Which baseline is used to identify a Zombie VM?
The correct answer is D. Fewer than 30 I/Os and less than 1000 bytes per day of network traffic for the past 21 days.
Efficient: The VM is well-provisioned and has optimal resource utilization.
Over-provisioned: The VM has more resources than it needs and has low resource utilization.
Constrained: The VM has less resources than it needs and has high resource utilization.
Inactive: The VM has no resource utilization and is idle or powered off.
Bully: The VM has high resource utilization and causes contention for other VMs.
A zombie VM is a subtype of an inactive VM that meets the following criteria2:
The VM is powered on for the past 21 days.
The VM does fewer than 30 read or write I/Os (total) per day for the past 21 days.
The VM receives or transfers fewer than 1000 bytes per day of network traffic for the past 21 days.
To identify a zombie VM, the administrator can use Prism Central to view the VM Profile dashboard and filter by profile type. The dashboard shows the number of VMs in each profile type, as well as their resource consumption and efficiency score. The administrator can also drill down into each VM to see its detailed metrics and recommendations for optimization.
Which inefficient VM Profile can be used to identify a VM that consumes too many resources and causes other VMs to starve?
Efficient: The VM is well-provisioned and has optimal resource utilization.
Over-provisioned: The VM has more resources than it needs and has low resource utilization.
Constrained: The VM has less resources than it needs and has high resource utilization.
Inactive: The VM has no resource utilization and is idle or powered off.
Bully: The VM has high resource utilization and causes contention for other VMs.
To identify a bully VM, the administrator can use Prism Central to view the VM Profile dashboard and filter by profile type. The dashboard shows the number of VMs in each profile type, as well as their resource consumption and efficiency score. The administrator can also drill down into each VM to see its detailed metrics and recommendations for optimization.
Refer to Exhibit:
An administrator needs to enable inline deduplication for a pre-existing storage container. When trying to enable deduplication on the storage container. this feature is grayed-out.
What is the reason for this behavior?
Nutanix supports two types of deduplication: post-process and inline. Post-process deduplication runs periodically on a schedule and can be enabled on any cluster. Inline deduplication runs in real time before data is written to disk and can be enabled only on all-flash clusters.
Therefore, by checking the type of storage and the type of deduplication, you can determine if you can enable inline deduplication on a storage container or not.
Refer to the exhibit.
The Linux Admin role has been created to manage only Linux VMs in the environment. However, the Admin1 user does not have access to all Linux VMs.
What step should be taken to grant the proper access?
In the exhibit, the Linux Admin role has been created with the following settings:
The role has the ''VM Admin'' permission, which allows the user to perform all actions on VMs3.
The role has been assigned to the admin1 user.
The role has been scoped to the entities that have the category key ''OS'' and the value ''Linux''.
Refer to the exhibit.
Which two initial cluster configuration tasks were missed during the deployment process? (Choose two.)
According to the image description, the exhibit shows a screenshot of a computer screen with a table of data. The table has 6 columns and 4 rows. The columns are labeled ''Date'', ''Time'', ''Status'', ''Details'', ''Configuration'', and ''Duration''. The rows contain information about different configurations and their statuses. The background is a light blue color. There is a pop-up message on the bottom right corner of the screen that reads ''This question has been answered. Click here to enable the edit button.''