An administrator is deploying an application using Nutanix Volumes. After configuring the volume group and connecting the guest's iSCSI initiator to the volume group, they begin performance testing. The administrator learns that performance on the virtual disk attached to the iSCSI initiator is far less than that of a virtual disk connected directly to the VM.
Which situation is causing this condition?
A. The VM's iSCSI traffic is being routed to the data services IP subnet
B. The performance test is generating small block random 10
C. The duster data services IP address is a bottleneck, shared with other iSCSI traffic
D. Data Locality ensures that VM attached disks are always faster than iSCSI volumes
A systems administrator needs to add more VMs to their Nutanix cluster. Which two actions should the administrator perform to determine if the current cluster could accommodate the new VMs? (Choose two.)
A. Perform an Inventory with Life Cycle Management.
B. Determine utilization with Cluster Runway.
C. Enable Deduplication and Erasure Coding.
D. Utilize Optimize Resources for VM efficiency.
An administrator has two clusters: Site A and Site B. Async DR is configured between the clusters as follows: Site A is the Primary Site Site B is the Secondary inactive Site, no VMs running Site A is fully in Production Site B used as Backup/Disaster Recovery
The customer wants to perform a planned failover between the sites. How should the administrator accomplish this?
A. Click Activate on the Secondary site within the Data Protection Dashboard
B. Click Activate on the Secondary site and run deactive NCLI command on Primary site
C. Choose Migrate on the Secondary site within the Data Protection Dashboard
D. Choose Migrate on the Primary site within the Data Protection Dashboard
A customer with a four-node RF2 cluster is adding application VMs to their system. After adding these Vms, the Prism dashboard shows 81% storage utilization.
What is the consequence of running the cluster at 81% storage utilization?
A. The customer has the ability to add more VMs up to the 100% storage utilization.
B. There is available capacity in the storage fabric and the cluster is resilient.
C. Node failure is imminent due to storage utilization.
D. The cluster is not resilient in the storage fabric
An administrator learns that some security settings in a cluster have been changed. The environment is out of compliance with required policies.
Which function should be used to revert any settings that have changed from the defaults and prevent further violations?
A. Cluster Lockdown with strong password enforcement
B. Advanced Intrusion Detection Environment (AIDE)
C. Security Configuration Management Automation (SCMA)
D. Defense Information Systems Agency STIG enforcement
An administrator deploys Exchange on a Nutanix cluster. The administrator creates two containers with RF2 configuration: One container for Exchange One container for the other VMs
The Exchange VM is experiencing I/O performance issues.
Which changes to Storage Optimization should be used on the Exchange container to enhance I/O performance?
A. No data reduction
B. Post process Deduplication only
C. Inline compression and EC-X
D. Inline compression and Deduplication
An administrator needs to deploy an application with a large amount of data connected via Nutanix Volumes.
Which two actions should the administrator take when designing the Volume Group? (Choose two.)
A. Use multiple subnets for iSCSI traffic
B. Enable RSS (Receive Side Scaling)
C. Enable thick provisioning on the Volume Group(s)
D. Distribute workload across multiple virtual disks
An administrator has an existing Nutanix seven-node cluster running at RF2 that must be changed to have the following capabilities: RF3 set for the cluster Performance tier deduplication
What is the minimum memory needed on the CVMs to allow for these capabilities?
A. 24GB
B. 28GB
C. 32GB
D. 20GB
An administrator configures authentication in Prism Central (PC) for the NTNX-Admins group. Users report that they are unable to log in. The administrator confirms that the Active Directory (AD) settings in PC are correct. Which condition could result in this behavior?
A. A role mapping needs to be associated with the AD group.
B. The users must be added to the Domain Admins AD group.
C. The Local authentication type must also be selected in PC.
D. A client chap certificate must also be added in PC.
An organization is planning an upgrade to AOS 5.15 and wants to understand which cluster products and/or services are supported for physical traffic isolation. Which Nutanix component supports its network traffic being isolated onto its own virtual network?
A. Volumes
B. Objects
C. Containers
D. Files
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Nutanix exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your NCM-5.15 exam preparations and Nutanix certification application, do not hesitate to visit our Vcedump.com to find your solutions here.