Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Nutanix NCP-MCI-7.5 Dumps Questions Answers

Page: 1 / 8
Total 110 questions

Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) 7.5 Questions and Answers

Question 1

An administrator added an SSH public key and verified connectivity to CVMs and AHV hosts. What is the recommended next step to reduce interactive access risk?

Options:

A.

Enable core dumps on AHV hosts for post-incident analysis.

B.

Disable password authentication for all CVMs and AHV hosts.

C.

Enable a login banner on Prism Central to acknowledge access terms.

D.

Increase the number of concurrent Prism Central UI sessions.

Buy Now
Question 2

An administrator needs to expand an existing cluster with a new node that has no operating system. Only IP addresses are available. Out of band management (IPMI) has not been configured. Which tool should be used to image the node?

Options:

A.

Foundation Central

B.

Phoenix ISO Image

C.

Discovery OS

D.

Standalone Foundation

Question 3

An administrator manages a Nutanix cluster with software data-at-rest encryption enabled using an external KMS. Several VMs are configured with vTPM to support Windows BitLocker encryption.

The administrator needs to perform a disaster recovery operation and restore the VMs on a different cluster. During the recovery, the administrator discovers that the encryption key backup file is unavailable.

What is the expected outcome for the vTPM-enabled VMs?

Options:

A.

The VMs will fail to start because BitLocker will not prompt for the recovery key on first boot.

B.

The VMs will start successfully with a new vTPM device automatically attached during the restore process.

C.

The VMs will fail to start successfully because the external KMS provides the vTPM keys directly to the new cluster.

D.

The VMs will fail to start because the vTPM keys cannot be recovered without the backup file.

Question 4

An administrator has a large group of VMs for the marketing team that all have the same RPO requirements of a snapshot every hour. A Protection Policy already exists with an hourly snapshot schedule. What is the easiest way to add this group of VMs to the Protection Policy?

Options:

A.

Assign a category to marketing VMs, then add the category to the Protection Policy.

B.

Edit the Protection Policy and add each individual VM.

C.

Create a template for the marketing VMs and add the template to the Protection Policy.

D.

Add each VM to the Protection Policy from the VM page.

Question 5

An administrator needs to enable Marketplace in Prism Central before deploying Nutanix apps.

Which prerequisite must be met on the Prism Element cluster hosting Prism Central to enable Marketplace?

Options:

A.

Data services IP must be configured.

B.

SMTP must already be enabled.

C.

LACP must be configured on all uplinks.

D.

LDAP must be configured.

Question 6

An administrator has been asked to deploy a single-node Prism Central VM, with the possibility to scale out to increase its capacity. What is the minimum supported Prism Central size?

Options:

A.

Small

B.

X-Small

C.

Large

D.

X-Large

Question 7

A cluster only has one storage pool. Even though the pool has sufficient empty space, all but one container are out of space. What could be the cause of this?

Options:

A.

The container is in a stretch cluster.

B.

There is more than one failed node in the cluster.

C.

A container has a capacity reservation set.

D.

There is more than one failed drive in the cluster.

Question 8

A six-node cluster with the Reserve Rebuild Capacity option enabled has stopped accepting write requests. The cluster has also had several VM outages. What could the cause be?

Options:

A.

The cluster has reached its EC-X capacity limit.

B.

A node failed causing 2N/2D containers to degrade.

C.

The cluster has reached its resilient capacity limit.

D.

A node failed causing 1N/1D containers to degrade.

Question 9

An administrator needs an account for automation that can be granted granular permissions and being authenticated without an interactive user password.

Which statement best describes how a Prism Central service account authenticates?

Options:

A.

Using the cluster admin password and inherits full admin privileges

B.

Using an external KMS key and is limited to encryption operations

C.

Using a CA-signed SSL certificate imported into the Prism Central

D.

Using a shared secret key managed through IAM and can be assigned RBAC roles

Question 10

An organization uses on-premises AHV-based clusters and also has workloads in public cloud environments.

The security team wants a single place to review security posture and compliance across the multi-cloud footprint, and they want the analysis to support security operations workflows rather than only showing cluster-level posture.

The administrator needs to pick the most appropriate Nutanix capability for this requirement.

Which option best aligns to the requirement?

Options:

A.

Use Flow Network Security policy views as microsegmentation policy listings inherently provide a full security posture and compliance assessment.

B.

Use the Prism Central Security Dashboard, to provide the same multi-cloud compliance view and cover Azure and AWS accounts by default.

C.

Use Prism Central Alerts and Events to provide a complete compliance picture across all environments and replaces posture management.

D.

Use Security Central to provide visibility into security posture and compliance for a multi-cloud environment (including public clouds).

Question 11

An administrator would like to create a VM template for reusability, to simplify VM management, and improve security.

When should the administrator apply a guest customization profile to simplify VM management?

Options:

A.

When deploying a VM with Cloud-Init guest customization

B.

When deploying a VM with a customized guided script

C.

When cloning a VM with Cloud-Init guest customization

D.

When cloning a VM with Sysprep guest customization

Question 12

An administrator detects suspicious outbound connections from a single VM that hosts a web tier component.

The incident response requirement is to immediately quarantine the VM so it cannot communicate with any other workload, but still allow connectivity from a designated forensic tooling group so investigators can collect evidence.

The organization uses categories for policy scope and wants a change that can be applied quickly during an incident without redesigning existing policies.

Which action best meets the requirement?

Options:

A.

Assign the VM to the built-in Quarantine category with the Forensic value so quarantine behavior blocks traffic except to and from forensic tools.

B.

Assign the VM to the built-in Quarantine category with the Strict value and separately create a shared service policy to allow forensic access.

C.

Create an application policy that only allows outbound traffic to forensic tools, leaving inbound traffic as allow all for faster investigation.

D.

Create an isolation environment policy between the VM and all other categories to block traffic and manually add exceptions for forensic tools.

Question 13

A new naming-convention policy for storage containers requires VM placement to follow the updated naming rules. Which action can be performed to comply with the policy?

Options:

A.

Perform live vDisk migration.

B.

Configure a new storage policy.

C.

Implement an image placement policy.

D.

Rename storage containers.

Question 14

An administrator is tasked with creating a Disaster Recovery plan between two clusters within Prism Central local AZ. To ensure a failover operation is successful, the administrator also needs the ability to test recovery in both directions.

What are the recommended networks required between the two clusters for successfully testing the recovery?

Options:

A.

Two Production Networks and One Test Network

B.

One Production Network and One Test Network

C.

Two Production Networks and Two Test Networks

D.

One Production Network and Two Test Networks

Question 15

An administrator needs to install multiple Prism Central instances on a single Prism Element management cluster.

Which statement is valid?

Options:

A.

Installing multiple Prism Central instances on a single cluster isn ' t supported.

B.

Only one Prism Central instance can be registered to the Prism Element cluster.

C.

After deploying the first Prism Central, the other instances can be set up from the Marketplace.

D.

It is possible to register and unregister Prism Element with the same Prism Central multiple times from the GUI.

Question 16

An administrator has determined that the storage space is low within a Nutanix cluster environment. The container is set to Replication Factor 2. After deleting dozens of inactive VMs earlier today, the administrator notices no space reclamation.

What could be the cause of this?

Options:

A.

Storage can only be reclaimed after restarting CVM services.

B.

Inactive VMs take up memory only and not storage space.

C.

Medusa only runs once every 24 hours.

D.

The VMs are still sitting in the recycle bin.

Question 17

A node in a 3-node cluster is running out of physical resources. All three nodes are equally configured. An administrator wants to live migrate VMs to another node, but is unable to do so.

What is causing this issue?

Options:

A.

VMs have vNUMA enabled.

B.

VMs have vGPU.

C.

VMs have memory overcommitment.

D.

VMs have GPU passthrough.

Question 18

An administrator is configuring Runway Analysis settings in Prism Central and selects Auto Detect under Reserve Capacity For Failure.

How will runway capacity be calculated in this configuration?

Options:

A.

The runway analysis reserves a fixed 10% of cluster CPU, memory, and storage capacity by default.

B.

The runway analysis calculates capacity using the full cluster resources but automatically adds a performance buffer.

C.

The runway analysis reserves capacity only for storage resources while CPU and memory remain unchanged.

D.

The runway analysis excludes the resources of the largest node so estimates account for a node failure.

Question 19

An administrator ran NCC checks and noticed the following failure:

Node x.x.x.x: FAIL: No NTP servers are configured in the cluster configuration Refer to KB 4519 ...

What is the minimum number of NTP servers that should be configured to be considered a good configuration that will ensure a high degree of accuracy?

Options:

A.

1

B.

3

C.

5

D.

7

Question 20

An administrator needs to configure the virtual switch on a Nutanix AHV cluster to maximize both per-VM and per-host network throughput with LACP support. Which bond type should the administrator configure?

Options:

A.

Active-Backup

B.

Active-Active

C.

Active-Active with MAC pinning

D.

No Uplink Bond

Question 21

An administrator is working to ensure a cluster ' s future resource needs in Prism Central and notices a red warning icon labeled PC Under-provisioned. Which specific condition in the environment most likely triggered this warning?

Options:

A.

The cluster ' s resilient capacity has fallen below the user-configured warning threshold.

B.

The administrator is using more than 80% of the Prism Central instance ' s capacity.

C.

Prism Central VM has reached 70% of its configured storage over-provisioning ratio.

D.

A scale-out Prism Central VMs has failed, causing a load imbalance.

Question 22

An administrator needs to move a running VM to another host in the same cluster without shutting it down.

Which is the best way to achive this task?

Options:

A.

Restore from recovery point.

B.

Restore from third-party backup.

C.

Clone from previous snapshot.

D.

Live migrate within the cluster.

Question 23

An administrator needs to protect a group of mission-critical virtual machines.

The business requirements are:

    Recovery Point Objective (RPO) must be set to 5 minutes.

    New mission critical VMs should be automatically protected.

Which data protection type supports this configuration?

Options:

A.

Protection Domain with NearSync replication

B.

Protection Policy with NearSync replication

C.

Protection Domain with Asynchronous replication

D.

Protection Policy with Asynchronous replication

Question 24

Faced with prolonged times for hardware delivery, an administrator is looking for a way to be informed on time when cluster storage capacity is running low. In order for new hard disks to be delivered on time, the administrator needs to get a warning earlier than it is set currently.

Which action should the administrator take to receive a warning about cluster storage capacity running low earlier?

Options:

A.

Enable early warning Storage Container alert.

B.

Increase frequency of Storage Pool alerts.

C.

Decrease Storage Container Space Usage Exceeded alert Warning threshold.

D.

Decrease Storage Pool Capacity Usage Exceeded alert Critical threshold.

Question 25

An administrator has been tasked with migrating VMs out of a storage container that isn ' t using compression and is using a non-standard naming convention. The administrator needs to do other administrative tasks during the vDisk live migration.

What administrative tasks can the administrator perform during the vDisk live migration?

Options:

A.

Update memory and vCPU config of the VM

B.

Protection domain based replication of the VM

C.

Snapshot, clone, backup or resize the VM

D.

Protection policy based replication of the VM

Question 26

An administrator is running Nutanix Cluster Check (NCC) in the Prism Element web console. The administrator is not able to collect the logs.

What could be causing this?

Options:

A.

Log collection can only be done from the command line.

B.

Nutanix cannot collect logs within Prism Element.

C.

Logs can only be collected via a Syslog collector.

D.

Nutanix cannot collect the logs while running NCC.

Question 27

An administrator is trying to move an asynchronous PD workload from one cluster to another by taking advantage of PD-Based DR when an error message is displayed in Prism.

Error updating protection domain. Protection domain is already active on source site " cluster name " . Please trigger migrate from source site to activate the protection domain.

What would cause this error to appear?

Options:

A.

Must " Promote " the secondary site first before activating

B.

Must " disable " first before trying to activate a PD

C.

VMs must be migrated from the VM page instead of using DR

D.

Trying to " activate " the PD while the primary cluster is reachable

Question 28

An administrator receives intermittent “VM I/O latency” complaints from two application teams that share the same AHV cluster.

In Prism Central, multiple performance-related alerts appear across the same 30 minute window, but only some VMs are impacted.

The administrator needs to collect the most relevant platform logs for escalation, minimizing noise and ensuring the bundle covers the exact time window when the alert condition occurred. The organization also requires that the log bundle can be attached to a support case without manual repackaging.

Which approach best satisfies the requirement?

Options:

A.

Enable auto-resolve for the alert policy so the alert clears after the condition stops, then collect logs later if the alert returns.

B.

Create a new custom alert policy with a stricter threshold so the alert triggers more consistently, then rely on the alert history instead of collecting logs.

C.

Export the Alerts list to CSV (up to the export limit), then attach the CSV to the case as the primary diagnostic artifact for performance troubleshooting.

D.

In the alert details, identify impacted entities and timestamps, collect logs for the relevant time window, and upload the bundle using a case-number upload option.

Question 29

After scaling out Prism Central to improve resiliency, which additional configuration should an administrator complete?

Options:

A.

Deploy the Witness service in a separate failure domain.

B.

Configure a Protection Domain to include all Prism Central VMs.

C.

Enable High Availability Reservations for Prism Element cluster.

D.

Set up VM-VM anti-affinity rules between Prism Central VMs.

Question 30

An administrator has configured CVM security hardening on a Nutanix cluster with the following settings:

    IP Restriction State is set to enabled

    Password-based SSH access is disabled via Cluster Lockdown

The administrator attempts to SSH into the CVM from a new jump box and the connection is refused.

What should the administrator do to restore SSH access to the CVM?

Options:

A.

Log in to Prism Central Security Dashboard and remotely update the SSH whitelisted addresses for the affected cluster.

B.

Log in to Prism Element and update the Cluster Lockdown settings to add the new jump box IP address.

C.

Access the CVM using the local console or serial access and update the SSH whitelisted address to the new jump box IP.

D.

Restart the CVM to reset the IP restriction and regain SSH access from the new jump box IP.

Question 31

An administrator is tasked with using Nutanix Move to migrate a VM from Hyper-V to Nutanix AHV. What must be deployed on the Hyper-V host to facilitate migration?

Options:

A.

Nutanix Move

B.

Nutanix VirtIO drivers

C.

Nutanix Guest Tools

D.

Nutanix Move Agent

Question 32

How many storage pools and storage containers are created during cluster creation?

Options:

A.

Two pools, two containers

B.

Two pools, three containers

C.

One pool, three containers

D.

One pool, two containers

Question 33

Due to user complaints of slow VM performance, an administrator is reviewing performance metrics on their Nutanix cluster and executes iostat on a Controller VM (CVM).

The following output is captured:

#TIMESTAMP 1768953673 : 01/21/2026 12:01:13 AM

avg-cpu: %user %nice %system %iowait %steal %idle

2.32 0.09 7.53 83.20 0.00 6.86

Based on this output, which statement most accurately describes the current state of the CVM?

Options:

A.

The CVM is likely waiting on disk I/O operations to complete, suggesting a potential bottleneck in the storage subsystem or underlying physical drives.

B.

The CVM is suffering from excessive network throughput congestion, resulting in a high percentage of CPU cycles being dedicated to interrupt processing.

C.

The CVM is under heavy computational load from Nutanix services, as evidenced by the high percentage of active processing cycles currently in use.

D.

The CVM is experiencing significant CPU contention from the hypervisor, as indicated by the discrepancy between low user percentage and high system overhead.

Page: 1 / 8
Total 110 questions