Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Nutanix NCP-MCI-6.5 Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) v6.5 exam Exam Practice Test

Page: 1 / 18
Total 178 questions

Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) v6.5 exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Refer to Exhibit:

Why has an anomaly been triggered?

Options:

A.

Because the CPU usage crossed the blue band.

B.

Because the blue band range increased over the last 2 days

C.

Because the CPU usage dropped belon' 20%

D.

Because the CPU usage reached 100%

Question 2

An administrator needs to periodically send information about cluster efficiency via email to a set of users.

What should be configured to accomplish this task?

Options:

A.

Configure Efficiency widget in Prism Central.

B.

Create a new' prism Central project.

C.

update Capacity Configurations in Prism Central.

D.

Add a schedule to Prism Central reports.

Question 3

The administrator recently had a node fail in an AHV Nutanix cluster. All of the VMs restarted on other nodes in the cluster, but they discovered that the VMs that make up a SQL cluster were running on the failed host. The administrator has been asked to take measures to prevent a SQL outage in the future.

What affinity option will prevent the SQL VMs from running on the same hos?

Options:

A.

VM-VM anti-Affinity policy

B.

Create Affinity Category

C.

VM-Most Affinity policy

D.

Create Affinity Project

Question 4

Which two private key types are supported by the Nutanix SSL certificate implementation? (Choose two.)

Options:

A.

ECDSA

B.

ECDH

C.

ED25519

D.

RSA

Question 5

An administrator needs to limit the amount of storage space that data stored in single container can consume.

Which action should the administrator take?

Options:

A.

Enable reservation for rebuild capacity

B.

Set an advertised capacity for the container

C.

Store VM snapshots in a different container

D.

Thick prevision the container

Question 6

Refer to the Exhibit:

An administrator receives complaints of poor performance in a particular VM.

Based on the VM performance metric, what is the most likely cause of this behavior?

Options:

A.

Oplog is full cannot serve IO request from this VM.

B.

The host’s CPU is severely overloaded.

C.

SSD tier is not big enough to serve workloads’ IOPS demand.

D.

The VM needs more vCPUs

Question 7

Prism Central will be installed manually on an AHV cluster.

Which three disk images must be downloaded from the portal for the Prism Central VM? (Choose three.)

Options:

A.

var

B.

tmp

C.

boot

D.

home

E.

data

Question 8

When installing Nutanix Guest Tools (NGT) on an ESXi-hosted VM, which port should be enabled on the VM to allow communication with the NGT-Controller VM service?

Options:

A.

2000

B.

2074

C.

8080

D.

9943

Question 9

How will an HDD failure affect VMs with data on the failed device?

Options:

A.

The VMs will crash, and will be restarted once the failed HDD has been replaced and the data has been restored.

B.

A live migration will be initiated, moving the affected VMs to a host that contains the replica data.

C.

The VMs will remain operational on that host and continue to function normally with no noticeable impact

D.

An HA event will occur, causing the affected VMs to restart on a node that contains the replica data.

Question 10

An administrator has created several custom alert policies, which are applied to the same entities. Prism Central displays a message that a similar policy exists.

In what order of precedence are overlapping policies evaluated?

Options:

Question 11

A customer has a newly-deployed AHV cluster with nodes that have 2.x 10 GBE and 2.x interface. The customer wants to use all available network interfaces to provide connectivity to the VMs.

Which option should the administrator use to achieve this while remaining consistent with Nutanix recommendations?

Options:

A.

Create separate VLANs that map 10GbE and 1GbE interfaces.

B.

Createbond1 on virbr0 and add the 1GbE interfaces to it for VM use.

C.

Create a second bond on br0 on each host and assign the 1 GbE interfaces to it.

D.

Create a second bridge on each host and assign the 1GbE interfaces to it.

Question 12

What is the function of the virbr0 bridge on AHV?

Options:

A.

To carry all traffic between the user VMs and the upstream network.

B.

To carry management and storage communication between user VMs and the CVM.

C.

To carry management and storage communication between user VMs and AHV host.

D.

To carry storage communication between the guest VMs and the CVM

Question 13

Which best practice should be followed when creating a bond in a Nutanix cluster?

Options:

A.

Place NICs of different speeds within the same bond

B.

Configure the bond to use LACP

C.

Only utilize NICs of the same speed within the same bond

D.

Use the default bond configuration after installation

Question 14

An administrator needs to shut down an AHV cluster to relocate hardware. The administrator upgrades NCC and runs health checks.

Which steps should the administrator perform next?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements.

Options:

Question 15

Which inefficient VM Profile can be used to identify a VM that consumes too many resources and causes other VMs to starve?

Options:

A.

Over-provisioned VM

B.

Inactive VM

C.

Bully VM

D.

Constrained VM

Question 16

An administrator is implementing a VDI solution. The workload will be a series of persistent desktops in a dedicated storage container within a four-node cluster Storage optimizations should be set on the dedicated storage container to give optimal performance including during a node failure event

Which storage optimizations should the administrator set to meet the requirements?

Options:

A.

Compression only

B.

Deduplication and Erasure Coding

C.

Compressoion and Deduplication

D.

Compression Deduplication and Erasure Coding

Question 17

Refer to Exhibit:

An administrator needs to enable inline deduplication for a pre-existing storage container. When trying to enable deduplication on the storage container. this feature is grayed-out.

What is the reason for this behavior?

Options:

A.

Replication Factor 1 is configured on the storage container.

B.

The cluster has less than 5 nodes which is the minimum node-count to enable deduplication.

C.

Capacity reservation is not enabled on the storage container.

D.

The cluster has hybrid storage and deduplication is supported only on all-flash clusters.

Question 18

Which two access protocols are supported by Files? (Choose two.)

Options:

A.

ISCSI

B.

SMB

C.

FCOE

D.

NFS

Question 19

Refer to Exhibit:

The Update Source for LCM has been configured as shown in the exhibit. Inventory is failing consistently.

What is the likely cause of this issue?

Options:

A.

Port 433 Is blocked by a firewall.

B.

Port 80 is blocked by a firewall.

C.

The administrator does not have a valid portal account.

D.

The license assigned to the cluster has expired.

Question 20

How should an administrator configure a custom alert for a specific VM in Prism?

Options:

A.

Modify an existing alert to only alert on the specific VM.

B.

Modify VM settings to add the custom alert.

C.

Modify the alerts to add a new custom alert policy.

D.

Modify node settings to add the custom alert.

Question 21

In Nutanix clusters, which feature ensures VMs can be migrated and restarted on another host in case of failure?

Options:

A.

High Availability

B.

Protection Domain

C.

Host Affinity Rules

D.

Availability Zone

Question 22

Which data savings technique utilizes stripes and parity calculation in a Nutanix cluster?

Options:

A.

Compression

B.

Parity strip

C.

Erasure coding

D.

Deduplication

Question 23

What does Nutanix recommend when setting up the node networking?

Options:

A.

Include NIC models from different vendors in the same bond

B.

Include at least two physically interfaces in every bond.

C.

Combine NIC models from different vendors in the same bond.

D.

Combine NIC models from different vendors in the same bond.

Question 24

Refer to Exhibit.

An administrator increases the cluster RF to 3. The containers are not modified.

What will the new values in the data resiliency dashboard be for FAILURES TOLERABLE for the Zookeeper and Extent Groups components?

Options:

A.

Zookeeper = 1 and Extent Groups = 1

B.

Zookeeper = 2 and Extent Groups = 2

C.

Zookeeper = 2 and Extent Groups = 1

D.

Zookeeper = 1 and Extent Groups = 2

Question 25

An administrator is performing validation testing of a new-deploy cluster. During this test, the administrator disconnect each LAN interface from each of the nodes while pinging the hypervisor and guest VMs.

When the first interface is disconnected, pings continue as expected to the hypervisor, but pings stop responding from the guest. Pings continue when the interface is reconnected. When the second interface is disconnected, pings continue to both the hypervisor and guest VMs.

What could be the cause of this error?

Options:

A.

This is normal behavior for a LAN Failover

B.

Switch ports are configured with different VLANs

C.

Portfast is not enabled on the switch ports

D.

One of the network interfaces has a bad patch cable.

Question 26

A customer has a 24-node cluster with all containers configured with RF3. Two different nodes have incurred a simultaneous HDD failure.

What is the result?

Options:

A.

The cluster runs in a degraded state until the failed drives are replaced and the data has been restored to three replicas.

B.

Sixty minutes after the failures a rebuild of the lost data can remaining HDDs begins to restore to three replicas.

C.

The VMs with data on those drives crash, and an HA event occurs, restarting them on a remaining healthy node.

D.

The Nutanix cluster recognizes the failures and immediately begins to rebuild lost data to three replicas.

Question 27

Which component ensures uniform distribution of data throughout the cluster to eliminate hot spots and speed up rebuilds?

Options:

A.

Cassandra

B.

Distributed Storage Fabric

C.

High Availability

D.

Acropolis App Mobility Fabric

Question 28

An administrator wants to have a VM on an AHV cluster with access to multiple VLANs. What is the most efficient way to achieve this?

Options:

A.

Update a vNIC on the VM to operate in trunked mode for all desired VLANs.

B.

Create a network in AHV associated with all those VLANs on all hosts.

C.

Use SFPs that allow the needed VLANs.

D.

Use one vNIC per VLAN for the VM.

Question 29

Refer to the Exhibit:

An administrator is adding a new node to a cluster. The node has been imaged to the same versions of AHV and AOS that the cluster is

running, configured with appropriate IP addresses, and br0-up has been configured in the same manner as the existing uplink bonds.

When attempting to add the node to the cluster with the Expand Cluster function in Prism, the cluster is unable to find the new node.

Based on the above output from the new node, what is most likely the cause of this issue?

Options:

A.

There is a firewall blocking the discovery traffic from the cluster.

B.

The ports on the upstream switch are not configured for LACP.

C.

The existing cluster and the expansion node are on different VLANs.

D.

LACP configuration must be completed after cluster expansion.

Question 30

An administrator wants to receive an environment summary report when a host failure occurs.

Which action would address the administrator’s need?

Options:

A.

Enable App Discovery

B.

Edit report schedule

C.

Configure an alert policy

D.

Create a playbook

Question 31

An administrator wants to ensure that data in a container is stored in the most space efficient manner as quickly as possible after being written,

Which space efficiency too meets this requirement?

Options:

A.

Inline Compression

B.

Thin Provisioning

C.

Cache Deduplication

D.

Erasure Coding

Question 32

Refer to exhibit:

Why has an anomaly been triggered?

Options:

A.

Controller reached 2500 IOPS.

B.

Observed IOPS exceed normal values.

C.

Normal Controller behavior has increased.

D.

Observed values do not match predicted values.

Question 33

Which two permission assignment tasks can be accomplished via Prism Element? (Choose two.)

Options:

A.

Grant a user permission to create VMs on a specific storage container

B.

Grant a user permission to view details of all VMs on a specific cluster

C.

Grant an active directory group permission to perform back operations

D.

Grant a user permission to create and delete snapshots on a specific VM

Question 34

A vDisk is read by multiple VMs. The cluster creates immutable copies of the vDisk. What are these vDisk copies called?

Options:

A.

Disk Clones

B.

Golden Images

C.

Volume Groups

D.

Shadow Clones

Question 35

Which three upgrades should an administrator be able to perform using Lifecycle Management? (Choose Three)

Options:

A.

AOS

B.

BMC

C.

BIOS

D.

Hypervisor

E.

HBA Firmware

Question 36

Which command should an administrator run from the CLI to view the uplink state of all AHV nodes in the

cluster?

Options:

A.

allssh show_uplinks

B.

manage_ovs show_uplinks

C.

allssh manage_ovs show_uplinks

D.

manage ovs show uplinks

Question 37

Microsegmentation was recently enabled in a Nutanix environment. The administrator wants to leverage Prism Central to create a policy that will block all traffic regardless of direction, between two groups of VMs identified by their category.

Which policy should be used to meet this requirement?

Options:

A.

An Application Security Policy

B.

A Quarantine Policy

C.

A Whitelist-Based Policy

D.

An Isolation Environment Policy

Question 38

An administrator is not able to log into Prism Central by using a new Active Directory user account. After Logging with the local user, the administrator verified that Directory Services and Role Mapping setting are valid.

What is the most likely cause of this issue?

Options:

A.

Change password at next logon attribute is set.

B.

User does not belong to the Administrators group.

C.

Active Directory functional level of wrong.

D.

Prism Element authentication is not configured.

Question 39

When a VM is connected to a Nutanix managed network, when is the IP addressed assigned?

Options:

A.

When the vNIC is created on the VM.

B.

When the VM is powered on.

C.

When the guest OS sends a DHCP request.

D.

When the guest OS receives a DHCP acknowledge.

Question 40

An administrator responsible for a VDl environment needs to investigate reports of slow logins. The administrator finds that increasing the number of vCPUs from 2 to 4 will reduce the login times. Production workloads are consuming 75% of the host CPU on the cluster. The administrator increases the vCPU count on all of the VDl VMs.

What are two impacts on the cluster? (Choose two)

Options:

A.

Increasing CPU counts will decrease memory utilization

B.

Increase memory utilization%

C.

Increase CPU utilization%

D.

Increase CPU ready%

Question 41

CPU utilization climbs above 90% on several VMs. This causes performance degradation for a business-critical application.

How can alerts be configured to notify the administrator before VM CPU utilization hits 90%?

Options:

A.

On a CVM, use ncli to set the VM CPU Check threshold for the critical VMs to a value below 90%.

B.

On the Health dashboard, locate the VM CPU Check and lower the alert threshold below 90%.

C.

On a CVM, configure a cron job to run the VM CPU Check more frequently and email the result.

D.

On the Alerts dashboard, ensure that the VM CPU usage alert is not set to auto-resolve.

Question 42

A newly-hired Nutanix administrator was tasked by the CIO to create a single VM on a test network. The network administrator stated that a native VLAN was used on the Cisco TOR switches with the following parameters:

IP address:172,16.1.2

Network Mask: 255.255.255.0

Default gateway: 172.16.1.1

VLAN:1

The same parameters were used to create a network profile on Nutanix, but the when the VM was on …

What should the Nutanix administrator do to fix this issue?

Options:

A.

Nutanix removed support for native VLAN.

B.

Change VLAN field from vlan. 1 to vlan.0.

C.

Enable IPv6 on the VM.

D.

Use DHCP as opposed to static IP

Question 43

Async DR is configured between two sites. A network outage occurs at the primary site.

Which steps must the administrator perform to bring the VMs back into service at the backup site?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements. Not all procedures are valid. Identify any invalid procedures using the drop-down option.

Options:

Question 44

A VM in a 12-node Nutanix cluster is hosting an application that has specific Physical GPU requirements. Only three nodes in the cluster meet this requirement.

The administrator wants to allow a general workload to be distributed across all nodes in the cluster and must make sure that the node hosting the VM meets its requirements.

How should the administrator perform this task?

Options:

A.

Create a sperate three-node cluster using the nodes that meet the requirement.

B.

Configure VM-Host affinity for the nodes that meet the application's GPU requirement.

C.

Over-Provision the application VM with additional virtual GPUs.

D.

Configure anti-affinity rules between the application VM and the other VMs running on the cluster.

Question 45

An administrator is preparing to deploy a new application on an AHV cluster, Security requirements dictate that all virtual servers supporting this application must be prevented from communicating with unauthorized hosts.

Which option would achieve this goal?

Options:

A.

Create a new VLAN, create a subnet on the cluster with the VLAN tag, deploy servers with vNlCs in the new subnet.

B.

Create a new Application Security Policy restricting communication to the authorized hosts and apply it to the servers in enforce mode.

C.

Create a new solation Environment policy apply it to the new servers and all authorized hosts.

D.

Create new' subnet and assign to an existing VPC assign the IP prefix and gateway for the subnet, deploy servers with vNlC5 in the new subnet.

Question 46

The Stargate service becomes unavailable on a single CVM on an AHV node. What is used to maintain I/O operations in the cluster?

Options:

A.

Route injection

B.

iSCSl redirector

C.

Hypervisor HA

D.

ha.py

Question 47

Which two methods are available when migrating a VM from a legacy 3-tier solution using VMware ESXi to AHV? (Choose two.)

Options:

A.

Deploy the Move appliance.

B.

Use Cross-Hypervisor DR.

C.

Import the .vmdk into the Image Service.

D.

Use shared nothing live migration.

Question 48

Which component is supported by Prism Central storage policies?

Options:

A.

Virtual Machines

B.

Volume Groups

C.

VM Templates

D.

Storage Containers

Question 49

What is the name of the internal bridge used by AHV nodes and CVMs?

Options:

A.

vnet0

B.

br1

C.

br0

D.

virbr0

Question 50

Refer to Exhibit:

An administrator is attempting to create an additional virtual switch on a newly deployed AHV cluster, using the two currently disconnected interfaces. The administrator is unable to select the disconnected interfaces when creating the virtual switch.

What is the likely cause of this issue?

Options:

A.

Only one interface is available on the selected hosts.

B.

Interfaces must be connected to the network before they can be assigned.

C.

The disconnected interfaces are currently assigned to virtual switch 0,

D.

Interfaces must be assigned to virtual switches via the cli

Question 51

A configuration is single domain, single forest, and does not use SSL.

Which port number should be used to configure LDAP?

Options:

A.

389

B.

3269

C.

636

D.

3268

Question 52

Refer to Exhibit:

Which statement is true?

Options:

A.

A critical alert will be triggered if I/O working set size goes over 6000 MB.

B.

A critical alert will be triggered when there is an anomaly above 4000 MB.

C.

A warning alert will be triggered after 3 anomalies have been catch.

D.

A warning alert will be triggered if I/O working set size goes over the blue band.

Question 53

Where are Leap Availability Zones configured?

Options:

A.

Cloud Connect

B.

Controller VM

C.

Prism Element

D.

Prism Central

Page: 1 / 18
Total 178 questions