An administrator is tasked with protection of a business critical application. The application is running on a Linux VM and is using a custom DB that require application consistent snapshots for data integrity.
An administrator has written a pre_freeze and post_thaw scripts and placed them under /usr/local/sbin/.
During protection domain scheduled run an alert is generated:
Execution of the PostThaw Script Failed
Which two resolution steps could an administrator conduct to fix the issue? (Choose two.)
An administrator attempted toenable Data-in-Transit Encryptionon aScale-Out Prism Central clustertoencrypt service-level traffic between nodes. However, the featuredid not work correctly due to a firewall restriction.
Which CVM-specific port should be allowed through the firewall for Data-in-Transit Encryption?
What guest customization options are available when creating a VM template?
Which configuration option allows a VM to be powered on before the rest of the VMs when starting a host?
Refer to the Exhibit:
An administrator needs to create two virtual machines: VM4 and VM5 that leverage the memory over-commit feature.
Once VM4 is created and running, the administrator notices that it uses only 28GB of RAM.
What will be the maximum RAM that can be allocated to VM5 so that it can be powered on?
An administrator needs to calculate baseline Capacity Runway on a newly registered AHV cluster. The cluster has been operating for 16 days, but no runway projections appear.
Why are no Capacity Runway projections being displayed?
An administrator wants to enable application discovery on a Nutanix cluster to monitor applications.
An X-Large Prism Central instance is already configured and meets the licensing, CPU, and memory requirements.
Which two other prerequisites must be met before enabling application discovery? (Choose two.)
An administrator is configuring Protection Policies to replicate VMs to a new Nutanix Cloud Cluster (NC2) connected via the Internet.
To comply with an organizational security policy, data sent via the Internet must be encrypted.
Which feature should be taken into account to be compliant?
Which Nutanix feature helps optimize storage space by removing duplicate blocks of data?
An administrator has been tasked by the company's leadership to justify and explain the decision to utilize the new Nutanix Disaster Recovery solution.
The environment contains:
• 100 workloads
• Workloads have varying boot orders
• Workloads span multiple subnets
• Workloads span across different business units
How should the administrator most efficiently organize and manage the workloads?
|
PDF + Testing Engine
|
|---|
|
$49.5 |
|
Testing Engine
|
|---|
|
$37.5 |
|
PDF (Q&A)
|
|---|
|
$31.5 |
Nutanix Free Exams |
|---|
|