Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which scenario would benefit most from Erasure Coding being enabled on a container?

A.

Long term storage of data which is written once and read infrequently

B.

High performance database where all is relatively hot.

C.

VDI use cases where a single VM is cloned 100’s of times

D.

WEB and API Servers

A guest VM should be able to tolerate simultaneous failure of two nodes or drives.

What are the minimum requirements for the Nutanix cluster?

A.

3 nodes with cluster RF 3 and container RF 3

B.

3 nodes with cluster RF 3 and container RF 2

C.

5 nodes with cluster RF 2 and container RF 3

D.

5 nodes with cluster RF 3 and container RF 3

An administrator manages a cluster and notices several failed components shown in the exhibit.

What two options does the administrator have to run all NCC checks manually? (Choose two.)

A.

Using the Actions drop-down menu in the Health dashboard of Prism Element.

B.

Running ncc health_checks run-alll on the CVM

C.

Using the action action drop-down menu in the Health dashboard of Prism Central

D.

Running noc health_checks run_all on the PC VM

An administrator needs to configure a new subnet on an AHV cluster and want to ensure that VMs will automatically be assigned an IP address at creation time.

Which type of network does the administrator need to create?

A.

Dynamic Network

B.

Unmanaged Network

C.

Managed Network

D.

DHCP Network

A customer wants to isolate a group of VMs within their Nutanix environment for security reasons. The customer creates a VM with two NICs to act as a firewall and installs the appropriate software and certificates.

However, no one from the outside can access the application.

What is the likely cause of this problem?

A.

A shared volume group must be used by all isolated VMs

B.

More than one NIC cannot be added to a VM

C.

One of the NICs needs to be configured on the internal VLAN

D.

Wireshark is installed on the NAT VM

Which method can be used to migrate a VM configured for UEFI-boot from a Nutanix Hyper-V cluster to AHV?

A.

Live Migration

B.

Storage vMotion

C.

Nutanix Move

D.

Cloud Connect

Which three cluster operations require an administrator to reclaim licenses?(Choose three)

A.

Destroy a cluster.

B.

Upgrade a cluster

C.

Migrate a cluster

D.

Remove a Node from a cluster

E.

Move Nodes between clusters.

What is Prism Central primarily used for?

A.

Multi-cluster network configuration

B.

Container creation

C.

Multi-cluster Single Sign On

D.

Data reduction configuration

Refer to the exhibit.

The Linux Admin role has been created to manage only Linux VMs in the environment. However, the Admin1 user does not have access to all Linux VMs.

What step should be taken to grant the proper access?

A.

Add the hosts to the entities KM for the role.

B.

Grant the admin1 user the viewer role (or the cluster.

C.

Add the role to the Linux images.

D.

Add the proper category to each Linux VM.

Which two private key types are supported by the Nutanix SSL certificate implementation? (Choose two.)

A.

ECDSA

B.

ECDH

C.

ED25519

D.

RSA