Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

An administrator wants to use Volumes to connect to physical servers that are not able to be virtualized.

Which three things must be configured for Volumes to support iSCSI clients? (Choose three)

A.

Enable external client access

B.

Client OS iSCSI initiator

C.

iSCSI Multipathing I/O

D.

Cluster Virtual IP address

E.

Data Services IP address

An administrator is configuring data protection and DR for a multi-tier application. All VMs must be protected at the same time.

What must the administrator do to meet this requirement?

A.

Create a consistency group for each VM with identical schedules

B.

Create a consistency group for the application and place all VMs in it

C.

Create a protection domain for the application and select auto-protect related entities

D.

Create a protection domain for each VM with identical schedules

A node with Erasure Coding fails. What is the impact?

A.

Potentially increased amount of data stored in the SSD tier.

B.

The node stops utilizing Erasure Coding.

C.

Increased Controller VM CPU Load.

D.

AOS is unable to do deduplication during the Erasure Coding failure.

Which expected operations during node addition when the new node has a different AOS version?

A.

The entire cluster is upgraded to the latest one-click release.

B.

The node is added and a separate upgrade operation must be performed.

C.

The addition fails and forces the administrator to image using standalone Foundation.

D.

The node is automatically re-imaged using the software currently running in the cluster.

Which three configuration scenarios are valid for the deployment of Prism Central? (Choose three.)

A.

Environments use Network Address Translation.

B.

Prism Elements and Prism Central art in different subnets.

C.

Environments do not have Internet access.

D.

Prism Elements and Prism Central have proxy configured.

E.

Environments use the 192.168.5.0/24 CVM management network.

What is the default network bond setting for an AHV host configuration?

A.

active-backup

B.

active-active

C.

balance-slb

D.

balance-tcp

An administrator needs to shut down an AHV cluster to relocate hardware. The administrator upgrades NCC and runs health checks.

Which steps should the administrator perform next?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements.

AHV IPAM assigns an IP address from the address pool when creating a managed VM NIC.

At which two instances does the address release back to the pool? (Choose two)

A.

The IP address lease expires

B.

The VM NIC is deleted.

C.

The IP address is changed to static.

D.

The VM is deleted.

Refer to the exhibit.

The Linux Admin role has been created to manage only Linux VMs in the environment. However, the Adminl user does not have access to all Linux VMs.

What step should be taken to grant the proper access?

A.

Add the hosts to the entities list for the role.

B.

Grant the admin 1 user the viewer role tor the cluster.

C.

Add the role to the Linux images.

D.

Add the proper category to each Linux VM.

Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness?

A.

Continuous Data Protection

B.

Copy-on-Write

C.

Split-mirror

D.

Redirect-On-Write