Page 2 out of 30 Pages ... Showing Questions in Random order from Exam |
An administrator is working with Nutanix Support and needs to provide logs for troubleshooting an issue. The cluster is located in a secure environment. Data such as IP addresses and VM names cannot be shared. Which method should be used to anonymize the log data sent to Nutanix Support?
A. Option A
B. Option B
C. Option C
D. Option D
An administrator wants to create a trunked interface on a VM on AOS 5.15x.
Which two steps should the administrator take first to achieve this? (Choose two)
A. Use acli
B. Log in over PE web UI.
C. SSH to CVM.
D. Update VM dialog
An administrator has been tasked with increasing security on Nutanix cluster by disabling password authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH,
What is the easiest way for the administrator to meet these needs?
A. Configure LDAP authentication through a secure server,
B. Enable STIES vie commend line on SSH to CVM.
C. Enable Cluster Lockdown and provide an RSA key.
D. Restrict access with User Management in Prism.
What is the default network bond setting for an AHV host configuration?
A. active-backup
B. active-active
C. balance-slb
D. balance-tcp
Refer to the exhibit.
An administrator is trying to implement the solution that is shown in the exhibit, but has
been unsuccessful.
Based on the diagram, what is causing the issue?
A. A remote Witness VM
B. Active containers in both sites
C. Network latency
D. Unsupported hypervisor
Explanation: The correct answer is C. Network latency.
The diagram shows a solution that uses synchronous replication between two remote
protection domains, cluster site A and cluster site B. Synchronous replication is a feature
that allows near-zero RPO (recovery point objective) by replicating data to the remote site
before acknowledging writes to the local site. However, synchronous replication has some
requirements and limitations that must be met for it to work properly. One of these
requirements is that the network latency between the two sites must be less than or equal
to 5 ms1. If the network latency is higher than 5 ms, the synchronous replication will fail
and the protection policy will be suspended2.
Therefore, based on the diagram, the most likely cause of the issue is that the network
latency between cluster site A and cluster site B is higher than 5 ms, which prevents the
synchronous replication from working. To verify this, the administrator can use the “ncli
cluster ping” command to measure the network latency between the two sites3. If the
network latency is indeed higher than 5 ms, the administrator can either improve the
network performance or switch to a different replication mode, such as near-synchronous
or asynchronous.
An administrator is tasked with configuring networking on an AHV cluster and needs to optimize for maximum single VM throughput.
Which bond mode should the administrator select?
A. Active-Active with Mac pinning
B. Active-Active
C. Active-Backup
D. No Uplink Bond
Explanation:
Active-Active is a bond mode that allows all uplinks in the bond to be used simultaneously for traffic transmission and reception. This bond mode provides load balancing and increased bandwidth for the AHV host and its VMs. Active-Active bond mode uses a hashing algorithm based on source MAC addresses to distribute traffic across different uplinks in the bond. Each individual VM NIC uses only a single bond member interface at a time, but multiple VM NICs are spread across different bond member interfaces. As a result, it is possible for a Nutanix AHV node with two 10 Gb interfaces to use up to 20 Gbps of network throughput, while individual VMs have a maximum throughput of 10 Gbps6.
Therefore, if an administrator needs to optimize for maximum single VM throughput, they should select Active-Active bond mode for their AHV cluster. This bond mode can be configured using Prism Element UI or manage-ovs commands on each AHV host7. No additional configuration is required on the upstream switch side, as long as the switches are interconnected physically or virtually and both uplinks trunk the same VLANs8.
Page 2 out of 30 Pages |
Previous |