Where should an administrator unregister Prism Element from Prism Central?
Where should an administrator unregister Prism Element from Prism Central?A . From a Host SSH sessionB . From the Prism Central web consoleC . From the Prism Element web consoleD . From a CVM SSH sessionView AnswerAnswer: D
What is the effect?
A customer has a 4-node cluster running at 80% capacity. One node fails due to a motherboard issue. What is the effect?A . The cluster continues to run but in a degraded state.B . Zeus becomes available after 60 minutes.C . Zeus becomes unavailable for 30 minutes.D . The cluster...
Which three steps must the administrator take to increase throughput to the host?
An administrator logs in to Prism Element goes to the Network view, and sees the output shown in the exhibit. Which three steps must the administrator take to increase throughput to the host? (Choose three.)A . Connect the 10Gb interfaces to the physical switch.B . Change the bond mode to...
Which metrics should the administrator review in Prism Analysis Graphs?
An administrator is reviewing performance of a core banking system that routinely has 20,000 concurrent users. During, business hours, the CPU on the applications servers runs at close to 100%. The administrator needs to determine if there is a performance issue specific to the app servers, the database servers, or...
Which three configuration scenarios are valid for the deployment of Prism Central? (Choose three.)
Which three configuration scenarios are valid for the deployment of Prism Central? (Choose three.)A . Environments use Network Address Translation.B . Prism Elements and Prism Central art in different subnets.C . Environments do not have Internet access.D . Prism Elements and Prism Central have proxy configured.E . Environments use the...
What requires iSCSI initiator configuration in the guest OS to use Volumes?
What requires iSCSI initiator configuration in the guest OS to use Volumes?A . SQL Server Always On Availability GroupB . Microsoft Windows Failover ClusterC . Oracle RACD . Exchange DAGView AnswerAnswer: B
What occurs to the cluster and these VMs during an AHV upgrade?
A Nutanix cluster is equipped with four nodes. Four VMs on this cluster have been configured with a VM-VM anti-affinity policy and are each being hosted by a different node. What occurs to the cluster and these VMs during an AHV upgrade?A . One node hosts two VMs while the...
What is the likely cause of this problem?
A customer wants to isolate a group of VMs within their Nutanix environment for security reasons. The customer creates a VM with two NICs to act as a firewall and installs the appropriate software and certificates. However, no one from the outside can access the application. What is the likely...
Which method should be used to anonymize the log data sent to Nutanix Support?
An administrator is working with Nutanix Support and needs to provide logs for troubleshooting an issue. The cluster is located in a secure environment. Data such as IP addresses and VM names cannot be shared. Which method should be used to anonymize the log data sent to Nutanix Support? A)...
How should the administrator fix this issue?
The customer is seeing high memory utilization on a mission critical VM. Users report that the application is unavailable. The guest OS does not support hot add components. How should the administrator fix this issue?A . Access the CVM on the host that is running the VM: * Open acli...