An administrator is deploying an application that requires maximum I/O throughput for scratch data. The administrator is concerned that the throughput requirement is greater than what can be provided by a single cluster node. What should the administrator do to meet this requirement?
A. Create a volume group with several virtual disks and attach to the VM
B. Create a volume group with one virtual disk attached to the VM
C. Create a virtual disk attached to the VM's PCI interface
D. Create several virtual disks attached to the VM's virtual SCSI controller
An administrator has two clusters: Site A and Site B. Async DR is configured between the clusters as follows: Site A is the Primary Site
Site B is the Secondary inactive Site, no VMs running Site A is fully in Production Site B used as Backup/Disaster Recovery
The customer wants to perform a planned failover between the sites. How should the administrator accomplish this?
A. Click Activate on the Secondary site within the Data Protection Dashboard
B. Click Activate on the Secondary site and run deactive NCLI command on Primary site
C. Choose Migrate on the Secondary site within the Data Protection Dashboard
D. Choose Migrate on the Primary site within the Data Protection Dashboard
For several days, an administrator notices the following alerts:
CVM NIC Speed Low Warning Alerts Warning Alerts of CVM NIC not performing at optimal speed CVM is disconnected from the network Critical Alert Network Visualization page shows excessive dropped packets on CVM/Host
Which steps should be taken to determine which problem should be addressed first?
A. Access the Hardware Page to verify resources are available Analyze ail CVM Speed Alerts in the Alerts/Events page Analyze output for the network and interface properties and connectivity issues
B. Verify Host/CVM connectivity on the Network Visualization page Use to verify the bridge and bond configuration Review alerts/events page for the CVM disconnected error
C. Review Alerts page for NIC speed alerts and alert timing Analyze the genesis.out log file for process failures
Assess the NIC properties in the Network Visualization>; Host Properties page
D. Restart networking services on the CVM Determine the current configuration of the affected CVM via output Access the Alerts/Events page for the CVM network connection failures
An administrator knows that the disks in a cluster are out of date and a new firmware is available. For security reasons, these clusters do not have access to the Internet. Which two steps must be completed to update the firmware? (Choose two.)
A. Configure LCM with a URL to access the firmware bundle.
B. Download a dark site bundle and stage it on an internal webserver.
C. Download the updated firmware .tgz file from the Nutanix portal.
D. Select Upgrade Software, then select disks and upload the updated firmware.
A three-node cluster has a Nutanix Files instance with three FSVMs. What happens after a node failure?
A. The affected FSVM will get live-migrated to another node.
B. The affected FSVM will not be restarted on another node due to its agent VM setting.
C. The affected FSVM will not be restarted on another node due to its VM-to-VM anti- affinity settings.
D. The affected FSVM will be restarted on another node.
An administrator is managing multiple Windows and Linux VMs connected to Nutanix Volumes. The Linux VMs are experiencing intermittent connectivity issues. The Windows VMs do not experience the same issue. Which option should the administrator use to resolve this issue?
A. Utilize Jumbo Frames
B. Add additional disks to the Volume Group
C. Set the SCSI timeout value to 60
D. Utilize a separate subnet for the Linux VMs
An administrator is deploying a three-tier application on a Nutanix Enterprise Cloud consisting of web, application, and database VMs. Traffic between the servers must be limited to specific services/ports. There is an application layer firewall VM deployed on one host in the cluster.
In which way should the administrator meet this requirement?
A. Create a network for each type of VM, and use policy-based routing to control the traffic flow
B. Configure a security policy and service chain redirecting the server traffic through the firewall
C. Separate the web. application and database VMs on to dedicated VLANs
D. Categorize the VMs in Prism Central and utilize Flow to set a security policy
Refer to the exhibit.
A Microsoft SQL 2016 deployment is shown in the exhibit. The administrator receives user reports that database queries take too long to return. Which optimization should be made to this configuration to improve performance?
A. Combine both of the OS and SQL Binaries disks
B. Add a second SCSI controller for the Database.
C. TempDB, and Logs disk Separate the Database. TempDB, and Logs onto their own disks
D. Configure the VM to use a PCI disk controller
A VM does not have enough resources for the demand, which leads to performance bottlenecks. The VM is exhibiting one or more of following baseline values, based on the past 30 days:
CPU usage>; 90% (moderate), 95% (high)
CPU ready time>; 5%, 10%
Memory usage>; 90%, 95%
Memory swap rate>; 0 Kbps (no moderate value)
Which type of VM is being described?
A. Constrained VM
B. Bully VM
C. Inactive VM
D. Over-provisioned VM
A customer wants to run SAP HANA on a Nutanix cluster with the following characteristics:
AHV nodes SAP HANA version 2 Production database files
Which configuration should be recommended to the customer?
A. Start with a cluster containing three or more nodes
B. Enable only compression for the container that contains the Production database
C. Do not enable compression, deduplication. or erasure coding on the storage container
D. Plate the SAP HANA Database on the same socket as CVM