1.
Refer to exhibit:
Why has an anomaly been triggered?
Controller reached 2500 IOP
Observed IOPS exceed normal values.
Normal Controller behavior has increased.
Observed values do not match predicted values.
2. An administrator is commissioning a Nutanix Enterprise Cloud.
Once the user VMs have been deployed and are running, the
administrator finds that VMs on the same host are able to
communicate, but are unable to communicate between hosts.
What must be changed to enable full inter-VM communications?
Change the spanning-tree port type on the switch.
Change the network the VMs are connected to
Update the switch to specifically allow VLAN 15
The VMs need to have static IP addresses.
3. When installing Nutanix Guest Tools (NGT) on an ESXi-hosted VM,
which port should be enabled on the VM to allow communication
with the NGT-Controller VM service?
2000
2074
8080
9943
4. An administrator wants to ensure that data in a container is
stored in the most space efficient manner as quickly as possible
after being written,
Which space efficiency too meets this requirement?
Inline Compression
Thin Provisioning
Cache Deduplication
Erasure Coding
5. An administrator was reviewing various AOS logs when a it was
noticed that the time of the logs were off by several hours.
Which initial step was missed during the post process cluster
configuration?
Setting the cluster time zone via PC GUI
Setting the cluster time zone via CVM NCLI
Setting the cluster time zone via PE GUI
Setting the cluster time zone via CVM ACLI
6. An administrator wants to reduce the largest amount of alert
emails received from Prism Central.
Which two settings should the administrator customize to meet this
requirement? (Choose two)
Skip empty digest email
Every Single Alert
Dally Digest
Email Recipients
7. A configuration is single domain, single forest, and does not use
SSL.
Which port number should be used to configure LDAP?
389
3269
636
3268
8. An administrator is reviewing performance of a core banking
system that routinely has 20,000 concurrent users. During, business
hours, the CPU on the applications servers runs at close to 100%.
The administrator needs to determine if there is a performance
issue specific to the app servers, the database servers, or all
servers on the cluster.
Which metrics should the administrator review in Prism Analysis
Graphs?
Cluster IO, Network, Database and App Server CPU
Cluster CPU and Memory Only
Cluster IO, CPU, Memory and Database and App Server CPU
Cluster IO, CPU, Memory, Network, App Server CPU
9. A customer has a newly-deployed AHV cluster with nodes that
have 2.x 10 GBE and 2.x interface. The customer wants to use all
available network interfaces to provide connectivity to the VMs.
Which option should the administrator use to achieve this while
remaining consistent with Nutanix recommendations?
Create separate VLANs that map 10GbE and 1GbE interfaces.
Createbond1 on virbr0 and add the 1GbE interfaces to it for VM use.
Create a second bond on br0 on each host and assign the 1 GbE interfaces to
it.
Create a second bridge on each host and assign the 1GbE interfaces to it.
10. An administrator manages an AHV cluster that is dedicated to a
dev/test environment. The administrator receiving complaints from
users that they are unable to create new VMs on the cluster.
After the reviewing the cluster, the administrator finds that the
memory resources are almost fully utilized, with many VMs over-
provisioned on memory.
What option is the most efficient resolution to enable additional
VMs to be created?
Enable Memory Overcommit on the over-provisioned VMs.
Enable Memory HA on the over-provisioned VMs.
Upgrade the nodes with additional memory DlMMs.
Disable HA Reservation on the cluster.
11. What is the expected behavior of the VMs residing on that host
when a controller VM becomes unavailable?
A Live Migration will be performed on the affected VMs.
The host will automatically redirect I/O and VMs will continue running.
The impacted host and VMs will automatically shut down.
VM High Availability will restart the impacted VMs on another host
12. Which method can be used to migrate a VM configured for UEFI-
boot from a Nutanix Hyper-V cluster to AHV?
Live Migration
Storage vMotion
Nutanix Move
Cloud Connect
13. What is the name of the internal bridge used by AHV nodes and
CVMs?
vnet0
br1
br0
virbr0
14. An administrator needs to relocate an AHV cluster to a new
datacenter during a maintenance window. The cluster will use the
same IPs in the new datacenter.
Which two steps should be taken to prepare for this task? (Choose
two.)
Reconfigure IPMI for the new datacenter
Shut down all user VMs in the cluster
Relocate the linked LDAP server
Stop all Nutanix Files clusters
15. Which change can be made on a cluster with software-based
Data-at-Rest Encryption enabled?
Disable encryption on the cluster
Deploy an additional Native KMS Server
Enable encryption for a VM
Change Native KMS to External KMS
16. An administrator needs to bring down a host in a Nutanix
Cluster for maintenance reasons.
The administrator puts the host in maintenance mode.
What should the administrator do to perform an orderly shutdown
of the CVM?
Execute the cvm_shutdown -P new command from the CV
Enter Fever off Server - immediate from the IPMI console.
Enter Fewer off Server-orderly Shutdown from the IPMI console.
Execute the cvm_shutdown -P now command from the host.
17. An administrator logs into the Nutanix Support Portal and
notices there is a new version of
the LCM Framework available. In an effort ensure LCM is providing
the latest features, the administrator would like to upgrade LCM.
How can the LCM Framework be upgraded?
Perform an LCM inventory
Upload the latest LCM Framework as an image in the image Configuration in
Prism
Upload the latest LCM Framework bundle via Upgrade Software in Prism
Upgrade AOS
18. Which baseline is used to identify a Zombie VM?
VM is powered off for the past 21 days.
Memory usage is less than 1% and memory swap rate is equal to 0 Kbps for
the past 21 days. VM has no logins for the past 21 days
VM has no logins for the past 21 days
Fewer than 30 1/Os and less than 1000 bytes per day of network traffic for
the past 21 days
19. In the event of a disk failure, which process will immediately ad
automatically scans Cassandra to find all data previously hosted on
the failed disk, and all disks in that node?
Curator
Stargate
Genesis
Prism
20. Which algorithm do snapshots and clones leverage to maximize
efficiency and effectiveness?
Continuous Data Protection
Copy-on-Write
Split-mirror
Redirect-On-Write
21. How will an HDD failure affect VMs with data on the failed
device?
The VMs will crash, and will be restarted once the failed HDD has been
replaced and the data has been restored.
A live migration will be initiated, moving the affected VMs to a host that
contains the replica data.
The VMs will remain operational on that host and continue to function
normally with no noticeable impact
An HA event will occur, causing the affected VMs to restart on a node that
contains the replica data.
22. After configuring Active Directory as the desired authentication
service, an administrator is not able to login into Prism Central
using privileged account.
Which configuration must be checked first?
Account lock status
Role Mapping
Local user account
Cluster Lockdown
23. After running an LCM inventory it is noticed that there are a
number of firmware and software updates available. The
administrator would like to avoid any host reboots, but would like to
apply some of the available updates?
Which two updates can be done while avoiding a host reboot?
(Choose two.)
2 Drives
AHV
Data Drives
AOS
24. Which two permission assignment tasks can be accomplished via
Prism Element? (Choose two.)
Grant a user permission to create VMs on a specific storage container
Grant a user permission to view details of all VMs on a specific cluster
Grant an active directory group permission to perform back operations
Grant a user permission to create and delete snapshots on a specific VM
25. An administrator has been asked to enable block awareness and
increase the fault tolerance to FT2 on a Nutanix AHV cluster with
the following configuration:
Four blocks
One node per block
Will the administrator be able to accomplish these tasks?
No-Fault tolerance changes are not supported.
Yes-FT2 requires a minimum of three nodes.
Yes-Block awareness requires a minimum of three blocks.
No-FT2 requires a minimum of five nodes.
26. What requires iSCSI initiator configuration in the guest OS to
use Volumes?
SQL Server Always On Availability Group
Microsoft Windows Failover Cluster
Oracle RAC
Exchange DAG
27. An administrator has set up a local web server accessible to the
Nutanix clusters.
Which two steps are required to set up LCM for an environment
without Internet access? (Choose two.)
Download the lcai_disconnecced_version. tar.gz LCM bundle from the support
portal.
Edit LCM Advanced Settings in Prism Element and enter the address of the
web server.
Edit LCM Advanced Settings m Prism Central and enter the address of the
web server.
Download the lcm_dark_site_version. tar . gz LCM bundle from the support
portal.
28. Which component ensures uniform distribution of data
throughout the cluster to eliminate hot spots and speed up
rebuilds?
Cassandra
Distributed Storage Fabric
High Availability
Acropolis App Mobility Fabric
29. Refer to the exhibit.
Which two initial cluster configuration tasks were missed during the
deployment process? (Choose two.)
Host password changes
Password policy changes
BIOS password changes
CVM password changes
30. A newly-hired Nutanix administrator was tasked by the CIO to
create a single VM on a test network.
The network administrator stated that a native VLAN was used on
the Cisco TOR switches with the following parameters:
IP address:172,16.1.2
Network Mask: 255.255.255.0
Default gateway: 172.16.1.1
VLAN:1
The same parameters were used to create a network profile on
Nutanix, but the when the VM was on …
What should the Nutanix administrator do to fix this issue?
Nutanix removed support for native VLA
Change VLAN field from vlan. 1 to vlan.0.
Enable IPv6 on the V
Use DHCP as opposed to static IP
31. An administrator wants to expand the Failure Domain level of a
cluster.
What two options are available? (Choose two.)
Node
Data Center
Block
Rack
32. An administrator logs in to Prism Element goes to the Network
view, and sees the output shown in the exhibit.
Which three steps must the administrator take to increase
throughput to the host? (Choose three.)
Connect the 10Gb interfaces to the physical switch.
Change the bond mode to balance-slb or balance―tcp.
Remove any 1Gb interfaces still connected from the default bond.
Add a new switch to the network and connect 1Gb interfaces to it.
Change the VLAN ID to a higher priority I
33. An administrator needs to boot a VM to a bootable CD. The
administrator tries to configure the VM to boot to it, select to add
disk, and goes to the images available. The image for the bootable
CD is unavailable.
What is the Likely issue?
The CD-ROM interface is too slow.
The administrator selected a disk attached before it can boot to a C
The VM needs to have a standard disk attached before it can boot to a C
The bootable CD image is corrupted during creation.
34. Refer to Exhibit:
Why has an anomaly been triggered?
Because the CPU usage crossed the blue band.
Because the blue band range increased over the last 2 days
Because the CPU usage dropped belon' 20%
Because the CPU usage reached 100%
35. An administrator is tasked with configuring networking on an
AHV cluster and needs to optimize for maximum single VM
throughput.
Which bond mode should the administrator select?
Active-Active with Mac pinning
Active-Active
Active-Backup
No Uplink Bond
36. An administrator is working with Nutanix Support and needs to
provide logs for troubleshooting an issue. The cluster is located in a
secure environment. Data such as IP addresses and VM names
cannot be shared.
Which method should be used to anonymize the log data sent to
Nutanix Support?
A)
B)
C)
D)
Option A
Option B
Option C
Option D
37. An administrator recently added new SSDs to a Nutanix cluster
and knows the firmware will be out of date, Due to security
constraints, the cluster does not have access to the Internet.
Which two steps must be completed to update the firmware?
(Choose two.)
Download the disk firmware from the OEM's website.
Download a darksite bundle and deploy an internal webserver,
Select Upgrade Software, then upload the firmware bundle.
update the LCM Source and URL to access the firmware bundle.
38. What is Prism Central primarily used for?
Multi-cluster network configuration
Container creation
Multi-cluster Single Sign On
Data reduction configuration
39. Refer to the exhibit.
An administrator is adding a new node to a cluster. The node has
been imaged to the same versions of AHV and AOS that the cluster
running, configured with appropriate IP addresses, and br0-up has
been configured the same the existing uplink bonds
When attempting to add the node to the cluster with the Expand
Cluster function in Prism, the cluster is unable to find the new node.
Based on the above output from the new node, what is most likely
the cause of this issue?
The ports on the upstream switch are not configured for LAC
The existing and the expansion node are on different VLANs.
There is a firewall blocking the discovery traffic from the tlu
LACP configuration must be completed after cluster expansion
40. Which capability refers to the storage of VM data on the node
where the VM is running and ensure that the read I/O does not have
to traverse the network?
Intelligent Locally
Data Locality
Intelligent Tiering
Data Tiering
41. On a Nutanix cluster, what does Network Segmentation refer to?
A distributed firewall for security VM to VM traffic.
Physically separating management traffic from guest VM traffic.
Isolating intra-cluster traffic from guest VM traffic.
Isolating management traffic from storage replication traffic.
42. How should an administrator enable secure access to Volumes
using a password?
iSER
CHAP
SAML
LDAP
43. When a configuring a syslog server in Prism Central, what two
pieces information are required? (Choose two.)
HTTPS URL
Encryption secret
Transport protocol
IP address/port
44. An administrator has been tasked with increasing security on
Nutanix cluster by disabling password authentication when
accessing the CVM and AHV hosts and instead moving to key-based
SSH,
What is the easiest way for the administrator to meet these needs?
Configure LDAP authentication through a secure server,
Enable STIES vie commend line on SSH to CV
Enable Cluster Lockdown and provide an RSA key.
Restrict access with User Management in Prism.
45. Prism Central will be installed manually on an AHV cluster.
Which three disk images must be downloaded from the portal for
the Prism Central VM? (Choose three.)
var
tmp
boot
home
data
46. An administrator needs to run a mixed Exchange and SQL
workload with a guaranteed amount of container space for each
application.
How should the administrator meet this requirement?
Create one container and set capacity reservation
Create two containers and reserve space for containers
Create one container and enable compression
Create two containers and reserve space for vDisks
47. Refer to Exhibit:
An administrator needs to enable inline deduplication for a pre-
existing storage container.
When trying to enable deduplication on the storage container. this
feature is grayed-out.
What is the reason for this behavior?
Replication Factor 1 is configured on the storage container.
The cluster has less than 5 nodes which is the minimum node-count to
enable deduplication.
Capacity reservation is not enabled on the storage container.
The cluster has hybrid storage and deduplication is supported only on all-
flash clusters.
48. An administrator is troubleshooting vDisk performance issues in
a Nutanix cluster with hybrid disks. The VMs all have Flash Mode
enabled.
But users are reporting disk latency.
What could cause the performance issues?
Flash mode is disabled when a node fails.
Compression is disabled on the vDisk storage container.
The VMs vDisks are in multiple containers.
Data size for flash mode exceeds 25% of the SSD capacity.
49. Which node type does not deploy a Nutanix Controller VM?
Storage Only
Hyper Converged
Compute Only
All Flash
50. Which Nutanix service control ncli, the HTML5 UI, and Rest API?
Prism
Cassandra
Zookeeper
Chronos
51. An administrator needs to provide access for a user to view real-
time performance metric for all VMs on all clusters across the
datacenter.
Which method accomplishes this with the least effort and ongoing
maintenance?
Configure IDP authentication and assign the user to the Cluster Admin role in
Prism Central.
Configure AD authentication and assign the user to the Viewer role in Prism
Element.
Configure AD authentication create a custom role, assign the user to the role,
and apply the role to all clusters and VMs
52. A vDisk is read by multiple VMs. The cluster creates immutable
copies of the vDisk.
What are these vDisk copies called?
Disk Clones
Golden Images
Volume Groups
Shadow Clones
53. An administrator responsible for a VDl environment needs to
investigate reports of slow logins. The administrator finds that
increasing the number of vCPUs from 2 to 4 will reduce the login
times. Production workloads are consuming 75% of the host CPU on
the cluster. The administrator increases the vCPU count on all of the
VDl VMs.
What are two impacts on the cluster? (Choose two)
Increasing CPU counts will decrease memory utilization
Increase memory utilization%
Increase CPU utilization%
Increase CPU ready%
54. Which two methods are available when migrating a VM from a
legacy 3-tier solution using VMware ESXi to AHV? (Choose two.)
Deploy the Move appliance.
Use Cross-Hypervisor D
Import the .vmdk into the Image Service.
Use shared nothing live migration.
55. An administrator has received reports of users being
disconnected from remote desktop sessions to a specific VM.
Which VM metric is most useful isolating the cause of the issue?
Storage Controller Bandwidth
Swap-Out Rate
Hypervisor CPU Ready time (%)
Virtual NIC receive packet dropped
56. A customer wants to isolate a group of VMs within their Nutanix
environment for security reasons. The customer creates a VM with
two NICs to act as a firewall and installs the appropriate software
and certificates.
However, no one from the outside can access the application.
What is the likely cause of this problem?
A shared volume group must be used by all isolated VMs
More than one NIC cannot be added to a VM
One of the NICs needs to be configured on the internal VLAN
Wireshark is installed on the NAT VM
57. Refer to Exhibit:
An administrator is trying to put a node into maintenance mode but
receives the message shown in the exhibit.
What is a potential reason for this dialog?
LinuxVM1 uses a vDisks stored in a RFI Datastore
LinuxVM1 uses a Volume Group
LinuxVM1 uses a virtual GP
LinuxVM1 uses e vDisks stored in a RF3 Datastore
58. How many SSL certificates are used by Prism Element on a
Nutanix cluster?
256
2048
59. The administrator recently had a node fail in an AHV Nutanix
cluster. All of the VMs restarted on other nodes in the cluster, but
they discovered that the VMs that make up a SQL cluster were
running on the failed host. The administrator has been asked to
take measures to prevent a SQL outage in the future.
What affinity option will prevent the SQL VMs from running on the
same hos?
VM-VM anti-Affinity policy
Create Affinity Category
VM-Most Affinity policy
Create Affinity Project
60. An administrator adds a node with older generation processors
to an existing AHV cluster with newer generation processors.
What is the effect on live migration?
Live migration continues to function as expected and VMs can move to any
AHV host.
Live migration is prevented until the administrator enables the legacy
migration option.
Live migration is prevented until the administrator manually changes the
newer processor level.
Live migration of VMs is prevented between newer and older processors.