Logo Passei Direto
Buscar
Material
páginas com resultados encontrados.
páginas com resultados encontrados.
left-side-bubbles-backgroundright-side-bubbles-background

Experimente o Premium!star struck emoji

Acesse conteúdos dessa e de diversas outras disciplinas.

Libere conteúdos
sem pagar

Ajude estudantes e ganhe conteúdos liberados!

left-side-bubbles-backgroundright-side-bubbles-background

Experimente o Premium!star struck emoji

Acesse conteúdos dessa e de diversas outras disciplinas.

Libere conteúdos
sem pagar

Ajude estudantes e ganhe conteúdos liberados!

left-side-bubbles-backgroundright-side-bubbles-background

Experimente o Premium!star struck emoji

Acesse conteúdos dessa e de diversas outras disciplinas.

Libere conteúdos
sem pagar

Ajude estudantes e ganhe conteúdos liberados!

left-side-bubbles-backgroundright-side-bubbles-background

Experimente o Premium!star struck emoji

Acesse conteúdos dessa e de diversas outras disciplinas.

Libere conteúdos
sem pagar

Ajude estudantes e ganhe conteúdos liberados!

left-side-bubbles-backgroundright-side-bubbles-background

Experimente o Premium!star struck emoji

Acesse conteúdos dessa e de diversas outras disciplinas.

Libere conteúdos
sem pagar

Ajude estudantes e ganhe conteúdos liberados!

left-side-bubbles-backgroundright-side-bubbles-background

Experimente o Premium!star struck emoji

Acesse conteúdos dessa e de diversas outras disciplinas.

Libere conteúdos
sem pagar

Ajude estudantes e ganhe conteúdos liberados!

left-side-bubbles-backgroundright-side-bubbles-background

Experimente o Premium!star struck emoji

Acesse conteúdos dessa e de diversas outras disciplinas.

Libere conteúdos
sem pagar

Ajude estudantes e ganhe conteúdos liberados!

left-side-bubbles-backgroundright-side-bubbles-background

Experimente o Premium!star struck emoji

Acesse conteúdos dessa e de diversas outras disciplinas.

Libere conteúdos
sem pagar

Ajude estudantes e ganhe conteúdos liberados!

left-side-bubbles-backgroundright-side-bubbles-background

Experimente o Premium!star struck emoji

Acesse conteúdos dessa e de diversas outras disciplinas.

Libere conteúdos
sem pagar

Ajude estudantes e ganhe conteúdos liberados!

left-side-bubbles-backgroundright-side-bubbles-background

Experimente o Premium!star struck emoji

Acesse conteúdos dessa e de diversas outras disciplinas.

Libere conteúdos
sem pagar

Ajude estudantes e ganhe conteúdos liberados!

Prévia do material em texto

1. Refer to exhibit: 
 
Why has an anomaly been triggered? 
A. Controller reached 2500 IOPS. 
B. Observed IOPS exceed normal values. 
C. Normal Controller behavior has increased. 
D. Observed values do not match predicted values. 
 
Answer: D 
Explanation: 
Nutanix anomaly detection is a feature that monitors seasonal trends for time-
series data (e.g. CPU usage, memory usage, latency, etc.) and establishes a 
“band” of expected values based on historicaldata12. Only values that hit outside 
the “band” will trigger an event / alert1.Nutanix leverages a method for 
determining the bands called ‘Generalized Extreme Studentized DeviateTest’. 
A simple way to think about this is similar to a confidence interval where the 
values are betweenthe lower and upper limits established by the 
algorithm. Another web source3 shows an example of how anomaly detection 
works in Nutanix Prism Central. Inthe video, you can see that when the observed 
value of a metric deviates significantly from the predictedvalue based on historical 
data, an anomaly event is triggered and displayed on a chart.Therefore, by 
comparing the observed values with the predicted values based on historical 
data, Nutanixanomaly detection can identify abnormal behavior and alert 
you accordingly 
 
 
2. An administrator is commissioning a Nutanix Enterprise Cloud. Once the 
user VMs have beendeployed and are running, the administrator finds that 
VMs on the same host are able to communicate, but are unable to 
communicate between hosts. 
What must be changed to enable full inter-VM communications? 
A. Change the spanning-tree port type on the switch. 
B. Change the network the VMs are connected to 
C. Update the switch to specifically allow VLAN 15 
D. The VMs need to have static IP addresses. 
 
Answer: C 
 
3. When installing Nutanix Guest Tools (NGT) on an ESXi-hosted VM, which 
port should be enabled onthe VM to allow communication with the NGT-
Controller VM service? 
A. 2000 
B. 2074 
C. 8080 
D. 9943 
 
Answer: B 
 
4. An administrator wants to ensure that data in a container is stored in the 
most space efficient manneras quickly as possible after being 
written,Which space efficiency too meets this requirement? 
A. Inline Compression 
B. Thin Provisioning 
C. Cache Deduplication 
D. Erasure Coding 
 
Answer: A 
Explanation: inline compression is a technique that compresses all incoming 
write I/O operations over 4 KB inline inthe persistent write buffer (oplog)23. This 
approach enables you to use oplog capacity more efficiently and helps drive 
sustained performance2. From AOS 5.18 onward, inline compression 
(compressiondelay=0) is enabled by default for all new containers24. 
https://portal.nutanix.com/page/documents/solutions/details?targetId=TN-2032-
Data-Efficiency:TN-2032-Data-Efficiency 
 
5. An administrator was reviewing various AOS logs when a it was noticed 
that the time of the logs were off by several hours. 
Which initial step was missed during the post process cluster 
configuration? 
A. Setting the cluster time zone via PC GUI 
B. Setting the cluster time zone via CVM NCLI 
C. Setting the cluster time zone via PE GUI 
D. Setting the cluster time zone via CVM ACLI 
 
Answer: B 
 
6. An administrator wants to reduce the largest amount of alert emails 
received from Prism Central. 
Which two settings should the administrator customize to meet this 
requirement? (Choose two) 
A. Skip empty digest email 
B. Every Single Alert 
C. Dally Digest 
D. Email Recipients 
 
Answer: C,D 
Explanation: According to the Nutanix Support & Insights website1, you can 
configure alert emails through Prism Central by enabling or disabling customer 
email notification for each alert. You can also modify or create custom alert 
policies for different entities and clusters23. 
 
 
https://portal.nutanix.com/page/documents/solutions/details?targetId=TN-2032-Data-Efficiency:TN-2032-Data-Efficiency
https://portal.nutanix.com/page/documents/solutions/details?targetId=TN-2032-Data-Efficiency:TN-2032-Data-Efficiency
7. A configuration is single domain, single forest, and does not use SSL. 
Which port number should be used to configure LDAP? 
A. 389 
B. 3269 
C. 636 
D. 3268 
Answer: A 
 
8. An administrator is reviewing performance of a core banking system that 
routinely has 20,000 concurrent users. During, business hours, the CPU on 
the applications servers runs at close to 100%. The administrator needs to 
determine if there is a performance issue specific to the app servers, the 
database servers, or all servers on the cluster. 
 
Which metrics should the administrator review in Prism Analysis Graphs? 
A. Cluster IO, Network, Database and App Server CPU 
B. Cluster CPU and Memory Only 
C. Cluster IO, CPU, Memory and Database and App Server CPU 
D. Cluster IO, CPU, Memory, Network, App Server CPU 
 
Answer: C 
 
 
9. A customer has a newly-deployed AHV cluster with nodes that have 
2.x 10 GBE and 2.x interface. The customer wants to use all available 
network interfaces to provide connectivity to the VMs. 
Which option should the administrator use to achieve this while remaining 
consistent with Nutanix recommendations? 
A. Create separate VLANs that map 10GbE and 1GbE interfaces. 
B. Createbond1 on virbr0 and add the 1GbE interfaces to it for VM use. 
C. Create a second bond on br0 on each host and assign the 1 GbE interfaces 
to it. 
D. Create a second bridge on each host and assign the 1GbE interfaces to it. 
Answer: D 
 
10. An administrator manages an AHV cluster that is dedicated to a dev/test 
environment. The administrator receiving complaints from users that they 
are unable to create new VMs on the cluster. After the reviewing the cluster, 
the administrator finds that the memory resources are almost fully utilized, 
with many VMs over-provisioned on memory. 
What option is the most efficient resolution to enable additional VMs to be 
created? 
A. Enable Memory Overcommit on the over-provisioned VMs. 
B. Enable Memory HA on the over-provisioned VMs. 
C. Upgrade the nodes with additional memory DlMMs. 
D. Disable HA Reservation on the cluster. 
 
Answer: A 
Explanation: Enable Memory Overcommit on the over-provisioned VMs is 
the most efficient resolution to enable additional VMs to be created. Memory 
overcommit allows VMs to use more memory than physically available on a 
host by compressing and swapping memory pages to storage1. This can improve 
memory utilization and increase VM density on a cluster1. However, memory 
overcommit is not supported When HA is configured to use reserved hosts, so 
you may need to disable HA reservation on the cluster before enabling memory 
overcommit1. 
 
 
11. What is the expected behavior of the VMs residing on that host when a 
controller VM becomes unavailable? 
A. A Live Migration will be performed on the affected VMs. 
B. The host will automatically redirect I/O and VMs will continue running. 
C. The impacted host and VMs will automatically shut down. 
D. VM High Availability will restart the impacted VMs on another host 
 
Answer: B 
 
12. Which method can be used to migrate a VM configured for UEFI-boot 
from a Nutanix Hyper-V clusterto AHV? 
A. Live Migration 
B. Storage vMotion 
C. Nutanix Move 
D. Cloud Connect 
 
Answer: C 
 
13. What is the name of the internal bridge used by AHV nodes and CVMs? 
A. vnet0 
B. br1 
C. br0 
D. virbr0 
 
Answer: D 
 
 
14. An administrator needs to relocate an AHV cluster to a new datacenter 
during a maintenance window. The cluster will use the same IPs in the new 
datacenter. 
Which two steps should be taken to prepare for this task? (Choose two.) 
A. Reconfigure IPMI for the new datacenter 
B. Shut down all user VMs in the cluster 
C. Relocate the linked LDAP server 
D. Stop all Nutanix Files clusters 
 
Answer: B, D 
 
15. Which changethe cluster has expired. 
 
http://www.vstellar.com/2019/01/10/ahv-networking-part-1-basics/#:~:text=AHV%20Network%20Architecture&text=virbr0%20is%20an%20internal%20switch,virbr0)%20have%20IP%20address%20192.168
http://www.vstellar.com/2019/01/10/ahv-networking-part-1-basics/#:~:text=AHV%20Network%20Architecture&text=virbr0%20is%20an%20internal%20switch,virbr0)%20have%20IP%20address%20192.168
http://www.vstellar.com/2019/01/10/ahv-networking-part-1-basics/#:~:text=AHV%20Network%20Architecture&text=virbr0%20is%20an%20internal%20switch,virbr0)%20have%20IP%20address%20192.168
Answer: A 
 
132. Microsegmentation was recently enabled in a Nutanix environment. 
The administrator wants toleverage Prism Central to create a policy that will 
block all traffic regardless of direction, between twogroups of VMs 
identified by their category. 
Which policy should be used to meet this requirement? 
A. An Application Security Policy 
B. A Quarantine Policy 
C. A Whitelist-Based Policy 
D. An Isolation Environment Policy 
 
Answer: D 
 
133. The Linux administration team has requested access rights to any 
current or future Linux VM in theenvironment. 
What entity should be selected when assigning this new role? 
A. Image 
B. AHV Cluster 
C. Category 
D. Project 
 
Answer: D 
 
134.Where should an administrator unregister Prism Element from Prism 
Central? 
A. From a Host SSH session 
B. From the Prism Central web console 
C. From the Prism Element web console 
D. From a CVM SSH session 
 
Answer: D 
 
 
135. The administrator wants a container to be displayed and limited to 1TB 
in the hypervisor.What advanced container setting must the administrator 
set? 
A. Advertised Capacity 
B. Reserved Capacity 
C. Advertised Quota 
D. Reserved Quota 
 
Answer: A 
 
136. Which best practice should be followed when creating a bond in a 
Nutanix cluster? 
A. Place NICs of different speeds within the same bond 
B. Configure the bond to use LACP 
C. Only utilize NICs of the same speed within the same bond 
D. Use the default bond configuration after installation 
 
Answer: C 
Explanation: Reference:https://next.nutanix.com/blog-40/maximum-
performance-from-acropolis-hypervisor-and-openvswitch-6312 
 
 
137. In Files, how many FSVMs are deployed by default? 
A. 1 
B. 2 
C. 3 
D. 5 
 
Answer: C 
 
 
https://next.nutanix.com/blog-40/maximum-performance-from-acropolis-hypervisor-and-openvswitch-6312
https://next.nutanix.com/blog-40/maximum-performance-from-acropolis-hypervisor-and-openvswitch-6312
138. When VM HA Reservation is enabled, what is the expected behavior for 
all failed VMs in the eventof a host failure? 
A. Restart on a best-effort basis if resources are available 
B. Perform a live migration to other hosts in the AHV cluster 
C. Restart on other hosts in the AHV cluster 
D. Perform a live migration on a best-effort basis if resources are available 
 
Answer: C 
Explanation: Reference: http://www.nutanixpedia.com/p/configuring-ha.html 
 
 
http://www.nutanixpedia.com/p/configuring-ha.html
139. In which two scenarios is Native Key Management Server supported? 
(Choose two) 
 
A. XenServer and AHV mixed cluster. 
B. Hyper-V and AHV mixed cluster. 
C. KVM and AHV mixed cluster. 
D. ESXi and AHV mixed cluster. 
 
Answer: B,D 
 
140. An administrator is implementing a VDI solution. The workload will be 
a series of persistent desktops in a dedicated storage container within a 
four-node cluster Storage optimizations should be set on the dedicated 
storage container to give optimal performance including during a node 
failure event. 
Which storage optimizations should the administrator set to meet the 
requirements? 
 
A. Compression Only 
B. Deduplication and Erasure Coding 
C. Compressoion and Deduplication 
D. Compression Deduplication and Erasure Coding 
 
Answer: C 
 
141. Refer to Exhibit: 
 
An administrator is trying to create a custom alert policy for all VMs.Why is 
the Alert warning if field greyed cut? 
 
A. The Alert critical if threshold is set. 
B. The Behavioral Anomaly threshold is set. 
C. The Enable Policy option checked. 
D. The Auto resolve alerts option is checked. 
 
Answer: B 
Explanation: when you create a custom alert policy, you can choose between 
two types of thresholds: StaticThreshold and Behavioral Anomaly. Static 
Threshold allows you to set a fixed value for the metric thattriggers the alert. 
Behavioral Anomaly allows you to use machine learning to detect abnormal 
behaviorbased on historical data.If you select Behavioral Anomaly as the 
threshold type, you cannot set a warning level for the alert. Youcan only set a 
critical level that indicates how much deviation from normal behavior is 
considered ananomaly3. Therefore, the Alert warning if field is greyed out when 
you select Behavioral Anomaly. 
 
 
142. HOTSPOT 
An administrator needs to shut down an AHV cluster to relocate hardware. 
The administrator upgradesNCC and runs health checks.Which steps 
should the administrator perform next? 
Item instructions: For each procedure, indicate theorder in which that 
procedure must take place to meet the item requirements. 
 
 
 
143. Where can an administrator change a CVM password? 
 
A. KMS Server Terminal 
B. CVM setting in Prism Element 
C. CVM setting in Prism Central 
D. Prism CVM VM Console 
 
Answer: D 
Explanation: Reference: https://next.nutanix.com/installation-configuration-
23/modifying-passwords-in-nutanix-environment-33538 
 
144. Which scenario would benefit most from Erasure Coding being 
enabled on a container? 
A. Long term storage of data which is written once and read infrequently 
B. High performance database where all is relatively hot. 
C. VDI use cases where a single VM is cloned 100’s of times 
https://next.nutanix.com/installation-configuration-23/modifying-passwords-in-nutanix-environment-33538
https://next.nutanix.com/installation-configuration-23/modifying-passwords-in-nutanix-environment-33538
D. WEB and API Servers 
 
Answer: A 
145. Which three cluster operations require an administrator to reclaim 
licenses? (Choose three) 
A. Destroy a cluster. 
B. Upgrade a cluster 
C. Migrate a cluster 
D. Remove a Node from a cluster 
E. Move Nodes between clusters. 
 
Answer: A,D,E 
Explanation: https://portal.nutanix.com/page/documents/details/?targetId=Web
_Console_Guide-Prism_v4_7:lic_licensing_managing_c.html Reclaiming 
Licenses (Including License Renewal)You can reclaim and optionally re-apply 
licenses for nodes in your clusters: 
✑ You must reclaim licenses when you plan to destroy a cluster. First reclaim the 
licenses, then destroythe cluster. You do not need to reclaim Starter licenses. 
These licenses are automatically appliedwhenever you create a cluster, including 
after you have destroyed a cluster. 
✑ Return licenses to your inventory when you remove one or more nodes from 
a cluster. Also, if youmove nodes from one cluster to another, first reclaim the 
licenses, move the nodes, then re-apply thelicenses. 
✑ You can reclaim licenses for nodes in your clusters in cases where you want 
to make modifications ordowngrade licenses. For example, applying an Ultimate 
license to all nodes in a cluster where somenodes are currently licensed as Pro 
and some nodes are licensed as Ultimate. You might also want totransition nodes 
from Ultimate to Pro licensing. 
✑ You must reclaim licenses when you renew licenses. First reclaim the expired 
licenses, then applynew licenses. 
 
 
146. After configuring modules for a Remote Syslog Server, the settings are 
as shown. The administratornotices that even though the level parameter 
is set to EMERGENCY, that all monitor logs are being sent.What is the likely 
cause of this issue? 
 
A. A second rsyslog server is configured to send all monitor logs. 
B. Having the Module Name set to STARGATEsends all monitor logs regardless 
of the level. 
C. A Log Level of EMERGENCY includes all monitor logs. 
D. The true setting for Include Monitor Logs sends all monitor logs regardless of 
the level. 
 
Answer: D 
Explanation: This means that the rsyslog server is configured to include all 
monitor logs in addition to the messageswith EMERGENCY level.It has a level 
parameter that specifies the severity of messages to be logged2. The level 
parameter canhave one of eight values: EMERG (emergency), ALERT, CRIT 
(critical), ERR (error), WARNING,NOTICE, INFO (informational), and DEBUG2. 
 
 
147. CPU utilization climbs above 90% on several VMs. This causes 
performance degradation for abusiness-critical application. 
How can alerts be configured to notify the administrator before VM CPU 
utilization hits 90%? 
 
A. On a CVM, use ncli to set the VM CPU Check threshold for the critical VMs to 
a value below 90%. 
B. On the Health dashboard, locate the VM CPU Check and lower the alert 
threshold below 90%. 
C. On a CVM, configure a cron job to run the VM CPU Check more frequently 
and email the result. 
D. On the Alerts dashboard, ensure that the VM CPU usage alert is not set to 
auto-resolve. 
 
Answer: B 
Explanation: Reference: 
https://portal.nutanix.com/page/documents/details?targetId=Web-Console-
Guide-Prismv5_16:Web-Console-Guide-Prism-v5_16 
 
148. An administrator has been alerted to a VM that has high I/O latency and 
wants to determine if thereare any other factors, such as insufficient 
network or memory resources that correlate, as part of atroubleshooting 
process.Which type of chart should the administrator create to allow all 
relevant data to be easily exported to CSV for later analysis? 
 
A. A VM entity chart with each of the relevant metrics. 
B. A cluster metric chart for each of the relevant metrics 
C. A cluster entity chart with each of the relevant metrics 
D. A VM metric chart for each of the relevant metrics 
 
Answer: A 
 
 
https://portal.nutanix.com/page/documents/details?targetId=Web-Console-Guide-Prismv5_16:Web-Console-Guide-Prism-v5_16
https://portal.nutanix.com/page/documents/details?targetId=Web-Console-Guide-Prismv5_16:Web-Console-Guide-Prism-v5_16
149. Refer to Exhibit: 
 
An administrator is attempting to create an additional virtual switch on a 
newly deployed AHV cluster,using the two currently disconnected 
interfaces. The administrator is unable to select the disconnectedinterfaces 
when creating the virtual switch.What is the likely cause of this issue? 
 
A. Only one interface is available on the selected hosts. 
B. Interfaces must be connected to the network before they can be assigned. 
C. The disconnected interfaces are currently assigned to virtual switch 0, 
D. Interfaces must be assigned to virtual switches via the cli 
 
Answer: C 
 
Explanation: when you create a new virtual switch on AHV, you need to select 
one or more uplink interfaces that areconnected to a physical network. You 
cannot select an interface that is already assigned to anothervirtual switch. By 
default, AHV creates a virtual switch called br0 that uses all available interfaces 
on thehost2. Therefore, if you want to use some of those interfaces for another 
virtual switch, you need toremove them from br0 first. 
https://masteringnutanix.com/2020/06/13/how-to-create-an-ahv-virtual-switch-
with-single-uplink/ 
https://masteringnutanix.com/2020/06/13/how-to-create-an-ahv-virtual-switch-with-single-uplink/
https://masteringnutanix.com/2020/06/13/how-to-create-an-ahv-virtual-switch-with-single-uplink/
150. An administrator wants to have a VM on an AHV cluster with access to 
multiple VLANs.What is the most efficient way to achieve this? 
 
A. Update a vNIC on the VM to operate in trunked mode for all desired VLANs. 
B. Create a network in AHV associated with all those VLANs on all hosts. 
C. Use SFPs that allow the needed VLANs. 
D. Use one vNIC per VLAN for the VM. 
 
Answer: A 
 
151. Refer to the exhibit. 
 
System Non-Root Partition Usage shows a warning or critical alert. The 
administrator needs to changethe frequency of checks and alerts to 
respond more quickly.Where in Prism Element should the administrator 
change the frequency of checks and alerts? 
 
A. Health Dashboard > Manage Crocks > Frequency 
B. Alerts Dashboard > Manage Checks > Schedule 
C. Health Dashboard > Manage Checks > Schedule 
D. Alerts Dashboard > Manage Checks > Frequency 
 
Answer: C 
 
152. An administrator would like to leverage the Reliable Event Logging 
Protocol (RELP) with theirRemote Syslog Server. After completing the 
configuration, it is observed that RELP logging is notworking as 
expected.What is the likely cause of this issue? 
 
A. The cluster does not have RELP installed. 
B. The GENESIS was the only one chosen to forward log information. 
C. The Remote Syslog Server was configure using TCP as the protocol. 
D. The remote server does not have rsyslog-relp installed. 
 
Answer: D 
 
 
153. An administrator wants to receive an environment summary report 
when a host failure occurs.Which action would address the administrator’s 
need? 
 
A. Enable App Discovery 
B. Edit report schedule 
C. Configure an alert policy 
D. Create a playbook 
 
Answer: C 
Explanation: An alert policy can be configured to send out an environment 
summary report when a host failure occurs.This can be done by creating a policy 
that triggers an alert whenever a host fails and then configuring thepolicy to send 
out a report that provides a summary of the environment in which the failure 
occurred.This will allow the administrator to quickly get a view of the environment 
after a failure occurs, allowingthem to take the necessary steps to address 
the issue. 
https://www.nutanix.com/support-services/training-
certification/certifications/certification-details-nutanix-certified-professional-
multicloud-infrastructure-6_5 
 
154. An administrator is concerned about the amount of data that a VM 
reading and writing to the storagefabric. 
https://www.nutanix.com/support-services/training-certification/certifications/certification-details-nutanix-certified-professional-multicloud-infrastructure-6_5
https://www.nutanix.com/support-services/training-certification/certifications/certification-details-nutanix-certified-professional-multicloud-infrastructure-6_5
https://www.nutanix.com/support-services/training-certification/certifications/certification-details-nutanix-certified-professional-multicloud-infrastructure-6_5
Which metric will provide that data? 
 
A. Host Hypervisor IO Bandwidth 
B. Host Disk IOPS 
C. VM Storage Controller IOPS 
D. VM Storage Controller Bandwidth 
 
Answer: C 
 
155. Upon logging into Prism Central, an administrator notices high cluster 
latency.How can the administrator analyze data with the least number of 
steps or actions? 
 
A. Modify Data Density in the main Prism Central dashboard. 
B. Click on the chart in the widget to expand the data elements. 
C. Take note of the duster name and create a new Analysis chart. 
D. Click the cluster name in the cluster quick access widget. 
 
Answer: B 
 
156. An Administrator has been asked to deploy VMs using a specific 
image. The image has beenconfigured with settings and applications that 
will be used by engineering to develop a new product bythe company.The 
image is not available on the desired cluster, but it is available in other 
cluster associated with PrismCentral.Why isno’t the image available? 
 
A. The image bandwidth policy has prevented the image upload. 
B. The cluster should be removed from all categories. 
C. The cluster has not been added to the correct category 
D. The image placement policy was configured with enforcement. 
 
Answer: D 
Explanation: When a placement policy is enforced, images are only allowed to 
be deployed on clusters that are part ofcategoriesthat are associated with the 
policy. If the desired cluster is not associated with the policy, thenthe image will 
not be available for deployment.https://next.nutanix.com/how-it-works-22/image-
management-for-ahv-clusters-and-dealing-with-the-inactive-image-37300 
 
157. An administrator is setting up a Nutanix cluster and needs to configure 
the default VLAN. 
Which configuration should the administrator choose? 
 
A. Vlan.0 
B. Vlan.1 
C. Vlan.2 
D. Vlan.7 
 
Answer: A 
Explanation: Nutanix cluster is a group of Nutanix nodes that share data and 
resources across a network1. A VLAN isa virtual LAN that allows devices on 
different physical LANs to communicate as if they were on the samenetwork2.by 
default, a virtual NIC (VM NIC) on a guest VM operates in access mode and can 
send and receivetraffic only over its own specified VLAN. The default VLAN ID 
for access mode interfaces is 1.Therefore, by choosing Vlan.1 as the default 
VLAN, you can simplify the network configuration and avoidpotential issues with 
other VLAN IDs. 
 
158. Which command should an administrator run from the CLI to view the 
uplink state of all AHV nodesin the cluster? 
 
A. allssh show_uplinks 
B. manage_ovs show_uplinks 
C. allssh manage_ovs show_uplinks 
D. manage ovs show uplinks 
 
Answer: C 
159. A two-node ROBO cluster is configured with a witness VM. 
 
What happens when Node A goes down? 
 
A. The- cluster becomes unavailable and goes into read-only mode. 
B. All operations and services on the Node B are shut down and go into a waiting 
state. 
C. The cluster is unaffected and no administrator intervention is required. 
D. Node B sends a leadership request to the Witness VM and goes into single-
node mode. 
 
Answer: D 
 
160. An administrator receives complaints of poor performance in a 
particular VM.Based on the VM performance metric, what is the most likely 
cause of this behavior? 
 
A. Oplog is full cannot serve IO request from this VM. 
B. The host’s CPU is severely overloaded. 
C. SSD tier is not big enough to serve workloads’ IOPS demand. 
D. The VM needs more vCPUs 
 
Answer: C 
Explanation: one of the key metrics to consider for VM performance is IOPS 
(Input/Output Operations Per Second),which is a measure of the number of 
input/output requests a device processes per second3. Anothermetric is 
throughput, which is a measure of how much data a device transfers per second3. 
 
 
161. HOTSPOT Async DR is configured between two sites. A network 
outage occurs at the primary site.Which steps must the administrator 
perform to bring the VMs back into service at the backup site? 
Item instructions: For each procedure, indicate the order in which that 
procedure must take place to meetthe item requirements. Not all 
procedures are valid. Identify any invalid procedures using the drop-down 
option. 
 
Answer: 
 
 
Explanation: 
 
 
 
162. A user is complaining about slowness of a mission-critical MSSQL 
Server. The administrator logs into Prism Element to investigate the VM 
performance and observes what is shown in the diagram. 
 
Which action would best improve VM performance? 
A. Disable hyperthreading in the BIOS. 
B. Add additional RAM to the user VM 
C. Add additional RAM to the host on which the VM is running. 
D. Ensure the host's CPUs ere not excessively overcommitted. 
Answer: B 
Explanation: Prism Element is a graphical user interface that allows you to 
manage Nutanix clusters1. You can usePrism Element charts to understand 
Nutanix cluster workloads and troubleshoot performance relatedissues2.memory 
optimized virtual machine sizes offer the best performance for SQL Server 
workloads on AzureVMs. Adding more RAM to the user VM can help reduce 
paging and improve query execution times.SQL Server performance can be 
affected by disk latency and throughput. By creating separate virtualdisks for data 
and logs, you can spread activity across multiple spindles and reduce disk 
contention.https://next.nutanix.com/how-it-works-22/differences-between-prism-
element-prism-central-and-prism-pro-37137 
 
163. An administrator needs to deploy an application with a large amount 
of data connected via Nutanixvolumes.Which two actions should 
the administrator take when designing the Volume Group? (Choose two.) 
A. Distribute workload across multiple virtual disks 
B. Enable RSS (Receive Side Scaling) 
C. Use multiple subnets for iSCSI traffic 
D. Enable thick provisioning on the Volume Group(s) 
Answer: A,B 
 
164. What is the minimum time a newly created Deduplication storage 
policy takes to apply to the VMs inthe container? 
A. 5 Minutes 
B. 10 minutes 
C. 30 minutes 
D. 60 minutes 
Answer: C 
 
165. An administrator needs to configure Prism to send encrypted 
messages to a set of recipients.Which setting must be applied? 
A. Use SMTP Port 25 
B. Configure Prism Central to use Cluster Lockdown 
C. Install SSL certificates on Prism Central 
D. Set SMTP Security Mode to STARTTLS 
Answer: D 
Explanation: The best way for the administrator to configure Prism to send 
encrypted messages to a set of recipientsis to set the SMTP Security Mode 
to STARTTLS. This will ensure that all messages sent over SMTP areencrypted 
and secure. Additionally, the administrator should consider installing SSL 
certificates on Prism Central to ensure that the messages are being sent 
securely. Finally, the administrator should considerconfiguring Prism Central to 
use Cluster Lockdown, which will help ensure that the messages are Only sent 
to the intended recipients. 
 
166. What is most likely the cause of this issue? 
A. There is a firewall rule blocking VLAN512 traffic 
B. VLAN512 is a reserved VLAN ID, and not usable for guest VMs. 
C. The VLAN was not created on the upstream switches. 
D. The administrator did not created the VLAN on all hosts 
 
Answer: C 
 
167. A cluster has RF2. The cluster loses two drives on different nodes in 
the same storage tier.What is the effect on the replicas of the VMs? 
 A. Some VM data may be lost 
B. No VMs lose data if the node has two or more SSDs 
C. Some VMs may reboot and gain access to data 
D. No VMs lose data because of RF2 
Answer: A 
 
Explanation: Reference: https://next.nutanix.com/how-it-works-22/disk-fault-
tollerance-8822 
 
168. What Nutanix feature provides effective caching optimization In VDI 
environments? 
A. Remote Protection Group 
B. Local Protection Group 
C. Snap Clones 
D. Shadow Clones 
Answer: D 
 
169. The customer is seeing high memory utilization on a mission critical 
VM. Users report that theapplication is unavailable. The guest OS does not 
support hot add components.How should the administrator fix this issue? 
A. Access the CVM on the host that is running the VM: 
* Open acli 
* Run a command to increase the amount of RAM assigned to the VM 
B. From the Prism web console: 
* Go to the VM dashboard* Select the VM from the VMs list 
* Choose Update* Adjust the amount of memory assigned to the VM 
C. Go to Control Panel in the VM: 
*Select the Computer Properties 
* Increase the amount of RAM assigned 
D. During the next maintenance window: 
https://next.nutanix.com/how-it-works-22/disk-fault-tollerance-8822
https://next.nutanix.com/how-it-works-22/disk-fault-tollerance-8822
* Select the VM from the VMs list 
* Perform a graceful shutdown 
 
Answer: D 
 
170. An administrator migrates a VM onto a new Nutanix cluster- After the 
migration, the administrator observes the following conditions: 
• Cluster memory utilization: 64% 
• Cluster CPU utilization: 19%• Cluster storage utilization. 32% 
• Average VM CPU utilization: 25% 
• Average VM CPU ready%: 24% 
• Average VM memory utilization: 60% 
 
Which two changes should the administrator make to improve VM 
performance? (Choose two.) 
 A. Reduce the number of vCPUs assigned to VMs.B. Add more memory to the VMs. 
C. Reduce the number of VMs on the hosts. 
D. Replace high core count CPUs with high clock rate CPUs. 
Answer: C,D 
 
171. Refer to the exhibit. 
 
The Linux Admin role has been created to manage only Linux VMs in the 
environment. 
However, the Admin1 user does not have access to all Linux VMs.What step 
should be taken to grant the proper access? 
A. Add the hosts to the entities KM for the role. 
B. Grant the admin1 user the viewer role (or the cluster. 
C. Add the role to the Linux images. 
D. Add the proper category to each Linux VM. 
Answer: A 
 
172. Which two capabilities does IPAM provide in a Nutanix networking 
configuration? (Choose two.) 
A. Allows proxy server settings to be set up for a defined network 
B. Allows AHV to assign IP addresses automatically to VMs using DHCP 
C. Configures a VLAN with an IP subnet and assigns a group of IP adresses 
D. Configures firewall rules to prevent or allow certain TCP/IP traffic 
Answer: B,Ccan be made on a cluster with software-based Data-at-
Rest Encryption enabled? 
A. Disable encryption on the cluster 
B. Deploy an additional Native KMS Server 
C. Enable encryption for a VM 
D. Change Native KMS to External KMS 
 
Answer: D 
Explanation: Reference: https://next.nutanix.com/blog-40/security-with-
simplicity-encryption-for-your-data-with-1-click-28225 
 
16. An administrator needs to bring down a host in a Nutanix Cluster for 
maintenance reasons. The administrator puts the host in maintenance 
mode. 
What should the administrator do to perform an orderly shutdown of the 
CVM? 
A. Execute the cvm_shutdown -P new command from the CVM. 
B. Enter Fever off Server - immediate from the IPMI console. 
C. Enter Fewer off Server-orderly Shutdown from the IPMI console. 
D. Execute the cvm_shutdown -P now command from the host. 
 
Answer: A 
 
https://next.nutanix.com/blog-40/security-with-simplicity-encryption-for-your-data-with-1-click-28225
https://next.nutanix.com/blog-40/security-with-simplicity-encryption-for-your-data-with-1-click-28225
17. An administrator logs into the Nutanix Support Portal and notices there 
is a new version ofthe LCM Framework available. In an effort ensure LCM 
is providing the latest features, the administrator would like to upgrade 
LCM. 
How can the LCM Framework be upgraded? 
A. Perform an LCM inventory 
B. Upload the latest LCM Framework as an image in the image Configuration in 
Prism 
C. Upload the latest LCM Framework bundle via Upgrade Software in Prism 
D. Upgrade AOS 
 
Answer: A 
 
18. Which baseline is used to identify a Zombie VM? 
A. VM is powered off for the past 21 days. 
B. Memory usage is less than 1% and memory swap rate is equal to 0 Kbps for 
the past 21 days.VM has no logins for the past 21 days 
C. VM has no logins for the past 21 days 
D. Fewer than 30 1/Os and less than 1000 bytes per day of network traffic for the 
past 21 days 
 
Answer: D 
 
19. In the event of a disk failure, which process will immediately ad 
automatically scans Cassandra to findall data previously hosted on the 
failed disk, and all disks in that node? 
A. Curator 
B. Stargate 
C. Genesis 
D. Prism 
 
Answer: A 
 
20. Which algorithm do snapshots and clones leverage to maximize 
efficiency and effectiveness? 
A. Continuous Data Protection 
B. Copy-on-Write 
C. Split-mirror 
D. Redirect-On-Write 
 
Answer: D 
 
21. How will an HDD failure affect VMs with data on the failed device? 
A. The VMs will crash, and will be restarted once the failed HDD has been 
replaced and the data hasbeen restored. 
B. A live migration will be initiated, moving the affected VMs to a host that contains 
the replica data. 
C. The VMs will remain operational on that host and continue to function normally 
with no noticeable impact 
D. An HA event will occur, causing the affected VMs to restart on a node 
that contains the replica data. 
 
Answer: C 
 
22. After configuring Active Directory as the desired authentication service, 
an administrator is not able to login into Prism Central using privileged 
account. 
Which configuration must be checked first? 
A. Account lock status 
B. Role Mapping 
C. Local user account 
D. Cluster Lockdown 
 
Answer: B 
Explanation: According to the Nutanix Community1, users can authenticate 
using their Active Directory credentialswhen Active Directory support is 
enabled for Prism Central. To enable Active Directory support, you needto 
configure Role Mapping12, which defines how Active Directory groups map to 
Prism Central roles.https://next.nutanix.com/ncm-intelligent-operations-formerly-
prism-pro-ultimate-26/configuring-authentication-38051 
 
23. After running an LCM inventory it is noticed that there are a number of 
firmware and software updates available. The administrator would like to 
avoid any host reboots, but would like to apply some of the available 
updates? 
Which two updates can be done while avoiding a host reboot? (Choose 
two.) 
A. M.2 Drives 
B. AHV 
C. Data Drives 
D. AOS 
 
Answer: A,D 
Explanation: AOS and M.2 Drives are two updates that can be done while 
avoiding a host reboot. AOS is the Acropolis Operating System that includes the 
hypervisor, storage and management components of the Nutanix cluster, and 
firmware and software updates can also be applied to it without requiring any host 
reboots 
 
24. Which two permission assignment tasks can be accomplished via 
Prism Element? (Choose two.) 
A. Grant a user permission to create VMs on a specific storage container 
B. Grant a user permission to view details of all VMs on a specific cluster 
C. Grant an active directory group permission to perform back Operations 
D. Grant a user permission to create and delete snapshots on a specific VM 
 
Answer: B,D 
Explanation: Prism Element is a management interface that allows 
administrators to assign permissions to users and groups on a per-cluster, per-
VM, or per-storage container basis. 
https://www.nutanix.com/content/dam/nutanix/resources/support/ncp-mci-ds.pdf 
 
25. An administrator has been asked to enable block awareness and 
increase the fault tolerance to FT2 on a Nutanix AHV cluster with the 
following configuration: 
• Four blocks. 
• One node per block. 
Will the administrator be able to accomplish these tasks? 
A. No-Fault tolerance changes are not supported. 
B. Yes-FT2 requires a minimum of three nodes. 
C. Yes-Block awareness requires a minimum of three blocks. 
D. No-FT2 requires a minimum of five nodes. 
 
Answer: D 
 
26. What requires iSCSI initiator configuration in the guest OS to use 
Volumes? 
A. SQL Server Always On Availability Group 
B. Microsoft Windows Failover Cluster 
C. Oracle RAC 
D. Exchange DAG 
 
Answer: B 
 
 
27. An administrator has set up a local web server accessible to the Nutanix 
clusters. 
Which two steps are required to set up LCM for an environment without 
Internet access? (Choose two.) 
A. Download the lcai_disconnecced_version. tar.gz LCM bundle from the support 
portal. 
B. Edit LCM Advanced Settings in Prism Element and enter the address of the 
web server. 
C. Edit LCM Advanced Settings m Prism Central and enter the address of the web 
server. 
D. Download the lcm_dark_site_version. tar . gz LCM bundle from the support 
portal. 
 
Answer: B,D 
 
28. Which component ensures uniform distribution of data throughout the 
cluster to eliminate hot spots and speed up rebuilds? 
A. Cassandra 
B. Distributed Storage Fabric 
C. High Availability 
D. Acropolis App Mobility Fabric 
 
Answer: A 
 
 
29. Refer to the exhibit. 
 
Which two initial cluster configuration tasks were missed during the 
deployment process? (Choose two.) 
A. Host password changes 
B. Password policy changes 
C. BIOS password changes 
D. CVM password changes 
 
Answer: A,D 
 
30. A newly-hired Nutanix administrator was tasked by the CIO to create a 
single VM on a test network. The network administrator stated that a native 
VLAN was used on the Cisco TOR switches with the following parameters: 
IP address:172,16.1.2 
Network Mask: 255.255.255.0 
Default gateway: 172.16.1.1 
VLAN:1 
The same parameters were used to create a network profile on Nutanix, but 
the when the VM was on …What should the Nutanix administrator do to fix 
this issue? 
A. Nutanix removed support for native VLAN. 
B. Change VLAN field from vlan1 to vlan0. 
C. Enable IPv6 on the VM. 
D. Use DHCP as opposed to static IP 
 
Answer: B 
 
31. An administrator wants to expand the Failure Domain level of a cluster. 
What two options are available? (Choose two.) 
A. Node 
B. Data Center 
C. Block 
D. Rack 
Answer: C,D 
 
32. An administrator logs in to Prism Element goes to the Network view, and 
sees the output shown in the exhibit. 
 
Which three steps must the administrator take to increase throughput to 
the host? (Choosethree.) 
A. Connect the 10Gb interfaces to the physical switch. 
B. Change the bond mode to balance-slb or balance—tcp. 
C. Remove any 1Gb interfaces still connected from the default bond. 
D. Add a new switch to the network and connect 1Gb interfaces to it. 
E. Change the VLAN ID to a higher priority ID. 
 
Answer: A,B,E 
 
 
33. An administrator needs to boot a VM to a bootable CD. The administrator 
tries to configure the VM to boot to it, select to add disk, and goes to the 
images available. The image for the bootable CD is unavailable. 
What is the Likely issue? 
A. The CD-ROM interface is too slow. 
B. The administrator selected a disk attached before it can boot to a CD. 
C. The VM needs to have a standard disk attached before it can boot to a CD. 
D. The bootable CD image is corrupted during creation. 
 
Answer: B 
Explanation: Reference: https://next.nutanix.com/prism-infrastructure-
management-26/booting-vm-to-cd-no-drives-present-31800 
 
34. Refer to Exhibit: 
 
 
Why has an anomaly been triggered? 
A. Because the CPU usage crossed the blue band. 
B. Because the blue band range increased over the last 2 days 
C. Because the CPU usage dropped belon' 20% 
D. Because the CPU usage reached 100% 
 
Answer: A 
Explanation: Nutanix leverages a method for determining the bands called 
‘Generalized Extreme Studentized DeviateTest’. A simple way to think about this 
https://next.nutanix.com/prism-infrastructure-management-26/booting-vm-to-cd-no-drives-present-31800
https://next.nutanix.com/prism-infrastructure-management-26/booting-vm-to-cd-no-drives-present-31800
is similar to a confidence interval where the values are between the lower and 
upper limits established by the algorithm. Another web source 3 shows an 
example of how anomaly detection works in Nutanix Prism Central. In the video, 
you can see that when the observed value of a metric deviates significantly from 
the predicted value based on historical data, an anomaly event is triggered and 
displayed on a chart. Therefore, by comparing the observed values with the 
predicted values based on historical data, Nutanix anomaly detection can 
identify abnormal behavior and alert you accordingly. 
 
35. An administrator is tasked with configuring networking on an AHV 
cluster and needs to optimize for maximum single VM throughput. 
Which bond mode should the administrator select? 
A. Active-Active with Mac pinning 
B. Active-Active 
C. Active-Backup 
D. No Uplink Bond 
 
Answer: B 
 
36. An administrator is working with Nutanix Support and needs to provide 
logs for troubleshooting na issue. The cluster is located in a secure 
environment. Data such as IP addresses and VM names cannot be shared. 
Which method should be used to anonymize the log data sent to Nutanix 
Support? 
 A) 
 
B) 
 
C) 
 
D) 
 
 A. Option A 
B. Option B 
C. Option C 
D. Option D 
Answer: D 
 
37. An administrator recently added new SSDs to a Nutanix cluster and 
knows the firmware will be out ofdate, Due to security constraints, the 
cluster does not have access to the Internet. 
Which two steps must be completed to update the firmware? (Choose two.) 
A. Download the disk firmware from the OEM's website. 
B. Download a darksite bundle and deploy an internal webserver, 
C. Select Upgrade Software, then upload the firmware bundle. 
D. update the LCM Source and URL to access the firmware bundle. 
 
Answer: B,C 
Explanation: 
• Download a dark site bundle and deploy an internal web server123. 
• Select Upgrade Software, then upload the firmware bundle using the 
Direct Upload option in LCM1. 
 
 
38. What is Prism Central primarily used for? 
A. Multi-cluster network configuration 
B. Container creation 
C. Multi-cluster Single Sign On 
D. Data reduction configuration 
 
Answer: C 
 
39. Refer to the exhibit 
 
 
An administrator is adding a new node to a cluster. The node has been 
imaged to the same versions of AHV and AOS that the cluster running, 
configured with appropriate IP addresses, and br0-up has been configured 
the same the existing uplink bonds. When attempting to add the node to the 
cluster with the Expand Cluster function in Prism, the cluster isunable to 
find the new node. 
Based on the above output from the new node, what is most likely the cause 
of this issue? 
A. The ports on the upstream switch are not configured for LACP. 
B. The existing and the expansion node are on different VLANs. 
C. There is a firewall blocking the discovery traffic from the tlu 
D. LACP configuration must be completed after cluster expansion 
Answer: B 
40. Which capability refers to the storage of VM data on the node where the 
VM is running and ensurethat the read I/O does not have to traverse the 
network? 
A. Intelligent Locally 
B. Data Locality 
C. Intelligent Tiering 
D. Data Tiering 
 
Answer: B 
 
41. On a Nutanix cluster, what does Network Segmentation refer to? 
A. A distributed firewall for security VM to VM traffic. 
B. Physically separating management traffic from guest VM traffic. 
C. Isolating intra-cluster traffic from guest VM traffic. 
D. Isolating management traffic from storage replication traffic. 
 
Answer: C 
Explanation: network segmentation on Nutanix clusters refers to creating a 
separate network for service-specificcommunication and isolating different types 
of traffic over selected VLANs or physical interfaces. 
https://next.nutanix.com/ncm-intelligent-operations-formerly-prism-pro-ultimate-
26/network-segmentation-isolating-service-specific-traffic-39463 
 
42. How should an administrator enable secure access to Volumes using a 
password? 
A. iSER 
B. CHAP 
C. SAML 
D. LDAP 
 
Answer: B 
Explanation: https://portal.nutanix.com/page/documents/details/?targetId=Web
-Console-Guide-Prism-v50:wc-block-services-enabling-t.html 
https://portal.nutanix.com/page/documents/details/?targetId=Web-Console-Guide-Prism-v50:wc-block-services-enabling-t.html
https://portal.nutanix.com/page/documents/details/?targetId=Web-Console-Guide-Prism-v50:wc-block-services-enabling-t.html
Provision storage on the Nutanix cluster by creating a volume group. Create a 
client whitelist to enableaccess to the volume group by using the IP addresses or 
client initiator IQNs in a whitelist (as part of thevolume group configuration). 
Create a secret for the volume group if you are using CHAP authentication. 
 
43. When a configuring a syslog server in Prism Central, what two pieces 
information are required?(Choose two.) 
A. HTTPS URL 
B. Encryption secret 
C. Transport protocol 
D. IP address/port 
 
Answer: C,D 
 
44. An administrator has been tasked with increasing security on Nutanix 
cluster by disabling password authentication when accessing the CVM and 
AHV hosts and instead moving to key-based SSH,What is the easiest way 
for the administrator to meet these needs? 
A. Configure LDAP authentication through a secure server. 
B. Enable STIES vie commend line on SSH to CVM. 
C. Enable Cluster Lockdown and provide an RSA key. 
D. Restrict access with User Management in Prism. 
 
Answer: C 
Explanation: "An administrator has been tasked with increasing security on 
Nutanix cluster by disabling passwordauthentication when accessing the CVM 
and AHV hosts and instead moving to key-based SSH, What isthe easiest way 
for the administrator to meet these needs? Enable Cluster Lockdown and provide 
anRSA key."Cluster Lockdown mode disables password authentication when 
accessing the CVM and AHV hosts andinstead requires key-based SSH. To 
enable Cluster Lockdown mode, you need to provide an RSA key.Therefore, by 
enabling Cluster Lockdown mode and providing an RSA key, you can increase 
security onNutanix cluster by disabling password authentication when accessing 
the CVM and AHV hosts andinstead moving to key-based SSH with minimal 
effort. https://next.nutanix.com/how-it-works-22/streamlined-login-and-increase-security-key-based-ssh-login-37397 
 
https://next.nutanix.com/how-it-works-22/streamlined-login-and-increase-security-key-based-ssh-login-37397
https://next.nutanix.com/how-it-works-22/streamlined-login-and-increase-security-key-based-ssh-login-37397
45. Prism Central will be installed manually on an AHV cluster. 
Which three disk images must be downloaded from the portal for the Prism 
Central VM? (Choose three.) 
A. var 
B. tmp 
C. boot 
D. home 
E. data 
 
Answer: C,D,E 
Explanation: 
 https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-
Guide-Prism-v5_10:mul-pc-install-scratch-c.html 
 
46. An administrator needs to run a mixed Exchange and SQL workload with 
a guaranteed amount of container space for each application. 
How should the administrator meet this requirement? 
A. Create one container and set capacity reservation 
B. Create two containers and reserve space for containers 
C. Create one container and enable compression 
D. Create two containers and reserve space for vDisks 
 
Answer: B 
Explanation: 
https://portal.nutanix.com/page/documents/details?targetId=Web_Console_Gui
de-NOS_v4_0:wc_security_authentication_wc_t.html 
 
 
https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-Prism-v5_10:mul-pc-install-scratch-c.html
https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-Prism-v5_10:mul-pc-install-scratch-c.html
https://portal.nutanix.com/page/documents/details?targetId=Web_Console_Guide-NOS_v4_0:wc_security_authentication_wc_t.html
https://portal.nutanix.com/page/documents/details?targetId=Web_Console_Guide-NOS_v4_0:wc_security_authentication_wc_t.html
47. Refer to Exhibit: 
 
An administrator needs to enable inline deduplication for a pre-existing 
storage container. When trying to enable deduplication on the storage 
container. this feature is grayed-out. 
What is the reason for this behavior? 
A. Replication Factor 1 is configured on the storage container. 
B. The cluster has less than 5 nodes which is the minimum node-count to enable 
deduplication. 
C. Capacity reservation is not enabled on the storage container. 
D. The cluster has hybrid storage and deduplication is supported only on all-flash 
clusters. 
 
Answer: D 
Explanation: Nutanix supports two types of deduplication: post-process and 
inline. Post-process deduplication runsperiodically on a schedule and can be 
enabled on any cluster. Inline deduplication runs in real timebefore data is written 
to disk and can be enabled only on all-flash clusters. Therefore, by checking the 
type of storage and the type of deduplication, you can determine if you canenable 
inline deduplication on a storage container or not. Nutanix inline deduplication is 
a feature that reduces the stored size and avoids duplicate data on astorage 
container1. It is recommended only on some specific scenarios, such as when 
using NutanixFiles or virtual desktop infrastructure (VDI) workloads12. 
 
48. An administrator is troubleshooting vDisk performance issues in a 
Nutanix cluster with hybrid disks. The VMs all have Flash Mode enabled. 
But users are reporting disk latency. 
What could cause the performance issues? 
A. Flash mode is disabled when a node fails. 
B. Compression is disabled on the vDisk storage container. 
C. The VMs vDisks are in multiple containers. 
D. Data size for flash mode exceeds 25% of the SSD capacity. 
 
Answer: D 
Explanation: data size for flash mode exceeds 25% of the SSD capacity could 
cause the performance issues. Flashmode is a feature that allows vDisks to be 
pinned to SSDs for faster access, but it has a limit of 25% ofthe SSD capacity per 
node. If this limit is exceeded, some vDisks may be evicted from flash mode 
andcause disk latency2. 
 
49. Which node type does not deploy a Nutanix Controller VM? 
A. Storage Only 
B. Hyper Converged 
C. Compute Only 
D. All Flash 
 
Answer: C 
 
 
50. Which Nutanix service control ncli, the HTML5 UI, and Rest API? 
A. Prism 
B. Cassandra 
C. Zookeeper 
D. Chronos 
 
Answer: A 
Explanation: Prism is the central service control used by Nutanix to manage the 
clusters.It provides a unified view of the entire system, and it is used to control 
the HTML5 UI, the nCLI, and the REST API. Prism is used to manage the 
resources of the system, such as the nodes, storage, andnetworks, as well as to 
monitor the performance of the system and the applications running on it. 
https://www.nutanixbible.com/2f-book-of-basics-cluster-components.html 
PrismKey Role: UI and API· Prism is the management gateway for components 
and administrators to configure and monitor the Nutanix cluster. This includes 
Ncli, the HTML5 UI, and REST API.· Prism runs on every node in the cluster and 
uses an elected leader like all components in the cluster. All requests are 
forwarded to the leader using Linux Iptables. This allows access to PRISM using 
any CVM Ip address.· Prism communicates with Zeus for cluster configuration 
data and Cassandra for statistics to present tothe user. It also communicates with 
the ESXi hosts for VM status and related information. These are onlysome of the 
essential services that make up the CVM functionality. For more information on 
all the services and various Nutanix Cluster components, refer to the portal 
documentation. 
 
51. An administrator needs to provide access for a user to view real-time 
performance metric for all VMs on all clusters across the datacenter.Which 
method accomplishes this with the least effort and ongoing maintenance? 
A. Configure IDP authentication and assign the user to the Cluster Admin role in 
Prism Central. 
B. Configure AD authentication and assign the user to the Viewer role in Prism 
Element. 
C. Configure AD authentication create a custom role, assign the user to the 
role, and apply the role to all clusters and VMs 
 
Answer: C 
 
https://www.nutanixbible.com/2f-book-of-basics-cluster-components.html
52. A vDisk is read by multiple VMs. The cluster creates immutable copies 
of the vDisk. 
What are these vDisk copies called? 
A. Disk Clones 
B. Golden Images 
C. Volume Groups 
D. Shadow Clones 
Answer: D 
 
53. An administrator responsible for a VDl environment needs to investigate 
reports of slow logins. The administrator finds that increasing the number 
of vCPUs from 2 to 4 will reduce the login times. 
Production workloads are consuming 75% of the host CPU on the cluster. 
The administrator increases the vCPU count on all of the VDl VMs. 
What are two impacts on the cluster? (Choose two) 
A. Increasing CPU counts will decrease memory utilization 
B. Increase memory utilization% 
C. Increase CPU utilization% 
D. Increase CPU ready% 
 
Answer: C,D 
 
54. Which two methods are available when migrating a VM from a legacy 3-
tier solution using VMwareESXi to AHV? (Choose two.) 
A. Deploy the Move appliance. 
B. Use Cross-Hypervisor DR. 
C. Import the .vmdk into the Image Service. 
D. Use shared nothing live migration. 
 
Answer: A,C 
 
 
55. An administrator has received reports of users being disconnected from 
remote desktop sessions to aspecific VM. 
Which VM metric is most useful isolating the cause of the issue? 
A. Storage Controller Bandwidth 
B. Swap-Out Rate 
C. Hypervisor CPU Ready time (%) 
D. Virtual NIC receive packet dropped 
 
Answer: D 
 
56. A customer wants to isolate a group of VMs within their Nutanix 
environment for security reasons. The customer creates a VM with two NICs 
to act as a firewall and installs the appropriate software and certificates. 
However, no one from the outside can access the application. 
What is the likely cause of this problem? 
A. A shared volume group must be used by all isolated VMs 
B. More than one NIC cannot be added to a VM 
C. One of the NICs needs to be configured on the internal VLAN 
D. Wireshark is installed on the NATVM 
 
Answer: C 
 
 
57. Refer to Exhibit: 
 
An administrator is trying to put a node into maintenance mode but 
receives the message shown in the exhibit. 
What is a potential reason for this dialog? 
A. LinuxVM1 uses a vDisks stored in a RFI Datastore 
B. LinuxVM1 uses a Volume Group 
C. LinuxVM1 uses a virtual GPU. 
D. LinuxVM1 uses e vDisks stored in a RF3 Datastore 
 
Answer: A 
Explanation: According to the Nutanix Community1, host maintenance mode is 
used to safely migrate all the uservirtual machines (VMs) in the host and make 
sure no VMs are running on the node. If a VM can’t bemigrated to another host, 
you need to shut down the VM for the host to enter into maintenance 
mode. According to The Virtualist2, a storage container is a logical segmentation 
of a storage pool that can bemounted as an NFS datastore on ESXi hosts. You 
can choose a replication factor (RF) for each storagecontainer, which determines 
how many copies of data are stored across different nodes. 
 
 
58. How many SSL certificates are used by Prism Element on a Nutanix 
cluster? 
A. 1 
B. 5 
C. 256 
D. 2048 
 
Answer: A 
 
59. The administrator recently had a node fail in an AHV Nutanix cluster. All 
of the VMs restarted on Other nodes in the cluster, but they discovered 
that the VMs that make up a SQL cluster were running on thefailed host. 
The administrator has been asked to take measures to prevent a SQL 
outage in the future. 
What affinity option will prevent the SQL VMs from running on the same 
hos? 
A. VM-VM anti-Affinity policy 
B. Create Affinity Category 
C. VM-Most Affinity policy 
D. Create Affinity Project 
 
Answer: A 
 
60. An administrator adds a node with older generation processors to an 
existing AHV cluster with newer generation processors. 
What is the effect on live migration? 
A. Live migration continues to function as expected and VMs can move to any 
AHV host. 
B. Live migration is prevented until the administrator enables the legacy migration 
option. 
C. Live migration is prevented until the administrator manually changes the newer 
processor level. 
D. Live migration of VMs is prevented between newer and older processors. 
 
Answer: D 
 
61. A guest VM should be able to tolerate simultaneous failure of two nodes 
or drives. 
What are the minimum requirements for the Nutanix cluster? 
A. 3 nodes with cluster RF 3 and container RF 3 
B. 3 nodes with cluster RF 3 and container RF 2 
C. 5 nodes with cluster RF 2 and container RF 3 
D. 5 nodes with cluster RF 3 and container RF 3 
 
Answer: D 
Explanation: 
 Reference: https://portal.nutanix.com/page/documents/details?targetId=Web-
Console-Guide-Prism-v5_16:arcredundancy-factor3-c.html 
 
62. Which three upgrades should an administrator be able to perform using 
Lifecycle Management?(Choose Three) 
A. AOS 
B. BMC 
C. BIOS 
D. Hypervisor 
E. HBA Firmware 
Answer: B,C,E 
Explanation: Reference: 
https://portal.nutanix.com/page/documents/kbs/details?targetId=kA00e000000L
MgICAW 
 
 
https://portal.nutanix.com/page/documents/details?targetId=Web-Console-Guide-Prism-v5_16:arcredundancy-factor3-c.html
https://portal.nutanix.com/page/documents/details?targetId=Web-Console-Guide-Prism-v5_16:arcredundancy-factor3-c.html
https://portal.nutanix.com/page/documents/kbs/details?targetId=kA00e000000LMgICAW
https://portal.nutanix.com/page/documents/kbs/details?targetId=kA00e000000LMgICAW
63. An administrator needs to increase bandwidth available to the AHV host 
and to the CVM. 
How should the administrator complete this task? 
A. In Prism, update vs0 to change the configuration to Active-Active. 
B. Use manage-ovs commands to update br0 change the configuration to Active-
Active. 
C. In Prism, create a vsl interface and add any remaining uplinks. 
D. Use manage-ovs commands to create br1 and add any remaining uplinks 
 
Answer: A 
 
64. An Administrator is working on a one-node ROBO cluster 
configurations. 
Which statement is true for this configuration? 
A. Witness vm required to break cluster quoram 
B. Supported hardware is NX-1175-G5 and G6 
C. witness vm should be 8vcp and 20gb ram 
D. the minimum RPO 8 hours required 
 
Answer: B 
Explanation: 
 Reference: https://www.nutanix.com/blog/unlocking-the-roboedge-it-landscape-
with-the-launch-of-nutanix-1-node-cluster 
 
 
https://www.nutanix.com/blog/unlocking-the-roboedge-it-landscape-with-the-launch-of-nutanix-1-node-cluster
https://www.nutanix.com/blog/unlocking-the-roboedge-it-landscape-with-the-launch-of-nutanix-1-node-cluster
65. AHV IPAM assigns an IP address from the address pool when creating 
a managed VM NIC. At which two instances does the address release back 
to the pool? (Choose two) 
A. The IP address lease expires 
B. The VM NIC is deleted. 
C. The IP address is changed to static. 
D. The VM is deleted. 
 
Answer: B,D 
Explanation: https://portal.nutanix.com/page/documents/solutions/details/?targ
etId=BP-2029_AHV:BP-2029_AHV 
Administrators can use Acropolis with IPAM to deliver a complete virtualization 
deployment, including network management, from the unified Prism interface. 
This capability radically simplifies the traditionally complex network management 
associated with provisioning VMs and assigning network addresses. Toavoid 
address overlap, be sure to work with your network team to reserve a range of 
addresses for VMs before enabling the IPAM feature. The Acropolis master 
assigns an IP address from the address pool when creating a managed VM NIC; 
the address releases back to the pool when the VM NIC or VM is deleted. 
 
66. Refer to exhibit: 
 
 
https://portal.nutanix.com/page/documents/solutions/details/?targetId=BP-2029_AHV:BP-2029_AHV
https://portal.nutanix.com/page/documents/solutions/details/?targetId=BP-2029_AHV:BP-2029_AHV
An administrator needs to update some images that were previously 
uploaded to their Nutanix cluster, whilelogged into Prism Element when 
trying to update the images, the update icon is not enabled. 
What could be the cause for this behavior? 
A. RBAC is configured and the administrator's user doesn't have the right 
privileges. 
B. The files were ISO but were uploaded as disk images hence cannot be used 
or edited. 
C. Images are corrupted and must be re-uploaded. 
D. Images were imported into Prism Central. 
 
Answer: D 
Explanation: According to Nutanix Support & Insights1, image create, update, 
and delete (CUD) behavior depends on whether a cluster (also known as Prism 
Element) is registered to Prism Central. Images created on a Prism Element 
reside on Prism Element and can be managed from Prism Element. For better 
centralized management, you can migrate images manually to Prism Central by 
using the image import feature. 
 
67. What are two minimum prerequisites for live migration to succeed? 
(Choose two.) 
A. All AHV hosts have IP addresses in the same subnet 
B. All AHV hosts must be configured on the same VLAN 
C. All VMs have an IP address in the same subnet 
D. All VMs are configured for the same VLAN 
 
Answer: A,B 
 
 
68. How should an administrator correct an SSL error when connecting to 
a Nutanix cluster? 
A. Add the SSL certificate to the workstation’s trusted people store 
B. Create a new self-signed certificate for the cluster with a 4096 bit key 
C. Create a new SSL certificate for the cluster signed by an AD certificate 
authority 
D. Add the SSL certificate to an AD group policy applied to all computer objects 
 
Answer: C 
 
69. An administrator wants to create a trunked interface on a VM on AOS 
5.15x. 
Which two steps should the administrator take first to achieve this? 
(Choose two) 
A. Use acli 
B. Log in over PE web UI. 
C. SSH to CVM. 
D. Update VM dialog. 
 
Answer: A,C 
Explanation: Reference: https://vmwaremine.com/2019/05/09/enable-vlan-
trunking-on-nutanix-ahv-vm/#sthash.3uIAHeXZ.dpbs 
 
70. A systemadministrator needs to add more VMs to their Nutanix cluster. 
Which two actions should the administrator perform to determine if the 
current cluster can accommodatethe new VMs? (Choose two) 
A. Enable Deduplication and Ensure Coding 
B. Utilize Optimize Resources for VM efficiency 
C. Determine utilization with Cluster Runway 
D. Perform an inventory with Life Cycle Management 
 
Answer: A,B 
 
https://vmwaremine.com/2019/05/09/enable-vlan-trunking-on-nutanix-ahv-vm/#sthash.3uIAHeXZ.dpbs
https://vmwaremine.com/2019/05/09/enable-vlan-trunking-on-nutanix-ahv-vm/#sthash.3uIAHeXZ.dpbs
71. Which two types of granular RBAC does Nutanix provide for AHV 
hosts? (Choose two.) 
A. Category based 
B. Project based 
C. Disk based 
D. Cluster based 
 
Answer: A,B 
 
72. An administrator manages a cluster and notices several failed 
components shown in the exhibit. 
 
What two options does the administrator have to run all NCC checks 
manually? (Choose two.) 
A. Using the Actions drop-down menu in the Health dashboard of Prism Element. 
B. Running ncc health_checks run-alll on the CVM 
C. Using the action action drop-down menu in the Health dashboard of Prism 
Central 
D. Running noc health_checks run_all on the PC VM 
Answer: A,B 
 
73. Which two access protocols are supported by Files? (Choose two.) 
A. ISCSI 
B. SMB 
C. FCOE 
D. NFS 
 
Answer: B,D 
 
74. A Nutanix cluster is equipped with four nodes. Four VMs on this cluster 
have been configured with a VM-VM anti-affinity policy and are each being 
hosted by a different node. 
What occurs to the cluster and these VMs during an AHV upgrade? 
A. One node hosts two VMs while the node being upgraded is in maintenance 
mode. 
B. One VM out of the four powers down when the node hosting it reboots. 
C. The AHV pre-upgrade checks fail until the administrator disables the anti-
affinity policy. 
D. The AHV pre-upgrade checks fail until the four VMs are powered off. 
 
Answer: A 
 
75. A user running a Computer Aided Design (CAD) application is 
complaining about slow response time within the VM, particular when 
moving windows or rendering images. 
Which VM metric will guide the administrator toward diagnosing the 
problem? 
A. Storage Controller Latency 
B. GPU Usage 
C. Swap in Rate 
D. Hypervisor Memory Usage (%) 
 
Answer: B 
 
 
76. An administrator needs to periodically send information about cluster 
efficiency via email to a set ofusers. 
What should be configured to accomplish this task? 
A. Configure Efficiency widget in Prism Central. 
B. Create a new' prism Central project. 
C. update Capacity Configurations in Prism Central. 
D. Add a schedule to Prism Central reports. 
 
Answer: D 
Explanation: To periodically send information about cluster efficiency via email 
to a set of users, the administrator canfollow these steps: 
• Create a report in Prism Central that contains the relevant information 
about cluster efficiency. 
• Add a schedule to the report to generate and send the report via email to 
the set of users at a specified frequency. This will ensure that the users 
receive regular updates about the cluster efficiency without the need 
formanual intervention. 
 
77. Which two private key types are supported by the Nutanix SSL 
certificate implementation? (Choosetwo.) 
A. ECDSA 
B. ECDH 
C. ED25519 
D. RSA 
 
Answer: A,D 
 
 
78. An administrator has been notified by a user that a Microsoft SQL Server 
instance is not performing well. When reviewing the utilization metrics, the 
following concerns are noted: 
• Memory consumption has been above 95% for several months 
• Memory consumption has been spiking to 100% for the last five days 
Storage latency is 2ms. 
When logging into Prism Central, how could the administrator quickly 
verify if this VM has performance bottlenecks? 
A. See Capacity Runway. 
B. Filter VM by Efficiency. 
C. Update Capacity Configurations. 
D. Perform Entity Sync 
 
Answer: B 
Explanation: This will allow the administrator to quickly identify VMs that are over 
provisioned or under utilized basedon their performance metrics. 
https://www.nutanix.com/support-services/training-
certification/certifications/certification-details-nutanix-certified-professional-
multicloud-infrastructure-6_5 
 
79. What does Nutanix recommend when setting up the node networking? 
A. Include NIC models from different vendors in the same bond 
B. Include at least two physically interfaces in every bond. 
C. Combine NIC models from different vendors in the same bond. 
D. Combine NIC models from different vendors in the same bond. 
 
Answer: B 
 
80. What is he recommended approach for a constrained VM? 
A. Reboot the VM 
B. Delete the VM. 
C. Increase the VM resources. 
D. Decrease the VM resources 
Answer: C 
https://www.nutanix.com/support-services/training-certification/certifications/certification-details-nutanix-certified-professional-multicloud-infrastructure-6_5
https://www.nutanix.com/support-services/training-certification/certifications/certification-details-nutanix-certified-professional-multicloud-infrastructure-6_5
https://www.nutanix.com/support-services/training-certification/certifications/certification-details-nutanix-certified-professional-multicloud-infrastructure-6_5
 
81. An administrator has created a Nutanix managed it a VLAN ID of 512. 
Several VMs have been created, and the administrator notices that the can 
successfully communicate with other VMs on that VLAN. Provided they are 
on the host, but cannot communicate with VMs that reside on different 
hosts in the cluster. 
What is most likely thee cause of this issue? 
A. There is a firewall rule blockingVLAN512 traffic. 
B. VLANS12 is a reserved VLAN ID, and not usable for guest VMs. 
C. The VLAN was not created on the upstream switches. 
D. The administrator did not create the VLAN on all hosts 
 
Answer: C 
 
82. An administrator needs to report on any alerts generated by a Nutanix 
cluster that affected the cluster's availability over the past 10 days. 
Which method should be used to locate these events? 
A. On the Health dashboard, use the Log Collector to export data based on time 
stamp. 
B. Export the cluster event log to a CSV on the Alerts dashboard. 
C. On the Alerts dashboard, filter based on Impact Type and the desired Time 
Range. 
D. Configure an Alert Policy to generate an email with the data on the Health 
dashboard. 
 
Answer: C 
Explanation: Reference: 
https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-
Guide-Prism-v55:mulalerts-management-pc-c.html 
 
 
https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-Prism-v55:mulalerts-management-pc-c.html
https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-Prism-v55:mulalerts-management-pc-c.html
83. In which two scenarios is an automated live migration likely to occur? 
(Choose two) 
A. Cluster resource hotspot 
B. AOS upgrade 
C. Network upgrade 
D. Hypervisor upgrade 
 
Answer: A,C 
 
84. Which three configuration scenarios are valid for the deployment of 
Prism Central? (Choose three.) 
A. Environments use Network Address Translation. 
B. Prism Elements and Prism Central art in different subnets. 
C. Environments do not have Internet access. 
D. Prism Elements and Prism Central have proxy configured. 
E. Environments use the 192.168.5.0/24 CVM management network. 
 
Answer: B,C,D 
 
85. An administrator notices that most of the VMs in the cluster are on one 
host. Users report that na application seems to respond slowly. The 
application server VM has significantly more memory assigned to it than 
other VMs. 
How should the administrator fix this issue? 
A. Reduce the amount of memory assigned to the VM. 
B. Migrate the VM to a different host. 
C. Add more memory to the VM. 
D. Increase the memory on the CVM. 
 
Answer: B86. The Stargate service becomes unavailable on a single CVM on an AHV 
node. 
What is used to maintain I/O operations in the cluster? 
A. Route injection 
B. iSCSl redirector 
C. Hypervisor HA 
D. ha.py 
 
Answer: B 
 
87. Which component can be associated with a storage policy? 
A. Subnet 
B. Catalog 
C. Vm 
D. Category 
 
Answer: C 
Explanation: A storage policy can be associated with a VM. A storage policy is 
a set of rules that define how data objects are stored and protected. It specifies 
the characteristics of storage, data protection, and data placement for virtual 
disks that are assigned to a VM.Subnets, catalogs, and categories are not 
associated with storage policies. 
https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-
Guide-vpc_2022_6:mul-cluster-storage-policy-summary-view-pc-r.html 
 
88. An administrator needs to configure a new subnet on an AHV cluster 
and want to ensure that VMs will automatically be assigned an IP address 
at creation time. 
Which type of network does the administrator need to create? 
A. Dynamic Network 
B. Unmanaged Network 
C. Managed Network 
D. DHCP Network 
 
https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-vpc_2022_6:mul-cluster-storage-policy-summary-view-pc-r.html
https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-vpc_2022_6:mul-cluster-storage-policy-summary-view-pc-r.html
Answer: C 
 
89. Administrator is creating a Windows 10 VM that will be used for a virtual 
desktop template. After creating the VM and booting to the ISO, the 
administrator is unable to install Windows and receives the following error. 
We couldn't find any drives. To get a storage driver, click Load dr1ver.What 
steps does the administrator need to take to install the OS? 
A. Load the Nutanix VirtIO Serial Bus Driver. 
B. Load the VirtIO Network Ethernet Adaper. 
C. Load the Nutanix Virtual Balloon Driver. 
D. Load the Virtual SCSI pass-through controller. 
 
Answer: D 
 
90. An administrator needs to create a new Linux image and will to do the 
following as part ofthe VM deployment: 
• Set the OS hostname 
• Add custom users 
• Add Keys 
• Run custom scripts 
What package needs to be installed in the Linux image to facilitate this 
automation? 
A. CloudInit 
B. Sysprep 
Answer: A 
 
91. Which data savings technique utilizes stripes and parity calculation in 
a Nutanix cluster? 
A. Compression 
B. Parity strip 
C. Erasure coding 
D. Deduplication 
Answer: C 
 
92. An administrator has an AHV cluster that is comprised of 4 nodes with 
the following configuration ineach node: 
• CPU:2 each 2.4GHz, 12 core 
• Memory: 256GB 
• Disk: 6 each 1.92 SSD 
A VM with 16 vCPUs and 96GB of RAM is being created on the cluster. 
How should the administrator configure the VM to assure optimal 
performance? 
A. With an affinity policy 
B. With memory overcommit 
C. With 2 vNUMA nodes 
D. With Flash Mode enabled 
 
Answer: C 
Explanation: The best way to configure the VM for optimal performance is to set 
it up with 2 vNUMA nodes. This will ensure that the VM is configured to take 
advantage of the CPU and memory resources available in each node, and it will 
also ensure that all of the cores are utilized for the best performance. Additionally, 
the administrator should ensure that the VM has an affinity policy set up so that 
the vCPUs are evenly distributed across the four nodes. Finally, Flash Mode 
should be enabled in order to take advantage ofthe high-performance SSDs that 
are available in the cluster 
 
93. An administrator is tasked with configuring network on an AHV cluster 
and wants to maximize throughput for the host with many small VMs while 
minimizing network switch configuration. 
Which bond mode should the administrator select? 
 A. Active-active 
B. Active-Active with Mac Pinning 
C. Active-Backup 
D. No-Uplink Bond 
Answer: A 
 
 
94. An administrator is performing validation testing of a new-deploy 
cluster. During this test, the administrator disconnect each LAN interface 
from each of the nodes while pinging the hypervisor and guest VMs. When 
the first interface is disconnected, pings continue as expected to the 
hypervisor, but pings stop responding from the guest. Pings continue when 
the interface is reconnected. When the second interface is disconnected, 
pings continue to both the hypervisor and guest VMs. 
What could be the cause of this error? 
A. This is normal behavior for a LAN Failover 
B. Switch ports are configured with different VLANs 
C. Portfast is not enabled on the switch ports 
D. One of the network interfaces has a bad patch cable. 
 
Answer: B 
Explanation: switch ports are configured with different VLANs could be the 
cause of this error. If the switch ports arenot configured with the same VLANs as 
the network interfaces on each node, then there could be amismatch in network 
connectivity when one interface is disconnected1. This could affect the guest VMs 
that are using a different VLAN than the hypervisor. 
 
95. An administrator wants to use Volumes to connect to physical servers 
that are not able to be virtualized. 
Which three things must be configured for Volumes to support iSCSI 
clients? (Choose three) 
A. Enable external client access 
B. Client OS iSCSI initiator 
C. iSCSI Multipathing I/O 
D. Cluster Virtual IP address 
E. Data Services IP address 
 
Answer: B,D,E 
Explanation: https://portal.nutanix.com/page/documents/details/?targetId=Web
-Console-Guide-Prism-v51:wc-block-services-c.html 
 
 
https://portal.nutanix.com/page/documents/details/?targetId=Web-Console-Guide-Prism-v51:wc-block-services-c.html
https://portal.nutanix.com/page/documents/details/?targetId=Web-Console-Guide-Prism-v51:wc-block-services-c.html
96. An administrator needs to limit the amount of storage space that data 
stored in single container can consume. 
Which action should the administrator take? 
A. Enable reservation for rebuild capacity 
B. Set an advertised capacity for the container 
C. Store VM snapshots in a different container 
D. Thick prevision the container 
 
Answer: B 
Explanation: The best way for the administrator to limit the amount of storage 
space that data stored in a singlecontainer can consume is to set an advertised 
capacity for the container. This will ensure that the datastored in the container 
doesn't exceed the set limit, and it will also help prevent any potentialperformance 
issues due to resource contention. Additionally, the administrator should consider 
thickprovisioning the container, which will pre-allocate the amount of storage 
space that can be used by thecontainer. This will help ensure that the data stored 
in the container doesn't exceed the advertisedcapacity. 
 
97.Which inefficient VM Profile can be used to identify a VM that consumes 
too many resources and causes other VMs to starve? 
A. Over-provisioned VM 
B. Inactive VM 
C. Bully VM 
D. Constrained VM 
 
Answer: C 
 
98. Which component is supported by Prism Central storage policies? 
A. Virtual Machines 
B. Volume Groups 
C. VM Templates 
D. Storage Containers 
 
Answer: B 
 
99. Which AOS process determine if an I/O from a user will be written to 
OpLog or to an Extent Store? 
A. Stargate 
B. Curtor 
C. Cassandara 
D. Zeus 
 
Answer: A 
 
 
 
100. Refer to Exhibit. 
 
An administrator increases the cluster RF to 3. The containers are not 
modified.What will the new values in the data resiliency dashboard be for 
FAILURES TOLERABLE for the Zookeeper and Extent Groups 
components? 
A. Zookeeper = 1 and Extent Groups = 1 
B. Zookeeper = 2 and Extent Groups = 2 
C. Zookeeper = 2 and Extent Groups = 1 
D. Zookeeper = 1 and Extent Groups = 2 
 
Answer: C 
 
101. While installing Windows 2019 on a new VM on an AHV cluster, an 
administrator notices there aren’t anydrives listed for the install. 
What might the problem be? 
A. VirtIO drivers have not yet been installed and the disks are IDE disks. 
B. VirtIO drivers have not yet been installed and the disks are SCSI disks. 
C. VirtIO drivers must be installed on AHV for installations of Windows. 
D. VirtIO drivers aren’t supported on this version of Windows 2019. 
 
Answer: B 
102. Which two predefined views can be added to a report to identify 
inefficient VMs? 
A. Under provisioned VMs List 
B. Zombie VMs List 
C. Constrained VMs List 
D. Overprovisioned VMs List 
 
Answer: C,D 
 
103. An administrator wants to replace and old node with a node of newer 
generation in a 3-node cluster. 
The administrator has already chosen the appropriate node. But unable to 
remove it from the cluster. 
Why is the Remove Host option not shown in the exhibit? 
A. The host needs to be placed into maintenance Mode before. 
B. It is only possible to remove a host from a cluster using CLI. 
C. It is not possible to remove a node from a the cluster using Prism Central 
D. It is not possible to remove a host from a 3-node cluster. 
 
Answer: D 
 
104. When configuring Prism Central, which two log modules are able to 
forward messages to anexternal syslog server? (Choose two). 
A. API Audit 
B. Flow 
C. DNS 
D. NTP Synchronization 
 
Answer: A,B 
 
105. How many Prism Central instances are required to deploy Leap: 
A. One per availability zone 
B. One per customer environment 
C. One per physical site 
D. One per AHV cluster 
 
Answer: A 
 
106. In Nutanix clusters, which feature ensures VMs can be migrated and 
restarted on another host in case of failure? 
A. High Availability 
B. Protection Domain 
C. Host Affinity Rules 
D. Availability Zone 
 
Answer: A 
 
 
107. An administrator has a Custom backup application that requires a 2TB 
disk and runs m Windows. Throughput is considerably lower than 
expected. 
The application was installed on a VM with the following configuration: 
• FOU vCPUs with one core/vCPU 
• 4GB of Memory 
• One 50GB vDisk for the Windows installation 
• One 2TB vDisk for the application 
What is the recommended configuration change to improve throughput? 
A. Add 4GB of memory to the VM 
B. Increase the vCPUs assigned to the VM 
C. Span the 2TB disk across four vDisks 
D. Increase the number of cores per vCPU 
 
Answer: C 
 
108. A recently configured cluster is leveraging NearSync with a recovery 
schedule of 15 minutes. It isnoticed that the cluster is consistently 
transitioning in an Out of NearSyne. 
What action should be taken to potentially address this issue? 
A. Increase network bandwidth 
B. Change the NearSync schedule to 30 minutes. 
C. Add a vCPUs to the user VMs. 
D. Configure a secondary schedule in the same Protection Domain. 
 
Answer: A 
 
109. In a default configuration of an AHV cluster, a single node fails. 
What happens to the running VMs on that node? 
A. The cluster restarts all VMs in the event of a host failure 
B. The VMs do a live migration to the master node in the cluster 
C. The VMs do a live migration to any other node in the cluster 
D. The cluster attempts to restart VMs on other hosts 
 
Answer: D 
Explanation: Reference: 
https://portal.nutanix.com/page/documents/details?targetId=Web-Console-
Guide-Prismv5_16:Web-Console-Guide-Prism-v5_16 
 
 
https://portal.nutanix.com/page/documents/details?targetId=Web-Console-Guide-Prismv5_16:Web-Console-Guide-Prism-v5_16
https://portal.nutanix.com/page/documents/details?targetId=Web-Console-Guide-Prismv5_16:Web-Console-Guide-Prism-v5_16
110. After logging into Prism Element, an administrator presses the letter A 
on the Keyboard. 
What is the expected out come of this input? 
A. Alerts page will launch 
B. Analysis will launch 
C. About Nutanix page will launch 
D. API Explorer page will launch 
 
Answer: D 
Explanation: API Explorer page will launch when an administrator presses the 
letter A on the keyboard after logging into Prism Element. This is one of the 
keyboard shortcuts that Prism Element provides for accessibility and ease of 
use1. API Explorer is a tool that allows users to explore and test Nutanix REST 
APIs withinPrism Element1. https://www.nutanixbible.com/3b-book-of-prism-
navigation.html 
 
111. When creating a VM on an AHV cluster, how is the initial placement of 
the VM determined? 
A. AHV uses a round robin algorithm, placing new VMs onto hosts based on the 
numerical order of their UUID 
B. The administrator right clicks on the desired host and selects Power on VM 
from the dropdown menu 
C. The Acropolis Dynamic Scheduler selects a host which provides 
adequate resources for the VMs configuration 
D. Placement is determined by the host that holds the new_VM token at the time 
of VM creation 
 
Answer: C 
 
 
https://www.nutanixbible.com/3b-book-of-prism-navigation.html
https://www.nutanixbible.com/3b-book-of-prism-navigation.html
112. Refer to the exhibit. 
 
An administrator is trying to implement the solution that is shown in the 
exhibit, but has been unsuccessful. Based on the diagram, what is causing 
the issue? 
A. A remote Witness VM 
B. Active containers in both sites 
C. Network latency 
D. Unsupported hypervisor 
 
Answer: C 
 
113.HOTSPOT 
What is the proper sequence to perform a one-click upgrade to a Nutanix 
cluster? 
Item instructions: For each procedure, indicate the order in which that 
procedure must take place to meet the item requirements. Not all 
procedures are valid. Identify any invalid procedures using the drop-down 
option. 
 
 
Answer: 
 
 
Explanation: 
 Step 1 ---> Login into Prism Element. 
Step 2 ---> Select the Gear Icon at top right of the page. 
Step 3 ---> Click Upgrade Software. 
Step 4 ---> Select the component to upgrade. 
Step 5 ---> Click download. 
Step 6 ---> Once the download completes, select upgrade. 
Invalid: 
1 - Select Prism Central. 
2 - Select user login. 
3 - On left select upgrade Prism Central. 
 
114. An administrator is configuring cross-hypervisor DR from an ESXi 
cluster to a new AHV cluster. When the administrator migrates a protection 
domain to the AHV cluster, the VMs fail to boot. 
What should the administrator do to correct this problem? 
A. Increase the snapshot frequency to more than 6 hours. 
B. Uninstall VMware Tools from the VMs. 
C. Install Nutanix Guest Tools in the protected VMs. 
D. Add all VMs into a single consistency group. 
 
Answer: C 
 
 
115. A customer has a 24-node cluster with all containers configured with 
RF3. Two different nodes have incurred a simultaneous HDD failure. 
What is the result? 
 
A. The cluster runs in a degraded state until the failed drives are replaced and 
the data has been restored to three replicas. 
B. Sixty minutes after the failures a rebuild of the lost data can remaining HDDs 
begins to restore to three replicas. 
C. The VMs with data on those drives crash, and an HA event occurs, restarting 
them on a remaining healthy node. 
D. The Nutanix cluster recognizes the failures and immediately begins to rebuild 
lost data to three replicas. 
 
Answer: D 
 
116. An administrator is adding a node with a higher AOS release to an 
existing cluster. 
What is the most efficient action an administrator should take to ensure it 
is in a supported state? 
A. Destroy cluster and foundation with the new node in place 
B. Add the node to the cluster and leave the existing AOS version in place 
C. Perform standalone reimage of the new node and then add to cluster 
D. Add the node to the cluster and reboot all running VMs to use new release 
 
Answer: C 
 
117.Where are Leap Availability Zones configured? 
A. Cloud Connect 
B. Controller VM 
C. Prism Element 
D. Prism Central 
 
Answer: D 
Explanation: Terminology 
✑ Availability Zone – it is represented by all resources(Nutanix Clusters) 
connected to Prism Central orXi Leap Availability zone. Depends on the 
architecture, Availability zone can represent geographicterritory, datacenter or 
server room in the datacenter. Protection policies – in protection policies you 
setup (RPO, Retention), rules to auto-apply policies to virtual 
machineshttps://vmwaremine.com/2019/02/08/nutanix-leap-runbooks-part-
1/#sthash.VwrzSzhQ.dpbs 
 
118. An administrator is not able to log into Prism Central by using a new 
Active Directory user account. After Logging with the local user, the 
administrator verified that Directory Services and Role Mapping setting are 
valid. 
What is the most likely cause of this issue? 
A. Change password at next logon attribute is set. 
B. User does not belong to the Administrators group. 
C. Active Directory functional level of wrong. 
D. Prism Element authentication is not configured. 
 
Answer: B 
 
119. What is the default network bond setting for an AHV host 
configuration? 
A. active-backup 
B. active-active 
C. balance-slb 
D. balance-tcp 
 
Answer: A 
Explanation: https://next.nutanix.com/blog-40/network-load-balancing-with-
acropolis-hypervisor-6463 
 
 
https://next.nutanix.com/blog-40/network-load-balancing-with-acropolis-hypervisor-6463
https://next.nutanix.com/blog-40/network-load-balancing-with-acropolis-hypervisor-6463
120. What is the expected operation during node addition when the new 
node has a different AOS version? 
A. The entire cluster is upgraded to the latest one-click release. 
B. The node is added and a separate upgrade operation must be performed. 
C. The addition fails and forces the administrator to image using standalone 
Foundation. 
D. The node is automatically re-imaged using the software currently running 
in the cluster. 
 
Answer: C 
 
 
121. An administrator is preparing to deploy a new application on an AHV 
cluster, Security requirements dictate that all virtual servers supporting this 
application must be prevented from communicating with unauthorized 
hosts. 
Which option would achieve this goal? 
A. Create a new VLAN, create a subnet on the cluster with the VLAN tag, deploy 
servers with vNlCs in the new subnet. 
B. Create a new Application Security Policy restricting communication to 
the authorized hosts and apply it to the servers in enforce mode. 
C. Create a new solation Environment policy apply it to the new servers and all 
authorized hosts. 
D. Create new' subnet and assign to an existing VPC assign the IP prefix and 
gateway for the subnet, deploy servers with vNlC5 in the new subnet. 
 
Answer: B 
Explanation: An Application Security Policy is a security feature in Nutanix AHV 
that can be used to restrict networkcommunication between virtual servers based 
on a variety of criteria, such as IP address, port, andprotocol. By creating a policy 
that restricts communication to authorized hosts and applying it to theservers in 
enforce mode, the administrator can prevent unauthorized communication 
between virtualservers.https://www.nutanix.com/products/ahv 
 
122. When a VM is connected to a Nutanix managed network, when is the 
IP addressed assigned? 
A. When the vNIC is created on the VM. 
B. When the VM is powered on. 
C. When the guest OS sends a DHCP request. 
D. When the guest OS receives a DHCP acknowledge. 
 
Answer: D 
 
 
123. How should an administrator configure a custom alert for a specific VM 
in Prism? 
A. Modify an existing alert to only alert on the specific VM. 
B. Modify VM settings to add the custom alert. 
C. Modify the alerts to add a new custom alert policy. 
D. Modify node settings to add the custom alert. 
 
Answer: C 
Explanation: https://portal.nutanix.com/page/documents/details/?targetId=Pris
m-Central-Guide-Prism-v510:mul-alert-policies-user-defined-configure-pc-c.html 
 
124. During an AHV upgrade, an administrator finds that a critical VM was 
powered off rather than migration to another host. 
Which scenario explains this behavior? 
A. NO AHV hosts were able to be scheduled. 
B. The VM OS hung during migration. 
C. The VM was on the same host as the acropolis leader. 
D. The VM was marked as an agent VM. 
 
Answer: D 
 
125. An administrator is configuring data protection and DR for a multi-tier 
application. All VMs must be protected at the same time. 
What must the administrator do to meet this requirement? 
A. Create a consistency group for each VM with identical schedules 
B. Create a consistency group for the application and place all VMs in it 
C. Create a protection domain for the application and select auto-protect related 
entities 
D. Create a protection domain for each VM with identical schedules 
 
Answer: C 
 
126. A node with Erasure Coding fails. 
https://portal.nutanix.com/page/documents/details/?targetId=Prism-Central-Guide-Prism-v510:mul-alert-policies-user-defined-configure-pc-c.html
https://portal.nutanix.com/page/documents/details/?targetId=Prism-Central-Guide-Prism-v510:mul-alert-policies-user-defined-configure-pc-c.html
What is the impact? 
A. The node stops utilizing Erasure Coding. 
B. Potentially increased amount of data stored in the SSD tier. 
C. Increased Controller VM CPU Load. 
D. AQS unable to do deduplication during the Erasure Coding failure. 
 
Answer: C 
 
 
127. An administrator needs to ensure logs, alerts and information is 
consistent across clusters that are located in different countries. 
Which service needs to be configured? 
A. SMTP 
B. DNS 
C. SNMP 
D. NTP 
 
Answer: D 
Explanation: NTP service needs to be configured to ensure logs, alerts and 
information is consistent across clustersthat are located in different countries. 
NTP stands for Network Time Protocol and it is used tosynchronize the clocks of 
all the nodes in a cluster1. This helps to maintain accurate timestamps for 
logs,alerts and other information that are generated by Nutanix clusters1. 
 
128. What is a requirement to enable Flow Neworking? 
A. A dedicated virtual switch has been created for Flow Networking. 
B. Flow Micro segmentation must be enabled. 
C. Microservices infrastructure must be enabled. 
D. Prims Central is using a three-node scale-out deployment 
 
Answer: B 
 
129. A VM in a 12-node Nutanix cluster is hosting an application that has 
specific Physical GPU requirements. Only three nodes in the cluster meet 
this requirement. The administrator wants to allow a general workload to 
be distributed across all nodes in the cluster and must make sure that the 
node hosting the VM meets its requirements. 
How should the administrator perform this task? 
A. Create a sperate three-node cluster using the nodes that meet 
the requirement. 
B. Configure VM-Host affinity for the nodes that meet the application's GPU 
requirement. 
C. Over-Provision the application VM with additional virtual GPUs. 
D. Configure anti-affinity rules between the application VM and the other VMs 
running on the cluster. 
 
Answer: B 
 
130. What is the function of the virbr0 bridge on AHV? 
A. To carry all traffic between the user VMs and the upstream network. 
B. To carry management and storage communication between user VMs and 
the CVM. 
C. To carry management and storage communication between user VMs and 
AHV host. 
D. To carry storage communication between the guest VMs and the CVM 
 
Answer: C 
Explanation: 
 http://www.vstellar.com/2019/01/10/ahv-networking-part-1-
basics/#:~:text=AHV%20Network%20Architecture&text=virbr0%20is%20an%20
internal%20switch,virbr0)%20have%20IP%20address%20192.168. 
 
131. The Update Source for LCM has been configured as shown in the 
exhibit. Inventory is failing consistently. 
 
What is the likely cause of this issue? 
A. Port 433 Is blocked by a firewall. 
B. Port 80 is blocked by a firewall. 
C. The administrator does not have a valid portal account. 
D. The license assigned to

Mais conteúdos dessa disciplina