Prévia do material em texto
1. Refer to exhibit: Why has an anomaly been triggered? A. Controller reached 2500 IOPS. B. Observed IOPS exceed normal values. C. Normal Controller behavior has increased. D. Observed values do not match predicted values. Answer: D Explanation: Nutanix anomaly detection is a feature that monitors seasonal trends for time- series data (e.g. CPU usage, memory usage, latency, etc.) and establishes a “band” of expected values based on historicaldata12. Only values that hit outside the “band” will trigger an event / alert1.Nutanix leverages a method for determining the bands called ‘Generalized Extreme Studentized DeviateTest’. A simple way to think about this is similar to a confidence interval where the values are betweenthe lower and upper limits established by the algorithm. Another web source3 shows an example of how anomaly detection works in Nutanix Prism Central. Inthe video, you can see that when the observed value of a metric deviates significantly from the predictedvalue based on historical data, an anomaly event is triggered and displayed on a chart.Therefore, by comparing the observed values with the predicted values based on historical data, Nutanixanomaly detection can identify abnormal behavior and alert you accordingly 2. An administrator is commissioning a Nutanix Enterprise Cloud. Once the user VMs have beendeployed and are running, the administrator finds that VMs on the same host are able to communicate, but are unable to communicate between hosts. What must be changed to enable full inter-VM communications? A. Change the spanning-tree port type on the switch. B. Change the network the VMs are connected to C. Update the switch to specifically allow VLAN 15 D. The VMs need to have static IP addresses. Answer: C 3. When installing Nutanix Guest Tools (NGT) on an ESXi-hosted VM, which port should be enabled onthe VM to allow communication with the NGT- Controller VM service? A. 2000 B. 2074 C. 8080 D. 9943 Answer: B 4. An administrator wants to ensure that data in a container is stored in the most space efficient manneras quickly as possible after being written,Which space efficiency too meets this requirement? A. Inline Compression B. Thin Provisioning C. Cache Deduplication D. Erasure Coding Answer: A Explanation: inline compression is a technique that compresses all incoming write I/O operations over 4 KB inline inthe persistent write buffer (oplog)23. This approach enables you to use oplog capacity more efficiently and helps drive sustained performance2. From AOS 5.18 onward, inline compression (compressiondelay=0) is enabled by default for all new containers24. https://portal.nutanix.com/page/documents/solutions/details?targetId=TN-2032- Data-Efficiency:TN-2032-Data-Efficiency 5. An administrator was reviewing various AOS logs when a it was noticed that the time of the logs were off by several hours. Which initial step was missed during the post process cluster configuration? A. Setting the cluster time zone via PC GUI B. Setting the cluster time zone via CVM NCLI C. Setting the cluster time zone via PE GUI D. Setting the cluster time zone via CVM ACLI Answer: B 6. An administrator wants to reduce the largest amount of alert emails received from Prism Central. Which two settings should the administrator customize to meet this requirement? (Choose two) A. Skip empty digest email B. Every Single Alert C. Dally Digest D. Email Recipients Answer: C,D Explanation: According to the Nutanix Support & Insights website1, you can configure alert emails through Prism Central by enabling or disabling customer email notification for each alert. You can also modify or create custom alert policies for different entities and clusters23. https://portal.nutanix.com/page/documents/solutions/details?targetId=TN-2032-Data-Efficiency:TN-2032-Data-Efficiency https://portal.nutanix.com/page/documents/solutions/details?targetId=TN-2032-Data-Efficiency:TN-2032-Data-Efficiency 7. A configuration is single domain, single forest, and does not use SSL. Which port number should be used to configure LDAP? A. 389 B. 3269 C. 636 D. 3268 Answer: A 8. An administrator is reviewing performance of a core banking system that routinely has 20,000 concurrent users. During, business hours, the CPU on the applications servers runs at close to 100%. The administrator needs to determine if there is a performance issue specific to the app servers, the database servers, or all servers on the cluster. Which metrics should the administrator review in Prism Analysis Graphs? A. Cluster IO, Network, Database and App Server CPU B. Cluster CPU and Memory Only C. Cluster IO, CPU, Memory and Database and App Server CPU D. Cluster IO, CPU, Memory, Network, App Server CPU Answer: C 9. A customer has a newly-deployed AHV cluster with nodes that have 2.x 10 GBE and 2.x interface. The customer wants to use all available network interfaces to provide connectivity to the VMs. Which option should the administrator use to achieve this while remaining consistent with Nutanix recommendations? A. Create separate VLANs that map 10GbE and 1GbE interfaces. B. Createbond1 on virbr0 and add the 1GbE interfaces to it for VM use. C. Create a second bond on br0 on each host and assign the 1 GbE interfaces to it. D. Create a second bridge on each host and assign the 1GbE interfaces to it. Answer: D 10. An administrator manages an AHV cluster that is dedicated to a dev/test environment. The administrator receiving complaints from users that they are unable to create new VMs on the cluster. After the reviewing the cluster, the administrator finds that the memory resources are almost fully utilized, with many VMs over-provisioned on memory. What option is the most efficient resolution to enable additional VMs to be created? A. Enable Memory Overcommit on the over-provisioned VMs. B. Enable Memory HA on the over-provisioned VMs. C. Upgrade the nodes with additional memory DlMMs. D. Disable HA Reservation on the cluster. Answer: A Explanation: Enable Memory Overcommit on the over-provisioned VMs is the most efficient resolution to enable additional VMs to be created. Memory overcommit allows VMs to use more memory than physically available on a host by compressing and swapping memory pages to storage1. This can improve memory utilization and increase VM density on a cluster1. However, memory overcommit is not supported When HA is configured to use reserved hosts, so you may need to disable HA reservation on the cluster before enabling memory overcommit1. 11. What is the expected behavior of the VMs residing on that host when a controller VM becomes unavailable? A. A Live Migration will be performed on the affected VMs. B. The host will automatically redirect I/O and VMs will continue running. C. The impacted host and VMs will automatically shut down. D. VM High Availability will restart the impacted VMs on another host Answer: B 12. Which method can be used to migrate a VM configured for UEFI-boot from a Nutanix Hyper-V clusterto AHV? A. Live Migration B. Storage vMotion C. Nutanix Move D. Cloud Connect Answer: C 13. What is the name of the internal bridge used by AHV nodes and CVMs? A. vnet0 B. br1 C. br0 D. virbr0 Answer: D 14. An administrator needs to relocate an AHV cluster to a new datacenter during a maintenance window. The cluster will use the same IPs in the new datacenter. Which two steps should be taken to prepare for this task? (Choose two.) A. Reconfigure IPMI for the new datacenter B. Shut down all user VMs in the cluster C. Relocate the linked LDAP server D. Stop all Nutanix Files clusters Answer: B, D 15. Which changethe cluster has expired. http://www.vstellar.com/2019/01/10/ahv-networking-part-1-basics/#:~:text=AHV%20Network%20Architecture&text=virbr0%20is%20an%20internal%20switch,virbr0)%20have%20IP%20address%20192.168 http://www.vstellar.com/2019/01/10/ahv-networking-part-1-basics/#:~:text=AHV%20Network%20Architecture&text=virbr0%20is%20an%20internal%20switch,virbr0)%20have%20IP%20address%20192.168 http://www.vstellar.com/2019/01/10/ahv-networking-part-1-basics/#:~:text=AHV%20Network%20Architecture&text=virbr0%20is%20an%20internal%20switch,virbr0)%20have%20IP%20address%20192.168 Answer: A 132. Microsegmentation was recently enabled in a Nutanix environment. The administrator wants toleverage Prism Central to create a policy that will block all traffic regardless of direction, between twogroups of VMs identified by their category. Which policy should be used to meet this requirement? A. An Application Security Policy B. A Quarantine Policy C. A Whitelist-Based Policy D. An Isolation Environment Policy Answer: D 133. The Linux administration team has requested access rights to any current or future Linux VM in theenvironment. What entity should be selected when assigning this new role? A. Image B. AHV Cluster C. Category D. Project Answer: D 134.Where should an administrator unregister Prism Element from Prism Central? A. From a Host SSH session B. From the Prism Central web console C. From the Prism Element web console D. From a CVM SSH session Answer: D 135. The administrator wants a container to be displayed and limited to 1TB in the hypervisor.What advanced container setting must the administrator set? A. Advertised Capacity B. Reserved Capacity C. Advertised Quota D. Reserved Quota Answer: A 136. Which best practice should be followed when creating a bond in a Nutanix cluster? A. Place NICs of different speeds within the same bond B. Configure the bond to use LACP C. Only utilize NICs of the same speed within the same bond D. Use the default bond configuration after installation Answer: C Explanation: Reference:https://next.nutanix.com/blog-40/maximum- performance-from-acropolis-hypervisor-and-openvswitch-6312 137. In Files, how many FSVMs are deployed by default? A. 1 B. 2 C. 3 D. 5 Answer: C https://next.nutanix.com/blog-40/maximum-performance-from-acropolis-hypervisor-and-openvswitch-6312 https://next.nutanix.com/blog-40/maximum-performance-from-acropolis-hypervisor-and-openvswitch-6312 138. When VM HA Reservation is enabled, what is the expected behavior for all failed VMs in the eventof a host failure? A. Restart on a best-effort basis if resources are available B. Perform a live migration to other hosts in the AHV cluster C. Restart on other hosts in the AHV cluster D. Perform a live migration on a best-effort basis if resources are available Answer: C Explanation: Reference: http://www.nutanixpedia.com/p/configuring-ha.html http://www.nutanixpedia.com/p/configuring-ha.html 139. In which two scenarios is Native Key Management Server supported? (Choose two) A. XenServer and AHV mixed cluster. B. Hyper-V and AHV mixed cluster. C. KVM and AHV mixed cluster. D. ESXi and AHV mixed cluster. Answer: B,D 140. An administrator is implementing a VDI solution. The workload will be a series of persistent desktops in a dedicated storage container within a four-node cluster Storage optimizations should be set on the dedicated storage container to give optimal performance including during a node failure event. Which storage optimizations should the administrator set to meet the requirements? A. Compression Only B. Deduplication and Erasure Coding C. Compressoion and Deduplication D. Compression Deduplication and Erasure Coding Answer: C 141. Refer to Exhibit: An administrator is trying to create a custom alert policy for all VMs.Why is the Alert warning if field greyed cut? A. The Alert critical if threshold is set. B. The Behavioral Anomaly threshold is set. C. The Enable Policy option checked. D. The Auto resolve alerts option is checked. Answer: B Explanation: when you create a custom alert policy, you can choose between two types of thresholds: StaticThreshold and Behavioral Anomaly. Static Threshold allows you to set a fixed value for the metric thattriggers the alert. Behavioral Anomaly allows you to use machine learning to detect abnormal behaviorbased on historical data.If you select Behavioral Anomaly as the threshold type, you cannot set a warning level for the alert. Youcan only set a critical level that indicates how much deviation from normal behavior is considered ananomaly3. Therefore, the Alert warning if field is greyed out when you select Behavioral Anomaly. 142. HOTSPOT An administrator needs to shut down an AHV cluster to relocate hardware. The administrator upgradesNCC and runs health checks.Which steps should the administrator perform next? Item instructions: For each procedure, indicate theorder in which that procedure must take place to meet the item requirements. 143. Where can an administrator change a CVM password? A. KMS Server Terminal B. CVM setting in Prism Element C. CVM setting in Prism Central D. Prism CVM VM Console Answer: D Explanation: Reference: https://next.nutanix.com/installation-configuration- 23/modifying-passwords-in-nutanix-environment-33538 144. Which scenario would benefit most from Erasure Coding being enabled on a container? A. Long term storage of data which is written once and read infrequently B. High performance database where all is relatively hot. C. VDI use cases where a single VM is cloned 100’s of times https://next.nutanix.com/installation-configuration-23/modifying-passwords-in-nutanix-environment-33538 https://next.nutanix.com/installation-configuration-23/modifying-passwords-in-nutanix-environment-33538 D. WEB and API Servers Answer: A 145. Which three cluster operations require an administrator to reclaim licenses? (Choose three) A. Destroy a cluster. B. Upgrade a cluster C. Migrate a cluster D. Remove a Node from a cluster E. Move Nodes between clusters. Answer: A,D,E Explanation: https://portal.nutanix.com/page/documents/details/?targetId=Web _Console_Guide-Prism_v4_7:lic_licensing_managing_c.html Reclaiming Licenses (Including License Renewal)You can reclaim and optionally re-apply licenses for nodes in your clusters: ✑ You must reclaim licenses when you plan to destroy a cluster. First reclaim the licenses, then destroythe cluster. You do not need to reclaim Starter licenses. These licenses are automatically appliedwhenever you create a cluster, including after you have destroyed a cluster. ✑ Return licenses to your inventory when you remove one or more nodes from a cluster. Also, if youmove nodes from one cluster to another, first reclaim the licenses, move the nodes, then re-apply thelicenses. ✑ You can reclaim licenses for nodes in your clusters in cases where you want to make modifications ordowngrade licenses. For example, applying an Ultimate license to all nodes in a cluster where somenodes are currently licensed as Pro and some nodes are licensed as Ultimate. You might also want totransition nodes from Ultimate to Pro licensing. ✑ You must reclaim licenses when you renew licenses. First reclaim the expired licenses, then applynew licenses. 146. After configuring modules for a Remote Syslog Server, the settings are as shown. The administratornotices that even though the level parameter is set to EMERGENCY, that all monitor logs are being sent.What is the likely cause of this issue? A. A second rsyslog server is configured to send all monitor logs. B. Having the Module Name set to STARGATEsends all monitor logs regardless of the level. C. A Log Level of EMERGENCY includes all monitor logs. D. The true setting for Include Monitor Logs sends all monitor logs regardless of the level. Answer: D Explanation: This means that the rsyslog server is configured to include all monitor logs in addition to the messageswith EMERGENCY level.It has a level parameter that specifies the severity of messages to be logged2. The level parameter canhave one of eight values: EMERG (emergency), ALERT, CRIT (critical), ERR (error), WARNING,NOTICE, INFO (informational), and DEBUG2. 147. CPU utilization climbs above 90% on several VMs. This causes performance degradation for abusiness-critical application. How can alerts be configured to notify the administrator before VM CPU utilization hits 90%? A. On a CVM, use ncli to set the VM CPU Check threshold for the critical VMs to a value below 90%. B. On the Health dashboard, locate the VM CPU Check and lower the alert threshold below 90%. C. On a CVM, configure a cron job to run the VM CPU Check more frequently and email the result. D. On the Alerts dashboard, ensure that the VM CPU usage alert is not set to auto-resolve. Answer: B Explanation: Reference: https://portal.nutanix.com/page/documents/details?targetId=Web-Console- Guide-Prismv5_16:Web-Console-Guide-Prism-v5_16 148. An administrator has been alerted to a VM that has high I/O latency and wants to determine if thereare any other factors, such as insufficient network or memory resources that correlate, as part of atroubleshooting process.Which type of chart should the administrator create to allow all relevant data to be easily exported to CSV for later analysis? A. A VM entity chart with each of the relevant metrics. B. A cluster metric chart for each of the relevant metrics C. A cluster entity chart with each of the relevant metrics D. A VM metric chart for each of the relevant metrics Answer: A https://portal.nutanix.com/page/documents/details?targetId=Web-Console-Guide-Prismv5_16:Web-Console-Guide-Prism-v5_16 https://portal.nutanix.com/page/documents/details?targetId=Web-Console-Guide-Prismv5_16:Web-Console-Guide-Prism-v5_16 149. Refer to Exhibit: An administrator is attempting to create an additional virtual switch on a newly deployed AHV cluster,using the two currently disconnected interfaces. The administrator is unable to select the disconnectedinterfaces when creating the virtual switch.What is the likely cause of this issue? A. Only one interface is available on the selected hosts. B. Interfaces must be connected to the network before they can be assigned. C. The disconnected interfaces are currently assigned to virtual switch 0, D. Interfaces must be assigned to virtual switches via the cli Answer: C Explanation: when you create a new virtual switch on AHV, you need to select one or more uplink interfaces that areconnected to a physical network. You cannot select an interface that is already assigned to anothervirtual switch. By default, AHV creates a virtual switch called br0 that uses all available interfaces on thehost2. Therefore, if you want to use some of those interfaces for another virtual switch, you need toremove them from br0 first. https://masteringnutanix.com/2020/06/13/how-to-create-an-ahv-virtual-switch- with-single-uplink/ https://masteringnutanix.com/2020/06/13/how-to-create-an-ahv-virtual-switch-with-single-uplink/ https://masteringnutanix.com/2020/06/13/how-to-create-an-ahv-virtual-switch-with-single-uplink/ 150. An administrator wants to have a VM on an AHV cluster with access to multiple VLANs.What is the most efficient way to achieve this? A. Update a vNIC on the VM to operate in trunked mode for all desired VLANs. B. Create a network in AHV associated with all those VLANs on all hosts. C. Use SFPs that allow the needed VLANs. D. Use one vNIC per VLAN for the VM. Answer: A 151. Refer to the exhibit. System Non-Root Partition Usage shows a warning or critical alert. The administrator needs to changethe frequency of checks and alerts to respond more quickly.Where in Prism Element should the administrator change the frequency of checks and alerts? A. Health Dashboard > Manage Crocks > Frequency B. Alerts Dashboard > Manage Checks > Schedule C. Health Dashboard > Manage Checks > Schedule D. Alerts Dashboard > Manage Checks > Frequency Answer: C 152. An administrator would like to leverage the Reliable Event Logging Protocol (RELP) with theirRemote Syslog Server. After completing the configuration, it is observed that RELP logging is notworking as expected.What is the likely cause of this issue? A. The cluster does not have RELP installed. B. The GENESIS was the only one chosen to forward log information. C. The Remote Syslog Server was configure using TCP as the protocol. D. The remote server does not have rsyslog-relp installed. Answer: D 153. An administrator wants to receive an environment summary report when a host failure occurs.Which action would address the administrator’s need? A. Enable App Discovery B. Edit report schedule C. Configure an alert policy D. Create a playbook Answer: C Explanation: An alert policy can be configured to send out an environment summary report when a host failure occurs.This can be done by creating a policy that triggers an alert whenever a host fails and then configuring thepolicy to send out a report that provides a summary of the environment in which the failure occurred.This will allow the administrator to quickly get a view of the environment after a failure occurs, allowingthem to take the necessary steps to address the issue. https://www.nutanix.com/support-services/training- certification/certifications/certification-details-nutanix-certified-professional- multicloud-infrastructure-6_5 154. An administrator is concerned about the amount of data that a VM reading and writing to the storagefabric. https://www.nutanix.com/support-services/training-certification/certifications/certification-details-nutanix-certified-professional-multicloud-infrastructure-6_5 https://www.nutanix.com/support-services/training-certification/certifications/certification-details-nutanix-certified-professional-multicloud-infrastructure-6_5 https://www.nutanix.com/support-services/training-certification/certifications/certification-details-nutanix-certified-professional-multicloud-infrastructure-6_5 Which metric will provide that data? A. Host Hypervisor IO Bandwidth B. Host Disk IOPS C. VM Storage Controller IOPS D. VM Storage Controller Bandwidth Answer: C 155. Upon logging into Prism Central, an administrator notices high cluster latency.How can the administrator analyze data with the least number of steps or actions? A. Modify Data Density in the main Prism Central dashboard. B. Click on the chart in the widget to expand the data elements. C. Take note of the duster name and create a new Analysis chart. D. Click the cluster name in the cluster quick access widget. Answer: B 156. An Administrator has been asked to deploy VMs using a specific image. The image has beenconfigured with settings and applications that will be used by engineering to develop a new product bythe company.The image is not available on the desired cluster, but it is available in other cluster associated with PrismCentral.Why isno’t the image available? A. The image bandwidth policy has prevented the image upload. B. The cluster should be removed from all categories. C. The cluster has not been added to the correct category D. The image placement policy was configured with enforcement. Answer: D Explanation: When a placement policy is enforced, images are only allowed to be deployed on clusters that are part ofcategoriesthat are associated with the policy. If the desired cluster is not associated with the policy, thenthe image will not be available for deployment.https://next.nutanix.com/how-it-works-22/image- management-for-ahv-clusters-and-dealing-with-the-inactive-image-37300 157. An administrator is setting up a Nutanix cluster and needs to configure the default VLAN. Which configuration should the administrator choose? A. Vlan.0 B. Vlan.1 C. Vlan.2 D. Vlan.7 Answer: A Explanation: Nutanix cluster is a group of Nutanix nodes that share data and resources across a network1. A VLAN isa virtual LAN that allows devices on different physical LANs to communicate as if they were on the samenetwork2.by default, a virtual NIC (VM NIC) on a guest VM operates in access mode and can send and receivetraffic only over its own specified VLAN. The default VLAN ID for access mode interfaces is 1.Therefore, by choosing Vlan.1 as the default VLAN, you can simplify the network configuration and avoidpotential issues with other VLAN IDs. 158. Which command should an administrator run from the CLI to view the uplink state of all AHV nodesin the cluster? A. allssh show_uplinks B. manage_ovs show_uplinks C. allssh manage_ovs show_uplinks D. manage ovs show uplinks Answer: C 159. A two-node ROBO cluster is configured with a witness VM. What happens when Node A goes down? A. The- cluster becomes unavailable and goes into read-only mode. B. All operations and services on the Node B are shut down and go into a waiting state. C. The cluster is unaffected and no administrator intervention is required. D. Node B sends a leadership request to the Witness VM and goes into single- node mode. Answer: D 160. An administrator receives complaints of poor performance in a particular VM.Based on the VM performance metric, what is the most likely cause of this behavior? A. Oplog is full cannot serve IO request from this VM. B. The host’s CPU is severely overloaded. C. SSD tier is not big enough to serve workloads’ IOPS demand. D. The VM needs more vCPUs Answer: C Explanation: one of the key metrics to consider for VM performance is IOPS (Input/Output Operations Per Second),which is a measure of the number of input/output requests a device processes per second3. Anothermetric is throughput, which is a measure of how much data a device transfers per second3. 161. HOTSPOT Async DR is configured between two sites. A network outage occurs at the primary site.Which steps must the administrator perform to bring the VMs back into service at the backup site? Item instructions: For each procedure, indicate the order in which that procedure must take place to meetthe item requirements. Not all procedures are valid. Identify any invalid procedures using the drop-down option. Answer: Explanation: 162. A user is complaining about slowness of a mission-critical MSSQL Server. The administrator logs into Prism Element to investigate the VM performance and observes what is shown in the diagram. Which action would best improve VM performance? A. Disable hyperthreading in the BIOS. B. Add additional RAM to the user VM C. Add additional RAM to the host on which the VM is running. D. Ensure the host's CPUs ere not excessively overcommitted. Answer: B Explanation: Prism Element is a graphical user interface that allows you to manage Nutanix clusters1. You can usePrism Element charts to understand Nutanix cluster workloads and troubleshoot performance relatedissues2.memory optimized virtual machine sizes offer the best performance for SQL Server workloads on AzureVMs. Adding more RAM to the user VM can help reduce paging and improve query execution times.SQL Server performance can be affected by disk latency and throughput. By creating separate virtualdisks for data and logs, you can spread activity across multiple spindles and reduce disk contention.https://next.nutanix.com/how-it-works-22/differences-between-prism- element-prism-central-and-prism-pro-37137 163. An administrator needs to deploy an application with a large amount of data connected via Nutanixvolumes.Which two actions should the administrator take when designing the Volume Group? (Choose two.) A. Distribute workload across multiple virtual disks B. Enable RSS (Receive Side Scaling) C. Use multiple subnets for iSCSI traffic D. Enable thick provisioning on the Volume Group(s) Answer: A,B 164. What is the minimum time a newly created Deduplication storage policy takes to apply to the VMs inthe container? A. 5 Minutes B. 10 minutes C. 30 minutes D. 60 minutes Answer: C 165. An administrator needs to configure Prism to send encrypted messages to a set of recipients.Which setting must be applied? A. Use SMTP Port 25 B. Configure Prism Central to use Cluster Lockdown C. Install SSL certificates on Prism Central D. Set SMTP Security Mode to STARTTLS Answer: D Explanation: The best way for the administrator to configure Prism to send encrypted messages to a set of recipientsis to set the SMTP Security Mode to STARTTLS. This will ensure that all messages sent over SMTP areencrypted and secure. Additionally, the administrator should consider installing SSL certificates on Prism Central to ensure that the messages are being sent securely. Finally, the administrator should considerconfiguring Prism Central to use Cluster Lockdown, which will help ensure that the messages are Only sent to the intended recipients. 166. What is most likely the cause of this issue? A. There is a firewall rule blocking VLAN512 traffic B. VLAN512 is a reserved VLAN ID, and not usable for guest VMs. C. The VLAN was not created on the upstream switches. D. The administrator did not created the VLAN on all hosts Answer: C 167. A cluster has RF2. The cluster loses two drives on different nodes in the same storage tier.What is the effect on the replicas of the VMs? A. Some VM data may be lost B. No VMs lose data if the node has two or more SSDs C. Some VMs may reboot and gain access to data D. No VMs lose data because of RF2 Answer: A Explanation: Reference: https://next.nutanix.com/how-it-works-22/disk-fault- tollerance-8822 168. What Nutanix feature provides effective caching optimization In VDI environments? A. Remote Protection Group B. Local Protection Group C. Snap Clones D. Shadow Clones Answer: D 169. The customer is seeing high memory utilization on a mission critical VM. Users report that theapplication is unavailable. The guest OS does not support hot add components.How should the administrator fix this issue? A. Access the CVM on the host that is running the VM: * Open acli * Run a command to increase the amount of RAM assigned to the VM B. From the Prism web console: * Go to the VM dashboard* Select the VM from the VMs list * Choose Update* Adjust the amount of memory assigned to the VM C. Go to Control Panel in the VM: *Select the Computer Properties * Increase the amount of RAM assigned D. During the next maintenance window: https://next.nutanix.com/how-it-works-22/disk-fault-tollerance-8822 https://next.nutanix.com/how-it-works-22/disk-fault-tollerance-8822 * Select the VM from the VMs list * Perform a graceful shutdown Answer: D 170. An administrator migrates a VM onto a new Nutanix cluster- After the migration, the administrator observes the following conditions: • Cluster memory utilization: 64% • Cluster CPU utilization: 19%• Cluster storage utilization. 32% • Average VM CPU utilization: 25% • Average VM CPU ready%: 24% • Average VM memory utilization: 60% Which two changes should the administrator make to improve VM performance? (Choose two.) A. Reduce the number of vCPUs assigned to VMs.B. Add more memory to the VMs. C. Reduce the number of VMs on the hosts. D. Replace high core count CPUs with high clock rate CPUs. Answer: C,D 171. Refer to the exhibit. The Linux Admin role has been created to manage only Linux VMs in the environment. However, the Admin1 user does not have access to all Linux VMs.What step should be taken to grant the proper access? A. Add the hosts to the entities KM for the role. B. Grant the admin1 user the viewer role (or the cluster. C. Add the role to the Linux images. D. Add the proper category to each Linux VM. Answer: A 172. Which two capabilities does IPAM provide in a Nutanix networking configuration? (Choose two.) A. Allows proxy server settings to be set up for a defined network B. Allows AHV to assign IP addresses automatically to VMs using DHCP C. Configures a VLAN with an IP subnet and assigns a group of IP adresses D. Configures firewall rules to prevent or allow certain TCP/IP traffic Answer: B,Ccan be made on a cluster with software-based Data-at- Rest Encryption enabled? A. Disable encryption on the cluster B. Deploy an additional Native KMS Server C. Enable encryption for a VM D. Change Native KMS to External KMS Answer: D Explanation: Reference: https://next.nutanix.com/blog-40/security-with- simplicity-encryption-for-your-data-with-1-click-28225 16. An administrator needs to bring down a host in a Nutanix Cluster for maintenance reasons. The administrator puts the host in maintenance mode. What should the administrator do to perform an orderly shutdown of the CVM? A. Execute the cvm_shutdown -P new command from the CVM. B. Enter Fever off Server - immediate from the IPMI console. C. Enter Fewer off Server-orderly Shutdown from the IPMI console. D. Execute the cvm_shutdown -P now command from the host. Answer: A https://next.nutanix.com/blog-40/security-with-simplicity-encryption-for-your-data-with-1-click-28225 https://next.nutanix.com/blog-40/security-with-simplicity-encryption-for-your-data-with-1-click-28225 17. An administrator logs into the Nutanix Support Portal and notices there is a new version ofthe LCM Framework available. In an effort ensure LCM is providing the latest features, the administrator would like to upgrade LCM. How can the LCM Framework be upgraded? A. Perform an LCM inventory B. Upload the latest LCM Framework as an image in the image Configuration in Prism C. Upload the latest LCM Framework bundle via Upgrade Software in Prism D. Upgrade AOS Answer: A 18. Which baseline is used to identify a Zombie VM? A. VM is powered off for the past 21 days. B. Memory usage is less than 1% and memory swap rate is equal to 0 Kbps for the past 21 days.VM has no logins for the past 21 days C. VM has no logins for the past 21 days D. Fewer than 30 1/Os and less than 1000 bytes per day of network traffic for the past 21 days Answer: D 19. In the event of a disk failure, which process will immediately ad automatically scans Cassandra to findall data previously hosted on the failed disk, and all disks in that node? A. Curator B. Stargate C. Genesis D. Prism Answer: A 20. Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness? A. Continuous Data Protection B. Copy-on-Write C. Split-mirror D. Redirect-On-Write Answer: D 21. How will an HDD failure affect VMs with data on the failed device? A. The VMs will crash, and will be restarted once the failed HDD has been replaced and the data hasbeen restored. B. A live migration will be initiated, moving the affected VMs to a host that contains the replica data. C. The VMs will remain operational on that host and continue to function normally with no noticeable impact D. An HA event will occur, causing the affected VMs to restart on a node that contains the replica data. Answer: C 22. After configuring Active Directory as the desired authentication service, an administrator is not able to login into Prism Central using privileged account. Which configuration must be checked first? A. Account lock status B. Role Mapping C. Local user account D. Cluster Lockdown Answer: B Explanation: According to the Nutanix Community1, users can authenticate using their Active Directory credentialswhen Active Directory support is enabled for Prism Central. To enable Active Directory support, you needto configure Role Mapping12, which defines how Active Directory groups map to Prism Central roles.https://next.nutanix.com/ncm-intelligent-operations-formerly- prism-pro-ultimate-26/configuring-authentication-38051 23. After running an LCM inventory it is noticed that there are a number of firmware and software updates available. The administrator would like to avoid any host reboots, but would like to apply some of the available updates? Which two updates can be done while avoiding a host reboot? (Choose two.) A. M.2 Drives B. AHV C. Data Drives D. AOS Answer: A,D Explanation: AOS and M.2 Drives are two updates that can be done while avoiding a host reboot. AOS is the Acropolis Operating System that includes the hypervisor, storage and management components of the Nutanix cluster, and firmware and software updates can also be applied to it without requiring any host reboots 24. Which two permission assignment tasks can be accomplished via Prism Element? (Choose two.) A. Grant a user permission to create VMs on a specific storage container B. Grant a user permission to view details of all VMs on a specific cluster C. Grant an active directory group permission to perform back Operations D. Grant a user permission to create and delete snapshots on a specific VM Answer: B,D Explanation: Prism Element is a management interface that allows administrators to assign permissions to users and groups on a per-cluster, per- VM, or per-storage container basis. https://www.nutanix.com/content/dam/nutanix/resources/support/ncp-mci-ds.pdf 25. An administrator has been asked to enable block awareness and increase the fault tolerance to FT2 on a Nutanix AHV cluster with the following configuration: • Four blocks. • One node per block. Will the administrator be able to accomplish these tasks? A. No-Fault tolerance changes are not supported. B. Yes-FT2 requires a minimum of three nodes. C. Yes-Block awareness requires a minimum of three blocks. D. No-FT2 requires a minimum of five nodes. Answer: D 26. What requires iSCSI initiator configuration in the guest OS to use Volumes? A. SQL Server Always On Availability Group B. Microsoft Windows Failover Cluster C. Oracle RAC D. Exchange DAG Answer: B 27. An administrator has set up a local web server accessible to the Nutanix clusters. Which two steps are required to set up LCM for an environment without Internet access? (Choose two.) A. Download the lcai_disconnecced_version. tar.gz LCM bundle from the support portal. B. Edit LCM Advanced Settings in Prism Element and enter the address of the web server. C. Edit LCM Advanced Settings m Prism Central and enter the address of the web server. D. Download the lcm_dark_site_version. tar . gz LCM bundle from the support portal. Answer: B,D 28. Which component ensures uniform distribution of data throughout the cluster to eliminate hot spots and speed up rebuilds? A. Cassandra B. Distributed Storage Fabric C. High Availability D. Acropolis App Mobility Fabric Answer: A 29. Refer to the exhibit. Which two initial cluster configuration tasks were missed during the deployment process? (Choose two.) A. Host password changes B. Password policy changes C. BIOS password changes D. CVM password changes Answer: A,D 30. A newly-hired Nutanix administrator was tasked by the CIO to create a single VM on a test network. The network administrator stated that a native VLAN was used on the Cisco TOR switches with the following parameters: IP address:172,16.1.2 Network Mask: 255.255.255.0 Default gateway: 172.16.1.1 VLAN:1 The same parameters were used to create a network profile on Nutanix, but the when the VM was on …What should the Nutanix administrator do to fix this issue? A. Nutanix removed support for native VLAN. B. Change VLAN field from vlan1 to vlan0. C. Enable IPv6 on the VM. D. Use DHCP as opposed to static IP Answer: B 31. An administrator wants to expand the Failure Domain level of a cluster. What two options are available? (Choose two.) A. Node B. Data Center C. Block D. Rack Answer: C,D 32. An administrator logs in to Prism Element goes to the Network view, and sees the output shown in the exhibit. Which three steps must the administrator take to increase throughput to the host? (Choosethree.) A. Connect the 10Gb interfaces to the physical switch. B. Change the bond mode to balance-slb or balance—tcp. C. Remove any 1Gb interfaces still connected from the default bond. D. Add a new switch to the network and connect 1Gb interfaces to it. E. Change the VLAN ID to a higher priority ID. Answer: A,B,E 33. An administrator needs to boot a VM to a bootable CD. The administrator tries to configure the VM to boot to it, select to add disk, and goes to the images available. The image for the bootable CD is unavailable. What is the Likely issue? A. The CD-ROM interface is too slow. B. The administrator selected a disk attached before it can boot to a CD. C. The VM needs to have a standard disk attached before it can boot to a CD. D. The bootable CD image is corrupted during creation. Answer: B Explanation: Reference: https://next.nutanix.com/prism-infrastructure- management-26/booting-vm-to-cd-no-drives-present-31800 34. Refer to Exhibit: Why has an anomaly been triggered? A. Because the CPU usage crossed the blue band. B. Because the blue band range increased over the last 2 days C. Because the CPU usage dropped belon' 20% D. Because the CPU usage reached 100% Answer: A Explanation: Nutanix leverages a method for determining the bands called ‘Generalized Extreme Studentized DeviateTest’. A simple way to think about this https://next.nutanix.com/prism-infrastructure-management-26/booting-vm-to-cd-no-drives-present-31800 https://next.nutanix.com/prism-infrastructure-management-26/booting-vm-to-cd-no-drives-present-31800 is similar to a confidence interval where the values are between the lower and upper limits established by the algorithm. Another web source 3 shows an example of how anomaly detection works in Nutanix Prism Central. In the video, you can see that when the observed value of a metric deviates significantly from the predicted value based on historical data, an anomaly event is triggered and displayed on a chart. Therefore, by comparing the observed values with the predicted values based on historical data, Nutanix anomaly detection can identify abnormal behavior and alert you accordingly. 35. An administrator is tasked with configuring networking on an AHV cluster and needs to optimize for maximum single VM throughput. Which bond mode should the administrator select? A. Active-Active with Mac pinning B. Active-Active C. Active-Backup D. No Uplink Bond Answer: B 36. An administrator is working with Nutanix Support and needs to provide logs for troubleshooting na issue. The cluster is located in a secure environment. Data such as IP addresses and VM names cannot be shared. Which method should be used to anonymize the log data sent to Nutanix Support? A) B) C) D) A. Option A B. Option B C. Option C D. Option D Answer: D 37. An administrator recently added new SSDs to a Nutanix cluster and knows the firmware will be out ofdate, Due to security constraints, the cluster does not have access to the Internet. Which two steps must be completed to update the firmware? (Choose two.) A. Download the disk firmware from the OEM's website. B. Download a darksite bundle and deploy an internal webserver, C. Select Upgrade Software, then upload the firmware bundle. D. update the LCM Source and URL to access the firmware bundle. Answer: B,C Explanation: • Download a dark site bundle and deploy an internal web server123. • Select Upgrade Software, then upload the firmware bundle using the Direct Upload option in LCM1. 38. What is Prism Central primarily used for? A. Multi-cluster network configuration B. Container creation C. Multi-cluster Single Sign On D. Data reduction configuration Answer: C 39. Refer to the exhibit An administrator is adding a new node to a cluster. The node has been imaged to the same versions of AHV and AOS that the cluster running, configured with appropriate IP addresses, and br0-up has been configured the same the existing uplink bonds. When attempting to add the node to the cluster with the Expand Cluster function in Prism, the cluster isunable to find the new node. Based on the above output from the new node, what is most likely the cause of this issue? A. The ports on the upstream switch are not configured for LACP. B. The existing and the expansion node are on different VLANs. C. There is a firewall blocking the discovery traffic from the tlu D. LACP configuration must be completed after cluster expansion Answer: B 40. Which capability refers to the storage of VM data on the node where the VM is running and ensurethat the read I/O does not have to traverse the network? A. Intelligent Locally B. Data Locality C. Intelligent Tiering D. Data Tiering Answer: B 41. On a Nutanix cluster, what does Network Segmentation refer to? A. A distributed firewall for security VM to VM traffic. B. Physically separating management traffic from guest VM traffic. C. Isolating intra-cluster traffic from guest VM traffic. D. Isolating management traffic from storage replication traffic. Answer: C Explanation: network segmentation on Nutanix clusters refers to creating a separate network for service-specificcommunication and isolating different types of traffic over selected VLANs or physical interfaces. https://next.nutanix.com/ncm-intelligent-operations-formerly-prism-pro-ultimate- 26/network-segmentation-isolating-service-specific-traffic-39463 42. How should an administrator enable secure access to Volumes using a password? A. iSER B. CHAP C. SAML D. LDAP Answer: B Explanation: https://portal.nutanix.com/page/documents/details/?targetId=Web -Console-Guide-Prism-v50:wc-block-services-enabling-t.html https://portal.nutanix.com/page/documents/details/?targetId=Web-Console-Guide-Prism-v50:wc-block-services-enabling-t.html https://portal.nutanix.com/page/documents/details/?targetId=Web-Console-Guide-Prism-v50:wc-block-services-enabling-t.html Provision storage on the Nutanix cluster by creating a volume group. Create a client whitelist to enableaccess to the volume group by using the IP addresses or client initiator IQNs in a whitelist (as part of thevolume group configuration). Create a secret for the volume group if you are using CHAP authentication. 43. When a configuring a syslog server in Prism Central, what two pieces information are required?(Choose two.) A. HTTPS URL B. Encryption secret C. Transport protocol D. IP address/port Answer: C,D 44. An administrator has been tasked with increasing security on Nutanix cluster by disabling password authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH,What is the easiest way for the administrator to meet these needs? A. Configure LDAP authentication through a secure server. B. Enable STIES vie commend line on SSH to CVM. C. Enable Cluster Lockdown and provide an RSA key. D. Restrict access with User Management in Prism. Answer: C Explanation: "An administrator has been tasked with increasing security on Nutanix cluster by disabling passwordauthentication when accessing the CVM and AHV hosts and instead moving to key-based SSH, What isthe easiest way for the administrator to meet these needs? Enable Cluster Lockdown and provide anRSA key."Cluster Lockdown mode disables password authentication when accessing the CVM and AHV hosts andinstead requires key-based SSH. To enable Cluster Lockdown mode, you need to provide an RSA key.Therefore, by enabling Cluster Lockdown mode and providing an RSA key, you can increase security onNutanix cluster by disabling password authentication when accessing the CVM and AHV hosts andinstead moving to key-based SSH with minimal effort. https://next.nutanix.com/how-it-works-22/streamlined-login-and-increase-security-key-based-ssh-login-37397 https://next.nutanix.com/how-it-works-22/streamlined-login-and-increase-security-key-based-ssh-login-37397 https://next.nutanix.com/how-it-works-22/streamlined-login-and-increase-security-key-based-ssh-login-37397 45. Prism Central will be installed manually on an AHV cluster. Which three disk images must be downloaded from the portal for the Prism Central VM? (Choose three.) A. var B. tmp C. boot D. home E. data Answer: C,D,E Explanation: https://portal.nutanix.com/page/documents/details?targetId=Prism-Central- Guide-Prism-v5_10:mul-pc-install-scratch-c.html 46. An administrator needs to run a mixed Exchange and SQL workload with a guaranteed amount of container space for each application. How should the administrator meet this requirement? A. Create one container and set capacity reservation B. Create two containers and reserve space for containers C. Create one container and enable compression D. Create two containers and reserve space for vDisks Answer: B Explanation: https://portal.nutanix.com/page/documents/details?targetId=Web_Console_Gui de-NOS_v4_0:wc_security_authentication_wc_t.html https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-Prism-v5_10:mul-pc-install-scratch-c.html https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-Prism-v5_10:mul-pc-install-scratch-c.html https://portal.nutanix.com/page/documents/details?targetId=Web_Console_Guide-NOS_v4_0:wc_security_authentication_wc_t.html https://portal.nutanix.com/page/documents/details?targetId=Web_Console_Guide-NOS_v4_0:wc_security_authentication_wc_t.html 47. Refer to Exhibit: An administrator needs to enable inline deduplication for a pre-existing storage container. When trying to enable deduplication on the storage container. this feature is grayed-out. What is the reason for this behavior? A. Replication Factor 1 is configured on the storage container. B. The cluster has less than 5 nodes which is the minimum node-count to enable deduplication. C. Capacity reservation is not enabled on the storage container. D. The cluster has hybrid storage and deduplication is supported only on all-flash clusters. Answer: D Explanation: Nutanix supports two types of deduplication: post-process and inline. Post-process deduplication runsperiodically on a schedule and can be enabled on any cluster. Inline deduplication runs in real timebefore data is written to disk and can be enabled only on all-flash clusters. Therefore, by checking the type of storage and the type of deduplication, you can determine if you canenable inline deduplication on a storage container or not. Nutanix inline deduplication is a feature that reduces the stored size and avoids duplicate data on astorage container1. It is recommended only on some specific scenarios, such as when using NutanixFiles or virtual desktop infrastructure (VDI) workloads12. 48. An administrator is troubleshooting vDisk performance issues in a Nutanix cluster with hybrid disks. The VMs all have Flash Mode enabled. But users are reporting disk latency. What could cause the performance issues? A. Flash mode is disabled when a node fails. B. Compression is disabled on the vDisk storage container. C. The VMs vDisks are in multiple containers. D. Data size for flash mode exceeds 25% of the SSD capacity. Answer: D Explanation: data size for flash mode exceeds 25% of the SSD capacity could cause the performance issues. Flashmode is a feature that allows vDisks to be pinned to SSDs for faster access, but it has a limit of 25% ofthe SSD capacity per node. If this limit is exceeded, some vDisks may be evicted from flash mode andcause disk latency2. 49. Which node type does not deploy a Nutanix Controller VM? A. Storage Only B. Hyper Converged C. Compute Only D. All Flash Answer: C 50. Which Nutanix service control ncli, the HTML5 UI, and Rest API? A. Prism B. Cassandra C. Zookeeper D. Chronos Answer: A Explanation: Prism is the central service control used by Nutanix to manage the clusters.It provides a unified view of the entire system, and it is used to control the HTML5 UI, the nCLI, and the REST API. Prism is used to manage the resources of the system, such as the nodes, storage, andnetworks, as well as to monitor the performance of the system and the applications running on it. https://www.nutanixbible.com/2f-book-of-basics-cluster-components.html PrismKey Role: UI and API· Prism is the management gateway for components and administrators to configure and monitor the Nutanix cluster. This includes Ncli, the HTML5 UI, and REST API.· Prism runs on every node in the cluster and uses an elected leader like all components in the cluster. All requests are forwarded to the leader using Linux Iptables. This allows access to PRISM using any CVM Ip address.· Prism communicates with Zeus for cluster configuration data and Cassandra for statistics to present tothe user. It also communicates with the ESXi hosts for VM status and related information. These are onlysome of the essential services that make up the CVM functionality. For more information on all the services and various Nutanix Cluster components, refer to the portal documentation. 51. An administrator needs to provide access for a user to view real-time performance metric for all VMs on all clusters across the datacenter.Which method accomplishes this with the least effort and ongoing maintenance? A. Configure IDP authentication and assign the user to the Cluster Admin role in Prism Central. B. Configure AD authentication and assign the user to the Viewer role in Prism Element. C. Configure AD authentication create a custom role, assign the user to the role, and apply the role to all clusters and VMs Answer: C https://www.nutanixbible.com/2f-book-of-basics-cluster-components.html 52. A vDisk is read by multiple VMs. The cluster creates immutable copies of the vDisk. What are these vDisk copies called? A. Disk Clones B. Golden Images C. Volume Groups D. Shadow Clones Answer: D 53. An administrator responsible for a VDl environment needs to investigate reports of slow logins. The administrator finds that increasing the number of vCPUs from 2 to 4 will reduce the login times. Production workloads are consuming 75% of the host CPU on the cluster. The administrator increases the vCPU count on all of the VDl VMs. What are two impacts on the cluster? (Choose two) A. Increasing CPU counts will decrease memory utilization B. Increase memory utilization% C. Increase CPU utilization% D. Increase CPU ready% Answer: C,D 54. Which two methods are available when migrating a VM from a legacy 3- tier solution using VMwareESXi to AHV? (Choose two.) A. Deploy the Move appliance. B. Use Cross-Hypervisor DR. C. Import the .vmdk into the Image Service. D. Use shared nothing live migration. Answer: A,C 55. An administrator has received reports of users being disconnected from remote desktop sessions to aspecific VM. Which VM metric is most useful isolating the cause of the issue? A. Storage Controller Bandwidth B. Swap-Out Rate C. Hypervisor CPU Ready time (%) D. Virtual NIC receive packet dropped Answer: D 56. A customer wants to isolate a group of VMs within their Nutanix environment for security reasons. The customer creates a VM with two NICs to act as a firewall and installs the appropriate software and certificates. However, no one from the outside can access the application. What is the likely cause of this problem? A. A shared volume group must be used by all isolated VMs B. More than one NIC cannot be added to a VM C. One of the NICs needs to be configured on the internal VLAN D. Wireshark is installed on the NATVM Answer: C 57. Refer to Exhibit: An administrator is trying to put a node into maintenance mode but receives the message shown in the exhibit. What is a potential reason for this dialog? A. LinuxVM1 uses a vDisks stored in a RFI Datastore B. LinuxVM1 uses a Volume Group C. LinuxVM1 uses a virtual GPU. D. LinuxVM1 uses e vDisks stored in a RF3 Datastore Answer: A Explanation: According to the Nutanix Community1, host maintenance mode is used to safely migrate all the uservirtual machines (VMs) in the host and make sure no VMs are running on the node. If a VM can’t bemigrated to another host, you need to shut down the VM for the host to enter into maintenance mode. According to The Virtualist2, a storage container is a logical segmentation of a storage pool that can bemounted as an NFS datastore on ESXi hosts. You can choose a replication factor (RF) for each storagecontainer, which determines how many copies of data are stored across different nodes. 58. How many SSL certificates are used by Prism Element on a Nutanix cluster? A. 1 B. 5 C. 256 D. 2048 Answer: A 59. The administrator recently had a node fail in an AHV Nutanix cluster. All of the VMs restarted on Other nodes in the cluster, but they discovered that the VMs that make up a SQL cluster were running on thefailed host. The administrator has been asked to take measures to prevent a SQL outage in the future. What affinity option will prevent the SQL VMs from running on the same hos? A. VM-VM anti-Affinity policy B. Create Affinity Category C. VM-Most Affinity policy D. Create Affinity Project Answer: A 60. An administrator adds a node with older generation processors to an existing AHV cluster with newer generation processors. What is the effect on live migration? A. Live migration continues to function as expected and VMs can move to any AHV host. B. Live migration is prevented until the administrator enables the legacy migration option. C. Live migration is prevented until the administrator manually changes the newer processor level. D. Live migration of VMs is prevented between newer and older processors. Answer: D 61. A guest VM should be able to tolerate simultaneous failure of two nodes or drives. What are the minimum requirements for the Nutanix cluster? A. 3 nodes with cluster RF 3 and container RF 3 B. 3 nodes with cluster RF 3 and container RF 2 C. 5 nodes with cluster RF 2 and container RF 3 D. 5 nodes with cluster RF 3 and container RF 3 Answer: D Explanation: Reference: https://portal.nutanix.com/page/documents/details?targetId=Web- Console-Guide-Prism-v5_16:arcredundancy-factor3-c.html 62. Which three upgrades should an administrator be able to perform using Lifecycle Management?(Choose Three) A. AOS B. BMC C. BIOS D. Hypervisor E. HBA Firmware Answer: B,C,E Explanation: Reference: https://portal.nutanix.com/page/documents/kbs/details?targetId=kA00e000000L MgICAW https://portal.nutanix.com/page/documents/details?targetId=Web-Console-Guide-Prism-v5_16:arcredundancy-factor3-c.html https://portal.nutanix.com/page/documents/details?targetId=Web-Console-Guide-Prism-v5_16:arcredundancy-factor3-c.html https://portal.nutanix.com/page/documents/kbs/details?targetId=kA00e000000LMgICAW https://portal.nutanix.com/page/documents/kbs/details?targetId=kA00e000000LMgICAW 63. An administrator needs to increase bandwidth available to the AHV host and to the CVM. How should the administrator complete this task? A. In Prism, update vs0 to change the configuration to Active-Active. B. Use manage-ovs commands to update br0 change the configuration to Active- Active. C. In Prism, create a vsl interface and add any remaining uplinks. D. Use manage-ovs commands to create br1 and add any remaining uplinks Answer: A 64. An Administrator is working on a one-node ROBO cluster configurations. Which statement is true for this configuration? A. Witness vm required to break cluster quoram B. Supported hardware is NX-1175-G5 and G6 C. witness vm should be 8vcp and 20gb ram D. the minimum RPO 8 hours required Answer: B Explanation: Reference: https://www.nutanix.com/blog/unlocking-the-roboedge-it-landscape- with-the-launch-of-nutanix-1-node-cluster https://www.nutanix.com/blog/unlocking-the-roboedge-it-landscape-with-the-launch-of-nutanix-1-node-cluster https://www.nutanix.com/blog/unlocking-the-roboedge-it-landscape-with-the-launch-of-nutanix-1-node-cluster 65. AHV IPAM assigns an IP address from the address pool when creating a managed VM NIC. At which two instances does the address release back to the pool? (Choose two) A. The IP address lease expires B. The VM NIC is deleted. C. The IP address is changed to static. D. The VM is deleted. Answer: B,D Explanation: https://portal.nutanix.com/page/documents/solutions/details/?targ etId=BP-2029_AHV:BP-2029_AHV Administrators can use Acropolis with IPAM to deliver a complete virtualization deployment, including network management, from the unified Prism interface. This capability radically simplifies the traditionally complex network management associated with provisioning VMs and assigning network addresses. Toavoid address overlap, be sure to work with your network team to reserve a range of addresses for VMs before enabling the IPAM feature. The Acropolis master assigns an IP address from the address pool when creating a managed VM NIC; the address releases back to the pool when the VM NIC or VM is deleted. 66. Refer to exhibit: https://portal.nutanix.com/page/documents/solutions/details/?targetId=BP-2029_AHV:BP-2029_AHV https://portal.nutanix.com/page/documents/solutions/details/?targetId=BP-2029_AHV:BP-2029_AHV An administrator needs to update some images that were previously uploaded to their Nutanix cluster, whilelogged into Prism Element when trying to update the images, the update icon is not enabled. What could be the cause for this behavior? A. RBAC is configured and the administrator's user doesn't have the right privileges. B. The files were ISO but were uploaded as disk images hence cannot be used or edited. C. Images are corrupted and must be re-uploaded. D. Images were imported into Prism Central. Answer: D Explanation: According to Nutanix Support & Insights1, image create, update, and delete (CUD) behavior depends on whether a cluster (also known as Prism Element) is registered to Prism Central. Images created on a Prism Element reside on Prism Element and can be managed from Prism Element. For better centralized management, you can migrate images manually to Prism Central by using the image import feature. 67. What are two minimum prerequisites for live migration to succeed? (Choose two.) A. All AHV hosts have IP addresses in the same subnet B. All AHV hosts must be configured on the same VLAN C. All VMs have an IP address in the same subnet D. All VMs are configured for the same VLAN Answer: A,B 68. How should an administrator correct an SSL error when connecting to a Nutanix cluster? A. Add the SSL certificate to the workstation’s trusted people store B. Create a new self-signed certificate for the cluster with a 4096 bit key C. Create a new SSL certificate for the cluster signed by an AD certificate authority D. Add the SSL certificate to an AD group policy applied to all computer objects Answer: C 69. An administrator wants to create a trunked interface on a VM on AOS 5.15x. Which two steps should the administrator take first to achieve this? (Choose two) A. Use acli B. Log in over PE web UI. C. SSH to CVM. D. Update VM dialog. Answer: A,C Explanation: Reference: https://vmwaremine.com/2019/05/09/enable-vlan- trunking-on-nutanix-ahv-vm/#sthash.3uIAHeXZ.dpbs 70. A systemadministrator needs to add more VMs to their Nutanix cluster. Which two actions should the administrator perform to determine if the current cluster can accommodatethe new VMs? (Choose two) A. Enable Deduplication and Ensure Coding B. Utilize Optimize Resources for VM efficiency C. Determine utilization with Cluster Runway D. Perform an inventory with Life Cycle Management Answer: A,B https://vmwaremine.com/2019/05/09/enable-vlan-trunking-on-nutanix-ahv-vm/#sthash.3uIAHeXZ.dpbs https://vmwaremine.com/2019/05/09/enable-vlan-trunking-on-nutanix-ahv-vm/#sthash.3uIAHeXZ.dpbs 71. Which two types of granular RBAC does Nutanix provide for AHV hosts? (Choose two.) A. Category based B. Project based C. Disk based D. Cluster based Answer: A,B 72. An administrator manages a cluster and notices several failed components shown in the exhibit. What two options does the administrator have to run all NCC checks manually? (Choose two.) A. Using the Actions drop-down menu in the Health dashboard of Prism Element. B. Running ncc health_checks run-alll on the CVM C. Using the action action drop-down menu in the Health dashboard of Prism Central D. Running noc health_checks run_all on the PC VM Answer: A,B 73. Which two access protocols are supported by Files? (Choose two.) A. ISCSI B. SMB C. FCOE D. NFS Answer: B,D 74. A Nutanix cluster is equipped with four nodes. Four VMs on this cluster have been configured with a VM-VM anti-affinity policy and are each being hosted by a different node. What occurs to the cluster and these VMs during an AHV upgrade? A. One node hosts two VMs while the node being upgraded is in maintenance mode. B. One VM out of the four powers down when the node hosting it reboots. C. The AHV pre-upgrade checks fail until the administrator disables the anti- affinity policy. D. The AHV pre-upgrade checks fail until the four VMs are powered off. Answer: A 75. A user running a Computer Aided Design (CAD) application is complaining about slow response time within the VM, particular when moving windows or rendering images. Which VM metric will guide the administrator toward diagnosing the problem? A. Storage Controller Latency B. GPU Usage C. Swap in Rate D. Hypervisor Memory Usage (%) Answer: B 76. An administrator needs to periodically send information about cluster efficiency via email to a set ofusers. What should be configured to accomplish this task? A. Configure Efficiency widget in Prism Central. B. Create a new' prism Central project. C. update Capacity Configurations in Prism Central. D. Add a schedule to Prism Central reports. Answer: D Explanation: To periodically send information about cluster efficiency via email to a set of users, the administrator canfollow these steps: • Create a report in Prism Central that contains the relevant information about cluster efficiency. • Add a schedule to the report to generate and send the report via email to the set of users at a specified frequency. This will ensure that the users receive regular updates about the cluster efficiency without the need formanual intervention. 77. Which two private key types are supported by the Nutanix SSL certificate implementation? (Choosetwo.) A. ECDSA B. ECDH C. ED25519 D. RSA Answer: A,D 78. An administrator has been notified by a user that a Microsoft SQL Server instance is not performing well. When reviewing the utilization metrics, the following concerns are noted: • Memory consumption has been above 95% for several months • Memory consumption has been spiking to 100% for the last five days Storage latency is 2ms. When logging into Prism Central, how could the administrator quickly verify if this VM has performance bottlenecks? A. See Capacity Runway. B. Filter VM by Efficiency. C. Update Capacity Configurations. D. Perform Entity Sync Answer: B Explanation: This will allow the administrator to quickly identify VMs that are over provisioned or under utilized basedon their performance metrics. https://www.nutanix.com/support-services/training- certification/certifications/certification-details-nutanix-certified-professional- multicloud-infrastructure-6_5 79. What does Nutanix recommend when setting up the node networking? A. Include NIC models from different vendors in the same bond B. Include at least two physically interfaces in every bond. C. Combine NIC models from different vendors in the same bond. D. Combine NIC models from different vendors in the same bond. Answer: B 80. What is he recommended approach for a constrained VM? A. Reboot the VM B. Delete the VM. C. Increase the VM resources. D. Decrease the VM resources Answer: C https://www.nutanix.com/support-services/training-certification/certifications/certification-details-nutanix-certified-professional-multicloud-infrastructure-6_5 https://www.nutanix.com/support-services/training-certification/certifications/certification-details-nutanix-certified-professional-multicloud-infrastructure-6_5 https://www.nutanix.com/support-services/training-certification/certifications/certification-details-nutanix-certified-professional-multicloud-infrastructure-6_5 81. An administrator has created a Nutanix managed it a VLAN ID of 512. Several VMs have been created, and the administrator notices that the can successfully communicate with other VMs on that VLAN. Provided they are on the host, but cannot communicate with VMs that reside on different hosts in the cluster. What is most likely thee cause of this issue? A. There is a firewall rule blockingVLAN512 traffic. B. VLANS12 is a reserved VLAN ID, and not usable for guest VMs. C. The VLAN was not created on the upstream switches. D. The administrator did not create the VLAN on all hosts Answer: C 82. An administrator needs to report on any alerts generated by a Nutanix cluster that affected the cluster's availability over the past 10 days. Which method should be used to locate these events? A. On the Health dashboard, use the Log Collector to export data based on time stamp. B. Export the cluster event log to a CSV on the Alerts dashboard. C. On the Alerts dashboard, filter based on Impact Type and the desired Time Range. D. Configure an Alert Policy to generate an email with the data on the Health dashboard. Answer: C Explanation: Reference: https://portal.nutanix.com/page/documents/details?targetId=Prism-Central- Guide-Prism-v55:mulalerts-management-pc-c.html https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-Prism-v55:mulalerts-management-pc-c.html https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-Prism-v55:mulalerts-management-pc-c.html 83. In which two scenarios is an automated live migration likely to occur? (Choose two) A. Cluster resource hotspot B. AOS upgrade C. Network upgrade D. Hypervisor upgrade Answer: A,C 84. Which three configuration scenarios are valid for the deployment of Prism Central? (Choose three.) A. Environments use Network Address Translation. B. Prism Elements and Prism Central art in different subnets. C. Environments do not have Internet access. D. Prism Elements and Prism Central have proxy configured. E. Environments use the 192.168.5.0/24 CVM management network. Answer: B,C,D 85. An administrator notices that most of the VMs in the cluster are on one host. Users report that na application seems to respond slowly. The application server VM has significantly more memory assigned to it than other VMs. How should the administrator fix this issue? A. Reduce the amount of memory assigned to the VM. B. Migrate the VM to a different host. C. Add more memory to the VM. D. Increase the memory on the CVM. Answer: B86. The Stargate service becomes unavailable on a single CVM on an AHV node. What is used to maintain I/O operations in the cluster? A. Route injection B. iSCSl redirector C. Hypervisor HA D. ha.py Answer: B 87. Which component can be associated with a storage policy? A. Subnet B. Catalog C. Vm D. Category Answer: C Explanation: A storage policy can be associated with a VM. A storage policy is a set of rules that define how data objects are stored and protected. It specifies the characteristics of storage, data protection, and data placement for virtual disks that are assigned to a VM.Subnets, catalogs, and categories are not associated with storage policies. https://portal.nutanix.com/page/documents/details?targetId=Prism-Central- Guide-vpc_2022_6:mul-cluster-storage-policy-summary-view-pc-r.html 88. An administrator needs to configure a new subnet on an AHV cluster and want to ensure that VMs will automatically be assigned an IP address at creation time. Which type of network does the administrator need to create? A. Dynamic Network B. Unmanaged Network C. Managed Network D. DHCP Network https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-vpc_2022_6:mul-cluster-storage-policy-summary-view-pc-r.html https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-vpc_2022_6:mul-cluster-storage-policy-summary-view-pc-r.html Answer: C 89. Administrator is creating a Windows 10 VM that will be used for a virtual desktop template. After creating the VM and booting to the ISO, the administrator is unable to install Windows and receives the following error. We couldn't find any drives. To get a storage driver, click Load dr1ver.What steps does the administrator need to take to install the OS? A. Load the Nutanix VirtIO Serial Bus Driver. B. Load the VirtIO Network Ethernet Adaper. C. Load the Nutanix Virtual Balloon Driver. D. Load the Virtual SCSI pass-through controller. Answer: D 90. An administrator needs to create a new Linux image and will to do the following as part ofthe VM deployment: • Set the OS hostname • Add custom users • Add Keys • Run custom scripts What package needs to be installed in the Linux image to facilitate this automation? A. CloudInit B. Sysprep Answer: A 91. Which data savings technique utilizes stripes and parity calculation in a Nutanix cluster? A. Compression B. Parity strip C. Erasure coding D. Deduplication Answer: C 92. An administrator has an AHV cluster that is comprised of 4 nodes with the following configuration ineach node: • CPU:2 each 2.4GHz, 12 core • Memory: 256GB • Disk: 6 each 1.92 SSD A VM with 16 vCPUs and 96GB of RAM is being created on the cluster. How should the administrator configure the VM to assure optimal performance? A. With an affinity policy B. With memory overcommit C. With 2 vNUMA nodes D. With Flash Mode enabled Answer: C Explanation: The best way to configure the VM for optimal performance is to set it up with 2 vNUMA nodes. This will ensure that the VM is configured to take advantage of the CPU and memory resources available in each node, and it will also ensure that all of the cores are utilized for the best performance. Additionally, the administrator should ensure that the VM has an affinity policy set up so that the vCPUs are evenly distributed across the four nodes. Finally, Flash Mode should be enabled in order to take advantage ofthe high-performance SSDs that are available in the cluster 93. An administrator is tasked with configuring network on an AHV cluster and wants to maximize throughput for the host with many small VMs while minimizing network switch configuration. Which bond mode should the administrator select? A. Active-active B. Active-Active with Mac Pinning C. Active-Backup D. No-Uplink Bond Answer: A 94. An administrator is performing validation testing of a new-deploy cluster. During this test, the administrator disconnect each LAN interface from each of the nodes while pinging the hypervisor and guest VMs. When the first interface is disconnected, pings continue as expected to the hypervisor, but pings stop responding from the guest. Pings continue when the interface is reconnected. When the second interface is disconnected, pings continue to both the hypervisor and guest VMs. What could be the cause of this error? A. This is normal behavior for a LAN Failover B. Switch ports are configured with different VLANs C. Portfast is not enabled on the switch ports D. One of the network interfaces has a bad patch cable. Answer: B Explanation: switch ports are configured with different VLANs could be the cause of this error. If the switch ports arenot configured with the same VLANs as the network interfaces on each node, then there could be amismatch in network connectivity when one interface is disconnected1. This could affect the guest VMs that are using a different VLAN than the hypervisor. 95. An administrator wants to use Volumes to connect to physical servers that are not able to be virtualized. Which three things must be configured for Volumes to support iSCSI clients? (Choose three) A. Enable external client access B. Client OS iSCSI initiator C. iSCSI Multipathing I/O D. Cluster Virtual IP address E. Data Services IP address Answer: B,D,E Explanation: https://portal.nutanix.com/page/documents/details/?targetId=Web -Console-Guide-Prism-v51:wc-block-services-c.html https://portal.nutanix.com/page/documents/details/?targetId=Web-Console-Guide-Prism-v51:wc-block-services-c.html https://portal.nutanix.com/page/documents/details/?targetId=Web-Console-Guide-Prism-v51:wc-block-services-c.html 96. An administrator needs to limit the amount of storage space that data stored in single container can consume. Which action should the administrator take? A. Enable reservation for rebuild capacity B. Set an advertised capacity for the container C. Store VM snapshots in a different container D. Thick prevision the container Answer: B Explanation: The best way for the administrator to limit the amount of storage space that data stored in a singlecontainer can consume is to set an advertised capacity for the container. This will ensure that the datastored in the container doesn't exceed the set limit, and it will also help prevent any potentialperformance issues due to resource contention. Additionally, the administrator should consider thickprovisioning the container, which will pre-allocate the amount of storage space that can be used by thecontainer. This will help ensure that the data stored in the container doesn't exceed the advertisedcapacity. 97.Which inefficient VM Profile can be used to identify a VM that consumes too many resources and causes other VMs to starve? A. Over-provisioned VM B. Inactive VM C. Bully VM D. Constrained VM Answer: C 98. Which component is supported by Prism Central storage policies? A. Virtual Machines B. Volume Groups C. VM Templates D. Storage Containers Answer: B 99. Which AOS process determine if an I/O from a user will be written to OpLog or to an Extent Store? A. Stargate B. Curtor C. Cassandara D. Zeus Answer: A 100. Refer to Exhibit. An administrator increases the cluster RF to 3. The containers are not modified.What will the new values in the data resiliency dashboard be for FAILURES TOLERABLE for the Zookeeper and Extent Groups components? A. Zookeeper = 1 and Extent Groups = 1 B. Zookeeper = 2 and Extent Groups = 2 C. Zookeeper = 2 and Extent Groups = 1 D. Zookeeper = 1 and Extent Groups = 2 Answer: C 101. While installing Windows 2019 on a new VM on an AHV cluster, an administrator notices there aren’t anydrives listed for the install. What might the problem be? A. VirtIO drivers have not yet been installed and the disks are IDE disks. B. VirtIO drivers have not yet been installed and the disks are SCSI disks. C. VirtIO drivers must be installed on AHV for installations of Windows. D. VirtIO drivers aren’t supported on this version of Windows 2019. Answer: B 102. Which two predefined views can be added to a report to identify inefficient VMs? A. Under provisioned VMs List B. Zombie VMs List C. Constrained VMs List D. Overprovisioned VMs List Answer: C,D 103. An administrator wants to replace and old node with a node of newer generation in a 3-node cluster. The administrator has already chosen the appropriate node. But unable to remove it from the cluster. Why is the Remove Host option not shown in the exhibit? A. The host needs to be placed into maintenance Mode before. B. It is only possible to remove a host from a cluster using CLI. C. It is not possible to remove a node from a the cluster using Prism Central D. It is not possible to remove a host from a 3-node cluster. Answer: D 104. When configuring Prism Central, which two log modules are able to forward messages to anexternal syslog server? (Choose two). A. API Audit B. Flow C. DNS D. NTP Synchronization Answer: A,B 105. How many Prism Central instances are required to deploy Leap: A. One per availability zone B. One per customer environment C. One per physical site D. One per AHV cluster Answer: A 106. In Nutanix clusters, which feature ensures VMs can be migrated and restarted on another host in case of failure? A. High Availability B. Protection Domain C. Host Affinity Rules D. Availability Zone Answer: A 107. An administrator has a Custom backup application that requires a 2TB disk and runs m Windows. Throughput is considerably lower than expected. The application was installed on a VM with the following configuration: • FOU vCPUs with one core/vCPU • 4GB of Memory • One 50GB vDisk for the Windows installation • One 2TB vDisk for the application What is the recommended configuration change to improve throughput? A. Add 4GB of memory to the VM B. Increase the vCPUs assigned to the VM C. Span the 2TB disk across four vDisks D. Increase the number of cores per vCPU Answer: C 108. A recently configured cluster is leveraging NearSync with a recovery schedule of 15 minutes. It isnoticed that the cluster is consistently transitioning in an Out of NearSyne. What action should be taken to potentially address this issue? A. Increase network bandwidth B. Change the NearSync schedule to 30 minutes. C. Add a vCPUs to the user VMs. D. Configure a secondary schedule in the same Protection Domain. Answer: A 109. In a default configuration of an AHV cluster, a single node fails. What happens to the running VMs on that node? A. The cluster restarts all VMs in the event of a host failure B. The VMs do a live migration to the master node in the cluster C. The VMs do a live migration to any other node in the cluster D. The cluster attempts to restart VMs on other hosts Answer: D Explanation: Reference: https://portal.nutanix.com/page/documents/details?targetId=Web-Console- Guide-Prismv5_16:Web-Console-Guide-Prism-v5_16 https://portal.nutanix.com/page/documents/details?targetId=Web-Console-Guide-Prismv5_16:Web-Console-Guide-Prism-v5_16 https://portal.nutanix.com/page/documents/details?targetId=Web-Console-Guide-Prismv5_16:Web-Console-Guide-Prism-v5_16 110. After logging into Prism Element, an administrator presses the letter A on the Keyboard. What is the expected out come of this input? A. Alerts page will launch B. Analysis will launch C. About Nutanix page will launch D. API Explorer page will launch Answer: D Explanation: API Explorer page will launch when an administrator presses the letter A on the keyboard after logging into Prism Element. This is one of the keyboard shortcuts that Prism Element provides for accessibility and ease of use1. API Explorer is a tool that allows users to explore and test Nutanix REST APIs withinPrism Element1. https://www.nutanixbible.com/3b-book-of-prism- navigation.html 111. When creating a VM on an AHV cluster, how is the initial placement of the VM determined? A. AHV uses a round robin algorithm, placing new VMs onto hosts based on the numerical order of their UUID B. The administrator right clicks on the desired host and selects Power on VM from the dropdown menu C. The Acropolis Dynamic Scheduler selects a host which provides adequate resources for the VMs configuration D. Placement is determined by the host that holds the new_VM token at the time of VM creation Answer: C https://www.nutanixbible.com/3b-book-of-prism-navigation.html https://www.nutanixbible.com/3b-book-of-prism-navigation.html 112. Refer to the exhibit. An administrator is trying to implement the solution that is shown in the exhibit, but has been unsuccessful. Based on the diagram, what is causing the issue? A. A remote Witness VM B. Active containers in both sites C. Network latency D. Unsupported hypervisor Answer: C 113.HOTSPOT What is the proper sequence to perform a one-click upgrade to a Nutanix cluster? Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements. Not all procedures are valid. Identify any invalid procedures using the drop-down option. Answer: Explanation: Step 1 ---> Login into Prism Element. Step 2 ---> Select the Gear Icon at top right of the page. Step 3 ---> Click Upgrade Software. Step 4 ---> Select the component to upgrade. Step 5 ---> Click download. Step 6 ---> Once the download completes, select upgrade. Invalid: 1 - Select Prism Central. 2 - Select user login. 3 - On left select upgrade Prism Central. 114. An administrator is configuring cross-hypervisor DR from an ESXi cluster to a new AHV cluster. When the administrator migrates a protection domain to the AHV cluster, the VMs fail to boot. What should the administrator do to correct this problem? A. Increase the snapshot frequency to more than 6 hours. B. Uninstall VMware Tools from the VMs. C. Install Nutanix Guest Tools in the protected VMs. D. Add all VMs into a single consistency group. Answer: C 115. A customer has a 24-node cluster with all containers configured with RF3. Two different nodes have incurred a simultaneous HDD failure. What is the result? A. The cluster runs in a degraded state until the failed drives are replaced and the data has been restored to three replicas. B. Sixty minutes after the failures a rebuild of the lost data can remaining HDDs begins to restore to three replicas. C. The VMs with data on those drives crash, and an HA event occurs, restarting them on a remaining healthy node. D. The Nutanix cluster recognizes the failures and immediately begins to rebuild lost data to three replicas. Answer: D 116. An administrator is adding a node with a higher AOS release to an existing cluster. What is the most efficient action an administrator should take to ensure it is in a supported state? A. Destroy cluster and foundation with the new node in place B. Add the node to the cluster and leave the existing AOS version in place C. Perform standalone reimage of the new node and then add to cluster D. Add the node to the cluster and reboot all running VMs to use new release Answer: C 117.Where are Leap Availability Zones configured? A. Cloud Connect B. Controller VM C. Prism Element D. Prism Central Answer: D Explanation: Terminology ✑ Availability Zone – it is represented by all resources(Nutanix Clusters) connected to Prism Central orXi Leap Availability zone. Depends on the architecture, Availability zone can represent geographicterritory, datacenter or server room in the datacenter. Protection policies – in protection policies you setup (RPO, Retention), rules to auto-apply policies to virtual machineshttps://vmwaremine.com/2019/02/08/nutanix-leap-runbooks-part- 1/#sthash.VwrzSzhQ.dpbs 118. An administrator is not able to log into Prism Central by using a new Active Directory user account. After Logging with the local user, the administrator verified that Directory Services and Role Mapping setting are valid. What is the most likely cause of this issue? A. Change password at next logon attribute is set. B. User does not belong to the Administrators group. C. Active Directory functional level of wrong. D. Prism Element authentication is not configured. Answer: B 119. What is the default network bond setting for an AHV host configuration? A. active-backup B. active-active C. balance-slb D. balance-tcp Answer: A Explanation: https://next.nutanix.com/blog-40/network-load-balancing-with- acropolis-hypervisor-6463 https://next.nutanix.com/blog-40/network-load-balancing-with-acropolis-hypervisor-6463 https://next.nutanix.com/blog-40/network-load-balancing-with-acropolis-hypervisor-6463 120. What is the expected operation during node addition when the new node has a different AOS version? A. The entire cluster is upgraded to the latest one-click release. B. The node is added and a separate upgrade operation must be performed. C. The addition fails and forces the administrator to image using standalone Foundation. D. The node is automatically re-imaged using the software currently running in the cluster. Answer: C 121. An administrator is preparing to deploy a new application on an AHV cluster, Security requirements dictate that all virtual servers supporting this application must be prevented from communicating with unauthorized hosts. Which option would achieve this goal? A. Create a new VLAN, create a subnet on the cluster with the VLAN tag, deploy servers with vNlCs in the new subnet. B. Create a new Application Security Policy restricting communication to the authorized hosts and apply it to the servers in enforce mode. C. Create a new solation Environment policy apply it to the new servers and all authorized hosts. D. Create new' subnet and assign to an existing VPC assign the IP prefix and gateway for the subnet, deploy servers with vNlC5 in the new subnet. Answer: B Explanation: An Application Security Policy is a security feature in Nutanix AHV that can be used to restrict networkcommunication between virtual servers based on a variety of criteria, such as IP address, port, andprotocol. By creating a policy that restricts communication to authorized hosts and applying it to theservers in enforce mode, the administrator can prevent unauthorized communication between virtualservers.https://www.nutanix.com/products/ahv 122. When a VM is connected to a Nutanix managed network, when is the IP addressed assigned? A. When the vNIC is created on the VM. B. When the VM is powered on. C. When the guest OS sends a DHCP request. D. When the guest OS receives a DHCP acknowledge. Answer: D 123. How should an administrator configure a custom alert for a specific VM in Prism? A. Modify an existing alert to only alert on the specific VM. B. Modify VM settings to add the custom alert. C. Modify the alerts to add a new custom alert policy. D. Modify node settings to add the custom alert. Answer: C Explanation: https://portal.nutanix.com/page/documents/details/?targetId=Pris m-Central-Guide-Prism-v510:mul-alert-policies-user-defined-configure-pc-c.html 124. During an AHV upgrade, an administrator finds that a critical VM was powered off rather than migration to another host. Which scenario explains this behavior? A. NO AHV hosts were able to be scheduled. B. The VM OS hung during migration. C. The VM was on the same host as the acropolis leader. D. The VM was marked as an agent VM. Answer: D 125. An administrator is configuring data protection and DR for a multi-tier application. All VMs must be protected at the same time. What must the administrator do to meet this requirement? A. Create a consistency group for each VM with identical schedules B. Create a consistency group for the application and place all VMs in it C. Create a protection domain for the application and select auto-protect related entities D. Create a protection domain for each VM with identical schedules Answer: C 126. A node with Erasure Coding fails. https://portal.nutanix.com/page/documents/details/?targetId=Prism-Central-Guide-Prism-v510:mul-alert-policies-user-defined-configure-pc-c.html https://portal.nutanix.com/page/documents/details/?targetId=Prism-Central-Guide-Prism-v510:mul-alert-policies-user-defined-configure-pc-c.html What is the impact? A. The node stops utilizing Erasure Coding. B. Potentially increased amount of data stored in the SSD tier. C. Increased Controller VM CPU Load. D. AQS unable to do deduplication during the Erasure Coding failure. Answer: C 127. An administrator needs to ensure logs, alerts and information is consistent across clusters that are located in different countries. Which service needs to be configured? A. SMTP B. DNS C. SNMP D. NTP Answer: D Explanation: NTP service needs to be configured to ensure logs, alerts and information is consistent across clustersthat are located in different countries. NTP stands for Network Time Protocol and it is used tosynchronize the clocks of all the nodes in a cluster1. This helps to maintain accurate timestamps for logs,alerts and other information that are generated by Nutanix clusters1. 128. What is a requirement to enable Flow Neworking? A. A dedicated virtual switch has been created for Flow Networking. B. Flow Micro segmentation must be enabled. C. Microservices infrastructure must be enabled. D. Prims Central is using a three-node scale-out deployment Answer: B 129. A VM in a 12-node Nutanix cluster is hosting an application that has specific Physical GPU requirements. Only three nodes in the cluster meet this requirement. The administrator wants to allow a general workload to be distributed across all nodes in the cluster and must make sure that the node hosting the VM meets its requirements. How should the administrator perform this task? A. Create a sperate three-node cluster using the nodes that meet the requirement. B. Configure VM-Host affinity for the nodes that meet the application's GPU requirement. C. Over-Provision the application VM with additional virtual GPUs. D. Configure anti-affinity rules between the application VM and the other VMs running on the cluster. Answer: B 130. What is the function of the virbr0 bridge on AHV? A. To carry all traffic between the user VMs and the upstream network. B. To carry management and storage communication between user VMs and the CVM. C. To carry management and storage communication between user VMs and AHV host. D. To carry storage communication between the guest VMs and the CVM Answer: C Explanation: http://www.vstellar.com/2019/01/10/ahv-networking-part-1- basics/#:~:text=AHV%20Network%20Architecture&text=virbr0%20is%20an%20 internal%20switch,virbr0)%20have%20IP%20address%20192.168. 131. The Update Source for LCM has been configured as shown in the exhibit. Inventory is failing consistently. What is the likely cause of this issue? A. Port 433 Is blocked by a firewall. B. Port 80 is blocked by a firewall. C. The administrator does not have a valid portal account. D. The license assigned to