In the event of a disk failure, which process will immediately ad automatically scans Cassandra to find all data previously hosted on the failed disk, and all disks in that node?
Prism Central will be installed manually on an AHV cluster.
Which three disk images must be downloaded from the portal for the Prism Central VM? (Choose three.)
AHV IPAM assigns an IP address from the address pool when creating a managed VM NIC.
At which two instances does the address release back to the pool? (Choose two)
After configuring Active Directory as the desired authentication service, an administrator is not able to login into Prism Central using privileged account.
Which configuration must be checked first?
An administrator is not able to log into Prism Central by using a new Active Directory user account. After Logging with the local user, the administrator verified that Directory Services and Role Mapping setting are valid.
What is the most likely cause of this issue?
Which scenario would benefit most from Erasure Coding being enabled on a container?
After running an LCM inventory it is noticed that there are a number of firmware and software updates available. The administrator would like to avoid any host reboots, but would like to apply some of the available updates?
Which two updates can be done while avoiding a host reboot? (Choose two.)
An administrator needs to run a mixed Exchange and SQL workload with a guaranteed amount of container
space for each application.
How should the administrator meet this requirement?
Refer to Exhibit:
An administrator wants to replace and old node with a node of newer generation in a 3-node cluster. The administrator has already chosen the appropriate node. But unable to remove it from the cluster.
Why is the Remove Host option not shown in the exhibit?
Refer to the Exhibit:
An administrator receives complaints of poor performance in a particular VM.
Based on the VM performance metric, what is the most likely cause of this behavior?
An administrator wants to use Volumes to connect to physical servers that are not able to be virtualized.
Which three things must be configured for Volumes to support iSCSI clients? (Choose three)
Which two permission assignment tasks can be accomplished via Prism Element? (Choose two.)
In Nutanix clusters, which feature ensures VMs can be migrated and restarted on another host in case of failure?
An administrator notices that most of the VMs in the cluster are on one host. Users report that an application seems to respond slowly. The application server VM has significantly more memory assigned to it than other VMs.
How should the administrator fix this issue?
The administrator wants a container to be displayed and limited to 1TB in the hypervisor.
What advanced container setting must the administrator set?
An administrator needs to shut down an AHV cluster to relocate hardware. The administrator upgrades NCC and runs health checks.
Which steps should the administrator perform next?
Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements.
In which two scenarios is an automated live migration likely to occur? (Choose two)
Refer to Exhibit:
After configuring modules for a Remote Syslog Server, the settings are as shown. The administrator notices that even though the level parameter is set to EMERGENCY, that all monitor logs are being sent.
What is the likely cause of this issue?
When installing Nutanix Guest Tools (NGT) on an ESXi-hosted VM, which port should be enabled on the VM to allow communication with the NGT-Controller VM service?
CPU utilization climbs above 90% on several VMs. This causes performance degradation for a business-critical application.
How can alerts be configured to notify the administrator before VM CPU utilization hits 90%?
An administrator needs to increase bandwidth available to the AHV host and to the CVM.
How should the administrator complete this task?
An administrator was reviewing various AOS logs when a it was noticed that the time of the logs were off by several hours.
Which initial step was missed during the post process cluster configuration?
An administrator is adding a node with a higher AOS release to an existing cluster.
What is the most efficient action an administrator should take to ensure it is in a supported state?
Refer to the Exhibit:
An administrator is adding a new node to a cluster. The node has been imaged to the same versions of AHV and AOS that the cluster is
running, configured with appropriate IP addresses, and br0-up has been configured in the same manner as the existing uplink bonds.
When attempting to add the node to the cluster with the Expand Cluster function in Prism, the cluster is unable to find the new node.
Based on the above output from the new node, what is most likely the cause of this issue?
What Nutanix feature provides effective caching optimization In VDI environments?
Which two capabilities does IPAM provide in a Nutanix networking configuration? (Choose two.)
When a VM is connected to a Nutanix managed network, when is the IP addressed assigned?
How should an administrator configure a custom alert for a specific VM in Prism?
Administrator is creating a Windows 10 VM that will be used for a virtual desktop template. After creating the VM and booting to the ISO, the administrator is unable to install Windows and receives the following error.
What steps does the administrator need to take to install the OS?
Async DR is configured between two sites. A network outage occurs at the primary site.
Which steps must the administrator perform to bring the VMs back into service at the backup site?
Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements. Not all procedures are valid. Identify any invalid procedures using the drop-down option.
A cluster has RF2. The cluster loses two drives on different nodes in the same storage tier.
What is the effect on the replicas of the VMs?
A VM in a 12-node Nutanix cluster is hosting an application that has specific Physical GPU requirements. Only three nodes in the cluster meet this requirement.
The administrator wants to allow a general workload to be distributed across all nodes in the cluster and must make sure that the node hosting the VM meets its requirements.
How should the administrator perform this task?
A configuration is single domain, single forest, and does not use SSL.
Which port number should be used to configure LDAP?
After logging into Prism Element, an administrator presses the letter A on the Keyboard.
What is the expected outcome of this input?
A system administrator needs to add more VMs to their Nutanix cluster.
Which two actions should the administrator perform to determine if the current cluster can accommodate the new VMs? (Choose two)
In which two scenarios is Native Key Management Server supported? (Choose two)
Which two methods are available when migrating a VM from a legacy 3-tier solution using VMware ESXi to AHV? (Choose two.)
A user running a Computer Aided Design (CAD) application is complaining about slow response time within the VM, particular when moving windows or rendering images.
Which VM metric will guide the administrator toward diagnosing the problem?
An administrator is implementing a VDI solution. The workload will be a series of persistent desktops in a dedicated storage container within a four-node cluster Storage optimizations should be set on the dedicated storage container to give optimal performance including during a node failure event
Which storage optimizations should the administrator set to meet the requirements?
Upon logging into Prism Central, an administrator notices high cluster latency.
How can the administrator analyze data with the least number of steps or actions?
Where should an administrator unregister Prism Element from Prism Central?
A customer wants to isolate a group of VMs within their Nutanix environment for security reasons. The customer creates a VM with two NICs to act as a firewall and installs the appropriate software and certificates.
However, no one from the outside can access the application.
What is the likely cause of this problem?
Which AOS process determine if an I/O from a user will be written to OpLog or to an Extent Store?