You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" Nutanix Certified Associate 6.5 & 6.10 (NCA) Practice Test 8 "
0 of 60 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
Nutanix Certified Associate 6.5 & 6.10 (NCA)
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking on “View Answers” option. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Answered
Review
Question 1 of 60
1. Question
Which metric indicates that a node is nearing resource exhaustion?
Correct
High CPU ready time means VMs are waiting for CPU resources, indicating the node is oversubscribed and nearing resource exhaustion.
Incorrect
High CPU ready time means VMs are waiting for CPU resources, indicating the node is oversubscribed and nearing resource exhaustion.
Unattempted
High CPU ready time means VMs are waiting for CPU resources, indicating the node is oversubscribed and nearing resource exhaustion.
Question 2 of 60
2. Question
Which LCM operation updates the cluster management software?
Correct
AOS (Acropolis Operating System) updates include cluster management software, Prism services, and core Nutanix platform functionality.
Incorrect
AOS (Acropolis Operating System) updates include cluster management software, Prism services, and core Nutanix platform functionality.
Unattempted
AOS (Acropolis Operating System) updates include cluster management software, Prism services, and core Nutanix platform functionality.
Question 3 of 60
3. Question
What storage feature automatically reclaims space from deleted or overwritten data?
Correct
Garbage collection is a background process that identifies and reclaims storage space from deleted or overwritten data blocks.
Incorrect
Garbage collection is a background process that identifies and reclaims storage space from deleted or overwritten data blocks.
Unattempted
Garbage collection is a background process that identifies and reclaims storage space from deleted or overwritten data blocks.
Question 4 of 60
4. Question
What is the correct sequence to enable deduplication for maximum space savings?
Correct
First analyze data to estimate savings potential, enable deduplication on appropriate containers, configure scan schedules, and monitor actual savings.
Incorrect
First analyze data to estimate savings potential, enable deduplication on appropriate containers, configure scan schedules, and monitor actual savings.
Unattempted
First analyze data to estimate savings potential, enable deduplication on appropriate containers, configure scan schedules, and monitor actual savings.
Question 5 of 60
5. Question
What is the function of the Cerebro service in Nutanix clusters?
Correct
Cerebro manages data replication for protection domains, handling snapshot replication to remote sites for disaster recovery.
Incorrect
Cerebro manages data replication for protection domains, handling snapshot replication to remote sites for disaster recovery.
Unattempted
Cerebro manages data replication for protection domains, handling snapshot replication to remote sites for disaster recovery.
Question 6 of 60
6. Question
What is the minimum cluster size to implement both RF2 and RF3 containers?
Correct
RF3 requires minimum 5 nodes, so to support both RF2 and RF3 containers in the same cluster, you need at least 5 nodes.
Incorrect
RF3 requires minimum 5 nodes, so to support both RF2 and RF3 containers in the same cluster, you need at least 5 nodes.
Unattempted
RF3 requires minimum 5 nodes, so to support both RF2 and RF3 containers in the same cluster, you need at least 5 nodes.
Question 7 of 60
7. Question
You need to configure automatic VM restart after host failure. Which feature enables this?
Correct
HA (High Availability) automatically restarts VMs on surviving hosts when a host fails, ensuring minimal downtime for critical workloads.
Incorrect
HA (High Availability) automatically restarts VMs on surviving hosts when a host fails, ensuring minimal downtime for critical workloads.
Unattempted
HA (High Availability) automatically restarts VMs on surviving hosts when a host fails, ensuring minimal downtime for critical workloads.
Question 8 of 60
8. Question
Which network configuration is required for inter-CVM communication in a cluster?
Correct
CVMs must be on the same Layer 2 network segment to communicate directly for cluster operations and consensus mechanisms.
Incorrect
CVMs must be on the same Layer 2 network segment to communicate directly for cluster operations and consensus mechanisms.
Unattempted
CVMs must be on the same Layer 2 network segment to communicate directly for cluster operations and consensus mechanisms.
Question 9 of 60
9. Question
You need to reduce storage consumption urgently. What are the first two steps? (Select two)
Correct
Enabling compression and removing unnecessary snapshots are the quickest ways to reduce storage consumption without hardware additions.
Incorrect
Enabling compression and removing unnecessary snapshots are the quickest ways to reduce storage consumption without hardware additions.
Unattempted
Enabling compression and removing unnecessary snapshots are the quickest ways to reduce storage consumption without hardware additions.
Question 10 of 60
10. Question
Which network feature provides bandwidth control for VMs in AHV?
Correct
Quality of Service (QoS) policies allow administrators to set bandwidth limits and priorities for VMs to prevent resource contention.
Incorrect
Quality of Service (QoS) policies allow administrators to set bandwidth limits and priorities for VMs to prevent resource contention.
Unattempted
Quality of Service (QoS) policies allow administrators to set bandwidth limits and priorities for VMs to prevent resource contention.
Question 11 of 60
11. Question
Which storage optimization provides the best results for virtual desktop workloads?
Correct
Deduplication is highly effective for VDI environments where many desktops share identical OS and application data blocks.
Incorrect
Deduplication is highly effective for VDI environments where many desktops share identical OS and application data blocks.
Unattempted
Deduplication is highly effective for VDI environments where many desktops share identical OS and application data blocks.
Question 12 of 60
12. Question
Which command-line interface is specific to AHV and VM management?
Correct
acli (Acropolis CLI) is specifically designed for managing AHV hypervisor settings, VMs, networks, and storage in Nutanix environments.
Incorrect
acli (Acropolis CLI) is specifically designed for managing AHV hypervisor settings, VMs, networks, and storage in Nutanix environments.
Unattempted
acli (Acropolis CLI) is specifically designed for managing AHV hypervisor settings, VMs, networks, and storage in Nutanix environments.
Question 13 of 60
13. Question
Which license edition is required for Nutanix Flow network microsegmentation?
Correct
Flow network security and microsegmentation features are included only in the Ultimate edition license tier.
Incorrect
Flow network security and microsegmentation features are included only in the Ultimate edition license tier.
Unattempted
Flow network security and microsegmentation features are included only in the Ultimate edition license tier.
Question 14 of 60
14. Question
Which two network bond modes are supported in AHV? (Select two)
Correct
AHV supports Active-Backup for basic redundancy and LACP (Link Aggregation Control Protocol) for active load balancing across multiple links.
Incorrect
AHV supports Active-Backup for basic redundancy and LACP (Link Aggregation Control Protocol) for active load balancing across multiple links.
Unattempted
AHV supports Active-Backup for basic redundancy and LACP (Link Aggregation Control Protocol) for active load balancing across multiple links.
Question 15 of 60
15. Question
Which alert policy component defines the condition that triggers an alert?
Correct
The alert trigger defines the specific metric, threshold, or event condition that must occur for the alert to be generated.
Incorrect
The alert trigger defines the specific metric, threshold, or event condition that must occur for the alert to be generated.
Unattempted
The alert trigger defines the specific metric, threshold, or event condition that must occur for the alert to be generated.
Question 16 of 60
16. Question
Which hypervisor management interface is used for ESXi clusters?
Correct
ESXi clusters require vCenter Server for management, which integrates with Prism Element for unified infrastructure management.
Incorrect
ESXi clusters require vCenter Server for management, which integrates with Prism Element for unified infrastructure management.
Unattempted
ESXi clusters require vCenter Server for management, which integrates with Prism Element for unified infrastructure management.
Question 17 of 60
17. Question
What is the function of the Chronos service in Nutanix clusters?
Correct
Chronos is the job scheduler that manages and coordinates background tasks like snapshots, replication, and maintenance operations.
Incorrect
Chronos is the job scheduler that manages and coordinates background tasks like snapshots, replication, and maintenance operations.
Unattempted
Chronos is the job scheduler that manages and coordinates background tasks like snapshots, replication, and maintenance operations.
Question 18 of 60
18. Question
Which three components are monitored by NCC health checks? (Select three)
Correct
NCC checks hardware health, software versions, and configuration compliance but does not monitor guest OS within VMs.
Incorrect
NCC checks hardware health, software versions, and configuration compliance but does not monitor guest OS within VMs.
Unattempted
NCC checks hardware health, software versions, and configuration compliance but does not monitor guest OS within VMs.
Question 19 of 60
19. Question
What is the correct sequence to investigate high CVM memory usage?
Correct
First identify which CVM has high memory, check what processes are consuming memory, review service logs for errors, then take corrective action.
Incorrect
First identify which CVM has high memory, check what processes are consuming memory, review service logs for errors, then take corrective action.
Unattempted
First identify which CVM has high memory, check what processes are consuming memory, review service logs for errors, then take corrective action.
Question 20 of 60
20. Question
What is the correct sequence to configure syslog for centralized logging?
Correct
Navigate to Settings, access Syslog configuration, add remote syslog server details (IP, port, protocol), and test the connection.
Incorrect
Navigate to Settings, access Syslog configuration, add remote syslog server details (IP, port, protocol), and test the connection.
Unattempted
Navigate to Settings, access Syslog configuration, add remote syslog server details (IP, port, protocol), and test the connection.
Question 21 of 60
21. Question
You need to identify VMs with highest CPU ready time. What does this indicate?
Correct
High CPU ready time indicates VMs are waiting for CPU resources to become available, suggesting the host is oversubscribed.
Incorrect
High CPU ready time indicates VMs are waiting for CPU resources to become available, suggesting the host is oversubscribed.
Unattempted
High CPU ready time indicates VMs are waiting for CPU resources to become available, suggesting the host is oversubscribed.
Question 22 of 60
22. Question
Which three alerts warrant immediate investigation? (Select three)
Correct
Critical hardware failures, high capacity utilization, and node/CVM offline conditions require immediate investigation, while informational alerts do not.
Incorrect
Critical hardware failures, high capacity utilization, and node/CVM offline conditions require immediate investigation, while informational alerts do not.
Unattempted
Critical hardware failures, high capacity utilization, and node/CVM offline conditions require immediate investigation, while informational alerts do not.
Question 23 of 60
23. Question
What is the correct sequence to create a VM from scratch in AHV?
Correct
Start by creating the VM object, configure CPU and memory resources, attach virtual disks, and configure network adapters.
Incorrect
Start by creating the VM object, configure CPU and memory resources, attach virtual disks, and configure network adapters.
Unattempted
Start by creating the VM object, configure CPU and memory resources, attach virtual disks, and configure network adapters.
Question 24 of 60
24. Question
You receive an alert that a disk is predicted to fail. What should you do first?
Correct
Predictive disk failure alerts should be reported to support with the disk serial number so replacement can be coordinated before actual failure.
Incorrect
Predictive disk failure alerts should be reported to support with the disk serial number so replacement can be coordinated before actual failure.
Unattempted
Predictive disk failure alerts should be reported to support with the disk serial number so replacement can be coordinated before actual failure.
Question 25 of 60
25. Question
What is the correct sequence to troubleshoot slow VM boot times?
Correct
Start by checking storage latency during boot, verify the boot device configuration, analyze CPU and memory resources, and check network dependencies.
Incorrect
Start by checking storage latency during boot, verify the boot device configuration, analyze CPU and memory resources, and check network dependencies.
Unattempted
Start by checking storage latency during boot, verify the boot device configuration, analyze CPU and memory resources, and check network dependencies.
Question 26 of 60
26. Question
Which alert destination requires firewall configuration for UDP port 514?
Correct
Syslog uses UDP port 514 by default, requiring firewall rules to allow traffic from cluster to the syslog server.
Incorrect
Syslog uses UDP port 514 by default, requiring firewall rules to allow traffic from cluster to the syslog server.
Unattempted
Syslog uses UDP port 514 by default, requiring firewall rules to allow traffic from cluster to the syslog server.
Question 27 of 60
27. Question
Which alert configuration sends duplicate notifications every hour until resolved?
Correct
Alert reminder configuration allows repeated notifications at specified intervals until the alert is acknowledged or resolved.
Incorrect
Alert reminder configuration allows repeated notifications at specified intervals until the alert is acknowledged or resolved.
Unattempted
Alert reminder configuration allows repeated notifications at specified intervals until the alert is acknowledged or resolved.
Question 28 of 60
28. Question
You need to configure VM-to-VM anti-affinity rules. What is the purpose?
Correct
Anti-affinity rules ensure that specified VMs (like redundant application servers) run on different hosts for better availability.
Incorrect
Anti-affinity rules ensure that specified VMs (like redundant application servers) run on different hosts for better availability.
Unattempted
Anti-affinity rules ensure that specified VMs (like redundant application servers) run on different hosts for better availability.
Question 29 of 60
29. Question
Which LCM operation can be performed without scheduling downtime?
Correct
AOS updates use a rolling upgrade process where CVMs are updated one at a time, allowing the cluster to remain operational.
Incorrect
AOS updates use a rolling upgrade process where CVMs are updated one at a time, allowing the cluster to remain operational.
Unattempted
AOS updates use a rolling upgrade process where CVMs are updated one at a time, allowing the cluster to remain operational.
Question 30 of 60
30. Question
What is the correct sequence to upgrade LCM framework to the latest version?
Correct
Access LCM interface, verify current framework version, download the latest framework update, and install it before updating other components.
Incorrect
Access LCM interface, verify current framework version, download the latest framework update, and install it before updating other components.
Unattempted
Access LCM interface, verify current framework version, download the latest framework update, and install it before updating other components.
Question 31 of 60
31. Question
Which LCM inventory status indicates a component is behind the current release?
Correct
The “Outdated“ status in LCM inventory shows that the installed version is older than the currently available release version.
Incorrect
The “Outdated“ status in LCM inventory shows that the installed version is older than the currently available release version.
Unattempted
The “Outdated“ status in LCM inventory shows that the installed version is older than the currently available release version.
Question 32 of 60
32. Question
What storage configuration provides the highest capacity efficiency?
Correct
RF2 with Erasure Coding (EC-X) provides the best balance of data protection and capacity efficiency, reducing overhead from 50% to approximately 25-33%.
Incorrect
RF2 with Erasure Coding (EC-X) provides the best balance of data protection and capacity efficiency, reducing overhead from 50% to approximately 25-33%.
Unattempted
RF2 with Erasure Coding (EC-X) provides the best balance of data protection and capacity efficiency, reducing overhead from 50% to approximately 25-33%.
Question 33 of 60
33. Question
What is the purpose of the Genesis service in Nutanix clusters?
Correct
Genesis is the master service that bootstraps cluster formation, coordinates services, and manages cluster-wide operations and state.
Incorrect
Genesis is the master service that bootstraps cluster formation, coordinates services, and manages cluster-wide operations and state.
Unattempted
Genesis is the master service that bootstraps cluster formation, coordinates services, and manages cluster-wide operations and state.
Question 34 of 60
34. Question
You need to generate a cluster configuration report for audit purposes. What is the correct sequence?
Correct
Navigate to the Reports section, select configuration report type, choose which components to include, and generate the report for download.
Incorrect
Navigate to the Reports section, select configuration report type, choose which components to include, and generate the report for download.
Unattempted
Navigate to the Reports section, select configuration report type, choose which components to include, and generate the report for download.
Question 35 of 60
35. Question
What is the correct sequence to enable deduplication on a storage container?
Correct
Select the target container, enable the deduplication feature, configure when deduplication scans run, and monitor the results and capacity savings.
Incorrect
Select the target container, enable the deduplication feature, configure when deduplication scans run, and monitor the results and capacity savings.
Unattempted
Select the target container, enable the deduplication feature, configure when deduplication scans run, and monitor the results and capacity savings.
Question 36 of 60
36. Question
You need to determine which license features are active. Where do you check this?
Correct
License information including edition type and active features is found in Prism Settings under the Licensing section.
Incorrect
License information including edition type and active features is found in Prism Settings under the Licensing section.
Unattempted
License information including edition type and active features is found in Prism Settings under the Licensing section.
Question 37 of 60
37. Question
What storage efficiency feature converts RF2 data to a parity-based scheme?
Correct
Erasure Coding (EC-X) converts replicated data to a parity-based scheme, reducing storage overhead while maintaining data protection.
Incorrect
Erasure Coding (EC-X) converts replicated data to a parity-based scheme, reducing storage overhead while maintaining data protection.
Unattempted
Erasure Coding (EC-X) converts replicated data to a parity-based scheme, reducing storage overhead while maintaining data protection.
Question 38 of 60
38. Question
Which storage optimization technique is best for sequential workloads?
Correct
Compression is highly effective for sequential workloads as it processes data streams efficiently without the overhead of deduplication fingerprinting.
Incorrect
Compression is highly effective for sequential workloads as it processes data streams efficiently without the overhead of deduplication fingerprinting.
Unattempted
Compression is highly effective for sequential workloads as it processes data streams efficiently without the overhead of deduplication fingerprinting.
Question 39 of 60
39. Question
What is the purpose of the Pithos service in Nutanix clusters?
Correct
Pithos is the distributed storage fabric layer that manages vDisks, snapshots, and clones across the cluster.
Incorrect
Pithos is the distributed storage fabric layer that manages vDisks, snapshots, and clones across the cluster.
Unattempted
Pithos is the distributed storage fabric layer that manages vDisks, snapshots, and clones across the cluster.
Question 40 of 60
40. Question
Which alert configuration determines when notifications are sent?
Correct
Alert policies define the complete configuration including triggers, conditions, severity, and actions that determine when and how notifications are sent.
Incorrect
Alert policies define the complete configuration including triggers, conditions, severity, and actions that determine when and how notifications are sent.
Unattempted
Alert policies define the complete configuration including triggers, conditions, severity, and actions that determine when and how notifications are sent.
Question 41 of 60
41. Question
What is the function of the Cassandra service in Nutanix clusters?
Correct
Cassandra is a distributed database that stores cluster configuration, metadata, and state information across all CVMs in the cluster.
Incorrect
Cassandra is a distributed database that stores cluster configuration, metadata, and state information across all CVMs in the cluster.
Unattempted
Cassandra is a distributed database that stores cluster configuration, metadata, and state information across all CVMs in the cluster.
Question 42 of 60
42. Question
You need to check if a node can be safely removed. What should you verify?
Correct
Before removing a node, verify the cluster will maintain required capacity and replication factor to ensure data protection and performance.
Incorrect
Before removing a node, verify the cluster will maintain required capacity and replication factor to ensure data protection and performance.
Unattempted
Before removing a node, verify the cluster will maintain required capacity and replication factor to ensure data protection and performance.
Question 43 of 60
43. Question
What is the minimum number of SSDs required per node in a hybrid cluster?
Correct
A minimum of one SSD per node is required in hybrid configurations to provide the performance tier for hot data and metadata.
Incorrect
A minimum of one SSD per node is required in hybrid configurations to provide the performance tier for hot data and metadata.
Unattempted
A minimum of one SSD per node is required in hybrid configurations to provide the performance tier for hot data and metadata.
Question 44 of 60
44. Question
You need to migrate VMs from another hypervisor to AHV. Which tool should you use?
Correct
Nutanix Move is specifically designed to migrate VMs from various sources including VMware, Hyper-V, and AWS to Nutanix AHV.
Incorrect
Nutanix Move is specifically designed to migrate VMs from various sources including VMware, Hyper-V, and AWS to Nutanix AHV.
Unattempted
Nutanix Move is specifically designed to migrate VMs from various sources including VMware, Hyper-V, and AWS to Nutanix AHV.
Question 45 of 60
45. Question
What is the correct sequence to configure SNMP for alert monitoring?
Correct
Navigate to Settings, access SNMP configuration, add SNMP trap destination addresses, and test the configuration to verify connectivity.
Incorrect
Navigate to Settings, access SNMP configuration, add SNMP trap destination addresses, and test the configuration to verify connectivity.
Unattempted
Navigate to Settings, access SNMP configuration, add SNMP trap destination addresses, and test the configuration to verify connectivity.
Question 46 of 60
46. Question
Which LCM update method requires manual download of update packages?
Correct
Dark Site mode requires administrators to manually download update packages to a local repository for deployment in air-gapped environments.
Incorrect
Dark Site mode requires administrators to manually download update packages to a local repository for deployment in air-gapped environments.
Unattempted
Dark Site mode requires administrators to manually download update packages to a local repository for deployment in air-gapped environments.
Question 47 of 60
47. Question
Which alert severity requires acknowledgment before it is cleared?
Correct
Critical alerts typically require manual acknowledgment by administrators to ensure they have been reviewed and addressed.
Incorrect
Critical alerts typically require manual acknowledgment by administrators to ensure they have been reviewed and addressed.
Unattempted
Critical alerts typically require manual acknowledgment by administrators to ensure they have been reviewed and addressed.
Question 48 of 60
48. Question
What does the term “witness“ refer to in Nutanix stretched clusters?
Correct
A witness is a lightweight VM or physical server at a third site that provides quorum to prevent split-brain scenarios in stretched cluster configurations.
Incorrect
A witness is a lightweight VM or physical server at a third site that provides quorum to prevent split-brain scenarios in stretched cluster configurations.
Unattempted
A witness is a lightweight VM or physical server at a third site that provides quorum to prevent split-brain scenarios in stretched cluster configurations.
Question 49 of 60
49. Question
You receive a critical alert for CVM down. What is the immediate impact?
Correct
When a CVM is down, VMs on that node lose local storage I/O path and must access storage through other CVMs over the network until recovered.
Incorrect
When a CVM is down, VMs on that node lose local storage I/O path and must access storage through other CVMs over the network until recovered.
Unattempted
When a CVM is down, VMs on that node lose local storage I/O path and must access storage through other CVMs over the network until recovered.
Question 50 of 60
50. Question
Which three services run on the Controller VM? (Select three)
Correct
Stargate, Curator, and Prism are core CVM services, while VMkernel is a hypervisor component that runs on ESXi hosts, not CVMs.
Incorrect
Stargate, Curator, and Prism are core CVM services, while VMkernel is a hypervisor component that runs on ESXi hosts, not CVMs.
Unattempted
Stargate, Curator, and Prism are core CVM services, while VMkernel is a hypervisor component that runs on ESXi hosts, not CVMs.
Question 51 of 60
51. Question
Which hypervisor feature allows hot-add of CPU and memory to VMs?
Correct
Both VMware ESXi and AHV support hot-add capabilities for CPU and memory, though it must be enabled in VM configuration before use.
Incorrect
Both VMware ESXi and AHV support hot-add capabilities for CPU and memory, though it must be enabled in VM configuration before use.
Unattempted
Both VMware ESXi and AHV support hot-add capabilities for CPU and memory, though it must be enabled in VM configuration before use.
Question 52 of 60
52. Question
What is the correct sequence to expand a storage container capacity?
Correct
Select the target container, view its properties, increase the capacity limit or mark it unlimited, and apply the changes.
Incorrect
Select the target container, view its properties, increase the capacity limit or mark it unlimited, and apply the changes.
Unattempted
Select the target container, view its properties, increase the capacity limit or mark it unlimited, and apply the changes.
Question 53 of 60
53. Question
You receive a capacity warning for a storage container. What is the first action?
Correct
First investigate what is consuming space in the container (large VMs, snapshots, etc.) before taking corrective action.
Incorrect
First investigate what is consuming space in the container (large VMs, snapshots, etc.) before taking corrective action.
Unattempted
First investigate what is consuming space in the container (large VMs, snapshots, etc.) before taking corrective action.
Question 54 of 60
54. Question
What is the correct sequence to perform VM disaster recovery from remote site?
Correct
Select the desired recovery point snapshot, activate the protection domain at the recovery site, power on recovered VMs, and test connectivity.
Incorrect
Select the desired recovery point snapshot, activate the protection domain at the recovery site, power on recovered VMs, and test connectivity.
Unattempted
Select the desired recovery point snapshot, activate the protection domain at the recovery site, power on recovered VMs, and test connectivity.
Question 55 of 60
55. Question
Which LCM status indicates updates have been downloaded but not applied?
Correct
The “Staged“ status shows that update packages have been downloaded and pre-checked but not yet applied to the cluster.
Incorrect
The “Staged“ status shows that update packages have been downloaded and pre-checked but not yet applied to the cluster.
Unattempted
The “Staged“ status shows that update packages have been downloaded and pre-checked but not yet applied to the cluster.
Question 56 of 60
56. Question
Which two factors determine Shadow Clone effectiveness? (Select two)
Correct
Shadow Clones are most effective when many VMs frequently read the same data blocks, creating opportunity for shared read cache.
Incorrect
Shadow Clones are most effective when many VMs frequently read the same data blocks, creating opportunity for shared read cache.
Unattempted
Shadow Clones are most effective when many VMs frequently read the same data blocks, creating opportunity for shared read cache.
Question 57 of 60
57. Question
You need to check which nodes are running outdated AOS versions. Where do you look?
Correct
The LCM inventory view displays the AOS version running on each node, making it easy to identify outdated nodes.
Incorrect
The LCM inventory view displays the AOS version running on each node, making it easy to identify outdated nodes.
Unattempted
The LCM inventory view displays the AOS version running on each node, making it easy to identify outdated nodes.
Question 58 of 60
58. Question
What is the function of the Arithmos service in Nutanix clusters?
Correct
Arithmos is the statistics aggregation service that collects, processes, and stores performance metrics and statistics from across the cluster.
Incorrect
Arithmos is the statistics aggregation service that collects, processes, and stores performance metrics and statistics from across the cluster.
Unattempted
Arithmos is the statistics aggregation service that collects, processes, and stores performance metrics and statistics from across the cluster.
Question 59 of 60
59. Question
You cannot connect to a VM via network. What is the first troubleshooting step?
Correct
First verify the basic VM network adapter configuration in Prism, ensuring it‘s connected to the correct network and enabled.
Incorrect
First verify the basic VM network adapter configuration in Prism, ensuring it‘s connected to the correct network and enabled.
Unattempted
First verify the basic VM network adapter configuration in Prism, ensuring it‘s connected to the correct network and enabled.
Question 60 of 60
60. Question
What happens when you enable compression on an existing storage container?
Correct
When compression is enabled, new writes are compressed immediately, while existing data is compressed gradually by the Curator background process.
Incorrect
When compression is enabled, new writes are compressed immediately, while existing data is compressed gradually by the Curator background process.
Unattempted
When compression is enabled, new writes are compressed immediately, while existing data is compressed gradually by the Curator background process.
X
Use Page numbers below to navigate to other practice tests