Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

NCP-MCI-6.5 Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) v6.5 exam Questions and Answers

Questions 4

Where are Leap Availability Zones configured?

Options:

A.

Cloud Connect

B.

Controller VM

C.

Prism Element

D.

Prism Central

Buy Now
Questions 5

What is the default network bond setting for an AHV host configuration?

Options:

A.

active-backup

B.

active-active

C.

balance-slb

D.

balance-tcp

Buy Now
Questions 6

Refer to exhibit:

Why has an anomaly been triggered?

Options:

A.

Controller reached 2500 IOPS.

B.

Observed IOPS exceed normal values.

C.

Normal Controller behavior has increased.

D.

Observed values do not match predicted values.

Buy Now
Questions 7

An administrator responsible for a VDl environment needs to investigate reports of slow logins. The administrator finds that increasing the number of vCPUs from 2 to 4 will reduce the login times. Production workloads are consuming 75% of the host CPU on the cluster. The administrator increases the vCPU count on all of the VDl VMs.

What are two impacts on the cluster? (Choose two)

Options:

A.

Increasing CPU counts will decrease memory utilization

B.

Increase memory utilization%

C.

Increase CPU utilization%

D.

Increase CPU ready%

Buy Now
Questions 8

An administrator needs to deploy an application with a large amount of data connected via Nutanix volumes.

Which two actions should the administrator take when designing the Volume Group? (Choose two.)

Options:

A.

Distribute workload across multiple virtual disks

B.

Enable RSS (Receive Side Scaling)

C.

Use multiple subnets for iSCSI traffic

D.

Enable thick provisioning on the Volume Group(s)

Buy Now
Questions 9

A customer wants to isolate a group of VMs within their Nutanix environment for security reasons. The customer creates a VM with two NICs to act as a firewall and installs the appropriate software and certificates.

However, no one from the outside can access the application.

What is the likely cause of this problem?

Options:

A.

A shared volume group must be used by all isolated VMs

B.

More than one NIC cannot be added to a VM

C.

One of the NICs needs to be configured on the internal VLAN

D.

Wireshark is installed on the NAT VM

Buy Now
Questions 10

An administrator needs to run a mixed Exchange and SQL workload with a guaranteed amount of container

space for each application.

How should the administrator meet this requirement?

Options:

A.

Create one container and set capacity reservation

B.

Create two containers and reserve space for containers

C.

Create one container and enable compression

D.

Create two containers and reserve space for vDisks

Buy Now
Questions 11

After the initial configuration and upgrade of NCC, the administrator notices these critical alerts:

. IPMI 10.7.133.33 is using default password

. Host 10.7.133.25 is using default password

. CVM 10.7.133.31 is using default password

Which two initial cluster configuration tasks were missed during the deployment process? (Choose two.)

Options:

A.

CVM password changes

B.

BIOS password changes

C.

Host password changes

D.

Password policy changes

Buy Now
Questions 12

An administrator wants to use Volumes to connect to physical servers that are not able to be virtualized.

Which three things must be configured for Volumes to support iSCSI clients? (Choose three)

Options:

A.

Enable external client access

B.

Client OS iSCSI initiator

C.

iSCSI Multipathing I/O

D.

Cluster Virtual IP address

E.

Data Services IP address

Buy Now
Questions 13

What requires iSCSI initiator configuration in the guest OS to use Volumes?

Options:

A.

SQL Server Always On Availability Group

B.

Microsoft Windows Failover Cluster

C.

Oracle RAC

D.

Exchange DAG

Buy Now
Questions 14

An administrator is preparing to deploy a new application on an AHV cluster, Security requirements dictate that all virtual servers supporting this application must be prevented from communicating with unauthorized hosts.

Which option would achieve this goal?

Options:

A.

Create a new VLAN, create a subnet on the cluster with the VLAN tag, deploy servers with vNlCs in the new subnet.

B.

Create a new Application Security Policy restricting communication to the authorized hosts and apply it to the servers in enforce mode.

C.

Create a new solation Environment policy apply it to the new servers and all authorized hosts.

D.

Create new' subnet and assign to an existing VPC assign the IP prefix and gateway for the subnet, deploy servers with vNlC5 in the new subnet.

Buy Now
Questions 15

Which component ensures uniform distribution of data throughout the cluster to eliminate hot spots and speed up rebuilds?

Options:

A.

Cassandra

B.

Distributed Storage Fabric

C.

High Availability

D.

Acropolis App Mobility Fabric

Buy Now
Questions 16

A vDisk is read by multiple VMs. The cluster creates immutable copies of the vDisk. What are these vDisk copies called?

Options:

A.

Disk Clones

B.

Golden Images

C.

Volume Groups

D.

Shadow Clones

Buy Now
Questions 17

Refer to Exhibit:

An administrator needs to enable inline deduplication for a pre-existing storage container. When trying to enable deduplication on the storage container. this feature is grayed-out.

What is the reason for this behavior?

Options:

A.

Replication Factor 1 is configured on the storage container.

B.

The cluster has less than 5 nodes which is the minimum node-count to enable deduplication.

C.

Capacity reservation is not enabled on the storage container.

D.

The cluster has hybrid storage and deduplication is supported only on all-flash clusters.

Buy Now
Questions 18

An Administrator is working on a one-node ROBO cluster configurations

Which statement is true for this configuration?

Options:

A.

Witness vm required to break cluster quoram

B.

Supported hardware is NX-1175-G5 and G6

C.

witness vm should be 8vcp and 20gb ram

D.

the minimum RPO 8 hours required

Buy Now
Questions 19

An Administrator has been asked to deploy VMs using a specific image. The image has been configured with settings and applications that will be used by engineering to develop a new product by the company.

The image is not available on the desired cluster, but it is available in other cluster associated with Prism Central.

Why isno’t the image available?

Options:

A.

The image bandwidth policy has prevented the image upload.

B.

The cluster should be removed from all categories.

C.

The cluster has not been added to the correct category

D.

The image placement policy was configured with enforcement.

Buy Now
Questions 20

Which node type does not deploy a Nutanix Controller VM?

Options:

A.

Storage Only

B.

Hyper Converged

C.

Compute Only

D.

All Flash

Buy Now
Questions 21

What is the name of the internal bridge used by AHV nodes and CVMs?

Options:

A.

vnet0

B.

br1

C.

br0

D.

virbr0

Buy Now
Questions 22

Which change can be made on a cluster with software-based Data-at-Rest Encryption enabled?

Options:

A.

Disable encryption on the cluster

B.

Deploy an additional Native KMS Server

C.

Enable encryption for a VM

D.

Change Native KMS to External KMS

Buy Now
Questions 23

Which command should an administrator run from the CLI to view the uplink state of all AHV nodes in the

cluster?

Options:

A.

allssh show_uplinks

B.

manage_ovs show_uplinks

C.

allssh manage_ovs show_uplinks

D.

manage ovs show uplinks

Buy Now
Questions 24

A configuration is single domain, single forest, and does not use SSL.

Which port number should be used to configure LDAP?

Options:

A.

389

B.

3269

C.

636

D.

3268

Buy Now
Questions 25

An administrator would like to leverage the Reliable Event Logging Protocol (RELP) with their Remote Syslog Server. After completing the configuration, it is observed that RELP logging is not working as expected.

What is the likely cause of this issue?

Options:

A.

The cluster does not have RELP installed.

B.

The GENESIS was the only one chosen to forward log information.

C.

The Remote Syslog Server was configure using TCP as the protocol.

D.

The remote server does not have rsyslog-relp installed.

Buy Now
Questions 26

When a configuring a syslog server in Prism Central, what two pieces information are required? (Choose two.)

Options:

A.

HTTPS URL

B.

Encryption secret

C.

Transport protocol

D.

IP address/port

Buy Now
Questions 27

When installing Nutanix Guest Tools (NGT) on an ESXi-hosted VM, which port should be enabled on the VM to allow communication with the NGT-Controller VM service?

Options:

A.

2000

B.

2074

C.

8080

D.

9943

Buy Now
Questions 28

An administrator wants to expand the Failure Domain level of a cluster.

What two options are available? (Choose two.)

Options:

A.

Node

B.

Data Center

C.

Block

D.

Rack

Buy Now
Questions 29

An administrator needs to limit the amount of storage space that data stored in single container can consume.

Which action should the administrator take?

Options:

A.

Enable reservation for rebuild capacity

B.

Set an advertised capacity for the container

C.

Store VM snapshots in a different container

D.

Thick prevision the container

Buy Now
Questions 30

An administrator wants to receive an environment summary report when a host failure occurs.

Which action would address the administrator’s need?

Options:

A.

Enable App Discovery

B.

Edit report schedule

C.

Configure an alert policy

D.

Create a playbook

Buy Now
Questions 31

What is the minimum time a newly created Deduplication storage policy takes to apply to the VMs in the container?

Options:

A.

5 Minutes

B.

10 minutes

C.

30 minutes

D.

60 minutes

Buy Now
Questions 32

CPU utilization climbs above 90% on several VMs. This causes performance degradation for a business-critical application.

How can alerts be configured to notify the administrator before VM CPU utilization hits 90%?

Options:

A.

On a CVM, use ncli to set the VM CPU Check threshold for the critical VMs to a value below 90%.

B.

On the Health dashboard, locate the VM CPU Check and lower the alert threshold below 90%.

C.

On a CVM, configure a cron job to run the VM CPU Check more frequently and email the result.

D.

On the Alerts dashboard, ensure that the VM CPU usage alert is not set to auto-resolve.

Buy Now
Questions 33

Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness?

Options:

A.

Continuous Data Protection

B.

Copy-on-Write

C.

Split-mirror

D.

Redirect-On-Write

Buy Now
Questions 34

Refer to Exhibit:

An administrator wants to replace and old node with a node of newer generation in a 3-node cluster. The administrator has already chosen the appropriate node. But unable to remove it from the cluster.

Why is the Remove Host option not shown in the exhibit?

Options:

A.

The host needs to be placed into maintenance Mode before.

B.

It is only possible to remove a host from a cluster using CLI.

C.

It is not possible to remove a node from a the cluster using Prism Central

D.

It is not possible to remove a host from a 3-node cluster.

Buy Now
Questions 35

A user is complaining about slowness of a mission-critical MSSQL Server. The administrator logs into Prism Element to investigate the VM performance and observes what is shown in the diagram.

Which action would best improve VM performance?

Options:

A.

Disable hyperthreading in the BIOS.

B.

Add additional RAM to the user VM.

C.

Add additional RAM to the host on which the VM is running.

D.

Ensure the host's CPUs ere not excessively overcommitted.

Buy Now
Questions 36

An administrator has received reports of users being disconnected from remote desktop sessions to a specific VM.

Which VM metric is most useful isolating the cause of the issue?

Options:

A.

Storage Controller Bandwidth

B.

Swap-Out Rate

C.

Hypervisor CPU Ready time (%)

D.

Virtual NIC receive packet dropped

Buy Now
Questions 37

After configuring Active Directory as the desired authentication service, an administrator is not able to login into Prism Central using privileged account.

Which configuration must be checked first?

Options:

A.

Account lock status

B.

Role Mapping

C.

Local user account

D.

Cluster Lockdown

Buy Now
Questions 38

When VM HA Reservation is enabled, what is the expected behavior for all failed VMs in the event of a host

failure?

Options:

A.

Restart on a best-effort basis if resources are available

B.

Perform a live migration to other hosts in the AHV cluster

C.

Restart on other hosts in the AHV cluster

D.

Perform a live migration on a best-effort basis if resources are available

Buy Now
Questions 39

Which data savings technique utilizes stripes and parity calculation in a Nutanix cluster?

Options:

A.

Compression

B.

Parity strip

C.

Erasure coding

D.

Deduplication

Buy Now
Questions 40

Which AOS process determine if an I/O from a user will be written to OpLog or to an Extent Store?

Options:

A.

Stargate

B.

Curtor

C.

Cassandara

D.

Zeus

Buy Now
Questions 41

Which inefficient VM Profile can be used to identify a VM that consumes too many resources and causes other VMs to starve?

Options:

A.

Over-provisioned VM

B.

Inactive VM

C.

Bully VM

D.

Constrained VM

Buy Now
Questions 42

An administrator is implementing a VDI solution. The workload will be a series of persistent desktops in a dedicated storage container within a four-node cluster Storage optimizations should be set on the dedicated storage container to give optimal performance including during a node failure event

Which storage optimizations should the administrator set to meet the requirements?

Options:

A.

Compression only

B.

Deduplication and Erasure Coding

C.

Compressoion and Deduplication

D.

Compression Deduplication and Erasure Coding

Buy Now
Questions 43

Which two methods are available when migrating a VM from a legacy 3-tier solution using VMware ESXi to AHV? (Choose two.)

Options:

A.

Deploy the Move appliance.

B.

Use Cross-Hypervisor DR.

C.

Import the .vmdk into the Image Service.

D.

Use shared nothing live migration.

Buy Now
Questions 44

An administrator is concerned about the amount of data that a VM reading and writing to the storage fabric.

Which metric will provide that data?

Options:

A.

Host Hypervisor IO Bandwidth

B.

Host Disk IOPS

C.

VM Storage Controller IOPS

D.

VM Storage Controller Bandwidth

Buy Now
Questions 45

The administrator wants a container to be displayed and limited to 1TB in the hypervisor.

What advanced container setting must the administrator set?

Options:

A.

Advertised Capacity

B.

Reserved Capacity

C.

Advertised Quota

D.

Reserved Quota

Buy Now
Questions 46

An administrator is tasked with configuring networking on an AHV cluster and needs to optimize for maximum single VM throughput.

Which bond mode should the administrator select?

Options:

A.

Active-Active with Mac pinning

B.

Active-Active

C.

Active-Backup

D.

No Uplink Bond

Buy Now
Questions 47

An administrator needs to increase bandwidth available to the AHV host and to the CVM.

How should the administrator complete this task?

Options:

A.

In Prism, update vs0 to change the configuration to Active-Active.

B.

Use manage-ovs commands to update br0 change the configuration to Active-Active.

C.

In Prism, create a vsl interface and add any remaining uplinks.

D.

Use manage-ovs commands to create br1 and add any remaining uplinks

Buy Now
Questions 48

Which three configuration scenarios are valid for the deployment of Prism Central? (Choose three.)

Options:

A.

Environments use Network Address Translation.

B.

Prism Elements and Prism Central art in different subnets.

C.

Environments do not have Internet access.

D.

Prism Elements and Prism Central have proxy configured.

E.

Environments use the 192.168.5.0/24 CVM management network.

Buy Now
Questions 49

When configuring Prism Central, which two log modules are able to forward messages to an external syslog server? (Choose two.

Options:

A.

API Audit

B.

Flow

C.

DNS

D.

NTP Synchronization

Buy Now
Questions 50

Refer to the exhibit.

An administrator is adding a new node to a cluster. The node has been imaged to the same versions of AHV and AOS that the cluster running, configured with appropriate IP addresses, and br0-up has been configured the same the existing uplink bonds

When attempting to add the node to the cluster with the Expand Cluster function in Prism , the cluster is unable to find the new node.

Based on the above output from the new node, what is most likely the cause of this issue?

Options:

A.

The ports on the upstream switch are not configured for LACP.

B.

The existing and the expansion node are on different VLANs.

C.

There is a firewall blocking the discovery traffic from the tlu

D.

LACP configuration must be completed after cluster expansion

Buy Now
Questions 51

In Nutanix clusters, which feature ensures VMs can be migrated and restarted on another host in case of failure?

Options:

A.

High Availability

B.

Protection Domain

C.

Host Affinity Rules

D.

Availability Zone

Buy Now
Questions 52

Which three cluster operations require an administrator to reclaim licenses?(Choose three)

Options:

A.

Destroy a cluster.

B.

Upgrade a cluster

C.

Migrate a cluster

D.

Remove a Node from a cluster

E.

Move Nodes between clusters.

Buy Now
Exam Code: NCP-MCI-6.5
Exam Name: Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) v6.5 exam
Last Update: May 1, 2024
Questions: 175
NCP-MCI-6.5 pdf

NCP-MCI-6.5 PDF

$28  $80
NCP-MCI-6.5 Engine

NCP-MCI-6.5 Testing Engine

$33.25  $95
NCP-MCI-6.5 PDF + Engine

NCP-MCI-6.5 PDF + Testing Engine

$45.5  $130