New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

NCS-Core Questions and Answers

Question # 6

An administrator is trying to correct high cluster IOPs and Cluster Controller Latency. Networking is the suspected issue.

Which networking parameters should be configured in the Nutanix cluster?

A.

Bond State and network latency

B.

Number of NICs connected and network latency.

C.

Number of NICs connected and frame size

D.

Number of NICs connected and bond state.

Full Access
Question # 7

After deployment of a Nutanix cluster, a customer has requested to validate the peak performance of the cluster.

Which tool can a consultant use to satisfy this request?

A.

Nutanix X-Ray

B.

Nutanix HCiBench

C.

diagnostics.py

D.

Nutanix perfmon

Full Access
Question # 8

An administrator is configuring an All Flash cluster to support the following workloads:

• Full clone virtual desktops

• Hadoop

• Write heavy databases

Which three correct configuration options should the administrator use to meet the item requirements? (Choose three.)

For each procedure, indicate whether it is a correct or incorrect procedure that must be configured to meet the item requirements using the drop-down option.

Full Access
Question # 9

Based on customer requirements, a consultant conducted an AHV cluster deployment. Each node is configured with four NICs.

Which two components should the consultant manually update in the As-Built Guide? (Choose two.)

A.

Node Port Layout Diagram

B.

Network Cabling Diagram

C.

Logical Design Diagram

D.

Site installation Diagram

Full Access
Question # 10

An administrator configures authentication in Prism Central (PC) for the NTNX-Admins group. Users report that they are unable to log in. The administrator confirms that the Active Directory (AD) settings in PC are correct.

Which condition could result in this behavior?

A.

A role mapping needs to be associated with the AD group.

B.

The users must be added to the Domain Admins AD group.

C.

The Local authentication type must also be selected in PC.

D.

A client chap certificate must also be added in PC.

Full Access
Question # 11

While creating an image placement policy on the organizations AOS 5.15-based Nutanix cluster, the administrator wants to ensure there are no restrictions on using the selected images on clusters outside of the identified set.

What type of Policy Enforcement must the administrator choose?

A.

Soft

B.

Internal

C.

Hard

D.

External

Full Access
Question # 12

A consultant is preparing to foundation over a customer network that has the following criteria:

* VLAN segmented network

* VLAN tags on the nodes must be imaged prior to starting the foundation process.

For each node, the consultant has done the following:

* Connected to the Network Crash Cart of the Node

* Logged in using “root” credentials

What should the consultant do next?

A.

1. CD to /root/nutanix-network-crashcart/

2. Start Network Utility tool by running: ./network_configuration

3. Change Values

B.

1. CD to /home/data/nutanix/nutanix-network-crashcart/

2. Start Network Utility tool by running: ./network_configuration

3. Change Values

C.

1. Log into CVM using nutanix@192.168.5.254

2. CD to /root/Nutanix-network-crashcart/

3. Start Network Utility tool by running: ./network_configuration

4. Change Values

D.

1. Log into CVM using nutanix@192.168.5.254

2. CD to /home/data/nutanix/nutanix-network-crashcart/

3. Start Network Utility tool by running: ./network_configuration

4. Change Values

Full Access
Question # 13

A customer has a four-node cluster and is using Volume Groups to provide storage services to a SQL cluster.

In the event of a CVM failure in the cluster, what is the expected IO path of the volume group’s iSCSI targets?

A.

vDisk directed at failure CVM are redirected to Data Services IP until CVM is reconnected

B.

vDisk directed to CVM that failed to disconnect and will not reconnect without manual intervention

C.

vDisk directed to failed CVM are redirected to another CVM and automatically reconnect

D.

vDisk directed at failed CVM will disconnect and reconnect when the failed CVM comes back online

Full Access
Question # 14

In preparing to install a new cluster for a company, a consultant needs to complete an installation worksheet.

Which values must be documented prior to initial base system setup?

A.

Block Serial Numbers

B.

Hypervisor, CVM, and IPMI IP Addresses

C.

DNS and NTP IP Addresses

D.

Prism Central IP Address

Full Access
Question # 15

A consultant is deploying a new Nutanix cluster. The nodes have the following network interfaces.

◦ 2x 10G NICS

◦ 2x 25G NICS

The consultant is using the default virtual switch configurations for AHV. After creating 10 VMs, the consultant observes inconsistent network speeds from the VMs on the AHV host.

What should the consultant do to resolve this issue?

A.

Configure load balancing on the virtual switch for both 106 and 25G interfaces.

B.

Configure a separate virtual switch with 10G NICs on vs o and 256 NICs on vs.

C.

Configure Active/Backup for both the 10G and 25G interfaces.

D.

Configure all network interfaces with LACP on the same virtual switch.

Full Access
Question # 16

An administrator of a Nutanix Enterprise Cloud has microsegmentation enabled and a firewall VM installed. The security team notifies the administrator that one of the VMs hosted in the environment has been exhibiting suspect network activity. The administrator wants to isolate the VM from the production network, but must still be able to access it to perform diagnostics.

What should the administrator do to meet the requirement?

A.

Disable the vNIC on the affected VM

B.

Quarantine the VM using the Forensic Method

C.

Create a firewall rule that blocks VM traffic but permits diagnostic access

D.

Create a security policy with a service chain directing that VMs traffic to the firewall VM

Full Access
Question # 17

A consultant has deployed a Nutanix cluster with AOS 5.10.x, then discovers the customer’s environment is running on AOS 5.6.x. The consultant decides to re-image the cluster using the foundation Java applet. During the Foundation discovery, all cluster nodes display a status of Unavailable.

What should the consultant do to resolve the issue?

A.

Use the Phoenix ISO

B.

Destroy the cluster.

C.

Restart the Genesis service on the cluster.

D.

Reset the IPMI IP addresses.

Full Access
Question # 18

A customer has the following requirement for a Nutanix cluster:

  • Must support high-performance Nutanix Volumes iSCSI workloads
  • Must utilize AHV nodes
  • Must use 10 GbE interface

How should the customer optimize networking?

A.

Enable Jumbo Frame on just the Host

B.

Convert Cluster to ESXi and enable Jumbo Frame on Host and CVM

C.

Enable Jumbo Frames on just the CVM

D.

Enable the use of Jumbo Frame on Host and CVM

Full Access
Question # 19

An administrator needs to replace the self-signed certificate on a cluster. Which two requirements must be met as part of the process? (Choose two.)

A.

The cluster administrator must restart the interface gateway.

B.

The signed, intermediate and root certificates are chained.

C.

The existing certificate must be deleted prior to replacement.

D.

The imported files for the custom certificate must be PEM encoded.

Full Access
Question # 20

An administrator manages the following two Nutanix AOS 5.15 cluster environment:

• Corp-cluster-01

• Corp-cluster-02

The VM images must be available only on Corp-cluster-01, but cannot be checked out to cluster Corp-cluster-02. The images also cannot be checked out to any other clusters that are registered with Prism Central in the future.

Which two configuration settings must the administrator choose when creating the image placement policy that satisfies the stated requirements? (Choose two.)

A.

Create an image placement policy that identifies cluster Corp-cluster-01 as the target cluster

B.

Set the policy enforcement to Soft.

C.

Set the policy enforcement to Hard.

D.

Create an image placement policy that identifies cluster Corp-cluster-02 as the target cluster.

Full Access
Question # 21

A VM is exhibiting one or more of the following baseline values based on the past 30 days:

• CPU usage < 20%

• CPU ready time < 5%

• Memory usage < 50% (moderately) or < 20% (severely)

• Memory swap rate = 0 Kbps

Which type of VM is being described?

A.

Constrained VM

B.

Inactive VM

C.

Bully VM

D.

Over-Provisioned VM

Full Access
Question # 22

A consultant is showing the Prism Element Web Console to a customer and wants to check that cluster health is OK. During validation, the Health menu raises critical alerts about components using default passwords.

The cluster is based on ESXi as hypervisor, where Prism Central and Nutanix Files are deployed. Passwords have already been changed for a few components, but some of them have been left by default.

How can the consultant check and handle that situation?

A.

Activate Cluster lockdown in Prism Element.

B.

Check accounts and passwords in Local User Management in the vCenter.

C.

Check NCC results and review the associated KB.

D.

Deploy and connect the cluster to Prism Security Central.

Full Access
Question # 23

An administrator needs to replace an aging SAN and move to a hyper-converged infrastructure. The existing environment consists of the following hosts that are connected to the SAN:

• 5xAIX hosts

• 3x Hyper-V hosts

• 9xESXi hosts

• 2x physical SQL Clusters (Windows Server 2012R2 hosts)

After deploying a Nutanix AHV cluster, which two actions should the administrator take to meet the requirements? (Choose two.)

A.

Deploy Volumes to support the AIX and SQL workloads.

B.

Migrate the ESXI workloads to AHV using Move.

C.

Deploy Files to support the AIX hosts.

D.

Migrate the ESXi and Hyper-V workloads using Move.

Full Access
Question # 24

Refer to the exhibit.

An administrator creates a security policy that isolates their financial application from accessing the Internet When viewing the policy in Prism Central, several connections from the application are outbound to the Internet.

What is causing this issue with the policy?

A.

The 0.0.0.0 address was not specified in the outbound rule.

B.

The blocked connections are illustrated for information only.

C.

The Activate box was not checked in the rule, so it is not enforcing.

D.

The policy has been left in monitor mode instead of enforcing mode.

Full Access
Question # 25

A consultant is setting up a new install of Nutanix Files for a customer, but receives this error when attempting to join the customer's Active Directory domain:

File Server could not join the Domain because User credentials failed with error Unable to connect to WORKGROUP ads_connect: No logon servers

The consultant has already verified the domain credentials provided by the customer are valid and have the correct permissions.

What is the most likely cause in this scenario for a domain-join failure when setting up Nutanix Files?

A.

The FSVMs storage network must be in the same network as the logon servers.

B.

The client network is failing to communicate with the customer's domain controllers due to mismatched MTU sizes.

C.

The client network is failing to communicate with the customer's domain controllers due to a missing network firewall port requirement.

D.

The FSVMs must first be manually added to a site mapping in Active Directory before they can be authorized to communicate with the logon servers.

Full Access
Question # 26

A consultant is planning to use a flat switch for installation.

What is the network requirement for Foundation VM, CVM, Hypervisor, and IPMI

A.

Foundation VM, CVM, and Hypervisor must be on the same subnet. IPMI can be on a different subnet.

B.

CVM, Hypervisor, and IPMI must be on the same subnet. Foundation VM can be on a different subnet.

C.

Foundation VM and CVM must be on the same subnet. Hypervisor and IPMI can be on a different subnet.

D.

Foundation VM, CVM, and IPMI must be on the same subnet. Hypervisor can be on a different subnet.

Full Access
Question # 27

An administrator knows that the disks in a cluster are out of date and a new firmware is available. For security reasons, these clusters do not have access to the Internet.

Which two steps must be completed to update the firmware? (Choose two.)

A.

Configure LCM with a URL to access the firmware bundle.

B.

Download a dark site bundle and stage it on an internal webserver.

C.

Download the updated firmware .tgz file from the Nutanix portal.

D.

Select Upgrade Software, then select disks and upload the updated firmware.

Full Access
Question # 28

Which subnet is reserved for CVM internal switch traffic?

A.

192.168.5.0/24

B.

192.168.254.0/24

C.

10.100.5.0/30

D.

172.16.19.0/16

Full Access
Question # 29

An administrator deletes a large amount of data from a Volume Group presented to a Linux VM. The administrator notices that the deleted data has not been reclaimed as usable storage.

What action should be taken to reclaim the storage capacity?

A.

Shrink the Volume Group that is associated with the Linux VM

B.

Unmount the Volume Group and then Remount the Volume Group

C.

Enable the unman operation on the Linux VM

D.

Run Defrag on the Linux VM

Full Access
Question # 30

A consultant is unable to ping the CVM from the hypervisor using the external interface. The customer's network is configured with the 10.3.12.0/24 subnet without VLAN tagging. The CVM and hypervisor are using the same address space.

What is causing this issue?

A.

The 1GbE and 10GbE NICs have not been separated.

B.

The default gateway is incorrect.

C.

The switch is trunked without a native VLAN.

D.

The CVM/hypervisor only communicates over 192.168.5.0/24.

Full Access
Question # 31

An administrator is using Nutanix Move to migrate a Windows VM from ESXi to AHV. Automated guest preparation is failing with an error:

Account has UAC enabled error

The administrator is using the local built-in administrator account for the Windows VM Admin approval mode must remain enabled.

What should the administrator do to continue with the migration with Nutanix Move?

A.

Use a Domain Admin account for the Windows VM

B.

Reboot the Windows VM and try the migration again

C.

Follow manual VM preparation guidelines

D.

Place Windows VM in Maintenance Mode

Full Access
Question # 32

A consultant will be doing an install for an enterprise customer. The consultant has racked up, powered on, and connected their Foundation software to the new nodes. The Foundation VM is not discovering the hardware.

What should the consultant do to resolve this issue?

A.

Console to each node, reboot the node, go through BIOS to set an IPMI IP address, then run Foundation bare metal installation using IPMI IP addresses.

B.

Connect a crash cart to each node, log in to the pre-installed AHV hypervisor, run the IPMITool commands to set IPMI IP Address, subnet, and gateway for each node. Run a Foundation using the configured IPMI addresses that were just set.

C.

Collect the IPMI MAC addresses on the back of each node, run a bare metal Foundation using each MAC addresses.

D.

Connect a crash cart to each node, reboot the node, go through BIOS and set an IPMI IP address for each node. Using your Foundation VM, create a Phoenix boot ISO, then mount the ISO via Virtual Media connector from IPMI.

Full Access
Question # 33

The installation process stops before imaging any of the nodes and an error message is displayed notifying the IPMI IP address is unreachable.

What should consultant do to fix the issue?

A.

Ensure the Foundation VM is not in the same broadcast domain as the Controller VMs.

B.

Re-try Foundation using a non-flat switch.

C.

Check the service. log and the individual node log files for more detailed information.

D.

if the nodes are in the same subnet go to the Cluster page and configure multi-homing.

Full Access
Question # 34

A consultant is performing a Nutanix Cluster installation on Dell XC Core hardware. The consultant decides to use Foundation Portable for Mac to perform the installation. When the consultant arrives onsite, Foundation Portable is unable to locate the new nodes.

Which log should the consultant check to troubleshoot this issue?

A.

/home/nutanix/foundation/log

B.

~/data/logs/foundation.out

C.

foundation.app/contents/resouces/log

D.

~/data/logs/foundation

Full Access
Question # 35

To ensure VM availability when a service outage has occurred, a customer has requested that automatic VM failovers must occur as part of the DR strategy for their environment.

Which failover operation is within an Unplanned Failover option?

A.

AHV Metro - with Witness Operation

B.

Protection Domain Migrate

C.

Cross-Cluster Live Migration

D.

Test Failover

Full Access
Question # 36

An administrator needs to maximize storage potential in a six-node cluster. The container is configured with the following:

  • Post-process compression
  • Capacity deduplication

What should the administrator configure to increase space savings?

A.

Erasure coding

B.

Inline compression

C.

Reserve capacity

D.

Cache dedupe

Full Access
Question # 37

A customer has a mail server and needs Nutanix to send email notifications about errors that might occur in Prism. The following information is included under SMTP Server Settings

◦IP Address of mail server

◦Port Security Mode

◦From email address

What should the consultant set up before arriving onsite?

A.

SMTP server to allow emails from all IPs in customer network

B.

SMTP server to allow emails from Cluster VIP and CVM IP addresses

C.

SMTP to allow emails from Cluster VIP

D.

SMTP server to allow emails from Host IP addresses

Full Access
Question # 38

An administrator is managing multiple Windows and Linux VMs connected to Nutanix Volumes. The Linux VMs are experiencing intermittent connectivity issues. The Windows VMs do not experience the same issue.

Which option should the administrator use to resolve this issue?

A.

Utilize Jumbo Frames

B.

Add additional disks to the Volume Group

C.

Set the SCSI timeout value to 60

D.

Utilize a separate subnet for the Linux VMs

Full Access
Question # 39

A customer has a G6 AHV cluster with 4x10GbE NICs on each node and the following configuration:

* Networking is set to default

* Only two NICs are connected

The customer receives the following critical message:

The NIC is disconnected from the switch, or the switchport is failing.

What should the consultant verify to resolve the issue?

A.

The NICs are configured for active-backup.

B.

The VLANs are configured correctly on the switch or tagged on the cluster.

C.

The other two 10GbE connections are removed from the default bond.

D.

The NICs are connected for balance-slb.

Full Access
Question # 40

As a part of a cluster deployment test plan, a customer asks the consultant for some additional performance and resiliency tests.

How should the consultant best satisfy this request?

A.

Deploy X-Ray and conduct any relevant tests.

B.

use Apache Jmeter.

C.

Run diagnostics.py directly from CVM.

D.

Leverage lometer.

Full Access
Question # 41

A consultant completes a new cluster installation and tries to update the firmware using LCM. The update fails with the following.

operation failed, Reason: Failed to run LCM operation, error: ReadError('not a grip file',).

Which log should the consultant view to get more info?

A.

genesis.out

B.

zookeeper.out

C.

janus.out

D.

athena.out

Full Access
Question # 42

At which prompt should a consultant execute the command nanage_ovs —bridge_nawe brO show_uplinks in a Nutanix cluster?

A.

nutanix@CVM-$

B.

rootOcvM-t

C.

esxiOcvM'S

D.

rootQAHV-J#

Full Access
Question # 43

In a Nutanix cluster, a Protection Domain contains 50 entities that are replicated to a remote Single Node Replication Target.

The current schedule configuration is as follows:

• Repeat every 6 hours

• Local Retention Policy 1

• Remote Retention Policy 8

• Starting time 12 am

At 8 am on Monday, the administrator discovers that a protected VM is corrupted. The latest good state was Sunday 2 pm. The administrator needs to maintain current protection.

Which strategy should the administrator use to meet these requirements?

A.

From the Remote site, activate the Protection Domain, then re-protect the entity.

B.

From the Remote site, restore the VM from the local snapshot by selecting the correct snapshot

C.

From the local site, retrieve the correct remote snapshot, then restore the VM locally.

D.

From the local site, restore the VM from the local snapshot by selecting the correct snapshot.

Full Access
Question # 44

While trying to upgrade AOS in a cluster, a consultant receives a warning message that there are two powered-on VMs that need to be powered off for the upgrade to proceed.

What would cause this warning to be issued?

A.

Upgrading a single-node cluster requires the VMs to be shut down.

B.

Upgrading a two-node cluster requires the VMs to be shut down.

C.

There are not enough resources left in the single-node cluster.

D.

There are not enough resources left in the two-node cluster.

Full Access
Question # 45

During the knowledge transfer on Prism GUI, a customer asked about AHV best practices for VM High Availability on a five-node cluster and the safest configuration. The consultant informed the customer that best practices dictate that all storage containers are configured with a replication factor of 3.

What will be the behavior if the non-default Guarantee mode is selected on Prism with two AHV host failures?

A.

Keeping the default mode will ensure that all VMs can restart in case of two AHV host failures.

B.

Keeping the default mode will ensure that all VMs can restart in case of an AHV host failure.

C.

Will ensure that all VMs can restart if two AHV nodes remains online.

D.

Will ensure that all VMs can restart in case of two simultaneous AHV host failures.

Full Access
Question # 46

A consultant successfully installs the Foundation VM on a laptop and needs to ensure the VM can communicate externally.

Which two configuration changes should the consultant make next? (Choose two.)

A.

Ensure the vNIC is set to bridged adapter.

B.

Configure the static IP address through the desktop virtualization software.

C.

Open terminal and configure via ifconfig command.

D.

Run the set_foundation_ip_address application on the VM desktop.

Full Access
Question # 47

An administrator needs to deploy an application with a large amount of data connected via Nutanix Volumes.

Which two actions should the administrator take when designing the Volume Group? (Choose two.)

A.

Use multiple subnets for iSCSI traffic

B.

Enable RSS (Receive Side Scaling)

C.

Enable thick provisioning on the Volume Group(s)

D.

Distribute workload across multiple virtual disks

Full Access
Question # 48

A customer recently set up Async Replication between Site A and Site B. The customer wants to conduct a planned failover and clicks Activate on Site B.

The customer then runs the following command on Site A:

ncli pd deactivate_and__destroy_vms name=

What does this do to the customer environment?

A.

VMs get deleted from Site B. and the protection domain is now Active.

B.

VMs are powered off on Site A and must be manually powered on at Site B.

C.

VMs get deleted from Site A and the protection domain is no longer active.

D.

Customer must then manually power off VMs at Site A and power them on at Site B.

Full Access
Question # 49

During the cluster deployment, a consultant conducts operational tests on a vCenter-managed ESXi hypervisor.

As a part of tests, vCenter must place the host into maintenance mode, however, the task is stuck and the CVM is not shutting down automatically.

What should the consultant do to resolve the issue?

A.

Shutdown the CVM using cvn_shutdown -P now.

B.

Put the node into maintenance mode using

C.

acli host.enter_maintenance_mode Hypervisor address.

D.

Put the node into maintenance mode using ’-/serviceability/bin/esx-shutdown

-s cwn_.£p_addr

E.

Shutdown the CVM using shutdown -h now.

Full Access
Question # 50

A consultant is using a customer’s switch for installation. Although the 10GbE ports for each of the hosts are connected to the switch, the nodes fail to be discovered.

What is causing the issue?

A.

IPv6 is not enabled on the switch.

B.

IPMI port is not plugged in.

C.

Foundation VM is running on a Windows host.

D.

10GbE ports are configured with the incorrect duplex setting.

Full Access
Question # 51

During Foundation using a customer-provided network switch, a consultant is facing time-out issues.

What action should the consultant take to resolve this issue?

A.

Check jumbo frames support of the network switch.

B.

Ensure the firmware of network switch is updated.

C.

Enable queue depth on ports connected to nodes.

D.

Disable STP on ports connected to Nutanix nodes.

Full Access
Question # 52

As a consultant concludes the project for deploying a new cluster, the customer expresses plans to repeat the process in-house for one of the company's dark site locations.

What three items can the consultant deliver in closing to help ensure customer's success in deploying and supporting Nutanix clusters?

A.

. Creating an account for access to Nutanix Support Portal

· External USB drive

. Offline NCC bundle

B.

· A trial license activation code for Prism Starter

. Creating an account for access to Nutanix Support Portal

. Guide for dark site deployments using Nutanix standards

C.

. Generating cluster licenses

. What are binaries and where can they be downloaded

. Creating an account for accessing the Nutanix Support Portal

D.

· External USB drive

. Access to Nutanix FTP

. Encrypted key required for accessing clusters

Full Access
Question # 53

A consultant deploys a new ESXi-based Nutanix cluster and migrates a sphere deployment to the cluster, After completing the deployment, the customer states they are experiencing VM performance issues.

Upon observing logs and performance data, the consultant identified the following symptoms.

◦ Excessive read/write 1/Os on CVMs

◦ Excessive Motion of VMs

What is causing this issue?

A.

Sphere cluster DRS migration threshold is set to Conservative.

B.

DRS is in use and the cluster is configured to use Erasure Coding.

C.

DRS is in use and the cluster is configured to use Deduplication.

D.

Sphere cluster DRS migration threshold is set to Aggressive

Full Access
Question # 54

Where can a consultant find Nutanix Enablement Starter Packs (ESPs)?

A.

In the Partner Portal

B.

In the Nutanix .NEXT Community Forum

C.

In the Support Portal

D.

In the Services section of the Nutanix website.

Full Access
Question # 55

A VM does not have enough resources for the demand, which leads to performance bottlenecks. The VM is exhibiting one or more of following baseline values, based on the past 30 days:

• CPU usage > 90% (moderate), 95% (high)

• CPU ready time > 5%, 10%

• Memory usage > 90%, 95%

• Memory swap rate > 0 Kbps (no moderate value)

Which type of VM is being described?

A.

Constrained VM

B.

Bully VM

C.

Inactive VM

D.

Over-provisioned VM

Full Access
Question # 56

A customer wants to validate the Microsoft SQL workload performance for a CRM application before migration to the new Nutanix cluster.

Which activity must the consultant add as part of the test plan to fulfill this requirement?

A.

X-Ray with OLAP Workload.

B.

Run perfmon on guest VM.

C.

X-Ray with OLTP Workload.

D.

Run perfmon on all CVMs.

Full Access
Question # 57

An administrator is deploying a three-tier application on a Nutanix Enterprise Cloud consisting of web, application, and database VMs. Traffic between the servers must be limited to specific services/ports. There is an application layer firewall VM deployed on one host in the cluster.

In which way should the administrator meet this requirement?

A.

Create a network for each type of VM, and use policy-based routing to control the traffic flow

B.

Configure a security policy and service chain redirecting the server traffic through the firewall

C.

Separate the web. application and database VMs on to dedicated VLANs

D.

Categorize the VMs in Prism Central and utilize Flow to set a security policy

Full Access
Question # 58

Refer to the exhibit.

An administrator logs in to Prism and sees the status shown in the exhibit within the Hardware Diagram section.

What should the administrator do?

A.

Resolve all alerts and re-import the disks to make sure there is no service disruption.

B.

Restart all CVMs for the cluster to check, confirm health and repartition and add the disks.

C.

Reseat all disks immediately. If this does not help, reseat the nodes.

D.

Check status of applications running on the cluster and call support

Full Access
Question # 59

An administrator is implementing a VDI solution. The workload will be a series of persistent desktops in a dedicated storage container within a four-node cluster. Storage optimizations should be set on the dedicated storage container to give optimal performance including during a node failure event.

Which storage optimizations should the administrator set to meet the requirements?

A.

Compression, Deduplication, and Erasure Coding

B.

Deduplication and Erasure Coding

C.

Compression and Deduplication

D.

Compression only

Full Access
Question # 60

Which subnet should a consultant be aware is reserved for internal connectivity within a Nutanix cluster?

A.

192.168.5.0/24

B.

192.168.5.0/23

C.

192.168.254.0/24

D.

192.168.5.0/26

Full Access
Question # 61

After the successful creation of clusters, the customer wants to ensure that alerts are sent automatically to Nutanix support.

Which Nutanix feature should the consultant ensure is enabled?

A.

Support Portal

B.

Pulse

C.

insights

D.

Support Tunnel

Full Access
Question # 62

An organization is running a Nutanix Cluster based on AOS 5.10.x and VMware vSphere 6.7. Currently, the CVM network is segmented and Storage only nodes not present.

A new security project based on NSX is coming. VMware Distributed Virtual Switches are required. The administrator needs to prepare the environment for the new project.

Which step should the administrator use to initiate the project?

A.

Enable Nutanix Flow at the Prism Central Level

B.

Manually disable CVM network Segmentation

C.

Convert storage only nodes into vSphere nodes

D.

Enable Jumbo Frames to accommodate network frames

Full Access
Question # 63

An administrator is configuring software only. Data-at-Rest Encryption on their Nutanix cluster. They are planning to deploy a third-party key management server (KMS).

Where should this server be hosted?

A.

As a single VM on the Nutanix cluster

B.

On hardware external to the Nutanix duster

C.

As a clustered VM setup on the Nutanix cluster

D.

As a single VM deployed on the host that contains the Prism leader CVM

Full Access
Question # 64

A consultant is onsite with a customer to expand an existing eight-node cluster with four new GPU nodes. The consultant plugs the nodes into the network switch and follows the procedure to expand the cluster in Prism Element, but the new nodes cannot be found.

Which issue is preventing the new nodes from being discovered?

A.

IPMI is not plugged into the network.

B.

IPv6 is disabled on the ToR switch.

C.

Node discovery is disabled in the BIOS.

D.

Active Directory is not configured appropriately.

Full Access
Question # 65

An administrator needs to initiate a new VDI project within a couple of months. Prism Central reports there are no storage resources to accommodate such workloads.

The administrator sees many powered-off VMs and has the authority to delete test VMs powered off at least for 30 days. Test VMs belong to the Test category.

Using Prism Central, which steps are required to identify the correct VMs to be deleted?

A.

Use Capacity Runway to filter by Test and Powered-off VMs

B.

Filter VMs list, choose Test category and Inactive under Efficiency

C.

Create a new Scenario selecting Test VMs. filter by uptime

D.

Create a new Project selecting Test VMs, sorting by power state

Full Access
Question # 66

During a technical call with a customer, it is identified that this installation will be software only on Dell servers. The out-of-band management interfaces will not be given IP addresses until the consultant is onsite.

Which Foundation method should be used for this type of installation?

A.

Bare metal using iDRAC MAC addresses.

B.

Bare metal using LAN MAC addresses.

C.

Bare metal using block serial numbers.

D.

Bare metal using node serial numbers.

Full Access
Question # 67

An administrator recently added VLAN 205 CRM in Prism Element. The workloads attached to the associated NICs are unable to establish network connectivity.

Which Layer 2 protocol allows the administrator to troubleshoot this issue from Prism Element?

A.

HDLC

B.

SUP

C.

LACP

D.

LLDP

Full Access
Question # 68

A consultant creates three storage containers (container-1, container-2, container-3). The customer requires that only container-1, which will be utilized as an NFS datastore, be presented to external hosts.

However, users are able to mount all three containers.

What is causing this problem?

A.

Compression was turned on for all containers.

B.

A Container-level whitelist entry was configured.

C.

Deduplication was turned on for all containers.

D.

A Global whitelist entry was configured.

Full Access
Question # 69

A customer needs a DR solution designed around the following requirements:

• There are 8 ms of latency between Sites A and B

• The administrator needs the shortest RPO/RTO possible

• Application consistent snapshots are required

• Use of Nutanix VSS

Which Data Protection Method should be used?

A.

Async

B.

Metro Availability

C.

Near Sync

D.

Cloud Connect

Full Access
Question # 70

What is the default password shipped on new NX hardware from the factory for the ADMIN user on IPMI?

A.

node-serial-number

B.

nutanix/4u

C.

block-serial-number

D.

ADMIN

Full Access
Question # 71

Refer to the exhibit.

A system administrator is using Range-Autofill tool to assign IP addresses to setup a multi-block cluster based on the following configuration:

Which additional changes must be made during the Foundation process to configure the cluster correctly?

A.

Change host names

B.

Reorder block serial

C.

Change IP address

D.

Reorder blocks

Full Access
Question # 72

A consultant is working with a customer on a new cluster deployment.

While reviewing the customer questionnaire, the consultant notices that the customer has documented their DNS servers as follows:

•CompanyDNSI 192.168.5.10

•CompanyDNS2 192.1685.20

What should the consultant consider regarding this deployment?

A.

Everything has been accounted for to ensure a successful deployment.

B.

Internal Nutanix networking will interfere with the installation's ability to complete.

C.

During deployment, the CVMs should be configured to use a separate network.

D.

New IP's provided should be verified to not conflict with the customers network.

Full Access
Question # 73

A consultant configures an ESXi cluster which will utilize a vSphere Distributed Switch (vDS). The consultant has just migrated the first host to the dvSwitch when several alerts appear within Prism Element regarding Host-to-CVM connectivity.

What is causing these alerts?

A.

The consultant migrated the CVM Backplane and VM network adapter over to the vDS.

B.

The consultant migrated the CVM svm-iscsi-pg network adapter over to the vDS.

C.

The consultant migrated the CVM Backplane network adapter over to the vDS.

D.

VLAN tags are incorrectly configured on the vDS port groups.

Full Access
Question # 74

A customer wants to use NIC teaming on an ESXi host using a vSphere Standard Switch configured with the Route based on physical NIC load load balancing option. The customer does not see the option when editing the Teaming and Failover settings for the switch.

How should the consultant resolve this issue?

A.

Change the load balancing option on the switch.

B.

Add a vSphere Distributed Switch

C.

Add another physical NIC to the team.

D.

Install a vCenter server to manage the switch

Full Access
Question # 75

After the migration, some SQL queries take longer to execute than prior to migration.

The following SQL best practices were applied while creating the SQL VM on Nutanix:

•8 vDisks per SQL server VM

•Database and Log files on separate vDisk

•2 TempDB database drives and 1 TempDB log drive

What should the administrator to do improve the SQL Server performance?

A.

Redistribute existing data by creating additional database file and enable autogrowth

B.

Create multiple TempDB data files and enable autogrowth

C.

Create multiple SQL log files and disable autogrowth

D.

Redistribute existing data by creating additional database files and disable autogrowth

Full Access
Question # 76

A customer’s security team has a policy prohibiting a consultant’s laptop from connecting within the corporate datacenter.

In which two ways should the consultant complete the customer deployment on the factory-prepared nodes? (Choose two.)

A.

Use the Controller VM-based Foundation process.

B.

Configure IPs on hosts and create the cluster.

C.

Run the Network Crashcart Script, provide IPs, and create the cluster manually.

D.

Manually edit ifcfg-etho file on CVM, restart networking, and create the cluster.

Full Access
Question # 77

Refer to the exhibit.

A consultant is installing AOS 5.10 and ESXi 6.5 on three nodes. During the Foundation process, ESXi 6.5 is not available as one of the choices for hypervisor.

Which solution should the consultant use?

A.

Upload ESXi image to /home/Nutanix/foundation/nos/hypervisor/esx.

B.

Restart Foundation VM and refresh Foundation page.

C.

Update the Foundation whitelist from the support portal.

D.

Upload ESXi image to /home/Nutanix/foundation/isos/hypervisor/esx.

Full Access
Question # 78

For a new AHV cluster installation, a customer has 20 NX-8155 nodes with quad port NICs. The customer wants to meet the following guidelines:

◦Take advantage of all available 10G links

◦Achieve maximum throughput per VM

◦Use of redundant ToR switches

◦Fastest reconvergence during link failure

How should the load balancing be configured on the host?

A.

In Prism Element, update the virtual switch uplink configuration to Active-Active with MAC pinning.

B.

In Prism Element, update the virtual switch uplink configuration to Active-Active.

C.

Use CLI to add the interfaces to bridge bro on all hosts.

D.

Use CLI to configure Balance-TCP on bridge bro.

Full Access
Question # 79

A consultant configures a Nutanix cluster and integrates the hosts into vCenter using VMware best practices. The customer has requested that the Nutanix cluster only have a single datastore.

Upon configuring the cluster per the customer requirements, vCenter displays an alert regarding the heartbeat datastore. The consultant adds the das.ignoreInsufficientHbDatastore value = true rule. The container can be seen from each host, but the alert remains active.

What should the consultant do to resolve this issue?

A.

Turn off and then turn back on HA.

B.

Make sure the DRS setting is turned on.

C.

Create a second container.

D.

Whitelist the vCenter IP address within Prism.

Full Access
Question # 80

An administrator needs to configure snapshots for DR scenarios. The databases get refreshed on Friday nights regularly. The search service application re-indexes the new application on Saturday nights regularly. The remaining front-end and middle tier VMs are static but do get minor version updates weekly.

The administrator needs to have 2 weeks of daily snapshots for all the VMs in an app group and 2 weeks application consist local snapshots only on Fridays, Saturdays and Sundays on the same group of VMs.

Which two options should the administrator use to configure snapshots?

A.

Create a schedule in a protection domain for all applicable VMs to snap daily with application consistency enabled with 6 days of retention and with no application consistency and 14 days local retention.

B.

Create two consistency groups in a protection domain, one for front-end and middle tier apps with no application consistency, one for database and Search apps with application consistency, and apply the correct schedule to both groups.

C.

Create one protection domain for all VMs in an application group with scheduled daily non-application consistent snapshots and another protection domain for all VMs in an application group with scheduled Friday. Saturday, Sunday application consistent snapshots.

D.

Create a protection domain for all VMs

Full Access
Question # 81

A consultant creates a Windows VM after installing a new Nutanix cluster running AHV. The consultant has statically assigned an IP address to the VM but it is unable to communicate on the network.

Which action should the consultant take to resolve this issue?

A.

Confirm that IPv6 is enabled on the guest VM.

B.

Confirm that the VM vNIC is tied to the correct VLAN in Prism Element.

C.

Mount and install the Nutanix Guest Tools.

D.

Set a Group Policy to make sure the Windows Firewall is disabled.

Full Access
Question # 82

An existing Nutanix customer has several clusters in production and is adding a new cluster. The customer wants to create an AHV cluster that has already been racked and powered on remotely, with the factory image, using Prism Central.

Which step should the consultant take next?

A.

Build the cluster with the Foundation Applet

B.

Build the cluster with the Foundation VM.

C.

Bare metal image the nodes with the Foundation VM.

D.

Build the cluster with Foundation Central.

Full Access
Question # 83

A consultant installs a new AHV cluster and moves the cluster into the customer's environment. Alter the move, the consultants notice that traffic is not being balanced across the physical NICs. The ToR switches have been configured with LACP.

Within Prism Element, which AHV network option should be set to resolve the issue?

A.

Active-Backup

B.

Active-Active

C.

No Uplink Bond

D.

Active-Active with MAC Pinning

Full Access
Question # 84

Where can the Foundation version included with an AOS bundle be found?

A.

AOS Release Notes

B.

Upgrade Paths menu

C.

Compatibility and Interoperability Matrix

D.

Field Installation Guide

Full Access
Question # 85

Refer to the exhibit.

A Microsoft SQL 2016 deployment is shown in the exhibit. The administrator receives user reports that database queries take too long to return.

Which optimization should be made to this configuration to improve performance?

A.

Combine both of the OS and SQL Binaries disks

B.

Add a second SCSI controller for the Database.

C.

TempDB, and Logs disk Separate the Database. TempDB, and Logs onto their own disks

D.

Configure the VM to use a PCI disk controller

Full Access
Question # 86

An administrator is monitoring the Nutanix v5.15-based AOS cluster performance logs and notices that a SQL server VM is greatly exceeding its intended maximum IOPS. The administrator has confirmed that a QoS policy was previously created for the group of VMs this server is a member of.

What are two reasons that this VM would exceed its maximum configured IOPS from the QoS Policy? (Choose two.)

A.

The VM is missing the required snapshot needed to implement the QoS Policy.

B.

The VM was not created as an AFS virtual machine.

C.

The SQL Server VM has volume groups attached.

D.

It was cloned from another SQL Server VM that was a member of the QoS Policy.

Full Access
Question # 87

When utilizing the Nutanix cluster As Built Document generator, which two configuration elements should a consultant provide when running the run_as_built.exe command? (Choose two.)

A.

Data Services IP

B.

Cluster IP

C.

Remote Site IP

D.

Customer Name

Full Access
Question # 88

After uploading a hypervisor ISO during the Foundation process, a consultant sees a message that the MD5 sum for the hypervisor is not found in the Whitelist file.

Which step should the consultant take next to resolve this issue?

A.

Download the hypervisor ISO again from the vendor website.

B.

Restart the Foundation process and upload the hypervisor again.

C.

Download the latest hypervisor ISO whitelist file from Nutanix portal.

D.

Check the hypervisor version in the Nutanix Compatibility Matrix.

Full Access
Question # 89

A customer has a Nutanix cluster with 10Gb connectivity via switch fabric extenders. The administrator receives NCC health check errors of latency greater than 200ms.

Which action should the administrator take to resolve the NCC errors?

A.

Replace the switch fabric extenders with 10G line rate switches

B.

Upgrade NCC and increase the CVM memory by 4Gb

C.

Add 2 additional 10G uplinks from the switch fabric extenders per node

D.

Upgrade NCC and increase the vCPU of the CVM

Full Access
Question # 90

In which two ways can the IPMI address be set on a Nutanix hardware installation? (Choose two.)

A.

Nutanix Network Crashcart

B.

iLO configuration utility

C.

BIOS configuration

D.

ipmitool

Full Access