An administrator needs to run a mixed Exchange and SQL workload with a guaranteed amount of container space for each application.
How should the administrator meet this requirement?
A. Create one container and set capacity reservation
B. Create two containers and reserve space for containers
C. Create one container and enable compression
D. Create two containers and reserve space for vDisks
A node with Erasure Coding fails.
What is the impact?
A. The node stops utilizing Erasure Coding.
B. Potentially increased amount of data stored in the SSD tier.
C. Increased Controller VM CPU Load.
D. AQS unable to do deduplication during the Erasure Coding failure.
Which SSL Files required for Importing Key and certificate (Choose 2)
A. Public Certificate
B. Private Certificate
C. CA Certificate D. Private Key
An administrator wants to secure an application running on an AHV cluster by limiting incoming and outgoing traffic destinations. The administrator creates a security policy for the application.
What is the next step?
A. Apply the Security Policy
B. Create an isolation policy
C. Add the Security policy to an existing isolation policy
D. Restart the VM hosting application
Two HDDs fail simultaneously on a single AHV host.
What are the chances of data loss?
A. 0%
B. 25%
C. 50%
D. 100%
An administrator migrates a Windows VM from an ESXi host to a Nutanix AHV cluster. When powered on, the migrated VM fails to start. The VM console shows the error message:
Cannot locate boot device
What should the administrator confirm to identify the reason that the VM fails to boot?
A. The Windows OS is at a supported patch level.
B. Nutanix Virt IO drivers were installed on the VM pre-migration.
C. VM snapshots on the source cluster were consolidated.
D. The ESXi source cluster can ping the destination AHV cluster.
What should the administrator do to enable this functionality?
A. Migrate the VM to a host where snapshots are enabled.
B. Create a volume group that contains the snapshots and add it to the VM.
C. Reboot the VM and enter Repair mode. Mount the CO from the subsequent menu.
D. Add a CO-ROM to the VM and mount the NGT ISO. Install the tools from inside the guest VM
How does AHV IPAM provide IP addresses to the VMs?
A. It runs a DHCP service within each CVM, which responds to DHCP requests from VMs on the local node.
B. It leverages a plug-in, which enables connection to third-party IPAM solutions to handle DCHP assignments.
C. It is a centralized DHCP server within Prism Central, which responds to DHCP requests for VMs on managed clusters.
D. leverages VXLAN and OpenFlow rules to intercept the DHCP request and responds with an address.
What provides the most efficient method to delete 20 specific AHV VMs?
A. Create a script using PowerCLI to delete the VMs.
B. In Prism Element, select and delete each VM.
C. Create a script using Postman and REST API.
D. In Prisra Central, select all VMs and click delete.
An administrator has a 4-node Nutanix cluster running on Hyper-V. The administrator create a new storage container and makes that available to all hosts.
Which storage protocol should be administrator use for the hosts to gain access to the storage container?
A. NFS
B. iSCSI
C. SMB/CIFS
D. Fiber Channel