An administrator is concerned that Prism will be inaccessible if Active Directory is unable to process logins. Which method should the administrator use to access the cluster in the event of this type of outage?
An administrator is deploying a new application to a Nutanix Enterprise Cloud. The application requires a security to prevent unauthorized access. Theapplication also uses many non-standard ports that are unique to it. Security should not be changed for existing applications.
What should the administrator do to meet these requirement?
A consultant is unable to install virtualization software on a laptop.
Which two versions of Foundation can be used to resolve this issue? (Choose two.)
The following critical Availability Alert displays in prism Central:
The protection Policy PP-BCA-1HR includes a business critical application with a 1-hour snapshot frequency.
What is causing this issue?
A three-node cluster has a Nutanix Files instance with three FSVMs.
What happens after a node failure?
An administrator is deploying several new application VMs to a Nutanix cluster. The application is very transactional with a 28/72 random, read/write ratio.
What should the administrator do?
While preparing for a new four-node cluster installation, the consultant has a Tech Review Call with the customer. The hardware is as follows:
* 4 nodes in 1 Block
* 8 x 10 GbE Ports
* 4 x 1 GbE IPMI Ports
* Adequate Ethernet ports are available
* Ethernet cables are correct and available
* Adequate rack space is available
Which remaining item must be confirmed as available onsite?
A Nutanix cluster is deployed with the following configuration:
• Three four-nodeblocks (A, B, and C)
• All Flash Redundancy Factor 2
What is the effect of simultaneous disk failures on two nodes located in block A?
A consultant is setting up a new vSphere cluster. Customer requirements are as follows:
* VMs should automatically failover to another host if the host crashes
* Host CPU and Memory resources should be evenly balanced
* New VMs should be placed on the host with the most resources available
Which two settings should be turned on to meet the requirements? (Choose two.)
An administrator needs to make sure an RF2 cluster can survive a complete rack failure without negatively effecting workload performance. The current cluster configuration consists of thefollowing:
• 30 nodes: distributed 10 nodes per rack across three 42U rack
• Each nodes is configured with 40TB usable storage all flash (Cluster Total 1.2 PB Usable)
• Current cluster utilization is 900TB storage
Which configuration changes should be made to make sure that the cluster meets the requirements?
Anadministrator needs to evaluate if the existing configuration of Protection Domains meets the specified corporate recovery policy for SQL Data. The corporate policy requires that all SQL Servers be recoverable at the DR site within 30 minutes, and must result in a maximum of 60 minutes of data loss. SQL data must be required.
The protection domain is configured as follows:
• Application consistent snapshots are enabled
• The SQL server VMs are assigned to the Protection Domain as their own Consistency Group
• The Protection Domain schedule is configured as snapshots taken every 90 minutes from 7 am until 8 pm
What must be changed to meet the required policy?
Refer to the exhibit.
An administrator logs in to Prism and sees the status shown in the exhibit within the Hardware Diagram section.
What should the administrator do?
For a new AHV cluster installation, a customer has 20 NX-8155-G6 nodes with quad port SFP NICs.
The customer wants to meet the following guidelines:
* Take advantage of all available 10GbE links
* Achieve maximum throughput per VM
* Use of redundant ToR switches
* Fastest reconvergence during link failure
How should the load balancing be configured on the host?
Anadministrator recently added VLAN 205 CRM in Prism Element. The workloads attached to the associated NICs are unable to establish network connectivity.
Which Layer 2 protocol allows the administrator to troubleshoot this issue from Prism Element?
A customer with a four-node RF2 cluster is addingapplication VMs to their system. After adding these VMs, the Prism dashboard shows 81% storage utilization.
What is the consequence of running the cluster at 81% storage utilization?
A consultant is performing a Nutanix Cluster installation on Dell XC Core hardware. The consultant decides to use Foundation Portable for Mac to perform the installation. When the consultant arrives onsite, Foundation Portable is unable to locate the new nodes.
Which log should the consultant check to troubleshoot this issue?
A customer is running out of storage in an ESXi cluster. The customer wants to add storage without paying for an additional hypervisor license.
Which option should the consultant recommend to meet the requirement?
A consultant is deploying a Nutanix cluster at a customer location. The consultant will be deploying the latest AOS along with the latest Nutanix hardware.
Which three references should the consultant review prior to this installation? (Choose three.)
To prepare for a new Nutanix installation, a consultant downloads the Foundation VM, imports the VM to their Desktop Virtualization Solution, and powers on the VM. The IPv4 static address on the host workstation and the Foundation VM have been configured, but pings between them fail.
Which two troubleshooting steps should the consultant perform? (Choose two.)
Refer to the exhibits.
An administrator has reported that a new VM is not performing well.
After analyzing the information presented in the exhibits, which option shows the best conclusion regarding this workload?
A customer has Metro Availability configured in Automatic Resume Mode between Site A and Site B What happens to VMs if Primary Site A has full network failure?
A consultant is running the Foundation VM using desktop virtualization software. No nodes are discovered.
What should the consultant verify first?
A customer has a four-node cluster and is using Volume Groups toprovide storage services to a SQL cluster.
In the event of a CVM failure in the cluster, what is the expected IO path of the volume group’s iSCSI targets?