Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Nutanix NCP-MCI-6.5 Dumps

Page: 1 / 13
Total 175 questions

Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) v6.5 exam Questions and Answers

Question 1

Which AOS process determine if an I/O from a user will be written to OpLog or to an Extent Store?

Options:

A.

Stargate

B.

Curtor

C.

Cassandara

D.

Zeus

Question 2

The administrator wants a container to be displayed and limited to 1TB in the hypervisor.

What advanced container setting must the administrator set?

Options:

A.

Advertised Capacity

B.

Reserved Capacity

C.

Advertised Quota

D.

Reserved Quota

Question 3

Refer to Exhibit:

Which statement is true?

Options:

A.

A critical alert will be triggered if I/O working set size goes over 6000 MB.

B.

A critical alert will be triggered when there is an anomaly above 4000 MB.

C.

A warning alert will be triggered after 3 anomalies have been catch.

D.

A warning alert will be triggered if I/O working set size goes over the blue band.

Question 4

What is the proper sequence to perform a one-click upgrade to a Nutanix cluster?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements. Not all procedures are valid. Identify any invalid procedures using the drop-down option.

Options:

Question 5

Which component ensures uniform distribution of data throughout the cluster to eliminate hot spots and speed up rebuilds?

Options:

A.

Cassandra

B.

Distributed Storage Fabric

C.

High Availability

D.

Acropolis App Mobility Fabric

Question 6

How many Prism Central instances are required to deploy Leap:'

Options:

A.

One per availability zone

B.

One per customer environment

C.

One per physical site

D.

One per AHV cluster

Question 7

An administrator is working with Nutanix Support and needs to provide logs for troubleshooting an issue. The cluster is located in a secure environment. Data such as IP addresses and VM names cannot be shared.

Which method should be used to anonymize the log data sent to Nutanix Support?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 8

An administrator needs to run a mixed Exchange and SQL workload with a guaranteed amount of container

space for each application.

How should the administrator meet this requirement?

Options:

A.

Create one container and set capacity reservation

B.

Create two containers and reserve space for containers

C.

Create one container and enable compression

D.

Create two containers and reserve space for vDisks

Question 9

An administrator needs to boot a VM to a bootable CD. The administrator tries to configure the VM to boot to it, select to add disk, and goes to the images available. The image for the bootable CD is unavailable.

What is the Likely issue?

Options:

A.

The CD-ROM interface is too slow.

B.

The administrator selected a disk attached before it can boot to a CD.

C.

The VM needs to have a standard disk attached before it can boot to a CD.

D.

The bootable CD image is corrupted during creation.

Question 10

An administrator needs to provide access for a user to view real-time performance metric for all VMs on all clusters across the datacenter.

Which method accomplishes this with the least effort and ongoing maintenance?

Options:

A.

Configure IDP authentication and assign the user to the Cluster Admin role in Prism Central.

B.

Configure AD authentication and assign the user to the Viewer role in Prism Element.

C.

Configure AD authentication create a custom role, assign the user to the role, and apply the role to all clusters and VMs

Question 11

Refer to Exhibit:

An administrator is trying to put a node into maintenance mode but receives the message shown in the exhibit.

What is a potential reason for this dialog?

Options:

A.

LinuxVM1 uses a vDisks stored in a RF1 Datastore

B.

LinuxVM1 uses a Volume Group

C.

LinuxVM1 uses a virtual GPU.

D.

LinuxVM1 uses e vDisks stored in a RF3 Datastore

Question 12

How should an administrator configure a custom alert for a specific VM in Prism?

Options:

A.

Modify an existing alert to only alert on the specific VM.

B.

Modify VM settings to add the custom alert.

C.

Modify the alerts to add a new custom alert policy.

D.

Modify node settings to add the custom alert.

Question 13

A newly-hired Nutanix administrator was tasked by the CIO to create a single VM on a test network. The network administrator stated that a native VLAN was used on the Cisco TOR switches with the following parameters:

IP address:172,16.1.2

Network Mask: 255.255.255.0

Default gateway: 172.16.1.1

VLAN:1

The same parameters were used to create a network profile on Nutanix, but the when the VM was on …

What should the Nutanix administrator do to fix this issue?

Options:

A.

Nutanix removed support for native VLAN.

B.

Change VLAN field from vlan. 1 to vlan.0.

C.

Enable IPv6 on the VM.

D.

Use DHCP as opposed to static IP

Question 14

What does Nutanix recommend when setting up the node networkring?

Options:

A.

Include NIC models from different vendors in the same bond

B.

Include at least two physically interfaces in every bond.

C.

Combine NIC models from different vendors in the same bond.

D.

Combine NIC models from different vendors in the same bond.

Question 15

Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness?

Options:

A.

Continuous Data Protection

B.

Copy-on-Write

C.

Split-mirror

D.

Redirect-On-Write

Question 16

An administrator wants to expand the Failure Domain level of a cluster.

What two options are available? (Choose two.)

Options:

A.

Node

B.

Data Center

C.

Block

D.

Rack

Question 17

An administrator is preparing to deploy a new application on an AHV cluster, Security requirements dictate that all virtual servers supporting this application must be prevented from communicating with unauthorized hosts.

Which option would achieve this goal?

Options:

A.

Create a new VLAN, create a subnet on the cluster with the VLAN tag, deploy servers with vNlCs in the new subnet.

B.

Create a new Application Security Policy restricting communication to the authorized hosts and apply it to the servers in enforce mode.

C.

Create a new solation Environment policy apply it to the new servers and all authorized hosts.

D.

Create new' subnet and assign to an existing VPC assign the IP prefix and gateway for the subnet, deploy servers with vNlC5 in the new subnet.

Question 18

A recently configured cluster is leveraging NearSync with a recovery schedule of 15 minutes. It is noticed that the cluster is consistently transitioning in an Out of NearSyne.

What action should be taken to potentially address this issue?

Options:

A.

Increase network bandwidth

B.

Change the NearSync schedule to 30 minutes.

C.

Add a vCPUs to the user VMs.

D.

Configure a secondary schedule in the same Protection Domain.

Question 19

Refer to the exhibit.

An administrator is adding a new node to a cluster. The node has been imaged to the same versions of AHV and AOS that the cluster running, configured with appropriate IP addresses, and br0-up has been configured the same the existing uplink bonds

When attempting to add the node to the cluster with the Expand Cluster function in Prism , the cluster is unable to find the new node.

Based on the above output from the new node, what is most likely the cause of this issue?

Options:

A.

The ports on the upstream switch are not configured for LACP.

B.

The existing and the expansion node are on different VLANs.

C.

There is a firewall blocking the discovery traffic from the tlu

D.

LACP configuration must be completed after cluster expansion

Question 20

An administrator logs in to Prism Element goes to the Network view, and sees the output shown in the exhibit.

Which three steps must the administrator take to increase throughput to the host? (Choose three.)

Options:

A.

Connect the 10Gb interfaces to the physical switch.

B.

Change the bond mode to balance-slb or balance—tcp.

C.

Remove any 1Gb interfaces still connected from the default bond.

D.

Add a new switch to the network and connect 1Gb interfaces to it.

E.

Change the VLAN ID to a higher priority ID.

Question 21

Refer to Exhibit:

Why has an anomaly been triggered?

Options:

A.

Because the CPU usage crossed the blue band.

B.

Because the blue band range increased over the last 2 days

C.

Because the CPU usage dropped belon' 20%

D.

Because the CPU usage reached 100%

Question 22

What is the function of the virbr0 bridge on AHV?

Options:

A.

To carry all traffic between the user VMs and the upstream network.

B.

To carry management and storage communication between user VMs and the CVM.

C.

To carry management and storage communication between user VMs and AHV host.

D.

To carry storage communication between the guest VMs and the CVM

Question 23

An administrator wants to use Volumes to connect to physical servers that are not able to be virtualized.

Which three things must be configured for Volumes to support iSCSI clients? (Choose three)

Options:

A.

Enable external client access

B.

Client OS iSCSI initiator

C.

iSCSI Multipathing I/O

D.

Cluster Virtual IP address

E.

Data Services IP address

Question 24

Which scenario would benefit most from Erasure Coding being enabled on a container?

Options:

A.

Long term storage of data which is written once and read infrequently

B.

High performance database where all is relatively hot.

C.

VDI use cases where a single VM is cloned 100’s of times

D.

WEB and API Servers

Question 25

Which component is supported by Prism Central storage policies?

Options:

A.

Virtual Machines

B.

Volume Groups

C.

VM Templates

D.

Storage Containers

Question 26

Refer to Exhibit:

After configuring modules for a Remote Syslog Server, the settings are as shown. The administrator notices that even though the level parameter is set to EMERGENCY, that all monitor logs are being sent.

What is the likely cause of this issue?

Options:

A.

A second rsyslog server is configured to send all monitor logs.

B.

Having the Module Name set to STARGATE sends all monitor logs regardless of the level.

C.

A Log Level of EMERGENCY includes all monitor logs.

D.

The true setting for Include Monitor Logs sends all monitor logs regardless of the level.

Question 27

After configuring Active Directory as the desired authentication service, an administrator is not able to login into Prism Central using privileged account.

Which configuration must be checked first?

Options:

A.

Account lock status

B.

Role Mapping

C.

Local user account

D.

Cluster Lockdown

Question 28

How many SSL certificates are used by Prism Element on a Nutanix cluster?

Options:

A.

1

B.

5

C.

256

D.

2048

Question 29

Prism Central will be installed manually on an AHV cluster.

Which three disk images must be downloaded from the portal for the Prism Central VM? (Choose three.)

Options:

A.

var

B.

tmp

C.

boot

D.

home

E.

data

Question 30

While installing Windows 2019 on a new VM on an AHV cluster, an administrator notices there aren’t any drives listed for the install.

What might the problem be?

Options:

A.

VirtIO drivers have not yet been installed and the disks are IDE disks.

B.

VirtIO drivers have not yet been installed and the disks are SCSI disks.

C.

VirtIO drivers must be installed on AHV for installations of Windows.

D.

VirtIO drivers aren’t supported on this version of Windows 2019.

Question 31

What is Prism Central primarily used for?

Options:

A.

Multi-cluster network configuration

B.

Container creation

C.

Multi-cluster Single Sign On

D.

Data reduction configuration

Question 32

Which capability refers to the storage of VM data on the node where the VM is running and ensure that the read I/O does not have to traverse the network?

Options:

A.

Intelligent Locally

B.

Data Locality

C.

Intelligent Tiering

D.

Data Tiering

Question 33

An administrator has been tasked with increasing security on Nutanix cluster by disabling password authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH,

What is the easiest way for the administrator to meet these needs?

Options:

A.

Configure LDAP authentication through a secure server,

B.

Enable STIES vie commend line on SSH to CVM.

C.

Enable Cluster Lockdown and provide an RSA key.

D.

Restrict access with User Management in Prism.

Question 34

An administrator is concerned about the amount of data that a VM reading and writing to the storage fabric.

Which metric will provide that data?

Options:

A.

Host Hypervisor IO Bandwidth

B.

Host Disk IOPS

C.

VM Storage Controller IOPS

D.

VM Storage Controller Bandwidth

Question 35

What Nutanix feature provides effective caching optimization In VDI environments?

Options:

A.

Remote Protection Group

B.

Local Protection Group

C.

Snap Clones

D.

Shadow Clones

Question 36

Refer to Exhibit:

An administrator is attempting to create an additional virtual switch on a newly deployed AHV cluster, using the two currently disconnected interfaces. The administrator is unable to select the disconnected interfaces when creating the virtual switch.

What is the likely cause of this issue?

Options:

A.

Only one interface is available on the selected hosts.

B.

Interfaces must be connected to the network before they can be assigned.

C.

The disconnected interfaces are currently assigned to virtual switch 0,

D.

Interfaces must be assigned to virtual switches via the cli

Question 37

In which two scenarios is Native Key Management Server supported? (Choose two)

Options:

A.

XenServer and AHV mixed cluster.

B.

Hyper-V and AHV mixed cluster.

C.

KVM and AHV mixed cluster.

D.

ESXi and AHV mixed cluster.

Question 38

A system administrator needs to add more VMs to their Nutanix cluster.

Which two actions should the administrator perform to determine if the current cluster can accommodate the new VMs? (Choose two)

Options:

A.

Enable Deduplication and Ensure Coding

B.

Utilize Optimize Resources for VM efficiency

C.

Determine utilization with Cluster Runway

D.

Perform an inventory with Life Cycle Management

Question 39

An administrator is tasked with configuring networking on an AHV cluster and needs to optimize for maximum single VM throughput.

Which bond mode should the administrator select?

Options:

A.

Active-Active with Mac pinning

B.

Active-Active

C.

Active-Backup

D.

No Uplink Bond

Question 40

A cluster has RF2. The cluster loses two drives on different nodes in the same storage tier.

What is the effect on the replicas of the VMs?

Options:

A.

Some VM data may be lost

B.

No VMs lose data if the node has two or more SSDs

C.

Some VMs may reboot and gain access to data

D.

No VMs lose data because of RF2

Question 41

An administrator needs to limit the amount of storage space that data stored in single container can consume.

Which action should the administrator take?

Options:

A.

Enable reservation for rebuild capacity

B.

Set an advertised capacity for the container

C.

Store VM snapshots in a different container

D.

Thick prevision the container

Question 42

An administrator needs to bring down a host in a Nutanix Cluster for maintenance reasons. The administrator puts the host in maintenance mode.

What should the administrator do to perform an orderly shutdown of the CVM?

Options:

A.

Execute the cvm_shutdown -P new command from the CVM.

B.

Enter Fever off Server - immediate from the IPMI console.

C.

Enter Fewer off Server-orderly Shutdown from the IPMI console.

D.

Execute the cvm_shutdown -P now command from the host.

Question 43

Refer to the exhibit.

System Non-Root Partition Usage shows a warning or critical alert The administrator needs to change the frequency of checks and alerts to respond more quickly.

Where in Prism Element should the administrator change the frequency of checks and alerts?

Options:

A.

Health Dashboard > Manage Crocks > Frequency

B.

Alerts Dashboard > Manage Checks > Schedule

C.

Health Dashboard > Manage Checks > Schedule

D.

Alerts Dashboard > Manage Checks > Frequency

Question 44

Which three upgrades should an administrator be able to perform using Lifecycle Management? (Choose Three)

Options:

A.

AOS

B.

BMC

C.

BIOS

D.

Hypervisor

E.

HBA Firmware

Question 45

An administrator recently added new SSDs to a Nutanix cluster and knows the firmware will be out of date, Due to security constraints, the cluster does not have access to the Internet.

Which two steps must be completed to update the firmware? (Choose two.)

Options:

A.

Download the disk firmware from the OEM's website.

B.

Download a darksite bundle and deploy an internal webserver,

C.

Select Upgrade Software, then upload the firmware bundle.

D.

update the LCM Source and URL to access the firmware bundle.

Question 46

An administrator would like to leverage the Reliable Event Logging Protocol (RELP) with their Remote Syslog Server. After completing the configuration, it is observed that RELP logging is not working as expected.

What is the likely cause of this issue?

Options:

A.

The cluster does not have RELP installed.

B.

The GENESIS was the only one chosen to forward log information.

C.

The Remote Syslog Server was configure using TCP as the protocol.

D.

The remote server does not have rsyslog-relp installed.

Question 47

Refer to the exhibit.

Which two initial cluster configuration tasks were missed during the deployment process? (Choose two.)

Options:

A.

Host password changes

B.

Password policy changes

C.

BIOS password changes

D.

CVM password changes

Question 48

An administrator needs to configure a new subnet on an AHV cluster and want to ensure that VMs will automatically be assigned an IP address at creation time.

Which type of network does the administrator need to create?

Options:

A.

Dynamic Network

B.

Unmanaged Network

C.

Managed Network

D.

DHCP Network

Question 49

A guest VM should be able to tolerate simultaneous failure of two nodes or drives.

What are the minimum requirements for the Nutanix cluster?

Options:

A.

3 nodes with cluster RF 3 and container RF 3

B.

3 nodes with cluster RF 3 and container RF 2

C.

5 nodes with cluster RF 2 and container RF 3

D.

5 nodes with cluster RF 3 and container RF 3

Question 50

Refer to exhibit:

Why has an anomaly been triggered?

Options:

A.

Controller reached 2500 IOPS.

B.

Observed IOPS exceed normal values.

C.

Normal Controller behavior has increased.

D.

Observed values do not match predicted values.

Question 51

An administrator needs to shut down an AHV cluster to relocate hardware. The administrator upgrades NCC and runs health checks.

Which steps should the administrator perform next?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements.

Options:

Question 52

A node with Erasure Coding fails.

What is the impact?

Options:

A.

The node stops utilizing Erasure Coding.

B.

Potentially increased amount of data stored in the SSD tier.

C.

Increased Controller VM CPU Load.

D.

AQS unable to do deduplication during the Erasure Coding failure.

Page: 1 / 13
Total 175 questions