servers, or all servers on the cluster.

Which metrics should the administrator review in Prism Analytics Graphs?

A.

Cluster CPU and Memory Only

B.

Cluster IO, Network, Database and App Server CPU

C.

Cluster IO, CPU, Memory and Database and App Server CPU

D.

Cluster IO, CPU, Memory, Network, App Server CPU

Full Access
Question # 26

What are two minimum prerequisites for live migration to succeed? (Choose two.)

A.

All AHV hosts have IP addresses in the same subnet

B.

All AHV hosts must be configured on the same VLAN

C.

All VMs have an IP address in the same subnet

D.

All VMs are configured for the same VLAN

Full Access
Question # 27

An administrator needs to shut down an AHV cluster to relocate hardware. The administrator upgrades NCC and runs health checks.

Which steps should the administrator perform next?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements.

Full Access
Question # 28

Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness?

A.

Continuous Data Protection

B.

Copy-on-Write

C.

Split-mirror

D.

Redirect-On-Write

Full Access
Question # 29

Which two methods are available when migrating a VM from a legacy 3-tier solution using VMware ESXi to AHV? (Choose two.)

A.

Deploy the Move appliance.

B.

Use Cross-Hypervisor DR.

C.

Import the .vmdk into the Image Service.

D.

Use shared nothing live migration.

Full Access
Question # 30

How will an HDD failure affect VMs with data on the failed device?

A.

The VMs will crash, and will be restarted once the failed HDD has been replaced and the data has been restored.

B.

A live migration will be initiated, moving the affected VMs to a host that contains the replica data.

C.

The VMs will remain operational on that host and continue to function normally with no noticeable impact

D.

An HA event will occur, causing the affected VMs to restart on a node that contains the replica data.

Full Access
Question # 31

An administrator is working with Nutanix Support and needs to provide logs for troubleshooting an issue. The cluster is located in a secure environment. Data such as IP addresses and VM names cannot be shared.

Which method should be used to anonymize the log data sent to Nutanix Support?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 32

Which two access protocols are supported by Files? (Choose two.)

A.

ISCSI

B.

SMB

C.

FCOE

D.

NFS

Full Access
Question # 33

Which three upgrades should an administrator be able to perform using Lifecycle Management? (Choose Three)

A.

AOS

B.

BMC

C.

BIOS

D.

Hypervisor

E.

HBA Firmware

Full Access
Question # 34

What is Prism Central primarily used for?

A.

Multi-cluster network configuration

B.

Container creation

C.

Multi-cluster Single Sign On

D.

Data reduction configuration

Full Access
Question # 35

How should an administrator configure a custom alert for a specific VM in Prism?

A.

Modify an existing alert to only alert on the specific VM.

B.

Modify VM settings to add the custom alert.

C.

Modify the alerts to add a new custom alert policy.

D.

Modify node settings to add the custom alert.

Full Access