Refer to the exhibit.
A Nutanix host is connected as shown in the exhibit with br0-up set to active/backup. Physical Switch 1 experiences a power outage causing br0-up to failover to using eth2. The CVM and host become inaccessible. User VMs restart on other hosts in the cluster, which causes a disruption to those VMs.
Which configuration issue likely caused this outage?
A. Bridge br0-up should be configured to use balance-tcp rather than active/backup.
B. The CVM should have eth1 connected to the OVS.
C. The upstream port for eth2 is missing a VLAN.
D. The user VMs only have one NIC
An administrator is configuring software only. Data-at-Rest Encryption on their Nutanix cluster. They are planning to deploy a third-party key management server (KMS). Where should this server be hosted?
A. As a single VM on the Nutanix cluster
B. On hardware external to the Nutanix duster
C. As a clustered VM setup on the Nutanix cluster
D. As a single VM deployed on the host that contains the Prism leader CVM
An administrator learns that some security settings in a cluster have been changed. The environment is out of compliance with required policies. Which function should be used to revert any settings that have changed from the defaults and prevent further violations?
A. Cluster Lockdown with strong password enforcement
B. Advanced Intrusion Detection Environment (AIDE)
C. Security Configuration Management Automation (SCMA)
D. Defense Information Systems Agency STIG enforcement
An administrator is implementing a VDI solution. The workload will be a series of persistent desktops in a dedicated storage container within a four-node cluster. Storage optimizations should be set on the dedicated storage container to give optimal performance including during a node failure event.
Which storage optimizations should the administrator set to meet the requirements?
A. Compression, Deduplication, and Erasure Coding
B. Deduplication and Erasure Coding
C. Compression and Deduplication
D. Compression only
Refer to the exhibit.
An administrator creates a security policy that isolates their financial application from accessing the Internet When viewing the policy in Prism Central, several connections from the application are outbound to the Internet. What is causing this issue with the policy?
A. The 0.0.0.0 address was not specified in the outbound rule.
B. The blocked connections are illustrated for information only.
C. The Activate box was not checked in the rule, so it is not enforcing.
D. The policy has been left in monitor mode instead of enforcing mode.
An administrator responsible for a VDI environment needs to investigate reports of slow logins. The administrator finds that increasing the number of vCPUs from 2 to 4 will reduce the login times. Production workloads are consuming 75% of the host CPU on the cluster. The administrator increases the vCPU count on all of the VDI VMs.
What are two impacts on the cluster? (Choose two.)
A. Increase CPU utilization%
B. Increase CPU ready%
C. Increase memory utilization%
D. Increasing CPU counts will decrease memory utilization
A customer has a primary datacenter with 12 Nutanix blocks distributed across three racks. The customer wants to achieve the most resiliency possible. They also have a datacenter in a branch office that is 400 kilometers away from the primary datacenter.
Which two solutions should be used? (Choose two.)
A. Time Stream to a remote site
B. Async DR to a remote site
C. Rack awareness
D. Block awareness
Over the period of 2 to 3 weeks, a cluster displays the following:
1.
Periods where Warning Alerts of memory usage over 75% are asserted
2.
Periods where Critical Warnings of memory usage over 90% are asserted
3.
Periods of slow of frozen VDI desktops have caused work stoppage or slowdown
4.
VDI clones have periodically not powered up when called, causing work stoppage Which steps should be used to prioritize the administrator's troubleshooting efforts?
A. 1. Assess resource health on Hardware page
2.
Review the Analysis page for memory usage demand
3.
Determine the VDI workload-to-host affinity across the cluster
B. 1. Analyze Alert Pages for a root cause of memory problem
2.
Analyze VM table page to access the VM functionality
3.
Analyze the VDI Clone properties for possible VDI Workload stress
C. 1. Check Analysis page for CPU demand
2.
Verify VDI workload property for memory subscription
3.
Review the Hardware page to determine if the cluster has sufficient RAM
D. 1. Review Analysis Page for memory use pattern
2.
Alert with VDI workload demand
3.
Analyze current and future workload in the Capacity Runaway tab for sufficient resources
Refer to the exhibit.
A Microsoft SQL 2016 deployment is shown in the exhibit. The administrator receives user reports that database queries take too long to return. Which optimization should be made to this configuration to improve performance?
A. Combine both of the OS and SQL Binaries disks
B. Add a second SCSI controller for the Database.
C. TempDB, and Logs disk Separate the Database. TempDB, and Logs onto their own disks
D. Configure the VM to use a PCI disk controller
An administrator needs to make sure an RF2 cluster can survive a complete rack failure without negatively effecting workload performance. The current cluster configuration consists of the following:
1.
30 nodes: distributed 10 nodes per rack across three 42U rack
2.
Each nodes is configured with 40TB usable storage all flash (Cluster Total 1.2 PB Usable)
3.
Current cluster utilization is 900TB storage
Which configuration changes should be made to make sure that the cluster meets the requirements?
A. Expanse the cluster by adding 3 additional nodes per rack, 9 nodes total.
B. Expanse the cluster by adding 2 additional nodes per rack, 6 nodes total.
C. Expanse the cluster by adding 9 nodes to a new 42U rack
D. Expanse the cluster by adding 8 nodes to a new 42U rack