Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

NCP-MCI-6.5 Exam Dumps - Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) v6.5 exam

Question # 4

An administrator is configuring cross-hypervisor DR from an ESXi cluster to a new AHV cluster. When the administrator migrates a protection domain to the AHV cluster, the VMs fail to boot.

What should the administrator do to correct this problem?

A.

Increase the snapshot frequency to more than 6 hours.

B.

Uninstall VMware Tools from the VMs.

C.

Install Nutanix Guest Tools in the protected VMs.

D.

Add all VMs into a single consistency group.

Full Access
Question # 5

Refer to the exhibit.

An administrator is adding a new node to a cluster. The node has been imaged to the same versions of AHV and AOS that the cluster running, configured with appropriate IP addresses, and br0-up has been configured the same the existing uplink bonds

When attempting to add the node to the cluster with the Expand Cluster function in Prism , the cluster is unable to find the new node.

Based on the above output from the new node, what is most likely the cause of this issue?

A.

The ports on the upstream switch are not configured for LACP.

B.

The existing and the expansion node are on different VLANs.

C.

There is a firewall blocking the discovery traffic from the tlu

D.

LACP configuration must be completed after cluster expansion

Full Access
Question # 6

Administrator is creating a Windows 10 VM that will be used for a virtual desktop template. After creating the VM and booting to the ISO, the administrator is unable to install Windows and receives the following error.

What steps does the administrator need to take to install the OS?

A.

Load the Nutanix VirtIO Serial Bus Driver.

B.

Load the VirtIO Network Ethernet Adaper.

C.

Load the Nutanix Virtual Balloon Driver.

D.

Load the Virtual SCSI pass-through controller.

Full Access
Question # 7

After running an LCM inventory it is noticed that there are a number of firmware and software updates available. The administrator would like to avoid any host reboots, but would like to apply some of the available updates?

Which two updates can be done while avoiding a host reboot? (Choose two.)

A.

M.2 Drives

B.

AHV

C.

Data Drives

D.

AOS

Full Access
Question # 8

Refer to Exhibit:

An administrator wants to replace and old node with a node of newer generation in a 3-node cluster. The administrator has already chosen the appropriate node. But unable to remove it from the cluster.

Why is the Remove Host option not shown in the exhibit?

A.

The host needs to be placed into maintenance Mode before.

B.

It is only possible to remove a host from a cluster using CLI.

C.

It is not possible to remove a node from a the cluster using Prism Central

D.

It is not possible to remove a host from a 3-node cluster.

Full Access
Question # 9

Refer to exhibit:

An administrator needs to update some images that were previously uploaded to their Nutanix cluster, while logged into Prism Element when trying to update the images, the update icon is not enabled.

What could be the cause for this behavior?

A.

RBAC is configured and the administrator's user doesn't have the right privileges.

B.

The files were ISO but were uploaded as disk images hence cannot be used or edited.

C.

Images are corrupted and must be re-uploaded.

D.

Images were imported into Prism Central.

Full Access
Question # 10

A configuration is single domain, single forest, and does not use SSL.

Which port number should be used to configure LDAP?

A.

389

B.

3269

C.

636

D.

3268

Full Access
Question # 11

After configuring Active Directory as the desired authentication service, an administrator is not able to login into Prism Central using privileged account.

Which configuration must be checked first?

A.

Account lock status

B.

Role Mapping

C.

Local user account

D.

Cluster Lockdown

Full Access
Question # 12

Which two methods are available when migrating a VM from a legacy 3-tier solution using VMware ESXi to AHV? (Choose two.)

A.

Deploy the Move appliance.

B.

Use Cross-Hypervisor DR.

C.

Import the .vmdk into the Image Service.

D.

Use shared nothing live migration.

Full Access
Question # 13

When installing Nutanix Guest Tools (NGT) on an ESXi-hosted VM, which port should be enabled on the VM to allow communication with the NGT-Controller VM service?

A.

2000

B.

2074

C.

8080

D.

9943

Full Access
Question # 14

An administrator needs to bring down a host in a Nutanix Cluster for maintenance reasons. The administrator puts the host in maintenance mode.

What should the administrator do to perform an orderly shutdown of the CVM?

A.

Execute the cvm_shutdown -P new command from the CVM.

B.

Enter Fever off Server - immediate from the IPMI console.

C.

Enter Fewer off Server-orderly Shutdown from the IPMI console.

D.

Execute the cvm_shutdown -P now command from the host.

Full Access
Question # 15

What is the name of the internal bridge used by AHV nodes and CVMs?

A.

vnet0

B.

br1

C.

br0

D.

virbr0

Full Access
Question # 16

In the event of a disk failure, which process will immediately ad automatically scans Cassandra to find all data previously hosted on the failed disk, and all disks in that node?

A.

Curator

B.

Stargate

C.

Genesis

D.

Prism

Full Access
Question # 17

Where are Leap Availability Zones configured?

A.

Cloud Connect

B.

Controller VM

C.

Prism Element

D.

Prism Central

Full Access
Question # 18

When VM HA Reservation is enabled, what is the expected behavior for all failed VMs in the event of a host

failure?

A.

Restart on a best-effort basis if resources are available

B.

Perform a live migration to other hosts in the AHV cluster

C.

Restart on other hosts in the AHV cluster

D.

Perform a live migration on a best-effort basis if resources are available

Full Access
Question # 19

An administrator is not able to log into Prism Central by using a new Active Directory user account. After Logging with the local user, the administrator verified that Directory Services and Role Mapping setting are valid.

What is the most likely cause of this issue?

A.

Change password at next logon attribute is set.

B.

User does not belong to the Administrators group.

C.

Active Directory functional level of wrong.

D.

Prism Element authentication is not configured.

Full Access
Question # 20

An administrator needs to shut down an AHV cluster to relocate hardware. The administrator upgrades NCC and runs health checks.

Which steps should the administrator perform next?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements.

Full Access
Question # 21

After the initial configuration and upgrade of NCC, the administrator notices these critical alerts:

. IPMI 10.7.133.33 is using default password

. Host 10.7.133.25 is using default password

. CVM 10.7.133.31 is using default password

Which two initial cluster configuration tasks were missed during the deployment process? (Choose two.)

A.

CVM password changes

B.

BIOS password changes

C.

Host password changes

D.

Password policy changes

Full Access
Question # 22

Which change can be made on a cluster with software-based Data-at-Rest Encryption enabled?

A.

Disable encryption on the cluster

B.

Deploy an additional Native KMS Server

C.

Enable encryption for a VM

D.

Change Native KMS to External KMS

Full Access
Question # 23

Which Nutanix service control ncli, the HTML5 UI, and Rest API?

A.

Prism

B.

Cassandra

C.

Zookeeper

D.

Chronos

Full Access
Question # 24

The administrator wants a container to be displayed and limited to 1TB in the hypervisor.

What advanced container setting must the administrator set?

A.

Advertised Capacity

B.

Reserved Capacity

C.

Advertised Quota

D.

Reserved Quota

Full Access
Question # 25

An Administrator has been asked to deploy VMs using a specific image. The image has been configured with settings and applications that will be used by engineering to develop a new product by the company.

The image is not available on the desired cluster, but it is available in other cluster associated with Prism Central.

Why isno’t the image available?

A.

The image bandwidth policy has prevented the image upload.

B.

The cluster should be removed from all categories.

C.

The cluster has not been added to the correct category

D.

The image placement policy was configured with enforcement.

Full Access
Question # 26

Where can an administrator change a CVM password?

A.

KMS Server Terminal

B.

CVM setting in Prism Element

C.

CVM setting in Prism Central

D.

Prism CVM VM Console

Full Access
Question # 27

An administrator wants to create a trunked interface on a VM on AOS 5.15x.

Which two steps should the administrator take first to achieve this? (Choose two)

A.

Use acli

B.

Log in over PE web UI.

C.

SSH to CVM.

D.

Update VM dialog.

Full Access
Question # 28

An administrator is reviewing performance of a core banking system that routinely has 20,000 concurrent users. During, business hours, the CPU on the applications servers runs at close to 100%. The administrator needs to determine if there is a performance issue specific to the app servers, the database servers, or all servers on the cluster.

Which metrics should the administrator review in Prism Analysis Graphs?

A.

Cluster IO, Network, Database and App Server CPU

B.

Cluster CPU and Memory Only

C.

Cluster IO, CPU, Memory and Database and App Server CPU

D.

Cluster IO, CPU, Memory, Network, App Server CPU

Full Access
Question # 29

Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness?

A.

Continuous Data Protection

B.

Copy-on-Write

C.

Split-mirror

D.

Redirect-On-Write

Full Access
Question # 30

An administrator has created several custom alert policies, which are applied to the same entities. Prism Central displays a message that a similar policy exists.

In what order of precedence are overlapping policies evaluated?

Full Access
Question # 31

How should an administrator enable secure access to Volumes using a password?

A.

iSER

B.

CHAP

C.

SAML

D.

LDAP

Full Access
Question # 32

Which two types of granular RBAC does Nutanix provide for AHV hosts? (Choose two.)

A.

Category based

B.

Project based

C.

Disk based

D.

Cluster based

Full Access
Question # 33

A guest VM should be able to tolerate simultaneous failure of two nodes or drives.

What are the minimum requirements for the Nutanix cluster?

A.

3 nodes with cluster RF 3 and container RF 3

B.

3 nodes with cluster RF 3 and container RF 2

C.

5 nodes with cluster RF 2 and container RF 3

D.

5 nodes with cluster RF 3 and container RF 3

Full Access
Question # 34

An Administrator is working on a one-node ROBO cluster configurations

Which statement is true for this configuration?

A.

Witness vm required to break cluster quoram

B.

Supported hardware is NX-1175-G5 and G6

C.

witness vm should be 8vcp and 20gb ram

D.

the minimum RPO 8 hours required

Full Access
Question # 35

An administrator wants to expand the Failure Domain level of a cluster.

What two options are available? (Choose two.)

A.

Node

B.

Data Center

C.

Block

D.

Rack

Full Access
Question # 36

The customer is seeing high memory utilization on a mission critical VM. Users report that the application is unavailable. The guest OS does not support hot add components.

How should the administrator fix this issue?

A.

Access the CVM on the host that is running the VM:

*Open acli

*Run a command to increase the amount of RAM assigned to the VM

B.

From the Prism web console:

*Go to the VM dashboard

*Select the VM from the VMs list

*Choose Update

*Adjust the amount of memory assigned to the VM

C.

Go to Control Panel in the VM:

*Select the Computer Properties

*Increase the amount of RAM assigned

D.

During the next maintenance window:

*Select the VM from the VMs list

*Perform a graceful shutdown

Full Access
Question # 37

Which baseline is used to identify a Zombie VM?

A.

VM is powered off for the past 21 days.

B.

Memory usage is less than 1% and memory swap rate is equal to 0 Kbps for the past 21 days.

VM has no logins for the past 21 days

C.

VM has no logins for the past 21 days

D.

Fewer than 30 1/Os and less than 1000 bytes per day of network traffic for the past 21 days

Full Access
Question # 38

Async DR is configured between two sites. A network outage occurs at the primary site.

Which steps must the administrator perform to bring the VMs back into service at the backup site?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements. Not all procedures are valid. Identify any invalid procedures using the drop-down option.

Full Access
Question # 39

Refer to Exhibit:

After configuring modules for a Remote Syslog Server, the settings are as shown. The administrator notices that even though the level parameter is set to EMERGENCY, that all monitor logs are being sent.

What is the likely cause of this issue?

A.

A second rsyslog server is configured to send all monitor logs.

B.

Having the Module Name set to STARGATE sends all monitor logs regardless of the level.

C.

A Log Level of EMERGENCY includes all monitor logs.

D.

The true setting for Include Monitor Logs sends all monitor logs regardless of the level.

Full Access
Question # 40

An administrator manages a cluster and notices several failed components shown in the exhibit.

What two options does the administrator have to run all NCC checks manually? (Choose two.)

A.

Using the Actions drop-down menu in the Health dashboard of Prism Element.

B.

Running ncc health_checks run-alll on the CVM

C.

Using the action action drop-down menu in the Health dashboard of Prism Central

D.

Running noc health_checks run_all on the PC VM

Full Access
Question # 41

On a Nutanix cluster, what does Network Segmentation refer to?

A.

A distributed firewall for security VM to VM traffic.

B.

Physically separating management traffic from guest VM traffic.

C.

Isolating intra-cluster traffic from guest VM traffic.

D.

Isolating management traffic from storage replication traffic.

Full Access
Question # 42

An administrator is working with Nutanix Support and needs to provide logs for troubleshooting an issue. The cluster is located in a secure environment. Data such as IP addresses and VM names cannot be shared.

Which method should be used to anonymize the log data sent to Nutanix Support?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 43

An administrator needs to report on any alerts generated by a Nutanix cluster that affected the cluster's availability over the past 10 days.

Which method should be used to locate these events?

A.

On the Health dashboard, use the Log Collector to export data based on time stamp.

B.

Export the cluster event log to a CSV on the Alerts dashboard.

C.

On the Alerts dashboard, filter based on Impact Type and the desired Time Range.

D.

Configure an Alert Policy to generate an email with the data on the Health dashboard.

Full Access
Question # 44

What is the proper sequence to perform a one-click upgrade to a Nutanix cluster?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements. Not all procedures are valid. Identify any invalid procedures using the drop-down option.

Full Access
Question # 45

Refer to Exhibit.

An administrator increases the cluster RF to 3. The containers are not modified.

What will the new values in the data resiliency dashboard be for FAILURES TOLERABLE for the Zookeeper and Extent Groups components?

A.

Zookeeper = 1 and Extent Groups = 1

B.

Zookeeper = 2 and Extent Groups = 2

C.

Zookeeper = 2 and Extent Groups = 1

D.

Zookeeper = 1 and Extent Groups = 2

Full Access
Question # 46

Refer to Exhibit:

Which statement is true?

A.

A critical alert will be triggered if I/O working set size goes over 6000 MB.

B.

A critical alert will be triggered when there is an anomaly above 4000 MB.

C.

A warning alert will be triggered after 3 anomalies have been catch.

D.

A warning alert will be triggered if I/O working set size goes over the blue band.

Full Access
Question # 47

An administrator needs to configure a new subnet on an AHV cluster and want to ensure that VMs will automatically be assigned an IP address at creation time.

Which type of network does the administrator need to create?

A.

Dynamic Network

B.

Unmanaged Network

C.

Managed Network

D.

DHCP Network

Full Access
Question # 48

An administrator needs to run a mixed Exchange and SQL workload with a guaranteed amount of container

space for each application.

How should the administrator meet this requirement?

A.

Create one container and set capacity reservation

B.

Create two containers and reserve space for containers

C.

Create one container and enable compression

D.

Create two containers and reserve space for vDisks

Full Access
Question # 49

An administrator is setting up a Nutanix cluster and needs to configure the default VLAN.

Which configuration should the administrator choose?

A.

Vlan.0

B.

Vlan.1

C.

Vlan.2

D.

Vlan.7

Full Access
Question # 50

An administrator is commissioning a Nutanix Enterprise Cloud. Once the user VMs have been deployed and are running, the administrator finds that VMs on the same host are able to communicate, but are unable to communicate between hosts.

What must be changed to enable full inter-VM communications?

A.

Change the spanning-tree port type on the switch.

B.

Change the network the VMs are connected to

C.

Update the switch to specifically allow VLAN 15

D.

The VMs need to have static IP addresses.

Full Access
Question # 51

In a default configuration of an AHV cluster, a single node fails.

What happens to the running VMs on that node?

A.

The cluster restarts all VMs in the event of a host failure

B.

The VMs do a live migration to the master node in the cluster

C.

The VMs do a live migration to any other node in the cluster

D.

The cluster attempts to restart VMs on other hosts

Full Access
Question # 52

Which command should an administrator run from the CLI to view the uplink state of all AHV nodes in the

cluster?

A.

allssh show_uplinks

B.

manage_ovs show_uplinks

C.

allssh manage_ovs show_uplinks

D.

manage ovs show uplinks

Full Access