10/233 questions · Unlock full access
Q1

A consultant is deploying a new four-node Nutanix cluster with AHV for a retail client. During the Foundation process, three nodes are successfully imaged, but the fourth node remains stuck in the discovery phase. The consultant confirms physical network connectivity and that the switch ports are configured identically. IPMI access to the problematic node via its web interface is successful from the consultant's laptop on the same VLAN. Which is the most likely reason Foundation cannot discover the node?

Q2Multiple answers

A financial services client requires a new Nutanix Files deployment for their analytics department. The solution must support both SMB shares for Windows-based data ingestion tools and NFSv4 exports for a Linux-based processing farm. A key requirement is that user permissions must be consistent regardless of the protocol used to access the data. Which configuration steps are necessary to meet these requirements? (Select TWO)

Q3

True or False: When a Nutanix cluster with Data-at-Rest Encryption (DaRE) enabled is expanded with new nodes, the new nodes will automatically encrypt their local drives and join the encrypted cluster without requiring manual intervention, provided they are imaged with a compatible AOS version.

Q4

A hospital's IT department is running a critical EMR application on a Nutanix cluster. Administrators report that during nightly batch processing, which is read-intensive, the application performance degrades significantly. Analysis in Prism shows high read latency on the CVMs, but CPU and memory utilization remain normal. The cluster is configured with RF2 and consists of hybrid nodes (SSD and HDD). Which action should a consultant recommend to provide the most immediate and targeted improvement for this workload?

Q5

A system administrator is configuring a Protection Domain for a group of VMs that host a multi-tier application. The business requires a Recovery Point Objective (RPO) of 15 minutes. To achieve this, the administrator plans to use NearSync replication. What is a primary prerequisite for configuring NearSync replication between two Nutanix clusters?

Q6

During a kick-off call for a new cluster installation, a customer states their security policy mandates that all infrastructure management traffic, including hypervisor and CVM communication, must be on a tagged VLAN. How does this requirement affect the configuration of the physical switch ports connected to the Nutanix nodes?

Q7

A consultant is performing a Nutanix Cluster Check (NCC) health check after a deployment. The check `cvm_memory_usage_check` returns a FAIL status for multiple CVMs. The cluster is running only a few test VMs, and overall resource usage is low. What is the most appropriate first step to investigate this failure?

Q8

An administrator needs to perform a firmware upgrade on the SATADOMs in a Nutanix cluster. To minimize disruption, they plan to use the one-click upgrade process available in the LCM inventory. What is a key prerequisite for the LCM process to perform this type of firmware upgrade?

Q9

A consultant is designing a networking solution for a new AHV cluster that will host a high-traffic e-commerce application. The customer wants to maximize network throughput for VMs and ensure redundancy. They have two 25GbE ports per node connected to a pair of top-of-rack switches. Which bond mode provides active-active load balancing based on the source and destination IP and port, and is recommended for this use case?

Q10

**Case Study** A regional bank is deploying a new Nutanix environment to modernize its core banking application. The environment consists of two sites: a primary production site (Site A) and a disaster recovery site (Site B), connected by a 1 Gbps WAN link with an average latency of 25ms. The production cluster at Site A is an all-flash AF8 system. The DR cluster at Site B is a hybrid HY-6 system. The core banking application consists of 15 VMs with a total of 10 TB of data. The business has mandated a Recovery Point Objective (RPO) of 1 hour and a Recovery Time Objective (RTO) of 4 hours for the entire application. The bank's security team requires that all data replicated between sites must be encrypted in-transit. The network team has informed the consultant that there is significant network congestion on the WAN link during business hours (9 AM - 5 PM). Given these requirements and constraints, which data protection strategy should the consultant implement?