Which Nutanix cluster service manages VM access to the Distributed Storage Fabric?
An administrator has an existing Nutanix cluster that is configured to protect VMs using. Time Stream. The administrator now needs to add support for protecting these VMs in AWs.
Which two changes must be made to the cluster to meet this requirement? (Choose two)
Which two levels of encryption are supported in a Nutanix cluster running third-party hypervisor? (Choose two.)
An administrator is configuring a container for a VM that will perform a data processing workload. Which compression technology is preferred for this type of workload?
Which Nutanix product or feature would support the replacement of a storage appliance for shared home directories?
An administrator wants to secure an application running on an AHV cluster by limiting incoming and outgoing traffic destinations. The administrator creates a security policy for the application.
What is the next step?
An administrator needs to determine current CPU usage across multiple clusters.
Which method should the administrator use to generate this type of report?
An administrator needs to view and compare IOPs for VMs across multiple clusters.
Which two dashboards can the administrator use to find this information? (Choose two)
An administrator is trying to create an additional account on the Nutanix cluster in Prism Element but is unable to create new users.
An administrator needs to shut down and relocate a Nutanix cluster.
Which step should the administrator take after shutting down all guest VMs on the cluster?
An administrator is creating a Protection Domain to back up multiple application environments.
Which mechanism does Nutanix use to aggregate VMs with common backup and restore objectives?
An administrator has configured an Active-Active policy on the brO uplink of an AHV host. The host is experiencing connectivity issues. What step should be taken?
An administrator is configuring data protection and DR for a multi-tier application. All VMs must be protected at the same time.
What must the administrator do to meet this requirement?
A Nutanix cluster is equipped with four nodes. Four VMs on this cluster have been configured with a VM-VM anti-affinity policy and are each being hosted by a different node.
What occurs to the cluster and these VMs during an AHV upgrade?
An administrator needs to shut down an AHV cluster to relocate hardware. The administrator upgrades NCC and runs health checks.
Which steps should the administrator perform next?
Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements.
Prism Central will be installed manually on an AHV cluster.
Which three disk images must be downloaded from the portal for the Prism Central VM? (Choose three.)
An administrator adds a node with older generation processors to an existing AHV cluster with newer generation processors. What is the effect on live migration?
Which three cluster operations require an administrator to reclaim licenses?(Choose three)
A cluster has RF2. The cluster loses two drives on different nodes in the same storage tier.
What is the effect on the replicas of the VMs?
What is the expected operation during node addition when the new node has a different AOS version?
Which three upgrades should an administrator be able to perform using Lifecycle Management? (Choose Three)
A configuration is single domain, single forest, and does not use SSL.
Which port number should be used to configure LDAP?
Refer to Exhibit.
An administrator increases the cluster RF to 3. The containers are not modified.
What will the new values in the data resiliency dashboard be for FAILURES TOLERABLE for the Zookeeper and Extent Groups components?
CPU utilization climbs above 90% on several VMs. This causes performance degradation for a business-critical application.
How can alerts be configured to notify the administrator before VM CPU utilization hits 90%?
When creating a VM on an AHV cluster, how is the initial placement of the VM determined?
Which two private key types are supported by the Nutanix SSL certificate implementation? (Choose two.)
The customer is seeing high memory utilization on a mission critical VM. Users report that the application is unavailable. The guest OS does not support hot add components.
How should the administrator fix this issue?