Why has an anomaly been triggered?
Refer to exhibit: Why has an anomaly been triggered?A . Controller reached 2500 IOPS. B. Observed IOPS exceed normal values. C. Normal Controller behavior has increased. D. Observed values do not match predicted values.View AnswerAnswer: D Explanation: Nutanix anomaly detection is a feature that monitors seasonal trends for time-series data...
Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness?
Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness?A . Continuous Data Protection B. Copy-on-Write C. Split-mirror D. Redirect-On-WriteView AnswerAnswer: D
Which two settings should the administrator customize to meet this requirement?
An administrator wants to reduce the largest amount of alert emails received from Prism Central. Which two settings should the administrator customize to meet this requirement? (Choose two)A . Skip empty digest email B. Every Single Alert C. Dally Digest D. Email RecipientsView AnswerAnswer: C,D Explanation: According to the Nutanix...
Which component ensures uniform distribution of data throughout the cluster to eliminate hot spots and speed up rebuilds?
Which component ensures uniform distribution of data throughout the cluster to eliminate hot spots and speed up rebuilds?A . Cassandra B. Distributed Storage Fabric C. High Availability D. Acropolis App Mobility FabricView AnswerAnswer: A
What two options are available?
An administrator wants to expand the Failure Domain level of a cluster. What two options are available? (Choose two.)A . Node B. Data Center C. Block D. RackView AnswerAnswer: C,D
What are two impacts on the cluster?
An administrator responsible for a VDl environment needs to investigate reports of slow logins. The administrator finds that increasing the number of vCPUs from 2 to 4 will reduce the login times. Production workloads are consuming 75% of the host CPU on the cluster. The administrator increases the vCPU count...
What is the likely cause of this problem?
A customer wants to isolate a group of VMs within their Nutanix environment for security reasons. The customer creates a VM with two NICs to act as a firewall and installs the appropriate software and certificates. However, no one from the outside can access the application. What is the likely...
When a configuring a syslog server in Prism Central, what two pieces information are required? (Choose two.)
When a configuring a syslog server in Prism Central, what two pieces information are required? (Choose two.)A . HTTPS URL B. Encryption secret C. Transport protocol D. IP address/portView AnswerAnswer: C,D
How should the administrator meet this requirement?
An administrator needs to run a mixed Exchange and SQL workload with a guaranteed amount of container space for each application. How should the administrator meet this requirement?A . Create one container and set capacity reservation B. Create two containers and reserve space for containers C. Create one container and...
What are these vDisk copies called?
A vDisk is read by multiple VMs. The cluster creates immutable copies of the vDisk. What are these vDisk copies called?A . Disk Clones B. Golden Images C. Volume Groups D. Shadow ClonesView AnswerAnswer: D