Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

NCP-MCI-6.5 Exam Dumps - Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) v6.5 exam

Go to page:
Question # 17

An administrator has been tasked with increasing security on Nutanix cluster by disabling password authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH,

What is the easiest way for the administrator to meet these needs?

A.

Configure LDAP authentication through a secure server,

B.

Enable STIES vie commend line on SSH to CVM.

C.

Enable Cluster Lockdown and provide an RSA key.

D.

Restrict access with User Management in Prism.

Full Access
Question # 18

A two-node ROBO cluster is configured with a witness VM.

What happens when Node A goes down?

A.

The- cluster becomes unavailable and goes into read-only mode.

B.

All operations and services on the Node B are shut down and go into a waiting state.

C.

The cluster is unaffected and no administrator intervention is required.

D.

Node B sends a leadership request to the Witness VM and goes into single-node mode.

Full Access
Question # 19

A system administrator needs to add more VMs to their Nutanix cluster.

Which two actions should the administrator perform to determine if the current cluster can accommodate the new VMs? (Choose two)

A.

Enable Deduplication and Ensure Coding

B.

Utilize Optimize Resources for VM efficiency

C.

Determine utilization with Cluster Runway

D.

Perform an inventory with Life Cycle Management

Full Access
Question # 20

A vDisk is read by multiple VMs. The cluster creates immutable copies of the vDisk. What are these vDisk copies called?

A.

Disk Clones

B.

Golden Images

C.

Volume Groups

D.

Shadow Clones

Full Access
Question # 21

Which two methods are available when migrating a VM from a legacy 3-tier solution using VMware ESXi to AHV? (Choose two.)

A.

Deploy the Move appliance.

B.

Use Cross-Hypervisor DR.

C.

Import the .vmdk into the Image Service.

D.

Use shared nothing live migration.

Full Access
Question # 22

Microsegmentation was recently enabled in a Nutanix environment. The administrator wants to leverage Prism Central to create a policy that will block all traffic regardless of direction, between two groups of VMs identified by their category.

Which policy should be used to meet this requirement?

A.

An Application Security Policy

B.

A Quarantine Policy

C.

A Whitelist-Based Policy

D.

An Isolation Environment Policy

Full Access
Question # 23

In the event of a disk failure, which process will immediately ad automatically scans Cassandra to find all data previously hosted on the failed disk, and all disks in that node?

A.

Curator

B.

Stargate

C.

Genesis

D.

Prism

Full Access
Question # 24

An administrator has created several custom alert policies, which are applied to the same entities. Prism Central displays a message that a similar policy exists.

In what order of precedence are overlapping policies evaluated?

Full Access
Go to page: