HOTSPOT
Async DR is configured between two sites. A network outage occurs at the primary site.
Which steps must the administrator perform to bring the VMs back into service at the backup site?
Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements. Not all procedures are valid. Identify any invalid procedures using the drop-down option.
Solution:
Does this meet the goal?
Correct Answer:A
Which two types of granular RBAC does Nutanix provide for AHV hosts? (Choose two.)
Correct Answer:AD
Nutanix provides two types of granular RBAC for AHV hosts: category based and cluster based3. Category based RBAC allows administrators to assign roles to users or groups based on categories, which are key-value pairs that can be applied to various entities in Prism Central, such as clusters, hosts, VMs, images, and networks. Categories can be used to group entities by different criteria, such as department, project, environment, or location. For example, an administrator can create a category key named Department and assign different values to it, such as Finance, Marketing, or Engineering. Then, the administrator can apply this category to different clusters or hosts and assign roles to users or groups based on this category. This way, users or groups can have different levels of access to different clusters or hosts depending on their department4. Cluster based RBAC allows administrators to assign roles to users or groups based on specific clusters registered in Prism Central. For example, an administrator can create a role named Cluster Admin and assign it to a user or group for a particular cluster. This way, the user or group can have full access to that cluster and its hosts and VMs, but not to other clusters5.
Reference: Role-Based Access Control
https://portal.nutanix.com/page/documents/details?targetId=Nutanix-Security-Guide-v6_7:sec-cluster-rbac-pc-c.html
An administrator has been notified by a user that a Microsoft SQL Server instance is not performing well.
When reviewing the utilization metrics, the following concerns are noted: Memory consumption has been above 95% for several months
Memory consumption has been spiking to 100% for the last five days Storage latency is 2ms.
When logging into Prism Central, how could the administrator quickly verify if this VM has performance bottlenecks?
Correct Answer:B
This will allow the administrator to quickly identify VMs that are overprovisioned or underutilized based on their performance metrics. https://www.nutanix.com/support-services/training-certification/certifications/certification- details-nutanix-certified-professional-multicloud-infrastructure-6_5
What does Nutanix recommend when setting up the node networkring?
Correct Answer:B
A bond is a logical interface that combines two or more physical interfaces on an AHV host. A bond provides high availability and load balancing for the network traffic of the host and its VMs. A bond can have different modes that determine how the traffic is distributed and how the bond handles failures of the physical interfaces. The most common bond modes are active-backup, active-active, and LACP1.
Nutanix recommends including at least two physical interfaces in every bond to ensure high availability and redundancy. If one of the physical interfaces fails or is disconnected, the other interface can take over the traffic without affecting the connectivity of the host or its VMs. Having at least two physical interfaces in a bond also allows for maintenance operations such as firmware upgrades or cable replacements without downtime2.
Nutanix does not recommend including NIC models from different vendors in the same bond, as this may cause compatibility issues or performance degradation. Nutanix also does not recommend using only one physical interface in a bond, as this provides no redundancy or load balancing benefits3.
Reference: Nutanix AHV Networking Best Practices
After the initial configuration and upgrade of NCC, the administrator notices these critical alerts:
. IPMI 10.7.133.33 is using default password
. Host 10.7.133.25 is using default password
. CVM 10.7.133.31 is using default password
Which two initial cluster configuration tasks were missed during the deployment process? (Choose two.)
Correct Answer:AC
The critical alerts listed are indicating that the default passwords are still in use for IPMI, the host, and the Controller Virtual Machine (CVM). This suggests that the passwords for these components were not changed from the default during the initial cluster configuration and deployment process, which is a critical security practice.
* A. CVM password changes: The alert for the CVM using the default password indicates that the CVM password has not been changed. It is a standard security measure to change
default passwords to prevent unauthorized access.
* C. Host password changes: Similarly, the alert for the host using the default password indicates that the default password for the host has not been updated. This applies to the passwords used to access the hypervisor host directly.
Changing default passwords is a critical step in securing the Nutanix environment. This is highlighted in Nutanix's best practices and security guidelines, which recommend changing default passwords as part of the initial configuration to ensure that the environment is not left vulnerable to unauthorized access due to known default credentials. This process is typically part of the initial setup procedures outlined in the Nutanix documentation for cluster deployment and security configuration.
The IPMI alert also points to the need for changing default passwords, but since IPMI (Intelligent Platform Management Interface) is not specifically mentioned in the provided options, it falls under the broader category of host-level password changes, which would be covered by option C.
BIOS password changes (Option B) and Password policy changes (Option D) are also important but were not directly flagged by the alerts mentioned. BIOS password changes are usually a separate task and not indicated by the alerts given, while password policy changes are related to the policies governing password complexity and rotation rather than the initial password setup.