Page 15 out of 51 Pages ... Showing Questions in Random order from Exam |
An administrator has a 32-node hybrid cluster with CPU, RAM and storage utilization of 80%. A database VM is configured with VM Flash. What is causing this IO latency?
A. Controller VM is experiencing high CPU ready time.
B. Curator scans causes by ILM constantly moving data.
C. VM Flash Mode reduces SSD tier capacity for VMs.
D. Database VM is experiencing high CPU ready time.
A consultant is working to setup the network before starting the Foundation process. How should the consultant complete this task?
A. Using the shared IPMI port, ensure that the connected switch can auto-negotiate to 1 Gbps.
B. Disable IPv6 on the network to which the nodes are connected to ensure that IPv6 unicast is blocked.
C. Ensure the IPMI of the nodes are reachable using pre-configured IPMI IPv6 addresses.
D. On Nutanix NX Series, connect the IPMI port and any one of the data ports to the switch.
An administrator protected a DB VM running on a Nutanix cluster with NearSync Replication, which schedules to repeat every 15 minutes to a second site. The daily change rate is low. During nightly backups, the replication window is missed due to write volume. Which two options describe the expected behavior? (Choose two.)
A. NearSync stops working and fails over to the remote site.
B. Protection Domain transitions back to the hourly schedule.
C. The Administrator needs to re-enable it manually.
D. The system continuously tries to get to the NearSync schedule.
Explanation: When a NearSync Replication window is missed due to high write volume
during nightly backups, the expected behavior of the system is to adjust the replication
schedule temporarily and continuously attempt to return to the configured NearSync
schedule. The correct answers are:
Option B, "Protection Domain transitions back to the hourly schedule." If the NearSync
cannot maintain the 15-minute schedule due to excessive write volume, it may temporarily
fall back to a less frequent schedule, such as hourly, to stabilize.
Option D, "The system continuously tries to get to the NearSync schedule." NearSync is
designed to handle transient high-load situations by trying to catch up and revert to the preset
NearSync schedule as conditions allow.
A consultant creates a Nutanix cluster using the 10.10.10.0/24 network and VLAN 10. The customer creates a VM network inside the Prism using VLAN 20. The customer starts to create VMs but is unable to ping the default gateway from these new systems.
What is causing the issue?
A. The CVM/hypervisor must be on an untagged VLAN.
B. The switch port is not set up as a trunk.
C. Only one VLAN is supported on AHV.
D. The CVM/hypervisor cannot use the same VLAN as guest VMs.
Explanation: The issue of VMs not being able to ping the default gateway from a newly created VM network on VLAN 20, while the Nutanix cluster uses VLAN 10, most likely stems from the switch port configuration. For the VMs on VLAN 20 to communicate outside their local network, the switch port to which the Nutanix nodes are connected must be configured as a trunk. This configuration allows multiple VLANs to coexist on the same physical port and enables routing between them. Without the trunk setup, the VLAN 20 traffic is restricted and cannot reach the network beyond the switch, including the default gateway.
After reviewing the questionnaire provided by a customer, the consultant is completing the Foundation Configuration on the Nutanix website. According to the customer requirements, the cluster should be prepared off site in a safe room, and moved afterwards to the datacenter. Which configuration should the consultant implement on the Foundation VM?
A. Add « virtual switch dedicated to the IPMI network.
B. Prepare multi-homing with two IP addresses.
C. another physical laptop port to the Foundation VM.
D. Create a firewall rule blocking customer subnets.
Explanation: When preparing the cluster offsite in a safe room, the consultant should ensure that the Foundation VM is correctly configured to handle IPMI networking. Implementing a virtual switch dedicated to the IPMI network within the Foundation VM environment ensures that there is a segregated and controlled network path for IPMI traffic, which is crucial for initial hardware configuration and management. This setup facilitates the secure and efficient foundation process before the cluster is moved to the data center.
Refer to the exhibit.
An administrator creates a security policy that isolates their financial application from
accessing the Internet When viewing the policy in Prism Central, several connections from
the application are outbound to the Internet.
What is causing this issue with the policy?
A. The 0.0.0.0 address was not specified in the outbound rule.
B. The blocked connections are illustrated for information only.
C. The Activate box was not checked in the rule, so it is not enforcing.
D. The policy has been left in monitor mode instead of enforcing mode.
Page 15 out of 51 Pages |
Previous |