Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

NCP-MCI-6.10 Exam Dumps - Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI v6.10)

Go to page:
Question # 9

An administrator is managing an environment based on two different AHV-based and ESXi-based clusters. Workloads are evenly distributed and in a healthy state.

A Linux VM running on ESXi is not performing well at the storage level and is configured as follows:

• VCPU: 8

• VRAM: 32

• vDisk: 3, first 100 GB, second 250 GB, third 250 GB

What is the easiest way to test VM performance, while minimizing downtime?

A.

Increase the number of vCPUs.

B.

Migrate the VM to the AHV cluster.

C.

Enable vDisk sharding at AOS level.

D.

Collapse the second and the third disk into a single one

Full Access
Question # 10

How can a VM or Volume Group (VG) be associated with a Storage Policy?

A.

Assign the Storage Policy directly on the VM or VG.

B.

Assign the VM or VG directly to the Storage Policy.

C.

Migrate the VM or VG to the Storage Container assigned to the Storage Policy.

D.

Assign the VM or VG to the same Category as the Storage Policy.

Full Access
Question # 11

An administrator needs tocreate a storage containerforVM disks. The container must meet the following conditions:

    10 GiB of the total allocated space must not be used by other containers.

    The container must have a maximum storage capacity of 500 GiB.

What settings should the administrator configure while creating the storage container?

A.

Set Advertised Capacity to 10 GiB and Reserved Capacity to 500 GiB.

B.

Set Advertised Capacity to 10 GiB.

C.

Set Reserved Capacity to 500 GiB.

D.

Set Reserved Capacity to 10 GiB and Advertised Capacity to 500 GiB.

Full Access
Question # 12

An administrator is tasked with optimizing a VM's storage to leverage compression features. Currently, vDisks are in a storage container default-container-91753272703541 that has no optimization activated. The administrator must move the VM's storage to the storage container Production.

What is the most efficient way to achieve this operation?

A.

Recreate VM in the Production storage container configuration and copy data.

B.

Recreate vDisk in the Production storage container configuration and copy data.

C.

Migrate VM to the Production storage container.

D.

Migrate vDisks to the Production storage container.

Full Access
Question # 13

Which task should be performed first when upgrading host memory?

A.

Gracefully stop the host by using the out of band management interface.

B.

Remove node from the cluster.

C.

Execute "shutdown -h now" from the AHV command line interface.

D.

Place node into the maintenance mode

Full Access
Question # 14

An administrator is responsible forresource planningand needs to plan forresiliencyof a10-node RF3 cluster. The cluster has100TB of storage.

How should the administrator plan for capacity in the event of future failures?

A.

Set Reserve Storage Capacity (%) to 20.

B.

Set Reserve Capacity for Failure to None.

C.

Set Reserve Capacity for Failure to Auto Detect.

D.

Set Reserve Memory Capacity (%) to 20.

Full Access
Question # 15

An administrator is working with anetwork engineerto design thenetwork architecture for a DR failover.

BecauseDNS is well-designed, theDR site will use a different subnetbutretain the same last octetin the IP address.

What is the best way to achieve this?

A.

Use a custom script to update the IP address after instantiation in DR.

B.

Set up IPAM so the address is dynamically assigned during DR.

C.

Manually log into VMs after the DR event and update the last octet.

D.

Utilize Recovery Plan Offset-based IP mapping.

Full Access
Question # 16

Theteam leads of a development environmentwant tolimit developer accessto a specific set ofVMs.

What is the most efficient way to enable the team leads to directly manage these VMs?

A.

Create arole mappingfor each team lead and assign appropriately.

B.

Create aVPCfor each team lead and give themVPC Admin.

C.

Create aProjectfor each team lead and assign access.

D.

CreateSecurity Policiesto isolate users.

Full Access
Go to page: