A consultant successfully creates a Nutanix cluster. The consultant needs to configure containers for the customers business critical applications and general server workloads. The customer requirements are to achieve maximum storage space savings and optimize I/O performance. What setting(s) should the consultant enable on the storage container(s)?
A. Compression and deduplication
B. Deduplication only
C. Compression only
For several days, an administrator notices the following alerts:
• CVM NIC Speed Low Warning Alerts
• Warning Alerts of CVM NIC not performing at optimal speed
• CVM is disconnected from the network Critical Alert
• Network Visualization page shows excessive dropped packets on CVM/Host
Which steps should be taken to determine which problem should be addressed first?
A. • Access the Hardware Page to verify resources are available
• Analyze ail CVM Speed Alerts in the Alerts/Events page
• Analyze output for the network and interface properties and connectivity issues
B. • Verify Host/CVM connectivity on the Network Visualization page
• Use to verify the bridge and bond configuration
• Review alerts/events page for the CVM disconnected error
C. • Review Alerts page for NIC speed alerts and alert timing
• Analyze the genesis.out log file for process failures
• Assess the NIC properties in the Network Visualization > Host Properties page
D. • Restart networking services on the CVM
• Determine the current configuration of the affected CVM via output
• Access the Alerts/Events page for the CVM network connection failures
From a hypervisor, which IP address should the consultant use to connect to the locally tossed on?
A. 192.168.5.254
B. 172.16.19.2
C. 10.100.5.5
D. 192.168.1.254
Explanation: When configuring network settings for a hypervisor or accessing local services hosted on it, the IP address must be reachable from the network configuration you are currently using. Given the generic nature of the options, the correct choice typically depends on the subnet used for management purposes, which often uses a standard private address. "192.168.5.254" is a common choice for local network configurations and is likely set up as the gateway or a primary network interface on the hypervisor.
A consultant configures an ESXi cluster which will utilize a vSphere Distributed Switch (vDS). The consultant has just migrated the first host to the dvSwitch when several alerts appear within Prism Element regarding Host-to-CVM connectivity. What is causing these alerts?
A. The consultant migrated the CVM Backplane and VM network adapter over to the vDS.
B. The consultant migrated the CVM svm-iscsi-pg network adapter over to the vDS.
C. The consultant migrated the CVM Backplane network adapter over to the vDS.
D. VLAN tags are incorrectly configured on the vDS port groups.
Explanation: When migrating an ESXi host to a vSphere Distributed Switch (vDS), it's crucial to correctly configure network adapters, including those for the Controller Virtual Machine (CVM). If the consultant migrated both the CVM backplane and the VM network adapter to the vDS, this could disrupt host-to-CVM connectivity if not configured correctly on the vDS. Such a setup requires precise configuration of network settings and VLAN tags to maintain seamless connectivity and avoid communication alerts in Prism Element.
An administrator needs to forecast infrastructure requirements for a new program and its associated applications. Prior to the projected start of the new program, all existing applications will be decommissioned. How should the administrator perform this task?
A. Check the Disregard Existing Workloads radio button in the Runway scenario.
B. Check the Disregard Existing Nodes radio button in the Runway scenario.
C. Add up the recovered workloads and manually remove from the Runway configuration.
D. Power down the workloads during a maintenance window and run the Capacity Runway.
An administrator needs to replace the self-signed certificate on a cluster. Which two requirements must be met as part of the process? (Choose two.)
A. The cluster administrator must restart the interface gateway.
B. The signed, intermediate and root certificates are chained.
C. The existing certificate must be deleted prior to replacement.
D. The imported files for the custom certificate must be PEM encoded.
An administrator has a custom backup application that requires a 2TB disk and runs in Windows. Throughput is considerably lower than expected.
The application was installed on a VM with the following configuration:
• Four vCPUs with one core/vCPU
• 4GB of Memory
• One 50GB vDisk for the Windows installation
• One 2TB vDisk for the application
What is the recommended configuration change to improve throughput?
A. Increase the number of cores per vCPU
B. Increase the vCPUs assigned to the VM
C. Span the 2TB disk across four vDisks
D. Add 4GB of memory to the VM
A consultant creates a new cluster using ESXi as the hypervisor. After creating the cluster, the consultant begins to run Life Cycle Manager (LCM) updates. During the LCM upgrade pre-checks, an error is returned. Which configuration is causing this issue?
A. ESXi cluster admission control is disabled.
B. ESXi cluster DRS is enabled.
C. ESXi cluster HA is enabled.
D. ESXi cluster admission control is enabled.
Explanation: The error during LCM pre-checks in an ESXi-based Nutanix cluster with HA enabled is most likely due to the ESXi cluster admission control being enabled. Admission control is a feature in VMware ESXi that reserves resources for HA purposes to ensure that sufficient resources are available in the event of host failures. When admission control is enabled, it can interfere with Nutanix LCM operations, which may require resource reallocation or reconfiguration that conflicts with the reserved capacities set by admission control. Disabling admission control during LCM updates would typically resolve this issue.References: VMware documentation on HA and Admission Control, Nutanix LCM documentation.
An organization is planning an upgrade to AOS 5.15 and wants to understand which cluster products and/or services are supported for physical traffic isolation.
Which Nutanix component supports its network traffic being isolated onto its own virtual network?
A. Volumes
B. Objects
C. Containers
D. Files
A consultant is onsite and needs to start their Foundation Virtual Machine (FVM) to image Nutanix hardware. The FVM fails to boot. The consultant decides to use a different Foundation method. Assuming the nodes will discover, which Foundation type or configuration option should the consultant select?
A. Foundation VM
B. Use IPMI IPs
C. Use IPMI MACs
D. Foundation Applet
Explanation: If the Foundation VM fails to boot and other methods need to be considered, the best alternative is the Foundation Applet. This lightweight tool runs on a laptop or other device and doesn't require booting a VM, providing a straightforward method to image Nutanix hardware, particularly useful in situations where hardware constraints or other issues prevent the use of a full Foundation VM.
Page 2 out of 15 Pages |
Previous |