A consultant has deployed a new Nutanix AHV cluster with Foundation. The customer requests separating the management and production traffic in the CVM. Which feature should the consultant configure?
A. Micro-segmentation
B. Multi-homing
C. Network Segmentation
D. VLAN Tagging
Explanation: To separate management and production traffic within a Nutanix AHV cluster, VLAN Tagging is the appropriate feature to configure. VLAN Tagging allows different types of traffic to be segregated onto different network segments over the same physical infrastructure, effectively isolating management traffic from production traffic at the network level. This setup enhances security and performance by reducing the possibility of network congestion affecting critical management operations.
What are the two most important prerequisites to be validated before the consultant goes onsite? (Choose two.)
A. Complete the kickoff call and validate the BOM (Bill of Materials).
B. Verify whether the servers have been racked by the customer.
C. Validate whether the cluster questionnaire is complete and if the physical switch configurations are complete.
D. Identify the point of contact who can provide networking details and switch port information after arriving onsite.
Which Nutanix tool does the Field Installation Guide provide instructions for?
A. Prism Central
B. Foundation
C. As-Built Generator
D. Nutanix Move
Explanation: The Nutanix Field Installation Guide primarily provides instructions for using Foundation. Foundation is the tool used for deploying, imaging, and configuring Nutanix nodes in a new installation or when expanding existing clusters. This tool is essential for setting up the Nutanix environment correctly and efficiently.
Which subnet is reserved for CVM internal switch traffic?
A. 192.168.5.0/24
B. 192.168.254.0/24
C. 10.100.5.0/30
D. 172.16.19.0/16
Explanation: The subnet 192.168.254.0/24 is commonly reserved for CVM (Controller Virtual Machine) internal switch traffic within Nutanix environments. This subnet is used internally by the CVMs for management and storage operations that are integral to the Nutanix infrastructure. Using a separate, reserved subnet helps to isolate management traffic from general network traffic, enhancing security and performance.
In a Nutanix cluster, a Protection Domain contains 50 entities that are replicated to a remote Single Node Replication Target.
The current schedule configuration is as follows:
• Repeat every 6 hours
• Local Retention Policy 1
• Remote Retention Policy 8
• Starting time 12 am
At 8 am on Monday, the administrator discovers that a protected VM is corrupted. The latest good state was Sunday 2 pm. The administrator needs to maintain current protection.
Which strategy should the administrator use to meet these requirements?
A. From the Remote site, activate the Protection Domain, then re-protect the entity.
B. From the Remote site, restore the VM from the local snapshot by selecting the correct snapshot
C. From the local site, retrieve the correct remote snapshot, then restore the VM locally.
D. From the local site, restore the VM from the local snapshot by selecting the correct snapshot.
A customer needs a 20-node cluster built. The consultant only has a 16-port flat network switch, and the customer is using VLAN tagging for the hosts and CVMs. How should the consultant create the cluster?
A. Set VLAN tags on all hosts and CVMs.
B. Create the Nutanix cluster manually.
C. Connect the cluster to the production network.
D. Create a separate four-node cluster.
Explanation: Given the constraint of a 16-port switch for a 20-node cluster, the consultant cannot physically connect all nodes to the network simultaneously. VLAN tagging allows multiple virtual networks to be carried over the same physical network. However, the challenge here is not about VLANs but the physical limitation of ports. The practical approach would be to manually create the cluster, potentially in stages, as the full network capacity required for all nodes is not available.
During which part of the Knowledge Transfer does the customer learn about Nutanix basics and their environment at a high level?
A. Technical Checklist
B. Technical Handoff Slides
C. Support portal
D. As-Built Guide
Over the period of 2 to 3 weeks, a cluster displays the following:
•Periods where Warning Alerts of memory usage over 75% are asserted
•Periods where Critical Warnings of memory usage over 90% are asserted
•Periods of slow of frozen VDI desktops have caused work stoppage or slowdown
•VDI clones have periodically not powered up when called, causing work stoppage
Which steps should be used to prioritize the administrator’s troubleshooting efforts?
A. •Assess resource health on Hardware page
•Review the Analysis page for memory usage demand
•Determine the VDI workload-to-host affinity across the cluster
B. •Analyze Alert Pages for a root cause of memory problem
•Analyze VM table page to access the VM functionality
•Analyze the VDI Clone properties for possible VDI Workload stress
C. •Check Analysis page for CPU demand
•Verify VDI workload property for memory subscription
•Review the Hardware page to determine if the cluster has sufficient RAM
D. •Review Analysis Page for memory use pattern
•Alert with VDI workload demand
•Analyze current and future workload in the Capacity Runaway tab for sufficient resources
Explanation: For the scenario with memory usage warnings and VDI performance issues, the best approach is to analyze and understand the memory usage patterns and demands on the system. Option D focuses on reviewing the Analysis page to monitor memory use trends and patterns, which is crucial for identifying peak usage times or processes consuming excessive memory. The mention of alerting with VDI workload demand implies the need to monitor and possibly adjust the VDI workload to better fit within available resources. Finally, analyzing current and future workload in the Capacity Runaway tab helps in understanding if the cluster resources are sufficient for the demand, which is critical in planning for capacity management and ensuring that such issues are mitigated moving forward. References: Nutanix Prism User Guide, Nutanix Community resources, VDI performance troubleshooting practices.
After a consultant runs Foundation, the imaging process fails. In which two locations can the consultant find the logs? (Choose two.)
A. On the Hypervisor - /home/nutanix/foundation/logs
B. Logs link on the Foundation Imaging Screen
C. On the Foundation VM - /home/nutanix/foundation/logs
D. On the CVM - /home/Nutanix/foundation/logs
Explanation: When encountering issues during the Foundation process, such as an imaging failure, consultants need to access detailed logs to diagnose the problem. Two primary locations for these logs include the direct link accessible via the Foundation Imaging Screen, which provides real-time logs during the imaging process, and the Foundation VM directory at /home/nutanix/foundation/logs. These locations offer comprehensive log data essential for troubleshooting and resolving imaging issues. References: Nutanix Foundation documentation and troubleshooting guides from the Nutanix Bible and Nutanix University training resources.
After a consultant runs a bare metal Foundation, the imaging process fails. In which two locations can the consultant find the logs? (Choose two.)
A. On the CVM - /home /nutanix/foundation/logs
B. On the Hypervisor - /home/nutanix/foundation/logs
C. On the Foundation VM - /home/nutanix/foundation/logs
D. View Logs link on the Foundation Imaging progress screen
Explanation: After a failed bare metal Foundation imaging process, the consultant can find relevant logs in two primary locations: on the Foundation VM at "/home/nutanix/foundation/logs" and via the "View Logs" link available on the Foundation Imaging progress screen. These logs are crucial for diagnosing issues during the imaging process as they provide detailed error messages and operational data.
Page 10 out of 31 Pages |
Previous |