Topic 1: Main Questions
Which two capabilities does IPAM provide in a Nutanix networking configuration? (Choose two.)
A. Allows proxy server settings to be set up for a defined network
B. Allows AHV to assign IP addresses automatically to VMs using DHCP
C. Configures a VLAN with an IP subnet and assigns a group of IP addresses
D. Configures firewall rules to prevent or allow certain TCP/IP traffic
Which change can be made on a cluster with software-based Data-at-Rest Encryption enabled?
A. Disable encryption on the cluster
B. Deploy an additional Native KMS Server
C. Enable encryption for a VM
D. Change Native KMS to External KMS
An administrator wants to have a VM on an AHV cluster with access to multiple VLANs. What is the most efficient way to achieve this?
A. Update a vNIC on the VM to operate in trunked mode for all desired VLANs.
B. Use SFPs that allow the needed VLANs.
C. Use one vNIC per VLAN for the VM.
D. Create a network in AHV associated with all those VLANs on all hosts.
Which three cluster operations require an administrator to reclaim licenses?(Choose three)
A. Destroy a cluster.
B. Upgrade a cluster
C. Migrate a cluster
D. Remove a Node from a cluster
E. Move Nodes between clusters.
Which expected operations during node addition when the new node has a different AOS version?
A. The entire cluster is upgraded to the latest one-click release.
B. The node is added and a separate upgrade operation must be performed.
C. The addition fails and forces the administrator to image using standalone Foundation.
D. The node is automatically re-imaged using the software currently running in the cluster.
Page 11 out of 48 Pages |
Previous |