Refer to the exhibit.
After configuring modules for a Remote Syslog Server, the settings are as shown. The administrator notices that even though the level parameter is set to EMERGENCY, that all monitor logs are being sent.
What is the likely cause of this issue?
Answer : A
An administrator has been tasked with increasing security on a Nutanix cluster by disabling password authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH.
What is the easiest way for the administrator to meet these needs?
Answer : C
In the event of a disk failure, which process will immediately and automatically scan Cassandra to find all data previously hosted on the failed disk, and all disks in that node?
Answer : D
An administrator needs to limit the amount of storage space that data stored in single container can consume.
Which action should the administrator take?
Answer : D
Refer to the exhibit.
An administrator is trying to implement the solution that is shown in the exhibit, but has been unsuccessful.
Based on the diagram, what is causing the issue?
Answer : B
An administrator was reviewing various AOS logs when it was noticed that the time of the logs was off by several hours.
Which initial step was missed during the post process cluster configuration?
Answer : A
Which AOS process determines if an I/O from a user VM will be written to OpLog or to an Extent Store?
Answer : B
When configuring a syslog server in Prism Central, what two pieces of information are required? (Choose two.)
Answer : BC
An administrator needs to create a new Linux image and will need to do the following as part of the VM deployment:
Set the OS hostname -
Add custom users -
Add keys -
Run custom scripts -
What package needs to be installed in the Linux image to facilitate this automation?
Answer : A
An administrator manages an AHV cluster that is dedicated to a dev/test environment. The administrator is receiving complaints from users that they are unable to create new VMs on the cluster.
After reviewing the cluster, the administrator finds that the memory resources are almost fully utilized, with many VMs over-provisioned on memory.
What option is the most efficient resolution to enable additional VMs to be created?
Answer : C
A user running a Computer Aided Design (CAD) application is complaining about slow response time within the VM, particularly when moving windows or rendering images.
Which VM metric will guide the administrator toward diagnosing the problem?
Answer : D
A newly hired Nutanix administrator was tasked by the CIO to create a single VM on a test network. The network administrator stated that a native VLAN was used on the Cisco TOR switches with the following parameters:
IP address: 172.16.1.2 -
Network Mask: 258.255.252.0 -
Default gateway: 172.16.1.1 -
VLAN: 1 -
The same parameters were used to create a network profile on Nutanix, but when the VM was created, it had no L3 connectivity.
What should the Nutanix administrator do to fix this issue?
Answer : B
An administrator needs to configure a new subnet on an AHV cluster and wants to ensure that VMs will automatically be assigned an IP address at creation time.
Which type of network does the administrator need to create?
Answer : C
A recently configured cluster is leveraging NearSync with a recovery schedule of 15 minutes. It is noticed that the cluster is consistently transitioning in and out of NearSync.
What action should be taken to potentially address this issue?
Answer : B
After configuring Active Directory as the desired authentication service, an administrator is not able to login into Prism Central using a privileged account.
Which configuration must be checked first?
Answer : A