Refer to the exhibit.
User 1 and User 2 belong to the AAPM group.
What are two descriptions of how Files perform quota management? (Choose two.)
A. User 2 can continue to add another 3GB file but will receive a daily notification email.
B. User 1 can continue to add another 5GB file but will receive a daily notification email.
C. User 1 can add an 8GB file to the share without receiving notification.
D. User 2 can add an 8GB file without receiving a notification email.
An administrator learns that some security settings in a cluster have been changed. The environment is out of compliance with required policies.
Which function should be used to revert any settings that have changed from the defaults and prevent further violations?
A. Cluster Lockdown with strong password enforcement
B. Advanced Intrusion Detection Environment (AIDE)
C. Security Configuration Management Automation (SCMA)
D. Defense Information Systems Agency STIG enforcement
An administrator responsible for a VDI environment needs to investigate reports of slow logins. The administrator finds that increasing the number of vCPUs from 2 to 4 will reduce the login times. Production workloads are consuming 75% of the host CPU on the cluster. The administrator increases the vCPU count on all of the VDI VMs.
What are two impacts on the cluster? (Choose two.)
A. Increase CPU utilization %
B. Increase CPU ready %
C. Increase memory utilization %
D. Increasing CPU counts will decrease memory utilization
A guest VM is reported to have poor storage performance. It has an I/O profile of 80% read. 20% write, and the HDDs form more than 50% of the read source. What should an administrator do to resolve this issue?
A. Increase SSD capacity
B. Increase the OPLOG
C. Increase the write cache
D. Use HDDs with higher RPM
An administrator needs to make sure an RF2 cluster can survive a complete rack failure without negatively effecting workload performance. The current cluster configuration consists of the following:
30 nodes: distributed 10 nodes per rack across three 42U rack
Each nodes is configured with 40TB usable storage all flash (Cluster Total 1.2 PB Usable)
Current cluster utilization is 900TB storage
Which configuration changes should be made to make sure that the cluster meets the requirements?
A. Expanse the cluster by adding 3 additional nodes per rack, 9 nodes total.
B. Expanse the cluster by adding 2 additional nodes per rack, 6 nodes total.
C. Expanse the cluster by adding 9 nodes to a new 42U rack
D. Expanse the cluster by adding 8 nodes to a new 42U rack
A customer needs a DR solution designed around the following requirements: There are 8 ms of latency between Sites A and B The administrator needs the shortest RPO/RTO possible Application consistent snapshots are required Use of Nutanix VSS
Which Data Protection Method should be used?
A. Async
B. Metro Availability
C. Near Sync
D. Cloud Connect
An administrator needs to migrate workloads from a Nutanix cluster running VMware ESXi to Nutanix AHV. The migration process needs to be completed in multiple VM groups and support roll back in case any problems are found during user acceptance testing.
Which action should the administrator perform?
A. Use Cross Hypervisor DR to replicate VMs from ESXi to AHV
B. Use VMware Converter
C. Use Nutanix one-click cluster conversion from ESXi to AHV
D. Use storage live migration
An administrator is concerned that Prism will be inaccessible if Active Directory is unable to process logins. Which method should the administrator use to access the cluster in the event of this type of outage?
A. Manage the cluster by using the "nutanix" user on the Prism leader CVM
B. Create and use an emergency local account on the cluster
C. Deploy an Active Directory server locally on the cluster
D. Manage the cluster remotely by downloading ncli to a remote workstation
An administrator needs to expand a cluster based on AHV and running on Nutanix G5 hardware with a new Nutanix G7 system. The cluster is running AOS 5.10 but the operation fails when expanding the cluster. AOS is running on the new system. There are no issues discovering the node.
Why is the operation failing?
A. AOS version running on G7 is older than the version on the cluster.
B. Foundation software has not been updated on the cluster.
C. G7 hardware cannot be added to a G5 cluster.
D. EVC needs to be configured before cluster expansion
An administrator finds that home shares cannot be configured in a new Files 3.5 deployment.
Why is this happening?
A. NFS default access is set to Read Only.
B. Multi-protocol access is not configured.
C. Access Based Enumeration is not enabled.
D. The system is deployed as a single FSVM.