Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is the expected operation during node addition when the new node has a different AOS version?

A.

The entire cluster is upgraded to the latest one-click release.

B.

The node is added and a separate upgrade operation must be performed.

C.

The addition fails and forces the administrator to image using standalone Foundation.

D.

The node is automatically re-imaged using the software currently running in the cluster.

The administrator wants a container to be displayed and limited to 1TB in the hypervisor.

What advanced container setting must the administrator set?

A.

Advertised Capacity

B.

Reserved Capacity

C.

Advertised Quota

D.

Reserved Quota

The Linux administration team has requested access rights to any current or future Linux VM in the environment.

What entity should be selected when assigning this new role?

A.

Category

B.

Project

C.

AHV Cluster

D.

Image

A Nutanix cluster is equipped with four nodes. Four VMs on this cluster have been configured with a VM-VM anti-affinity policy and are each being hosted by a different node.

What occurs to the cluster and these VMs during an AHV upgrade?

A.

One node hosts two VMs while the node being upgraded is in maintenance mode.

B.

One VM out of the four powers down when the node hosting it reboots.

C.

The AHV pre-upgrade checks fail until the administrator disables the anti-affinity policy.

D.

The AHV pre-upgrade checks fail until the four VMs are powered off.

Which three upgrades should an administrator be able to perform using Lifecycle Management? (Choose Three)

A.

AOS

B.

BMC

C.

BIOS

D.

Hypervisor

E.

HBA Firmware

In Files, how many FSVMs are deployed by default?

A.

1

B.

2

C.

3

D.

5

An administrator is migrating ESXi VMs to a Nutanix AHV cluster. The VM data is available to the AHV system.

Which process must the administrator complete below AHV VMs can be create?

A.

Import the VMs .vmx file using the Image Service

B.

Rename the –flat.vmdk files for the VM based on the VM UUID

C.

Import the VM’s –flad.vmdk files using the Image Service

D.

Import the VM’s .nvram file using the Image Service

An administrator has a cluster in a secure environment. The administrator wants to disable password authentication over SSH to access the cluster.

Which configure should the administrator use to disable password authentication over SSH?

A.

Modify the SSH configuration on each host

B.

Enable Cluster Lockdown in Prism

C.

Modify the SSH Configuration on each CVM

D.

Configure a proxy server in Prism

Which feature must be enabled in order to ensure that VMs are restarted on other hosts in the event of a host failure?

A.

High Availability

B.

VM Snapshots

C.

Network Segmentation

D.

Live Migration

Which type of data is distributed by Zookeeper to ensure availability in the case of node or block failure?

A.

User Data

B.

Metadata

C.

Configuration Data

D.

Snapshot Data