In a Nutanix cluster, a Protection Domain contains 50 entities that are replicated to a remote Single Node Replication Target. The current schedule configuration is as follows: Repeat every 6 hours Local Retention Policy 1 Remote Retention Policy 8 Starting time 12 am
At 8 am on Monday, the administrator discovers that a protected VM is corrupted. The latest good state was Sunday 2 pm. The administrator needs to maintain current protection.
Which strategy should the administrator use to meet these requirements?
A. From the Remote site, activate the Protection Domain, then re-protect the entity.
B. From the Remote site, restore the VM from the local snapshot by selecting the correct snapshot.
C. From the local site, retrieve the correct remote snapshot, then restore the VM locally.
D. From the local site, restore the VM from the local snapshot by selecting the correct snapshot.
An administrator learns that some security settings in a cluster have been changed. The environment is out of compliance with required policies.
Which function should be used to revert any settings that have changed from the defaults and prevent further violations?
A. Cluster Lockdown with strong password enforcement
B. Advanced Intrusion Detection Environment (AIDE)
C. Security Configuration Management Automation (SCMA)
D. Defense Information Systems Agency STIG enforcement
An administrator is deploying an application using Nutanix Volumes. After configuring the volume group and connecting the guest's iSCSI initiator to the volume group, they begin performance testing. The administrator learns that performance on the virtual disk attached to the iSCSI initiator is far less than that of a virtual disk connected directly to the VM.
Which situation is causing this condition?
A. The VM's iSCSI traffic is being routed to the data services IP subnet
B. The performance test is generating small block random 10
C. The duster data services IP address is a bottleneck, shared with other iSCSI traffic
D. Data Locality ensures that VM attached disks are always faster than iSCSI volumes
A customer has a Nutanix cluster with 10Gb connectivity via switch fabric extenders. The administrator receives NCC health check errors of latency greater than 200ms. Which action should the administrator take to resolve the NCC errors?
A. Replace the switch fabric extenders with 10G line rate switches
B. Upgrade NCC and increase the CVM memory by 4Gb
C. Add 2 additional 10G uplinks from the switch fabric extenders per node
D. Upgrade NCC and increase the vCPU of the CVM
An administrator receives an alert in Prism indicating that interface eth2, on an AHV host is receiving many CRC errors. After togging into the problematic host, the following command is run to show the indicated output:
What is causing this issue?
A. Incorrect link speeds on the switch
B. The interface is incorrectly configured with Jumbo Frames
C. A misconfigured bond
D. A physical layer network problem
Refer to the exhibit.
An administrator configures Active Directory authentication as shown in the exhibit. Upon finishing setup, users are not able to log in. What configuration change should be made to fix this issue?
A. Change leaps to https
B. Change the Directory URL to use an IP rather than a name
C. Change the plct from 389 to 636
D. Change the Domain to use an IP rather than a name
An administrator has a VM that consumes large amounts of storage and has the following characteristics: Create large / sequential writes Data must be kept for years Data is normally only accessed at the end of the year to run report
The administrator decides to use Erasure Coding to save space.
Which feature should the administrator utilize to save space for this VM?
A. Inline Compression
B. Flash Mode
C. Cache Dedup
D. Post-Process Compression
A customer has Metro Availability configured in Automatic Resume Mode between Site A and Site B.
What happens to VMs if Primary Site A has full network failure?
A. Automatic protection domain promotion in Site B. VMs automatically restart in Site
B. VMs continue to run on Site A following an automatic disable of protection domains.
C. An administrator must unwitness in Site B and promote protection domains in Site B for VMs to restart
D. An administrator must promote protection domains in Site B for VMs to restart.
A customer has NearSync configured. When the administrator tries to restore a snapshot from 3 minutes ago, it is not available. The snapshots are happening at 15-minute intervals instead of at the 5-minute configured interval. When the protection domain was initially set up, the snapshots were happening at the expected 5-minute interval.
What should the customer do to enable the snapshots to happen at the expected interval?
A. Utilize Metro Availability to meet this requirement
B. Change the protection domain to use Async DR
C. Fix a connectivity issue because the protection domain reverted to Async
D. Configure the protection domain to take snapshots on 15-minute intervals
An administrator is updating disk firmware using LCM and receives the following message:
"There have been 10 or more cluster services restarts within 15 minutes in the Controller VM."
The message appears as each drive is upgraded.
What is the reason this message is being generated?
A. A node has been rebalanced
B. A drive has been reformatted
C. A node has been rebooted
D. A drive has been rejected