A consultant successfully installs the Foundation VM on a laptop and needs to ensure the VM can communicate externally. Which two configuration changes should the consultant make next? (Choose two.)
A. Ensure the vNIC is set to bridged adapter.
B. Configure the static IP address through the desktop virtualization software.
C. Open terminal and configure via ifconfig command.
D. Run the set_foundation_ip_address application on the VM desktop.
Explanation: To ensure that the Foundation VM can communicate externally, the virtual network interface card (vNIC) should be set to a bridged adapter. This setting allows the VM to appear as a unique entity on the network, receiving its own IP address accessible from outside the host machine. Additionally, running the 'set_foundation_ip_address' application on the VM desktop enables the consultant to configure a specific, reachable IP address for the Foundation VM, ensuring it can communicate effectively with external network resources and devices.
A systems administrator needs to add more VMs to their Nutanix cluster. Which two actions should the administrator perform to determine if the current cluster can accommodate the new VMs? (Choose two.)
A. Perform an Inventory with Life Cycle Management.
B. Determine utilization with Cluster Runway.
C. Enable Deduplication and Erasure Coding.
D. Utilize Optimize Resources for VM efficiency.
An administrator configure Active Directory (AD) authentication for their Nutanix environment. When login in using an AD user account, the login process takes more than one minute to complete. No delay occurs when logging a local account.
What should the administrator confirm to resolve this issue?
A. The user search base for the group is configured correctly
B. The domain controller being used is configured as a global catalog server.
C. Active directory lookups are configured to use Non-Recursive mode.
D. The service Account Username is correct for the domain.
Explanation:
In a Nutanix environment, if the login process using an Active Directory (AD) user account takes more than a minute to complete, it could be due to the configuration of the AD lookups.
Active Directory lookups can be configured to use either Recursive or Non-Recursive mode. In Recursive mode, the system will look up each group that a user is a member of, then each group that those groups are members of, and so on. This can lead to a large number of lookups and potentially slow down the login process1.
On the other hand, in Non-Recursive mode, the system only looks up the direct groups that a user is a member of. This can significantly reduce the number of lookups and speed up the login process1.
Therefore, the administrator should confirm that Active Directory lookups are configured to use Non-Recursive mode to resolve this issue.
An administrator learns that some security settings in a cluster have been changed. The environment is out of compliance with required policies. Which function should be used to revert any settings that have changed from the defaults and prevent further violations?
A. Cluster Lockdown with strong password enforcement
B. Advanced Intrusion Detection Environment (AIDE)
C. Security Configuration Management Automation (SCMA)
D. Defense Information Systems Agency STIG enforcement
An administrator needs to expand a cluster based on AHV and running on Nutanix G5 hardware with a new Nutanix G7 system. The cluster is running AOS 5.10 but the operation fails when expanding the cluster. AOS is running on the new system. There are no issues discovering the node. Why is the operation failing?
A. AOS version running on G7 is older than the version on the cluster.
B. Foundation software has not been updated on the cluster.
C. G7 hardware cannot be added to a G5 cluster.
D. EVC needs to be configured before cluster expansion
A consultant is conducting a vSphere cluster deployment. As a part of operational tests, a vMotion operation is performed on a test VM, but fails with following error message:
The VMotion failed because the ESX hosts were not able to connect over the VMotion network. Please check your VMotion network settings and physical network configuration.
VMotion [184329483:1276605211167987] failed to create connection with remote host <10.10.16.14>: The ESX hosts failed to connect over the VMotion network Migration [184329483:1276605211167987] failed to connect to remote host <10.10.16.14>: Timeout
What issue could prevent the vMotion operation from completing successfully?
A. The vmknic is configured with a conflicting IP address.
B. NIOC is enabled and vMotion traffic is configured with Share value SO.
C. Foundation service prevents connectivity between the source and the destination TCP port 8000.
D. The vSS is configured with Route based on originating virtual port.
Explanation: The failure of the vMotion operation indicated by the error message could most plausibly be caused by: A. The vmknic (VMkernel network interface card) configured with a conflicting IP address. This conflict can prevent the ESXi hosts from establishing a connection over the VMotion network, as each host must have a unique IP address on the VMotion network to facilitate proper migration communications. Option B, involving NIOC settings, and option D, involving vSS configuration, could influence performance but are less likely to cause a complete failure to connect. Option C, related to the Foundation service, is not relevant to vMotion networking issues directly. References: VMware vSphere Networking Documentation, Nutanix Integration with VMware Environments.
A consultant has deployed a new Nutanix AHV cluster with Foundation. The customer requests separating the management and production traffic in the CVM. Which feature should the consultant configure?
A. Micro-segmentation
B. Multi-homing
C. Network Segmentation
D. VLAN Tagging
Explanation: To separate management and production traffic within a Nutanix AHV cluster, VLAN Tagging is the appropriate feature to configure. VLAN Tagging allows different types of traffic to be segregated onto different network segments over the same physical infrastructure, effectively isolating management traffic from production traffic at the network level. This setup enhances security and performance by reducing the possibility of network congestion affecting critical management operations.
What are the two most important prerequisites to be validated before the consultant goes onsite? (Choose two.)
A. Complete the kickoff call and validate the BOM (Bill of Materials).
B. Verify whether the servers have been racked by the customer.
C. Validate whether the cluster questionnaire is complete and if the physical switch configurations are complete.
D. Identify the point of contact who can provide networking details and switch port information after arriving onsite.
Which Nutanix tool does the Field Installation Guide provide instructions for?
A. Prism Central
B. Foundation
C. As-Built Generator
D. Nutanix Move
Explanation: The Nutanix Field Installation Guide primarily provides instructions for using Foundation. Foundation is the tool used for deploying, imaging, and configuring Nutanix nodes in a new installation or when expanding existing clusters. This tool is essential for setting up the Nutanix environment correctly and efficiently.
Which subnet is reserved for CVM internal switch traffic?
A. 192.168.5.0/24
B. 192.168.254.0/24
C. 10.100.5.0/30
D. 172.16.19.0/16
Explanation: The subnet 192.168.254.0/24 is commonly reserved for CVM (Controller Virtual Machine) internal switch traffic within Nutanix environments. This subnet is used internally by the CVMs for management and storage operations that are integral to the Nutanix infrastructure. Using a separate, reserved subnet helps to isolate management traffic from general network traffic, enhancing security and performance.
In a Nutanix cluster, a Protection Domain contains 50 entities that are replicated to a remote Single Node Replication Target.
The current schedule configuration is as follows:
• Repeat every 6 hours
• Local Retention Policy 1
• Remote Retention Policy 8
• Starting time 12 am
At 8 am on Monday, the administrator discovers that a protected VM is corrupted. The latest good state was Sunday 2 pm. The administrator needs to maintain current protection.
Which strategy should the administrator use to meet these requirements?
A. From the Remote site, activate the Protection Domain, then re-protect the entity.
B. From the Remote site, restore the VM from the local snapshot by selecting the correct snapshot
C. From the local site, retrieve the correct remote snapshot, then restore the VM locally.
D. From the local site, restore the VM from the local snapshot by selecting the correct snapshot.
A customer needs a 20-node cluster built. The consultant only has a 16-port flat network switch, and the customer is using VLAN tagging for the hosts and CVMs. How should the consultant create the cluster?
A. Set VLAN tags on all hosts and CVMs.
B. Create the Nutanix cluster manually.
C. Connect the cluster to the production network.
D. Create a separate four-node cluster.
Explanation: Given the constraint of a 16-port switch for a 20-node cluster, the consultant cannot physically connect all nodes to the network simultaneously. VLAN tagging allows multiple virtual networks to be carried over the same physical network. However, the challenge here is not about VLANs but the physical limitation of ports. The practical approach would be to manually create the cluster, potentially in stages, as the full network capacity required for all nodes is not available.
Page 8 out of 26 Pages |
Previous |