Page 1 out of 13 Pages |
Administrator has recently deployed an NC2 cluster on AWS in the North Virginia region in availability zone
us-east-id. The consuming IPS from a 10.78.2.0/24 range.
The AWS VPC has two available CIDR ranges:
10.78.0.0/16
10.19.101.0/24
The following subnet have been configured in the NC2 AWS VPC:
Which two subnet will show up in the Network configuration of the Prism Element Settings page? (Choose
two.)
A. DR01
B. L2stretch
C. VDI
D. DR02
Explanation:
An administrator has deployed an NC2 cluster on AWS to an existing environment for VDI.
Afterwards, the corporate security teams direct the administrator to reuse an existing AWS subnet, 10.79.4.0/24
that has two EC2 instances: EC2-1 (10.79.4.200) and EC2-2 (10.79.4.201). The security team indicates that
this directive is to avoid overlap with the AHV IPAM.
Which two configuration actions should the administrator take to ensure there are no configuration issues?
(Choose two.)
A. aCLI > net.add_to_ip_bfacklist 10.79.4.200 aCLI > net.add_to_ip_blacklist 10.79.4.201
B. Deploy two VMs on the NC2 cluster and assign 10.79.4.200 and 10.79.4.201 as the assigned IPs in Prism Element
C. aCLI > net.de/ete_from_ip_blacklist 10.79.4.200 aCLI > net.defete_fromjp_blacklist 10.79.4.201
D. Configure the AHV JPAM to use DHCP range 10.79.4.2 -10.79.4.253.
Explanation:
To avoid IP address conflicts and ensure there are no configuration issues when reusing an existing AWS
subnet, the administrator should take the following actions:
aCLI > net.add_to_ip_blacklist 10.79.4.200 aCLI > net.add_to_ip_blacklist 10.79.4.201 (Answer
A):
This command adds the specified IP addresses to the blacklist, preventing AHV IPAM from
assigning these addresses to any VMs. This ensures that the existing EC2 instances with IPs
10.79.4.200 and 10.79.4.201 are not allocated to other VMs in the NC2 cluster.
Configure the AHV IPAM to use DHCP range 10.79.4.2 -10.79.4.253 (Answer D):
By configuring the AHV IPAM to use a specific DHCP range, you ensure that the IP addresses
assigned to the EC2 instances (10.79.4.200 and 10.79.4.201) are not included in the DHCP pool.
This prevents IP address conflicts within the subnet.
A company has a large scale AWS deployment and has just finished installing their first NC2 on AWS
cluster. The new cluster is now running workloads in production.
The cluster is configured with:
* 16 Nodes
* 8 Subnets
* 200 User VMs per subnet
* Nutanix Files
An administrator has been tasked with installing an EC2 instance on one of the subnets that is also used by the
Nutanix, When the EC2 instance is powered on, an IP conflict occurs.
What action should the administrator take to resolve this issue?
A. The IP address used by the NC2 VM should be blocked /excluded from EC2.
B. The Instance Metadata of the NC2 instance needs to have the address reserved.
C. Assign an elastic IP to the EC2 instance and reboot.
D. The IP address used by the EC2 instance should be blocked / excluded from IPAM.
Explanation:
To resolve the IP conflict issue when an EC2 instance is powered on in a subnet also used by Nutanix NC2,
the administrator should block or exclude the IP address used by the NC2 VM from being assigned to EC2
instances. This can be done by configuring the IP address management (IPAM) settings to ensure that the
specific IP addresses allocated to the NC2 VMs are not used by EC2 instances, preventing IP conflicts and
ensuring smooth operation of both environments.
Which two features or services can an administrator ensure are protected by cluster protect within an NC2 environment? (Choose two.)
A. Flow Network Security
B. VM Templates
C. Nutanix Files
D. Virtual Machine Disks
Explanation:
Within an NC2 environment, the Cluster Protect feature can ensure the protection of:
Nutanix Files: This provides file services within the Nutanix ecosystem, and Cluster Protect can
safeguard the data stored in Nutanix Files.
Virtual Machine Disks: This ensures that the data stored on virtual machine disks is protected,
providing backup and recovery options for the virtual machines running within the cluster.
Which service enables the monitoring of key metrics on various AWS services, inducing EC2, EBS, and VPC for an NC2 cluster deployments?
A. Amazon CloudWatch
B. AWS CloudTrail
C. AWS CloudFormation
D. Amazon inspector
An administrator needs to understand which of the services implemented on their NC2 AWS deployment will be protected with Cluster protect. Which service of feature is Cluster Protect able to both protect and recover its associated metadata?
A. Object
B. VM templates
C. Files
D. Categories
Explanation:
Cluster Protect in an NC2 environment can protect and recover the following services and their associated
metadata:
VM Templates: Ensures that templates used for creating virtual machines are backed up and
recoverable.
Files: Protects data stored in Nutanix Files, ensuring that file services are backed up and can be restored
as needed.
Page 1 out of 13 Pages |