Page 3 out of 25 Pages ... Showing Questions in Random order from Exam |
How would an administrator enter the NDB command line to change the static IP address on the NDB VM?
A. era-server
B. era
C. cerebro_cli
D. arithmos cli
Explanation:
To change the static IP address on the NDB VM, an administrator would need to enter the NDB command
line using the cerebro_cli command. The cerebro_cli command is used to access the Cerebro service, which is
responsible for managing the NDB instance and its components. The cerebro_cli command can be run from
the NDB VM or from any other VM that has network connectivity to the NDB VM.
The cerebro_cli command has various subcommands and options to perform different tasks, such as changing
the IP address, hostname, password, or certificate of the NDB VM. To change the static IP address, the
administrator would need to use the cerebro_cli network update subcommand with the appropriate
parameters, such as the new IP address, netmask, gateway, and DNS servers. The cerebro_cli network
update subcommand also requires the administrator to provide the current password of the NDB VM for
authentication. After changing the IP address, the administrator would need to restart the NDB VM for the
changes to take effect.
How does NDB send notifications when alerts are generated?
A. SNMP
B. APIs
C. Pulse
D. Email
Explanation:
NDB sends notifications when alerts are generated via email. The email notifications can be configured to
send to one or more recipients, and can be customized to include the alert severity, category, description, and
resolution steps. The email notifications help to inform the database administrator and other stakeholders
about the status and issues of the NDB-managed databases and operations.
NDB does not send notifications via SNMP, APIs, or Pulse. SNMP is a protocol for collecting and organizing
information about managed devices on a network. APIs are interfaces for communicating and exchanging
data between different applications or systems. Pulse is a feature of the Nutanix cluster that collects and sends
diagnostic and usage data to Nutanix for analysis and support.
Which two profiles are required to provision a new Oracle database through Era? (Choose two.)
A. Memory
B. Compute
C. Network
D. Storage
Explanation:
In the Nutanix Database Automation (NCP-DB) framework, provisioning a new Oracle database through Era
requires the configuration of both a Compute and a Storage profile1. The Compute profile is used to define
the resources allocated to the database, such as CPU and memory, while the Storage profile is used to specify
the storage configuration for the database. These profiles are essential in ensuring that the database is
provisioned with the necessary resources and storage configurations for optimal performance23.
An administrator is tasked with providing a Jr DBA with access to NBD with limited capabilities.
This user should only be able to:
• Provision Databases
• Provision Database Servers
• Create Ones
• Refresh Clones
• Patch Database Servers
How can the administrator complete this task?
A. Clone the Database Admin role, and add the desired privileges.
B. Create a role with only those privileges, assign the role to the Jr DBA user.
C. Create a user for the Jr DBA, and assign only those privileges.
D. Clone the Database Admin role, and remove all but the desired privileges.
Explanation:
The correct answer is B because it allows the administrator to create a custom role with the specific privileges
that the Jr DBA user needs, and then assign that role to the user. This way, the administrator can control the
access level of the Jr DBA user without affecting the existing roles or users in NDB. Option A is incorrect
because it involves cloning the Database Admin role, which has more privileges than the Jr DBA user
requires, and then adding more privileges, which is unnecessary and redundant. Option C is incorrect because
it involves creating a user for the Jr DBA, but not assigning a role to the user, which means the user will not
have any privileges in NDB. Option D is incorrect because it involves cloning the Database Admin role,
which has more privileges than the Jr DBA user requires, and then removing some of the privileges, which is
inefficient and risky.
When an Oracle database is upgraded using Era, what is the type of upgrade category?
A. In-place upgrade
B. Out-of-place upgrade
C. Disruptive upg raze
D. Non-disruptive upgrade
Explanation:
When an Oracle database is upgraded using Era, the type of upgrade category is an “In-place upgrade”. This
method involves upgrading the database software within the same Oracle home as the existing database. The
AutoUpgrade utility is used to automate the upgrade process, both before starting upgrades, during upgrade
deployments, and during post-upgrade checks and configuration migration1. This method is preferred due to
its simplicity and efficiency1.
Which two encryption methods can be used when configuring an SMTP server? (Choose two.)
A. TLS
B. SSL
C. S/MIME
D. IPsec
Explanation:
NDB supports SMTP server configuration for sending email notifications and alerts. SMTP server
configuration requires specifying the SMTP server address, port, username, password, and encryption
method. The encryption method determines how the email messages are secured during transmission. NDB
supports two encryption methods for SMTP server configuration: TLS and SSL.
TLS (Transport Layer Security) is a protocol that encrypts and authenticates data between the email client and
the SMTP server. TLS can operate in two modes: explicit and implicit. In explicit mode, the email client and
the SMTP server negotiate the encryption method and parameters after establishing a plain text connection.
This mode typically uses port 587. In implicit mode, the email client and the SMTP server assume that the
connection is encrypted from the start, without any negotiation. This mode typically uses port 465.
SSL (Secure Sockets Layer) is a predecessor of TLS that also encrypts and authenticates data between the
email client and the SMTP server. SSL operates in implicit mode only, and uses port 465 by default. SSL is
less secure than TLS, but it is still widely used and supported by many email providers.
S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard that encrypts and signs email messages
at the application layer, rather than the transport layer. S/MIME requires the use of digital certificates and
public key cryptography to ensure the confidentiality and integrity of email messages. S/MIME is not a valid
encryption method for SMTP server configuration, as it does not affect the connection between the email
client and the SMTP server.
IPsec (Internet Protocol Security) is a suite of protocols that secures IP packets at the network layer, rather
than the application or transport layer. IPsec can encrypt and authenticate data between any two IP endpoints,
such as routers, firewalls, or hosts. IPsec is not a valid encryption method for SMTP server configuration, as it
does not apply to the specific protocol or port used by SMTP.
Page 3 out of 25 Pages |
Previous |