A consultant has deployed a new Nutanix AHV cluster with Foundation. The customer requests separating the management and production traffic in the CVM. Which feature should the consultant configure?
A. Micro-segmentation
B. Multi-homing
C. Network Segmentation
D. VLAN Tagging
Explanation: To separate management and production traffic within a Nutanix AHV cluster, VLAN Tagging is the appropriate feature to configure. VLAN Tagging allows different types of traffic to be segregated onto different network segments over the same physical infrastructure, effectively isolating management traffic from production traffic at the network level. This setup enhances security and performance by reducing the possibility of network congestion affecting critical management operations.
What are the two most important prerequisites to be validated before the consultant goes onsite? (Choose two.)
A. Complete the kickoff call and validate the BOM (Bill of Materials).
B. Verify whether the servers have been racked by the customer.
C. Validate whether the cluster questionnaire is complete and if the physical switch configurations are complete.
D. Identify the point of contact who can provide networking details and switch port information after arriving onsite.
Which Nutanix tool does the Field Installation Guide provide instructions for?
A. Prism Central
B. Foundation
C. As-Built Generator
D. Nutanix Move
Explanation: The Nutanix Field Installation Guide primarily provides instructions for using Foundation. Foundation is the tool used for deploying, imaging, and configuring Nutanix nodes in a new installation or when expanding existing clusters. This tool is essential for setting up the Nutanix environment correctly and efficiently.
Which subnet is reserved for CVM internal switch traffic?
A. 192.168.5.0/24
B. 192.168.254.0/24
C. 10.100.5.0/30
D. 172.16.19.0/16
Explanation: The subnet 192.168.254.0/24 is commonly reserved for CVM (Controller Virtual Machine) internal switch traffic within Nutanix environments. This subnet is used internally by the CVMs for management and storage operations that are integral to the Nutanix infrastructure. Using a separate, reserved subnet helps to isolate management traffic from general network traffic, enhancing security and performance.
In a Nutanix cluster, a Protection Domain contains 50 entities that are replicated to a remote Single Node Replication Target.
The current schedule configuration is as follows:
• Repeat every 6 hours
• Local Retention Policy 1
• Remote Retention Policy 8
• Starting time 12 am
At 8 am on Monday, the administrator discovers that a protected VM is corrupted. The latest good state was Sunday 2 pm. The administrator needs to maintain current protection.
Which strategy should the administrator use to meet these requirements?
A. From the Remote site, activate the Protection Domain, then re-protect the entity.
B. From the Remote site, restore the VM from the local snapshot by selecting the correct snapshot
C. From the local site, retrieve the correct remote snapshot, then restore the VM locally.
D. From the local site, restore the VM from the local snapshot by selecting the correct snapshot.
Page 19 out of 61 Pages |
Previous |