Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

The following critical Availability Alert displays in prism Central:

The protection Policy PP-BCA-1HR includes a business critical application with a 1-hour snapshot frequency.

What is causing this issue?

A.

There is a scheduled outage for the Availability Zone referenced in Protection Policy PP-BCA-1HR.

B.

Workloads included in PP-BCA-1HR are no longer within their intended RPO.

C.

Prism Central in the Availability Zone for PP-BCA-1HR is unavailable.

D.

NearSync replication between the Availability Zones has fallen out of scope.

Which two access protocols are supported by Files? (Choose two.)

A.

NFS

B.

FCOE

C.

SMB

D.

ISCSI

A.

From the Life Cycle Management page in Prism Element, click Perform Inventory, then edit settings and set LCM Auto Inventory to Daily

B.

From the Life Cycle Management page in Prism Central, click Perform Inventory, then edit settings and click the Enable LCM Auto Inventory checkbox

C.

From the Life Cycle Management page in Prism Element, click Perform Inventory, then edit settings and click the Enable LCM Auto Inventory checkbox

D.

From the Life Cycle Management page in Prism Central, click Perform Inventory every Morning

An administrator needs to configure the cluster to ensure all VMs are capable of being restarted in the event of a host failure.

Which option provides this functionality?

A.

HA Reservation

B.

Live Migration

C.

VM Affinity

D.

Best Effort

An administrator is concerned that Prism will be inaccessible if Active Directory is unable to process logins. Which method should the administrator use to access the cluster in the event of this type of outage?

A.

Manage the cluster by using the "nutanix" user on the Prism leader CVM

B.

Create and use an emergency local account on the cluster

C.

Deploy an Active Directory server locally on the cluster

D.

Manage the cluster remotely by downloading ncli to a remote workstation

An administrator has two clusters: Site A and Site B.

Async DR is configured between the clusters as follows:

• Site A is the Primary Site

• Site B is the Secondary inactive Site, no VMs running

• Site A is fully in Production

• Site B used as Backup/Disaster Recovery

The customer wants to perform a planned failover between the sites.

How should the administrator accomplish this?

A.

Click Activate on the Secondary site within the Data Protection Dashboard

B.

Click Activate on the Secondary site and run deactive NCLI command on Primary site

C.

Choose Migrate on the Secondary site within the Data Protection Dashboard

D.

Choose Migrate on the Primary site within the Data Protection Dashboard

An administrator has Created a new windows VM and Given it to the user. The user states that only C drive mapping is visible within the windows OS.

What is causing this issue?

A.

The user has not formatted and assigned drive letters to the additional disk.

B.

The additional disk have not been formatted as ExFAT in Prism Central

C.

the administrator has not run the add command line utility

D.

the additional disk were formatted as NTFS in Prism Central

Refer to the exhibits.

An administrator has reported that a new VM is not performing well.

After analyzing the information presented in the exhibits, which option shows the best conclusion regarding this workload?

A.

VM is CPU constrained since the hypervisor cannot provide the required resources.

B.

VM is CPU constrained because more CPU needs to be added to the VM.

C.

VM is Storage constrained, because the workload is waiting for storage access.

D.

VM is not CPU constrained, because the VM is not running, a multithreaded application.

An administrator is deploying a new application to a Nutanix Enterprise Cloud. The application requires a security to prevent unauthorized access. The application also uses many non-standard ports that are unique to it. Security should not be changed for existing applications.

What should the administrator do to meet these requirement?

A.

Use existing categories for the VMs. and create new security policies to use the existing categories.

B.

Use existing categories for the VMs and modify existing security policies to include the specific port.

C.

Create new categories for the VMs, and create new security policies that include the new categories.

D.

Create new categories for the VMs, and modify existing security policies to include the new categories.

Which command should an administrator run from the CLI to view the uplink state of all AHV nodes in the cluster?

A.

manage_ovs show_uplinks

B.

allssh show_uplinks

C.

allssh manage_ovs show_uplinks

D.

manage ovs show uplinks