Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

NCP-MCI-6.5 Exam Dumps - Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) v6.5 exam

Question # 4

Where can an administrator change a CVM password?

A.

KMS Server Terminal

B.

CVM setting in Prism Element

C.

CVM setting in Prism Central

D.

Prism CVM VM Console

Full Access
Question # 5

Which two access protocols are supported by Files? (Choose two.)

A.

ISCSI

B.

SMB

C.

FCOE

D.

NFS

Full Access
Question # 6

An administrator is working with Nutanix Support and needs to provide logs for troubleshooting an issue. The cluster is located in a secure environment. Data such as IP addresses and VM names cannot be shared.

Which method should be used to anonymize the log data sent to Nutanix Support?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 7

Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness?

A.

Continuous Data Protection

B.

Copy-on-Write

C.

Split-mirror

D.

Redirect-On-Write

Full Access
Question # 8

Prism Central will be installed manually on an AHV cluster.

Which three disk images must be downloaded from the portal for the Prism Central VM? (Choose three.)

A.

var

B.

tmp

C.

boot

D.

home

E.

data

Full Access
Question # 9

After configuring Active Directory as the desired authentication service, an administrator is not able to login into Prism Central using privileged account.

Which configuration must be checked first?

A.

Account lock status

B.

Role Mapping

C.

Local user account

D.

Cluster Lockdown

Full Access
Question # 10

An administrator needs to boot a VM to a bootable CD. The administrator tries to configure the VM to boot to it, select to add disk, and goes to the images available. The image for the bootable CD is unavailable.

What is the Likely issue?

A.

The CD-ROM interface is too slow.

B.

The administrator selected a disk attached before it can boot to a CD.

C.

The VM needs to have a standard disk attached before it can boot to a CD.

D.

The bootable CD image is corrupted during creation.

Full Access
Question # 11

What Nutanix feature provides effective caching optimization In VDI environments?

A.

Remote Protection Group

B.

Local Protection Group

C.

Snap Clones

D.

Shadow Clones

Full Access
Question # 12

An administrator needs to configure a new subnet on an AHV cluster and want to ensure that VMs will automatically be assigned an IP address at creation time.

Which type of network does the administrator need to create?

A.

Dynamic Network

B.

Unmanaged Network

C.

Managed Network

D.

DHCP Network

Full Access
Question # 13

Where are Leap Availability Zones configured?

A.

Cloud Connect

B.

Controller VM

C.

Prism Element

D.

Prism Central

Full Access
Question # 14

What requires iSCSI initiator configuration in the guest OS to use Volumes?

A.

SQL Server Always On Availability Group

B.

Microsoft Windows Failover Cluster

C.

Oracle RAC

D.

Exchange DAG

Full Access
Question # 15

A Nutanix cluster is equipped with four nodes. Four VMs on this cluster have been configured with a VM-VM anti-affinity policy and are each being hosted by a different node.

What occurs to the cluster and these VMs during an AHV upgrade?

A.

One node hosts two VMs while the node being upgraded is in maintenance mode.

B.

One VM out of the four powers down when the node hosting it reboots.

C.

The AHV pre-upgrade checks fail until the administrator disables the anti-affinity policy.

D.

The AHV pre-upgrade checks fail until the four VMs are powered off.

Full Access
Question # 16

Refer to Exhibit.

An administrator increases the cluster RF to 3. The containers are not modified.

What will the new values in the data resiliency dashboard be for FAILURES TOLERABLE for the Zookeeper and Extent Groups components?

A.

Zookeeper = 1 and Extent Groups = 1

B.

Zookeeper = 2 and Extent Groups = 2

C.

Zookeeper = 2 and Extent Groups = 1

D.

Zookeeper = 1 and Extent Groups = 2

Full Access
Question # 17

An administrator has been tasked with increasing security on Nutanix cluster by disabling password authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH,

What is the easiest way for the administrator to meet these needs?

A.

Configure LDAP authentication through a secure server,

B.

Enable STIES vie commend line on SSH to CVM.

C.

Enable Cluster Lockdown and provide an RSA key.

D.

Restrict access with User Management in Prism.

Full Access
Question # 18

A two-node ROBO cluster is configured with a witness VM.

What happens when Node A goes down?

A.

The- cluster becomes unavailable and goes into read-only mode.

B.

All operations and services on the Node B are shut down and go into a waiting state.

C.

The cluster is unaffected and no administrator intervention is required.

D.

Node B sends a leadership request to the Witness VM and goes into single-node mode.

Full Access
Question # 19

A system administrator needs to add more VMs to their Nutanix cluster.

Which two actions should the administrator perform to determine if the current cluster can accommodate the new VMs? (Choose two)

A.

Enable Deduplication and Ensure Coding

B.

Utilize Optimize Resources for VM efficiency

C.

Determine utilization with Cluster Runway

D.

Perform an inventory with Life Cycle Management

Full Access
Question # 20

A vDisk is read by multiple VMs. The cluster creates immutable copies of the vDisk. What are these vDisk copies called?

A.

Disk Clones

B.

Golden Images

C.

Volume Groups

D.

Shadow Clones

Full Access
Question # 21

Which two methods are available when migrating a VM from a legacy 3-tier solution using VMware ESXi to AHV? (Choose two.)

A.

Deploy the Move appliance.

B.

Use Cross-Hypervisor DR.

C.

Import the .vmdk into the Image Service.

D.

Use shared nothing live migration.

Full Access
Question # 22

Microsegmentation was recently enabled in a Nutanix environment. The administrator wants to leverage Prism Central to create a policy that will block all traffic regardless of direction, between two groups of VMs identified by their category.

Which policy should be used to meet this requirement?

A.

An Application Security Policy

B.

A Quarantine Policy

C.

A Whitelist-Based Policy

D.

An Isolation Environment Policy

Full Access
Question # 23

In the event of a disk failure, which process will immediately ad automatically scans Cassandra to find all data previously hosted on the failed disk, and all disks in that node?

A.

Curator

B.

Stargate

C.

Genesis

D.

Prism

Full Access
Question # 24

An administrator has created several custom alert policies, which are applied to the same entities. Prism Central displays a message that a similar policy exists.

In what order of precedence are overlapping policies evaluated?

Full Access
Question # 25

An administrator adds a node with older generation processors to an existing AHV cluster with newer generation processors. What is the effect on live migration?

A.

Live migration continues to function as expected and VMs can move to any AHV host.

B.

Live migration is prevented until the administrator enables the legacy migration option.

C.

Live migration is prevented until the administrator manually changes the newer processor level.

D.

Live migration of VMs is prevented between newer and older processors.

Full Access
Question # 26

An administrator needs to increase bandwidth available to the AHV host and to the CVM.

How should the administrator complete this task?

A.

In Prism, update vs0 to change the configuration to Active-Active.

B.

Use manage-ovs commands to update br0 change the configuration to Active-Active.

C.

In Prism, create a vsl interface and add any remaining uplinks.

D.

Use manage-ovs commands to create br1 and add any remaining uplinks

Full Access
Question # 27

An administrator has created a Nutanix managed it a VLAN ID of 512.

Several VMs have been created, and the administrator notices that the can successfully communicate with other VMs on that VLAN.

Provided they are on the host, but cannot communicate with VMs that reside on different hosts in the cluster.

What is most likely thee cause of this issue?

A.

There is a firewall rule blockingVLAN512 traffic.

B.

VLANS12 is a reserved VLAN ID, and not usable for guest VMs.

C.

The VLAN was not created on the upstream switches.

D.

The administrator did not create the VLAN on all hosts

Full Access
Question # 28

After the initial configuration and upgrade of NCC, the administrator notices these critical alerts:

. IPMI 10.7.133.33 is using default password

. Host 10.7.133.25 is using default password

. CVM 10.7.133.31 is using default password

Which two initial cluster configuration tasks were missed during the deployment process? (Choose two.)

A.

CVM password changes

B.

BIOS password changes

C.

Host password changes

D.

Password policy changes

Full Access
Question # 29

An administrator has set up a local web server accessible to the Nutanix clusters.

Which two steps are required to set up LCM for an environment without Internet access? (Choose two.)

A.

Download the lcai_disconnecced_version. tar.gz LCM bundle from the support portal.

B.

Edit LCM Advanced Settings in Prism Element and enter the address of the web server.

C.

Edit LCM Advanced Settings m Prism Central and enter the address of the web server.

D.

Download the lcm_dark_site_version. tar . gz LCM bundle from the support portal.

Full Access
Question # 30

An administrator needs to ensure logs, alerts and information is consistent across clusters that are located in different countries.

Which service needs to be configured?

A.

SMTP

B.

DNS

C.

SNMP

D.

NTP

Full Access
Question # 31

Which two capabilities does IPAM provide in a Nutanix networking configuration? (Choose two.)

A.

Allows proxy server settings to be set up for a defined network

B.

Allows AHV to assign IP addresses automatically to VMs using DHCP

C.

Configures a VLAN with an IP subnet and assigns a group of IP addresses

D.

Configures firewall rules to prevent or allow certain TCP/IP traffic

Full Access
Question # 32

In which two scenarios is Native Key Management Server supported? (Choose two)

A.

XenServer and AHV mixed cluster.

B.

Hyper-V and AHV mixed cluster.

C.

KVM and AHV mixed cluster.

D.

ESXi and AHV mixed cluster.

Full Access
Question # 33

An Administrator has been asked to deploy VMs using a specific image. The image has been configured with settings and applications that will be used by engineering to develop a new product by the company.

The image is not available on the desired cluster, but it is available in other cluster associated with Prism Central.

Why isno’t the image available?

A.

The image bandwidth policy has prevented the image upload.

B.

The cluster should be removed from all categories.

C.

The cluster has not been added to the correct category

D.

The image placement policy was configured with enforcement.

Full Access
Question # 34

In Files, how many FSVMs are deployed by default?

A.

1

B.

2

C.

3

D.

5

Full Access
Question # 35

A user is complaining about slowness of a mission-critical MSSQL Server. The administrator logs into Prism Element to investigate the VM performance and observes what is shown in the diagram.

Which action would best improve VM performance?

A.

Disable hyperthreading in the BIOS.

B.

Add additional RAM to the user VM.

C.

Add additional RAM to the host on which the VM is running.

D.

Ensure the host's CPUs ere not excessively overcommitted.

Full Access
Question # 36

What is a requirement to enable Flow Networking?

A.

A dedicated virtual switch has been created for Flow Networking.

B.

Flow Micro segmentation must be enabled.

C.

Microservices infrastructure must be enabled.

D.

Prims Central is using a three-node scale-out deployment

Full Access
Question # 37

Which storage policy value can be inherited from a cluster?

A.

IO performance

B.

Storage Container

C.

Compression

D.

QoS

Full Access
Question # 38

An administrator wants to use Volumes to connect to physical servers that are not able to be virtualized.

Which three things must be configured for Volumes to support iSCSI clients? (Choose three)

A.

Enable external client access

B.

Client OS iSCSI initiator

C.

iSCSI Multipathing I/O

D.

Cluster Virtual IP address

E.

Data Services IP address

Full Access
Question # 39

An administrator is configuring data protection and DR for a multi-tier application. All VMs must be protected at the same time.

What must the administrator do to meet this requirement?

A.

Create a consistency group for each VM with identical schedules

B.

Create a consistency group for the application and place all VMs in it

C.

Create a protection domain for the application and select auto-protect related entities

D.

Create a protection domain for each VM with identical schedules

Full Access
Question # 40

An administrator is implementing a VDI solution. The workload will be a series of persistent desktops in a dedicated storage container within a four-node cluster Storage optimizations should be set on the dedicated storage container to give optimal performance including during a node failure event

Which storage optimizations should the administrator set to meet the requirements?

A.

Compression only

B.

Deduplication and Erasure Coding

C.

Compressoion and Deduplication

D.

Compression Deduplication and Erasure Coding

Full Access
Question # 41

An administrator initially performed a cluster Foundation using a flat switch without any VLAN configuration. After the Foundation, the administrator moved the dual 25Gb data ports and single 1Gb IPMI port to the actual switches with the below network configurations:

. All VLANs are tagged

. VLAN 1000 for CVM\Hypervisor traffic

· VLAN 1001 for User VM traffic

. VLAN 100 for IPMI traffic

After moving the IPMI network links, the administrator can no longer ping the IPMI IPs.

Which two changes does the administrator need to make? (Choose two.)

A.

SSH to AHV and set the VLAN ID using IPMI Tool.

B.

SSH to CVM and restart network services on all host.

C.

SSH to AHV and change the IP address using IPMI tool.

D.

SSH to CVM and restart Genesis on all CVMs.

Full Access
Question # 42

An administrator manages an AHV cluster that is dedicated to a dev/test environment. The administrator receiving complaints from users that they are unable to create new VMs on the cluster.

After the reviewing the cluster, the administrator finds that the memory resources are almost fully utilized, with many VMs over-provisioned on memory.

What option is the most efficient resolution to enable additional VMs to be created?

A.

Enable Memory Overcommit on the over-provisioned VMs.

B.

Enable Memory HA on the over-provisioned VMs.

C.

Upgrade the nodes with additional memory DlMMs.

D.

Disable HA Reservation on the cluster.

Full Access
Question # 43

When installing Nutanix Guest Tools (NGT) on an ESXi-hosted VM, which port should be enabled on the VM to allow communication with the NGT-Controller VM service?

A.

2000

B.

2074

C.

8080

D.

9943

Full Access
Question # 44

An administrator needs to provide access for a user to view real-time performance metric for all VMs on all clusters across the datacenter.

Which method accomplishes this with the least effort and ongoing maintenance?

A.

Configure IDP authentication and assign the user to the Cluster Admin role in Prism Central.

B.

Configure AD authentication and assign the user to the Viewer role in Prism Element.

C.

Configure AD authentication create a custom role, assign the user to the role, and apply the role to all clusters and VMs

Full Access
Question # 45

Refer to Exhibit:

Why has an anomaly been triggered?

A.

Because the CPU usage crossed the blue band.

B.

Because the blue band range increased over the last 2 days

C.

Because the CPU usage dropped belon' 20%

D.

Because the CPU usage reached 100%

Full Access
Question # 46

An administrator wants to reduce the largest amount of alert emails received from Prism Central.

Which two settings should the administrator customize to meet this requirement? (Choose two)

A.

Skip empty digest email

B.

Every Single Alert

C.

Dally Digest

D.

Email Recipients

Full Access
Question # 47

Refer to Exhibit:

An administrator wants to replace and old node with a node of newer generation in a 3-node cluster. The administrator has already chosen the appropriate node. But unable to remove it from the cluster.

Why is the Remove Host option not shown in the exhibit?

A.

The host needs to be placed into maintenance Mode before.

B.

It is only possible to remove a host from a cluster using CLI.

C.

It is not possible to remove a node from a the cluster using Prism Central

D.

It is not possible to remove a host from a 3-node cluster.

Full Access
Question # 48

An administrator is not able to log into Prism Central by using a new Active Directory user account. After Logging with the local user, the administrator verified that Directory Services and Role Mapping setting are valid.

What is the most likely cause of this issue?

A.

Change password at next logon attribute is set.

B.

User does not belong to the Administrators group.

C.

Active Directory functional level of wrong.

D.

Prism Element authentication is not configured.

Full Access
Question # 49

Refer to Exhibit:

Which statement is true?

A.

A critical alert will be triggered if I/O working set size goes over 6000 MB.

B.

A critical alert will be triggered when there is an anomaly above 4000 MB.

C.

A warning alert will be triggered after 3 anomalies have been catch.

D.

A warning alert will be triggered if I/O working set size goes over the blue band.

Full Access
Question # 50

A customer has a 24-node cluster with all containers configured with RF3. Two different nodes have incurred a simultaneous HDD failure.

What is the result?

A.

The cluster runs in a degraded state until the failed drives are replaced and the data has been restored to three replicas.

B.

Sixty minutes after the failures a rebuild of the lost data can remaining HDDs begins to restore to three replicas.

C.

The VMs with data on those drives crash, and an HA event occurs, restarting them on a remaining healthy node.

D.

The Nutanix cluster recognizes the failures and immediately begins to rebuild lost data to three replicas.

Full Access
Question # 51

When a VM is connected to a Nutanix managed network, when is the IP addressed assigned?

A.

When the vNIC is created on the VM.

B.

When the VM is powered on.

C.

When the guest OS sends a DHCP request.

D.

When the guest OS receives a DHCP acknowledge.

Full Access
Question # 52

What is he recommended approach for a constrained VM?

A.

Reboot the VM

B.

Delete the VM.

C.

Increase the VM resources.

D.

Decrease the VM resources

Full Access
Question # 53

A cluster has RF2. The cluster loses two drives on different nodes in the same storage tier.

What is the effect on the replicas of the VMs?

A.

Some VM data may be lost

B.

No VMs lose data if the node has two or more SSDs

C.

Some VMs may reboot and gain access to data

D.

No VMs lose data because of RF2

Full Access