Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Vce NCP-MCI-7.5 Questions Latest

Page: 3 / 8
Total 110 questions

Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) 7.5 Questions and Answers

Question 9

An administrator needs an account for automation that can be granted granular permissions and being authenticated without an interactive user password.

Which statement best describes how a Prism Central service account authenticates?

Options:

A.

Using the cluster admin password and inherits full admin privileges

B.

Using an external KMS key and is limited to encryption operations

C.

Using a CA-signed SSL certificate imported into the Prism Central

D.

Using a shared secret key managed through IAM and can be assigned RBAC roles

Question 10

An organization uses on-premises AHV-based clusters and also has workloads in public cloud environments.

The security team wants a single place to review security posture and compliance across the multi-cloud footprint, and they want the analysis to support security operations workflows rather than only showing cluster-level posture.

The administrator needs to pick the most appropriate Nutanix capability for this requirement.

Which option best aligns to the requirement?

Options:

A.

Use Flow Network Security policy views as microsegmentation policy listings inherently provide a full security posture and compliance assessment.

B.

Use the Prism Central Security Dashboard, to provide the same multi-cloud compliance view and cover Azure and AWS accounts by default.

C.

Use Prism Central Alerts and Events to provide a complete compliance picture across all environments and replaces posture management.

D.

Use Security Central to provide visibility into security posture and compliance for a multi-cloud environment (including public clouds).

Question 11

An administrator would like to create a VM template for reusability, to simplify VM management, and improve security.

When should the administrator apply a guest customization profile to simplify VM management?

Options:

A.

When deploying a VM with Cloud-Init guest customization

B.

When deploying a VM with a customized guided script

C.

When cloning a VM with Cloud-Init guest customization

D.

When cloning a VM with Sysprep guest customization

Question 12

An administrator detects suspicious outbound connections from a single VM that hosts a web tier component.

The incident response requirement is to immediately quarantine the VM so it cannot communicate with any other workload, but still allow connectivity from a designated forensic tooling group so investigators can collect evidence.

The organization uses categories for policy scope and wants a change that can be applied quickly during an incident without redesigning existing policies.

Which action best meets the requirement?

Options:

A.

Assign the VM to the built-in Quarantine category with the Forensic value so quarantine behavior blocks traffic except to and from forensic tools.

B.

Assign the VM to the built-in Quarantine category with the Strict value and separately create a shared service policy to allow forensic access.

C.

Create an application policy that only allows outbound traffic to forensic tools, leaving inbound traffic as allow all for faster investigation.

D.

Create an isolation environment policy between the VM and all other categories to block traffic and manually add exceptions for forensic tools.

Page: 3 / 8
Total 110 questions