Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

NCP-MCI-6.5 Sample Questions Answers

Questions 4

An administrator would like to leverage the Reliable Event Logging Protocol (RELP) with their Remote Syslog Server. After completing the configuration, it is observed that RELP logging is not working as expected.

What is the likely cause of this issue?

Options:

A.

The cluster does not have RELP installed.

B.

The GENESIS was the only one chosen to forward log information.

C.

The Remote Syslog Server was configure using TCP as the protocol.

D.

The remote server does not have rsyslog-relp installed.

Buy Now
Questions 5

Which component is supported by Prism Central storage policies?

Options:

A.

Virtual Machines

B.

Volume Groups

C.

VM Templates

D.

Storage Containers

Buy Now
Questions 6

Refer to exhibit:

Why has an anomaly been triggered?

Options:

A.

Controller reached 2500 IOPS.

B.

Observed IOPS exceed normal values.

C.

Normal Controller behavior has increased.

D.

Observed values do not match predicted values.

Buy Now
Questions 7

Refer to the exhibit.

Which two initial cluster configuration tasks were missed during the deployment process? (Choose two.)

Options:

A.

Host password changes

B.

Password policy changes

C.

BIOS password changes

D.

CVM password changes

Buy Now
Questions 8

An administrator has set up a local web server accessible to the Nutanix clusters.

Which two steps are required to set up LCM for an environment without Internet access? (Choose two.)

Options:

A.

Download the lcai_disconnecced_version. tar.gz LCM bundle from the support portal.

B.

Edit LCM Advanced Settings in Prism Element and enter the address of the web server.

C.

Edit LCM Advanced Settings m Prism Central and enter the address of the web server.

D.

Download the lcm_dark_site_version. tar . gz LCM bundle from the support portal.

Buy Now
Questions 9

An administrator recently added new SSDs to a Nutanix cluster and knows the firmware will be out of date, Due to security constraints, the cluster does not have access to the Internet.

Which two steps must be completed to update the firmware? (Choose two.)

Options:

A.

Download the disk firmware from the OEM's website.

B.

Download a darksite bundle and deploy an internal webserver,

C.

Select Upgrade Software, then upload the firmware bundle.

D.

update the LCM Source and URL to access the firmware bundle.

Buy Now
Questions 10

What does Nutanix recommend when setting up the node networkring?

Options:

A.

Include NIC models from different vendors in the same bond

B.

Include at least two physically interfaces in every bond.

C.

Combine NIC models from different vendors in the same bond.

D.

Combine NIC models from different vendors in the same bond.

Buy Now
Questions 11

An administrator notices that most of the VMs in the cluster are on one host. Users report that an application seems to respond slowly. The application server VM has significantly more memory assigned to it than other VMs.

How should the administrator fix this issue?

Options:

A.

Reduce the amount of memory assigned to the VM.

B.

Migrate the VM to a different host.

C.

Add more memory to the VM.

D.

Increase the memory on the CVM.

Buy Now
Questions 12

An administrator was reviewing various AOS logs when a it was noticed that the time of the logs were off by several hours.

Which initial step was missed during the post process cluster configuration?

Options:

A.

Setting the cluster time zone via PC GUI

B.

Setting the cluster time zone via CVM NCLI

C.

Setting the cluster time zone via PE GUI

D.

Setting the cluster time zone via CVM ACLI

Buy Now
Questions 13

When installing Nutanix Guest Tools (NGT) on an ESXi-hosted VM, which port should be enabled on the VM to allow communication with the NGT-Controller VM service?

Options:

A.

2000

B.

2074

C.

8080

D.

9943

Buy Now
Questions 14

Where can an administrator change a CVM password?

Options:

A.

KMS Server Terminal

B.

CVM setting in Prism Element

C.

CVM setting in Prism Central

D.

Prism CVM VM Console

Buy Now
Questions 15

An administrator has received reports of users being disconnected from remote desktop sessions to a specific VM.

Which VM metric is most useful isolating the cause of the issue?

Options:

A.

Storage Controller Bandwidth

B.

Swap-Out Rate

C.

Hypervisor CPU Ready time (%)

D.

Virtual NIC receive packet dropped

Buy Now
Questions 16

When configuring Prism Central, which two log modules are able to forward messages to an external syslog server? (Choose two.

Options:

A.

API Audit

B.

Flow

C.

DNS

D.

NTP Synchronization

Buy Now
Questions 17

An administrator needs to configure Prism to send encrypted messages to a set of recipients.

Which setting must be applied?

Options:

A.

Use SMTP Port 25

B.

Configure Prism Central to use Cluster Lockdown

C.

Install SSL certificates on Prism Central

D.

Set SMTP Security Mode to STARTTLS

Buy Now
Questions 18

A user running a Computer Aided Design (CAD) application is complaining about slow response time within the VM, particular when moving windows or rendering images.

Which VM metric will guide the administrator toward diagnosing the problem?

Options:

A.

Storage Controller Latency

B.

GPU Usage

C.

Swap in Rate

D.

Hypervisor Memory Usage (%)

Buy Now
Questions 19

An administrator has been tasked with increasing security on Nutanix cluster by disabling password authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH,

What is the easiest way for the administrator to meet these needs?

Options:

A.

Configure LDAP authentication through a secure server,

B.

Enable STIES vie commend line on SSH to CVM.

C.

Enable Cluster Lockdown and provide an RSA key.

D.

Restrict access with User Management in Prism.

Buy Now
Questions 20

Which change can be made on a cluster with software-based Data-at-Rest Encryption enabled?

Options:

A.

Disable encryption on the cluster

B.

Deploy an additional Native KMS Server

C.

Enable encryption for a VM

D.

Change Native KMS to External KMS

Buy Now
Questions 21

Which capability refers to the storage of VM data on the node where the VM is running and ensure that the read I/O does not have to traverse the network?

Options:

A.

Intelligent Locally

B.

Data Locality

C.

Intelligent Tiering

D.

Data Tiering

Buy Now
Questions 22

The customer is seeing high memory utilization on a mission critical VM. Users report that the application is unavailable. The guest OS does not support hot add components.

How should the administrator fix this issue?

Options:

A.

Access the CVM on the host that is running the VM:

*Open acli

*Run a command to increase the amount of RAM assigned to the VM

B.

From the Prism web console:

*Go to the VM dashboard

*Select the VM from the VMs list

*Choose Update

*Adjust the amount of memory assigned to the VM

C.

Go to Control Panel in the VM:

*Select the Computer Properties

*Increase the amount of RAM assigned

D.

During the next maintenance window:

*Select the VM from the VMs list

*Perform a graceful shutdown

Buy Now
Questions 23

An administrator logs in to Prism Element goes to the Network view, and sees the output shown in the exhibit.

Which three steps must the administrator take to increase throughput to the host? (Choose three.)

Options:

A.

Connect the 10Gb interfaces to the physical switch.

B.

Change the bond mode to balance-slb or balance—tcp.

C.

Remove any 1Gb interfaces still connected from the default bond.

D.

Add a new switch to the network and connect 1Gb interfaces to it.

E.

Change the VLAN ID to a higher priority ID.

Buy Now
Questions 24

Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness?

Options:

A.

Continuous Data Protection

B.

Copy-on-Write

C.

Split-mirror

D.

Redirect-On-Write

Buy Now
Questions 25

A node with Erasure Coding fails.

What is the impact?

Options:

A.

The node stops utilizing Erasure Coding.

B.

Potentially increased amount of data stored in the SSD tier.

C.

Increased Controller VM CPU Load.

D.

AQS unable to do deduplication during the Erasure Coding failure.

Buy Now
Questions 26

How should an administrator configure a custom alert for a specific VM in Prism?

Options:

A.

Modify an existing alert to only alert on the specific VM.

B.

Modify VM settings to add the custom alert.

C.

Modify the alerts to add a new custom alert policy.

D.

Modify node settings to add the custom alert.

Buy Now
Questions 27

A vDisk is read by multiple VMs. The cluster creates immutable copies of the vDisk. What are these vDisk copies called?

Options:

A.

Disk Clones

B.

Golden Images

C.

Volume Groups

D.

Shadow Clones

Buy Now
Questions 28

What is the minimum time a newly created Deduplication storage policy takes to apply to the VMs in the container?

Options:

A.

5 Minutes

B.

10 minutes

C.

30 minutes

D.

60 minutes

Questions 29

After logging into Prism Element, an administrator presses the letter A on the Keyboard.

What is the expected outcome of this input?

Options:

A.

Alerts page will launch

B.

Analysis will launch

C.

About Nutanix page will launch

D.

API Explorer page will launch

Buy Now
Questions 30

Refer to Exhibit.

An administrator increases the cluster RF to 3. The containers are not modified.

What will the new values in the data resiliency dashboard be for FAILURES TOLERABLE for the Zookeeper and Extent Groups components?

Options:

A.

Zookeeper = 1 and Extent Groups = 1

B.

Zookeeper = 2 and Extent Groups = 2

C.

Zookeeper = 2 and Extent Groups = 1

D.

Zookeeper = 1 and Extent Groups = 2

Buy Now
Questions 31

The administrator recently had a node fail in an AHV Nutanix cluster. All of the VMs restarted on other nodes in the cluster, but they discovered that the VMs that make up a SQL cluster were running on the failed host. The administrator has been asked to take measures to prevent a SQL outage in the future.

What affinity option will prevent the SQL VMs from running on the same hos?

Options:

A.

VM-VM anti-Affinity policy

B.

Create Affinity Category

C.

VM-Most Affinity policy

D.

Create Affinity Project

Buy Now
Questions 32

An administrator needs to report on any alerts generated by a Nutanix cluster that affected the cluster's availability over the past 10 days.

Which method should be used to locate these events?

Options:

A.

On the Health dashboard, use the Log Collector to export data based on time stamp.

B.

Export the cluster event log to a CSV on the Alerts dashboard.

C.

On the Alerts dashboard, filter based on Impact Type and the desired Time Range.

D.

Configure an Alert Policy to generate an email with the data on the Health dashboard.

Buy Now
Questions 33

Refer to Exhibit:

Why has an anomaly been triggered?

Options:

A.

Because the CPU usage crossed the blue band.

B.

Because the blue band range increased over the last 2 days

C.

Because the CPU usage dropped belon' 20%

D.

Because the CPU usage reached 100%

Buy Now
Questions 34

On a Nutanix cluster, what does Network Segmentation refer to?

Options:

A.

A distributed firewall for security VM to VM traffic.

B.

Physically separating management traffic from guest VM traffic.

C.

Isolating intra-cluster traffic from guest VM traffic.

D.

Isolating management traffic from storage replication traffic.

Buy Now
Questions 35

An administrator is configuring data protection and DR for a multi-tier application. All VMs must be protected at the same time.

What must the administrator do to meet this requirement?

Options:

A.

Create a consistency group for each VM with identical schedules

B.

Create a consistency group for the application and place all VMs in it

C.

Create a protection domain for the application and select auto-protect related entities

D.

Create a protection domain for each VM with identical schedules

Buy Now
Questions 36

During an AHV upgrade, an administrator finds that a critical VM was powered off rather than migration to another host.

Which scenario explains this behavior?

Options:

A.

NO AHV hosts were able to be scheduled.

B.

The VM OS hung during migration.

C.

The VM was on the same host as the acropolis leader.

D.

The VM was marked as an agent VM.

Buy Now
Questions 37

An administrator wants to use Volumes to connect to physical servers that are not able to be virtualized.

Which three things must be configured for Volumes to support iSCSI clients? (Choose three)

Options:

A.

Enable external client access

B.

Client OS iSCSI initiator

C.

iSCSI Multipathing I/O

D.

Cluster Virtual IP address

E.

Data Services IP address

Buy Now
Questions 38

How should an administrator enable secure access to Volumes using a password?

Options:

A.

iSER

B.

CHAP

C.

SAML

D.

LDAP

Buy Now
Questions 39

What is Prism Central primarily used for?

Options:

A.

Multi-cluster network configuration

B.

Container creation

C.

Multi-cluster Single Sign On

D.

Data reduction configuration

Buy Now
Questions 40

In which two scenarios is an automated live migration likely to occur? (Choose two)

Options:

A.

Cluster resource hotspot

B.

AOS upgrade

C.

Network upgrade

D.

Hypervisor upgrade

Buy Now
Questions 41

An administrator has created a Nutanix managed it a VLAN ID of 512.

Several VMs have been created, and the administrator notices that the can successfully communicate with other VMs on that VLAN.

Provided they are on the host, but cannot communicate with VMs that reside on different hosts in the cluster.

What is most likely thee cause of this issue?

Options:

A.

There is a firewall rule blockingVLAN512 traffic.

B.

VLANS12 is a reserved VLAN ID, and not usable for guest VMs.

C.

The VLAN was not created on the upstream switches.

D.

The administrator did not create the VLAN on all hosts

Buy Now
Questions 42

Refer to the exhibit.

An administrator is trying to implement the solution that is shown in the exhibit, but has been unsuccessful.

Based on the diagram, what is causing the issue?

Options:

A.

A remote Witness VM

B.

Active containers in both sites

C.

Network latency

D.

Unsupported hypervisor

Buy Now
Questions 43

Refer to Exhibit:

An administrator is trying to create a custom alert policy for all VMs.

Why is the Alert warning if field greyed cut?

Options:

A.

The Alert critical if threshold is set.

B.

The Behavioral Anomaly threshold is set.

C.

The Enable Policy option checked.

D.

The Auto resolve alerts option is checked.

Buy Now
Questions 44

A VM in a 12-node Nutanix cluster is hosting an application that has specific Physical GPU requirements. Only three nodes in the cluster meet this requirement.

The administrator wants to allow a general workload to be distributed across all nodes in the cluster and must make sure that the node hosting the VM meets its requirements.

How should the administrator perform this task?

Options:

A.

Create a sperate three-node cluster using the nodes that meet the requirement.

B.

Configure VM-Host affinity for the nodes that meet the application's GPU requirement.

C.

Over-Provision the application VM with additional virtual GPUs.

D.

Configure anti-affinity rules between the application VM and the other VMs running on the cluster.

Buy Now
Questions 45

A configuration is single domain, single forest, and does not use SSL.

Which port number should be used to configure LDAP?

Options:

A.

389

B.

3269

C.

636

D.

3268

Buy Now
Questions 46

Refer to the exhibit.

An administrator is adding a new node to a cluster. The node has been imaged to the same versions of AHV and AOS that the cluster running, configured with appropriate IP addresses, and br0-up has been configured the same the existing uplink bonds

When attempting to add the node to the cluster with the Expand Cluster function in Prism , the cluster is unable to find the new node.

Based on the above output from the new node, what is most likely the cause of this issue?

Options:

A.

The ports on the upstream switch are not configured for LACP.

B.

The existing and the expansion node are on different VLANs.

C.

There is a firewall blocking the discovery traffic from the tlu

D.

LACP configuration must be completed after cluster expansion

Buy Now
Questions 47

An administrator responsible for a VDl environment needs to investigate reports of slow logins. The administrator finds that increasing the number of vCPUs from 2 to 4 will reduce the login times. Production workloads are consuming 75% of the host CPU on the cluster. The administrator increases the vCPU count on all of the VDl VMs.

What are two impacts on the cluster? (Choose two)

Options:

A.

Increasing CPU counts will decrease memory utilization

B.

Increase memory utilization%

C.

Increase CPU utilization%

D.

Increase CPU ready%

Buy Now
Questions 48

An Administrator has been asked to deploy VMs using a specific image. The image has been configured with settings and applications that will be used by engineering to develop a new product by the company.

The image is not available on the desired cluster, but it is available in other cluster associated with Prism Central.

Why isno’t the image available?

Options:

A.

The image bandwidth policy has prevented the image upload.

B.

The cluster should be removed from all categories.

C.

The cluster has not been added to the correct category

D.

The image placement policy was configured with enforcement.

Buy Now
Questions 49

An administrator is configuring cross-hypervisor DR from an ESXi cluster to a new AHV cluster. When the administrator migrates a protection domain to the AHV cluster, the VMs fail to boot.

What should the administrator do to correct this problem?

Options:

A.

Increase the snapshot frequency to more than 6 hours.

B.

Uninstall VMware Tools from the VMs.

C.

Install Nutanix Guest Tools in the protected VMs.

D.

Add all VMs into a single consistency group.

Buy Now
Questions 50

Which two types of granular RBAC does Nutanix provide for AHV hosts? (Choose two.)

Options:

A.

Category based

B.

Project based

C.

Disk based

D.

Cluster based

Buy Now
Questions 51

In the event of a disk failure, which process will immediately ad automatically scans Cassandra to find all data previously hosted on the failed disk, and all disks in that node?

Options:

A.

Curator

B.

Stargate

C.

Genesis

D.

Prism

Buy Now
Questions 52

An administrator is commissioning a Nutanix Enterprise Cloud. Once the user VMs have been deployed and are running, the administrator finds that VMs on the same host are able to communicate, but are unable to communicate between hosts.

What must be changed to enable full inter-VM communications?

Options:

A.

Change the spanning-tree port type on the switch.

B.

Change the network the VMs are connected to

C.

Update the switch to specifically allow VLAN 15

D.

The VMs need to have static IP addresses.

Buy Now
Exam Code: NCP-MCI-6.5
Exam Name: Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) v6.5 exam
Last Update: Apr 19, 2024
Questions: 175
$64  $159.99
$48  $119.99
$40  $99.99
buy now NCP-MCI-6.5