Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

What does Nutanix recommend when setting up the node networking?

A.

Include NIC models from different vendors in the same bond

B.

Include at least two physically interfaces in every bond.

C.

Combine NIC models from different vendors in the same bond.

D.

Combine NIC models from different vendors in the same bond.

Full Access
Question # 5

An administrator needs to increase bandwidth available to the AHV host and to the CVM.

How should the administrator complete this task?

A.

In Prism, update vs0 to change the configuration to Active-Active.

B.

Use manage-ovs commands to update br0 change the configuration to Active-Active.

C.

In Prism, create a vsl interface and add any remaining uplinks.

D.

Use manage-ovs commands to create br1 and add any remaining uplinks

Full Access
Question # 6

An administrator has an AHV cluster that is comprised of 4 nodes with the following configuration in each node:

CPU:2 each 2.4GHz, 12 core

Memory: 256GB

Disk: 6 each 1.92 SSD

A VM with 16 vCPUs and 96GB of RAM is being created on the cluster.

How should the administrator configure the VM to assure optimal performance?

A.

With an affinity policy

B.

With memory overcommit

C.

With 2 vNUMA nodes

D.

With Flash Mode enabled

Full Access
Question # 7

An administrator logs into the Nutanix Support Portal and notices there is a new version of the LCM Framework available. In an effort ensure LCM is providing the latest features, the administrator would like to upgrade LCM.

How can the LCM Framework be upgraded?

A.

Perform an LCM inventory

B.

Upload the latest LCM Framework as an image in the image Configuration in Prism

C.

Upload the latest LCM Framework bundle via Upgrade Software in Prism

D.

Upgrade AOS

Full Access
Question # 8

After the initial configuration and upgrade of NCC, the administrator notices these critical alerts:

. IPMI 10.7.133.33 is using default password

. Host 10.7.133.25 is using default password

. CVM 10.7.133.31 is using default password

Which two initial cluster configuration tasks were missed during the deployment process? (Choose two.)

A.

CVM password changes

B.

BIOS password changes

C.

Host password changes

D.

Password policy changes

Full Access
Question # 9

An administrator initially performed a cluster Foundation using a flat switch without any VLAN configuration. After the Foundation, the administrator moved the dual 25Gb data ports and single 1Gb IPMI port to the actual switches with the below network configurations:

. All VLANs are tagged

. VLAN 1000 for CVM\Hypervisor traffic

· VLAN 1001 for User VM traffic

. VLAN 100 for IPMI traffic

After moving the IPMI network links, the administrator can no longer ping the IPMI IPs.

Which two changes does the administrator need to make? (Choose two.)

A.

SSH to AHV and set the VLAN ID using IPMI Tool.

B.

SSH to CVM and restart network services on all host.

C.

SSH to AHV and change the IP address using IPMI tool.

D.

SSH to CVM and restart Genesis on all CVMs.

Full Access
Question # 10

An administrator migrates a VM onto a new Nutanix cluster- After the migration, the administrator observes the following conditions:

• Cluster memory utilization: 64%

• Cluster CPU utilization: 19%

• Cluster storage utilization. 32%

• Average VM CPU utilization: 25%

• Average VM CPU ready%: 24%

• Average VM memory utilization: 60%

Which two changes should the administrator make to improve VM performance? (Choose two.)

A.

Reduce the number of vCPUs assigned to VMs.

B.

Add more memory to the VMs.

C.

Reduce the number of VMs on the hosts.

D.

Replace high core count CPUs with high clock rate CPUs.

Full Access
Question # 11

After configuring Active Directory as the desired authentication service, an administrator is not able to login into Prism Central using privileged account.

Which configuration must be checked first?

A.

Account lock status

B.

Role Mapping

C.

Local user account

D.

Cluster Lockdown

Full Access
Question # 12

When creating a VM on an AHV cluster, how is the initial placement of the VM determined?

A.

AHV uses a round robin algorithm, placing new VMs onto hosts based on the numerical order of their UUID

B.

The administrator right clicks on the desired host and selects Power on VM from the dropdown menu

C.

The Acropolis Dynamic Scheduler selects a host which provides adequate resources for the VMs configuration

D.

Placement is determined by the host that holds the new_VM token at the time of VM creation

Full Access
Question # 13

On a Nutanix cluster, what does Network Segmentation refer to?

A.

A distributed firewall for security VM to VM traffic.

B.

Physically separating management traffic from guest VM traffic.

C.

Isolating intra-cluster traffic from guest VM traffic.

D.

Isolating management traffic from storage replication traffic.

Full Access
Question # 14

Which scenario would benefit most from Erasure Coding being enabled on a container?

A.

Long term storage of data which is written once and read infrequently

B.

High performance database where all is relatively hot.

C.

VDI use cases where a single VM is cloned 100’s of times

D.

WEB and API Servers

Full Access
Question # 15

When VM HA Reservation is enabled, what is the expected behavior for all failed VMs in the event of a host

failure?

A.

Restart on a best-effort basis if resources are available

B.

Perform a live migration to other hosts in the AHV cluster

C.

Restart on other hosts in the AHV cluster

D.

Perform a live migration on a best-effort basis if resources are available

Full Access
Question # 16

Which data savings technique utilizes stripes and parity calculation in a Nutanix cluster?

A.

Compression

B.

Parity strip

C.

Erasure coding

D.

Deduplication

Full Access
Question # 17

The administrator recently had a node fail in an AHV Nutanix cluster. All of the VMs restarted on other nodes in the cluster, but they discovered that the VMs that make up a SQL cluster were running on the failed host. The administrator has been asked to take measures to prevent a SQL outage in the future.

What affinity option will prevent the SQL VMs from running on the same hos?

A.

VM-VM anti-Affinity policy

B.

Create Affinity Category

C.

VM-Most Affinity policy

D.

Create Affinity Project

Full Access
Question # 18

After running an LCM inventory it is noticed that there are a number of firmware and software updates available. The administrator would like to avoid any host reboots, but would like to apply some of the available updates?

Which two updates can be done while avoiding a host reboot? (Choose two.)

A.

M.2 Drives

B.

AHV

C.

Data Drives

D.

AOS

Full Access
Question # 19

The Stargate service becomes unavailable on a single CVM on an AHV node. What is used to maintain I/O operations in the cluster?

A.

Route injection

B.

iSCSl redirector

C.

Hypervisor HA

D.

ha.py

Full Access
Question # 20

An administrator responsible for a VDl environment needs to investigate reports of slow logins. The administrator finds that increasing the number of vCPUs from 2 to 4 will reduce the login times. Production workloads are consuming 75% of the host CPU on the cluster. The administrator increases the vCPU count on all of the VDl VMs.

What are two impacts on the cluster? (Choose two)

A.

Increasing CPU counts will decrease memory utilization

B.

Increase memory utilization%

C.

Increase CPU utilization%

D.

Increase CPU ready%

Full Access
Question # 21

Which two types of granular RBAC does Nutanix provide for AHV hosts? (Choose two.)

A.

Category based

B.

Project based

C.

Disk based

D.

Cluster based

Full Access
Question # 22

An administrator is tasked with configuring networking on an AHV cluster and needs to optimize for maximum single VM throughput.

Which bond mode should the administrator select?

A.

Active-Active with Mac pinning

B.

Active-Active

C.

Active-Backup

D.

No Uplink Bond

Full Access
Question # 23

An administrator is troubleshooting vDisk performance issues in a Nutanix cluster with hybrid disks. The VMs all have Flash Mode enabled.

But users are reporting disk latency.

What could cause the performance issues?

A.

Flash mode is disabled when a node fails.

B.

Compression is disabled on the vDisk storage container.

C.

The VMs vDisks are in multiple containers.

D.

Data size for flash mode exceeds 25% of the SSD capacity.

Full Access
Question # 24

An administrator has received reports of users being disconnected from remote desktop sessions to a specific VM.

Which VM metric is most useful isolating the cause of the issue?

A.

Storage Controller Bandwidth

B.

Swap-Out Rate

C.

Hypervisor CPU Ready time (%)

D.

Virtual NIC receive packet dropped

Full Access
Question # 25

An administrator wants to receive an environment summary report when a host failure occurs.

Which action would address the administrator’s need?

A.

Enable App Discovery

B.

Edit report schedule

C.

Configure an alert policy

D.

Create a playbook

Full Access
Question # 26

When configuring Prism Central, which two log modules are able to forward messages to an external syslog server? (Choose two.

A.

API Audit

B.

Flow

C.

DNS

D.

NTP Synchronization

Full Access
Question # 27

An administrator wants to ensure that data in a container is stored in the most space efficient manner as quickly as possible after being written,

Which space efficiency too meets this requirement?

A.

Inline Compression

B.

Thin Provisioning

C.

Cache Deduplication

D.

Erasure Coding

Full Access
Question # 28

Which two private key types are supported by the Nutanix SSL certificate implementation? (Choose two.)

A.

ECDSA

B.

ECDH

C.

ED25519

D.

RSA

Full Access
Question # 29

An administrator is configuring cross-hypervisor DR from an ESXi cluster to a new AHV cluster. When the administrator migrates a protection domain to the AHV cluster, the VMs fail to boot.

What should the administrator do to correct this problem?

A.

Increase the snapshot frequency to more than 6 hours.

B.

Uninstall VMware Tools from the VMs.

C.

Install Nutanix Guest Tools in the protected VMs.

D.

Add all VMs into a single consistency group.

Full Access
Question # 30

Which two access protocols are supported by Files? (Choose two.)

A.

ISCSI

B.

SMB

C.

FCOE

D.

NFS

Full Access
Question # 31

An administrator is concerned about the amount of data that a VM reading and writing to the storage fabric.

Which metric will provide that data?

A.

Host Hypervisor IO Bandwidth

B.

Host Disk IOPS

C.

VM Storage Controller IOPS

D.

VM Storage Controller Bandwidth

Full Access
Question # 32

Which two permission assignment tasks can be accomplished via Prism Element? (Choose two.)

A.

Grant a user permission to create VMs on a specific storage container

B.

Grant a user permission to view details of all VMs on a specific cluster

C.

Grant an active directory group permission to perform back operations

D.

Grant a user permission to create and delete snapshots on a specific VM

Full Access
Question # 33

An administrator has set up a local web server accessible to the Nutanix clusters.

Which two steps are required to set up LCM for an environment without Internet access? (Choose two.)

A.

Download the lcai_disconnecced_version. tar.gz LCM bundle from the support portal.

B.

Edit LCM Advanced Settings in Prism Element and enter the address of the web server.

C.

Edit LCM Advanced Settings m Prism Central and enter the address of the web server.

D.

Download the lcm_dark_site_version. tar . gz LCM bundle from the support portal.

Full Access
Question # 34

Which best practice should be followed when creating a bond in a Nutanix cluster?

A.

Place NICs of different speeds within the same bond

B.

Configure the bond to use LACP

C.

Only utilize NICs of the same speed within the same bond

D.

Use the default bond configuration after installation

Full Access
Question # 35

Which two methods are available when migrating a VM from a legacy 3-tier solution using VMware ESXi to AHV? (Choose two.)

A.

Deploy the Move appliance.

B.

Use Cross-Hypervisor DR.

C.

Import the .vmdk into the Image Service.

D.

Use shared nothing live migration.

Full Access
Question # 36

What is the name of the internal bridge used by AHV nodes and CVMs?

A.

vnet0

B.

br1

C.

br0

D.

virbr0

Full Access
Question # 37

In which two scenarios is an automated live migration likely to occur? (Choose two)

A.

Cluster resource hotspot

B.

AOS upgrade

C.

Network upgrade

D.

Hypervisor upgrade

Full Access
Question # 38

In Files, how many FSVMs are deployed by default?

A.

1

B.

2

C.

3

D.

5

Full Access
Question # 39

A VM in a 12-node Nutanix cluster is hosting an application that has specific Physical GPU requirements. Only three nodes in the cluster meet this requirement.

The administrator wants to allow a general workload to be distributed across all nodes in the cluster and must make sure that the node hosting the VM meets its requirements.

How should the administrator perform this task?

A.

Create a sperate three-node cluster using the nodes that meet the requirement.

B.

Configure VM-Host affinity for the nodes that meet the application's GPU requirement.

C.

Over-Provision the application VM with additional virtual GPUs.

D.

Configure anti-affinity rules between the application VM and the other VMs running on the cluster.

Full Access
Question # 40

An Administrator has been asked to deploy VMs using a specific image. The image has been configured with settings and applications that will be used by engineering to develop a new product by the company.

The image is not available on the desired cluster, but it is available in other cluster associated with Prism Central.

Why isno’t the image available?

A.

The image bandwidth policy has prevented the image upload.

B.

The cluster should be removed from all categories.

C.

The cluster has not been added to the correct category

D.

The image placement policy was configured with enforcement.

Full Access
Question # 41

An administrator wants to have a VM on an AHV cluster with access to multiple VLANs. What is the most efficient way to achieve this?

A.

Update a vNIC on the VM to operate in trunked mode for all desired VLANs.

B.

Create a network in AHV associated with all those VLANs on all hosts.

C.

Use SFPs that allow the needed VLANs.

D.

Use one vNIC per VLAN for the VM.

Full Access
Question # 42

After deploying a cluster, time is not synchronizing properly.

What task needs to be performed?

A.

DNS configuration

B.

NTP configuration

C.

HA configuration

D.

SMTP configuration

Full Access
Question # 43

Where can an administrator change a CVM password?

A.

KMS Server Terminal

B.

CVM setting in Prism Element

C.

CVM setting in Prism Central

D.

Prism CVM VM Console

Full Access
Question # 44

Which two predefined views can be added to a report to identify inefficient VMs?

A.

Underprovisioned VMs List

B.

Zombie VMs List

C.

Constrained VMs List

D.

Overprovisioned VMs List

Full Access
Question # 45

How many SSL certificates are used by Prism Element on a Nutanix cluster?

A.

1

B.

5

C.

256

D.

2048

Full Access
Question # 46

An administrator manages an AHV cluster that is dedicated to a dev/test environment. The administrator receiving complaints from users that they are unable to create new VMs on the cluster.

After the reviewing the cluster, the administrator finds that the memory resources are almost fully utilized, with many VMs over-provisioned on memory.

What option is the most efficient resolution to enable additional VMs to be created?

A.

Enable Memory Overcommit on the over-provisioned VMs.

B.

Enable Memory HA on the over-provisioned VMs.

C.

Upgrade the nodes with additional memory DlMMs.

D.

Disable HA Reservation on the cluster.

Full Access
Question # 47

An administrator recently added new SSDs to a Nutanix cluster and knows the firmware will be out of date, Due to security constraints, the cluster does not have access to the Internet.

Which two steps must be completed to update the firmware? (Choose two.)

A.

Download the disk firmware from the OEM's website.

B.

Download a darksite bundle and deploy an internal webserver,

C.

Select Upgrade Software, then upload the firmware bundle.

D.

update the LCM Source and URL to access the firmware bundle.

Full Access
Question # 48

Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness?

A.

Continuous Data Protection

B.

Copy-on-Write

C.

Split-mirror

D.

Redirect-On-Write

Full Access
Question # 49

How should an administrator configure a custom alert for a specific VM in Prism?

A.

Modify an existing alert to only alert on the specific VM.

B.

Modify VM settings to add the custom alert.

C.

Modify the alerts to add a new custom alert policy.

D.

Modify node settings to add the custom alert.

Full Access
Question # 50

A node with Erasure Coding fails.

What is the impact?

A.

The node stops utilizing Erasure Coding.

B.

Potentially increased amount of data stored in the SSD tier.

C.

Increased Controller VM CPU Load.

D.

AQS unable to do deduplication during the Erasure Coding failure.

Full Access
Question # 51

What is the proper sequence to perform a one-click upgrade to a Nutanix cluster?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements. Not all procedures are valid. Identify any invalid procedures using the drop-down option.

Full Access
Question # 52

Which command should an administrator run from the CLI to view the uplink state of all AHV nodes in the

cluster?

A.

allssh show_uplinks

B.

manage_ovs show_uplinks

C.

allssh manage_ovs show_uplinks

D.

manage ovs show uplinks

Full Access
Question # 53

An administrator needs to relocate an AHV cluster to a new datacenter during a maintenance window. The cluster will use the same IPs in the new datacenter.

Which two steps should be taken to prepare for this task? (Choose two.)

A.

Reconfigure IPMI for the new datacenter

B.

Shut down all user VMs in the cluster

C.

Relocate the linked LDAP server

D.

Stop all Nutanix Files clusters

Full Access