An administrator using adark site deployment for LCMis attempting toupgrade to the latest BIOS.
After completing aninventory scan, the administrator doesnot see the expected BIOS versionavailable for upgrade.
What is the most likely reason the latest BIOS is not shown?
Correct Answer:B
In a dark site deployment, LCM does not automatically fetch updates from the internet. The administrator must manually upload compatibility bundles.
✑ Option B (The latest compatibility bundle has not been uploaded) is correct:
✑ Option A is incorrect:
✑ Option C is incorrect:
✑ Option D is incorrect:
References:
✑ Nutanix LCM GuideUsing Compatibility Bundles in Dark Sites
✑ Nutanix KBTroubleshooting Firmware Updates in Dark Site Deployments
Due toapplication requirements, an administrator needs to support amulticast configurationin anAHV cluster.
Which AHV feature can be used to optimize network traffic so that multicast traffic is only forwarded to the VMs that need to receive it?
Correct Answer:C
Multicast traffic can generate unnecessary overhead if it is not properly managed.IGMP Snooping (Option C)ensures thatmulticast packets are only sent to VMs that have requested them, rather than broadcasting to all VMs.
✑ Option C (IGMP Snooping) is correct:
✑ Option A (LACP) is incorrect:
✑ Option B (UDP) is incorrect:
✑ Option D (Network Segmentation) is incorrect:
References:
✑ Nutanix AHV Networking Guide Enabling IGMP Snooping
✑ Nutanix Bible Network Traffic Optimization in AHV
✑ Nutanix KB Best Practices for Multicast Traffic in AHV
A consultant is configuringsyslog monitoringand wants to receiveCRITICAL logsfrom the
Audit module.
Which severity level setting should be configured to get the desired output?
Correct Answer:B
Syslog severity levels follow a standard numerical system, wherelower numbers indicate higher severity.
✑ Option B (Severity Level 2) is correct:
✑ Options A (0), C (5), and D (7) are incorrect:
References:
✑ Nutanix Security GuideSyslog Integration and Severity Levels
✑ Nutanix KBConfiguring Syslog for Prism Central Audit Logs
An administrator noticeshigh CPU usage on a VMand wants to determine whether adding more vCPUswould improve performance.
Which two metrics should be analyzed to make this decision? (Choose two.)
Correct Answer:AB
When diagnosing CPU performance issues, CPU Ready Time and CPU Usage are the key indicators of whether more vCPUs are needed.
✑ Option A (VM CPU Ready Time) is correct:
✑ Option B (VM CPU Usage) is correct:
✑ Option C (Host CPU Usage) is incorrect:
✑ Option D (Host Memory Swap Out Rate) is incorrect:
References:
✑ Nutanix Prism Central GuideAnalyzing VM CPU Performance
✑ Nutanix KBUnderstanding CPU Ready Time and VM Performance
Refer to Exhibit:
An administrator sees the alert shown in the exhibit.
What should the administrator do to ensure the nutanix user can no longer SSH to a CVM using a password?
Correct Answer:C
Understanding the Exhibit & the Alert The alert states:
✑ "The cluster is using password-based SSH access for the CVM."
✑ "Password-based remote login is enabled on the cluster."
✑ "It is recommended to use key-based SSH access instead of password-based SSH access for better security."
This means that the nutanix user can log in to Controller VMs (CVMs) using a password, which is a security risk.
Corrective Action: Enabling Cluster Lockdown
(C) Enable Cluster Lockdown. (Correct Answer)
✑ Cluster Lockdown Mode restricts password-based SSH access and forces key- based authentication.
✑ This prevents users from logging into CVMs using passwords, enhancing cluster security.
✑ To enable Cluster Lockdown:
Evaluating the Other Answer Choices
(A) Rename the nutanix user. (Incorrect)
✑ The nutanix user is a built-in system account required for cluster operations.
✑ Renaming the user will not prevent SSH access via password.
(B) Block port 22 on the CVM firewall. (Incorrect)
✑ Blocking port 22 (SSH) will completely disable SSH access, including key-based authentication.
✑ This may break cluster management and troubleshooting operations.
(D) Delete the nutanix user. (Incorrect)
✑ The nutanix user is a critical system account required for cluster functionality.
✑ Deleting the account will cause serious issues with cluster management.
Multicloud Infrastructure References & Best Practices
✑ Nutanix Security Best Practices:
✑ Cluster Lockdown Benefits:
References:
✑ Nutanix Security Guide Enabling Cluster Lockdown for SSH Security
✑ Nutanix KB Securing SSH Access on Nutanix Clusters