What command initiated from a CVM, is used to view the pNICs on all AHV nodes?
A.
hostssh ssh [emailprotected] ovs-appctl bond/show
B.
allssh ovs-appctl bond/show
C.
allssh ssh [emailprotected] ovs-appctl bond/show
D.
hostssh ovs-appctl bond/show
Answer:
d
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
Which node type does a Nutanix Controller VM deploy?
A.
Storage Only
B.
Hyper Converged
C.
Computer Only
D.
All Flash
Answer:
d
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
The customer is seeing high memory utilization on a mission critical VM. Users report that the application is unavailable. The guest OS does not support hot add components. How should the administrator fix this issue?
A.
Go to Control Panel in the VM: Select the Computer Properties Increase the amount of RAM assigned
B.
From the Prism web console: Go to the VM dashboard Select the VM from the VMs list Choose Update Adjust the amount of memory assigned to the VM
C.
During the next maintenance window: Select the VM from the VMs list Perform a graceful shutdown Choose Update Increase the amount of memory assigned to the VM
D.
Access the CVM on the host that is running the VM: Open acli Run a command to increase the amount of RAM assigned to the VM
Answer:
c
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 5
A VM in a 12-node Nutanix cluster is hosting an application that has specific physical GPU requirements. Only three nodes in the cluster meet this requirement. The administrator wants to allow a general workload to be distributed across all nodes in the cluster and must make sure that the node hosting the VM meets its requirements. How should the administrator perform this task?
A.
Configure anti-affinity rules between the application VM and the other VMs running on the cluster.
B.
Over-provision the application VM with additional virtual GPUs.
C.
Create a separate three-node cluster using the nodes that meet the requirement.
D.
Configure VM-Host affinity for the nodes that meet the application's GPU requirement.
Answer:
d
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 6
An administrator wants to be able to manage their application from Prism Central. Which feature must the administrator enable to allow for application management?
A.
Capacity runaway
B.
Entity explorer
C.
Image management
D.
Self-service portal
Answer:
d
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 7
Which set of steps should be used to stop the cluster in Nutanix operations?
A.
1. Shut down Nutanix Controller VMs. 2. Log on to a running Controller VM in the cluster with SSH. 3. Stop the Nutanix cluster.
B.
1. Log on to a running Controller VM in the cluster with SSH. 2. Shut down all other Controller VMs. 3. Stop the Nutanix clusters.
C.
1. Shut down all Guest VMs. 2. Log on to a running Controller VM in the cluster with SSH. 3. Stop the Nutanix cluster.
D.
1. Shut down Nutanix CVMs and Guest VMs. 2. Log on to a running Controller VM in the cluster with SSH. 3. Stop the Nutanix cluster.
Answer:
c
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 8
The Linux administrator team has requested access rights to any current or future Linux VM in the environment. What entity should be selected when assigning this new role?
A.
Image
B.
AHV Cluster
C.
Category
D.
Project
Answer:
d
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 9
An administrator has an existing Nutanix cluster that is configured to protect VMs using Time Stream. The administrator now needs to add support for protecting these VMs in AWS. Which two changes must be made to the cluster to meet this requirement? (Choose two.)
A.
Configure protection domains with a 15-minute schedule
B.
Add the remote site to the existing protection domains
C.
Deploy a remote site for another cluster
D.
Configure a remote site
Answer:
bc
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 10
An administrator is working with sensitive data and wants to encrypt that data by Nutanix Software Encryption. Which three types of information and components are required to enable this configuration? (Choose three.)