Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An organization uses on-premises AHV-based clusters and also has workloads in public cloud environments.

The security team wants a single place to review security posture and compliance across the multi-cloud footprint, and they want the analysis to support security operations workflows rather than only showing cluster-level posture.

The administrator needs to pick the most appropriate Nutanix capability for this requirement.

Which option best aligns to the requirement?

A.

Use Flow Network Security policy views as microsegmentation policy listings inherently provide a full security posture and compliance assessment.

B.

Use the Prism Central Security Dashboard, to provide the same multi-cloud compliance view and cover Azure and AWS accounts by default.

C.

Use Prism Central Alerts and Events to provide a complete compliance picture across all environments and replaces posture management.

D.

Use Security Central to provide visibility into security posture and compliance for a multi-cloud environment (including public clouds).

An administrator manages a Nutanix cluster with software data-at-rest encryption enabled using an external KMS. Several VMs are configured with vTPM to support Windows BitLocker encryption.

The administrator needs to perform a disaster recovery operation and restore the VMs on a different cluster. During the recovery, the administrator discovers that the encryption key backup file is unavailable.

What is the expected outcome for the vTPM-enabled VMs?

A.

The VMs will fail to start because BitLocker will not prompt for the recovery key on first boot.

B.

The VMs will start successfully with a new vTPM device automatically attached during the restore process.

C.

The VMs will fail to start successfully because the external KMS provides the vTPM keys directly to the new cluster.

D.

The VMs will fail to start because the vTPM keys cannot be recovered without the backup file.

An administrator manages a shared AHV environment where Dev workloads must not exceed 2,000 IOPS per VM during business hours to prevent noisy-neighbor impact on Prod.

The administrator already uses categories to group VMs (for example, category Env=Dev) and wants a scalable approach that applies consistent throttling to all current and future Dev VMs without configuring each VM individually.

Which approach best meets the requirement?

A.

Increase the replication factor for Dev workloads so additional copies distribute I/O and cap IOPS.

B.

Configure a storage policy with QoS throttling and associate the policy to the category used by Dev VMs.

C.

Set Storage QoS attributes on one representative Dev VM, then clone that VM so all Dev VMs inherit the QoS settings.

D.

Enable compression on the storage container hosting Dev VMs to reduce latency and enforce an effective IOPS limit.

An administrator needs to protect a volume group using a protection policy that supports an RPO of 1 hour. The environment consists of two clusters in different geographic regions. Which replication type should be used?

A.

NearSync

B.

Synchronous

C.

Metro Availability

D.

Asynchronous

What is the default compression setting when a new storage container is created in Prism Central?

A.

Inline compression with a 0-minute delay

B.

Post-process compression with a 60-minute delay

C.

Post-process compression with a 0-minute delay

D.

Inline compression with a 60-minute delay

An administrator manages a 3-node AHV cluster and needs to optimize overall cluster consumption starting from a recording server workload that stores MP4 videos on dedicated local vDisks. Specifications:

Compression: post process 60 min

Capacity dedupe: disabled

Erasure coding: Disabled

Which configuration would best improve cluster performance?

A.

Configure Erasure Coding with 1 minute delay.

B.

Move data from local vDisk to a Nutanix Files NFS share.

C.

Enable capacity deduplication at storage container level.

D.

Create a storage policy to disable compression.

An administrator has been asked to deploy a single-node Prism Central VM, with the possibility to scale out to increase its capacity. What is the minimum supported Prism Central size?

A.

Small

B.

X-Small

C.

Large

D.

X-Large

Refer to the exhibit.

An administrator is configuring Active Directory Authentication in Prism Element and wants to ensure all traffic is encrypted. Which port should the administrator use?

A.

389

B.

443

C.

636

D.

9440

A company has purchased Nutanix hardware for multiple remote branch offices. The IT team at headquarters needs to image and deploy all clusters remotely from a central location.

An administrator deploys Foundation Central from the Prism Central Marketplace.

What capability does Foundation Central provide in this scenario?

A.

Automated backup and recovery of cluster configurations across all sites

B.

Ability to remotely upgrade AOS and AHV on existing clusters

C.

Ability to register all remote clusters to Prism Central automatically after deployment

D.

Single pane of glass to create remote clusters without individual node configuration

An administrator has configured CVM security hardening on a Nutanix cluster with the following settings:

    IP Restriction State is set to enabled

    Password-based SSH access is disabled via Cluster Lockdown

The administrator attempts to SSH into the CVM from a new jump box and the connection is refused.

What should the administrator do to restore SSH access to the CVM?

A.

Log in to Prism Central Security Dashboard and remotely update the SSH whitelisted addresses for the affected cluster.

B.

Log in to Prism Element and update the Cluster Lockdown settings to add the new jump box IP address.

C.

Access the CVM using the local console or serial access and update the SSH whitelisted address to the new jump box IP.

D.

Restart the CVM to reset the IP restriction and regain SSH access from the new jump box IP.