Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

NCM-MCI-5.20 Questions and Answers

Question # 6

Which two access protocols are supported by Files? (Choose two.)

A.

NFS

B.

FCOE

C.

SMB

D.

ISCSI

Full Access
Question # 7

An administrator recently added VLAN 205 CRM in Prism Element. The workloads attached to the associated NICs are unable to establish network connectivity.

Which Layer 2 protocol allows the administrator to troubleshoot this issue from Prism Element?

A.

HDLC

B.

SUP

C.

LACP

D.

LLDP

Full Access
Question # 8

An administrator recently added in 3 nodes to an existing 5 node cluster. While 1 node came with its own block, the other 2 nodes where added to an existing share. After adding the nodes, the administrator sees that the hardware tab displays the correct number of nodes, but incorrect position in the diagram tab.

What should the administrator do to resolve the issue?

A.

Check the factory_config.json for all 3 nodes

B.

SSH into CVM and perform genesis restart on each CVM

C.

SSH into the CVMs and run genesis acropolis stop; cluster start

D.

Check the factory_config. json for the two single nodes.

Full Access
Question # 9

Which two CVM components are used to provide data Locality? Choose 2

A.

Volume Group

B.

Logical unit

C.

Unified Cache

D.

Extent Store

Full Access
Question # 10

An administrator wants to utilize Network Visualization to monitor the physical and logical network on the Nutanix cluster. The first-hop switch has LLDP enabled. The network switch information is still not being displayed.

What is causing this problem?

A.

The ISL between switches is not configured.

B.

SNMP is not configured properly.

C.

br0 and br1 are not defined.

D.

The cluster is using RDMA-enabled NICs.

Full Access
Question # 11

An administrator attempts to reinstall a VM's Guest OS but is unable to change the Legace BIOS boot Priority.

Based on the exhibit, what is causing this issue?

A.

the CD-ROM is empty

B.

the VM is currently ON

C.

GuestOS reinstall is not possible for a VM

D.

the VM is undergoing a snapshot

Full Access
Question # 12

A CEO asks the IT administrator to provide a list of required resources to protect current workloads and the two new SQL servers from a disaster. The Nutanix environment is managed by Prism Central.

Which option explains how to meet the CEO's request?

A.

In Capacity Runway, select Optimize Resources and select all VMs that must be protected.

B.

Create a new project and assign the VMs to it to get compute and storage requirements.

C.

Create a new scenario based on a new cluster based on a VM Profile and select Recommend.

D.

Create a new Recovery policy by selecting the VM that needs to be protected and get hardware requirements.

Full Access
Question # 13

An Administrator Notices that the Data Resiliency status of some components has been reduced to 0, making it impossible to support a node failure in the cluster.

What failed Component Caused this Issue?

A.

Block

B.

Node

C.

Disk

D.

CVM

Full Access
Question # 14

An administrator wants to view VMs with NGT Installed and Filter by their installed guest operating systems.

How can this task most quickly be accomplished within prism central?

A.

Use a pre-defined Prism Central report

B.

Create a customer Focus using the OS Column

C.

In the VM dashboard , filter by the nutanix Guest tools - OS field

D.

use the Prism central analysis Panel to create a pie chart by OSType

Full Access
Question # 15

An administrator is monitoring the Nutanix v5.15-based AOS cluster performance logs and notices that a SQL server VM is greatly exceeding its intended maximum IOPS. The administrator has confirmed that a QoS policy was previously created for the group of VMs this server is a member of.

What are two reasons that this VM would exceed its maximum configured IOPS from the QoS Policy? (Choose two.)

A.

The VM is missing the required snapshot needed to implement the QoS Policy.

B.

The VM was not created as an AFS virtual machine.

C.

The SQL Server VM has volume groups attached.

D.

It was cloned from another SQL Server VM that was a member of the QoS Policy.

Full Access
Question # 16

Refer to the exhibit.

An administrator is commissioning a Nutanix Enterprise Cloud. Once the user VMs have been deployed and are running, the administrator finds that VMs on the same host are able to communicate, but are unable to communicate between hosts.

What must be changed to enable full inter-VM communications?

A.

Change the network the VMs are connected to

B.

Change the spanning-tree port type on the switch

C.

The VMs need to have static IP addresses

D.

Update the switch to specifically allow VLAN 15

Full Access
Question # 17

An administrator needs to determine current CPU usage across multiple clusters.

Which method should the administrator use to generate this type of report?

A.

Prism Central, Home, Manage Dashboards

B.

Prism Central, Explore, Hosts

C.

Prism Central, Home, Add Widgets

D.

Prism Central, Explore, Clusters

Full Access
Question # 18

A new Nutanix cluster is ready for production on a remote site with no IT staff. Changes to the infrastructure will cost money and probably cause a cluster stop. The administrator needs to perform a health check on the environment that should include:

• Network connectivity checks

• Network performance status

• Storage performance status

Which tool should be used to perform this test?

A.

X-Ray

B.

clurator_cli

C.

NCC

D.

diagnostic, py

Full Access
Question # 19

An administrator is deploying an application that requires maximum I/O throughput for scratch data. The administrator is concerned that the throughput requirement is greater than what can be provided by a single cluster node.

What should the administrator do to meet this requirement?

A.

Create a volume group with several virtual disks and attach to the VM

B.

Create a volume group with one virtual disk attached to the VM

C.

Create a virtual disk attached to the VM's PCI interface

D.

Create several virtual disks attached to the VM's virtual SCSI controller

Full Access
Question # 20

An administrator has Created a new VM, but When accessing the console to monitor the guest install, the administrator sees the effect shown in the exhibit.

What is the likely cause of this issue?

A.

The Wrong type of disk was specified

B.

the installation media was not mounted

C.

the nutanix virtIO driver was not mounted

D.

The boot order is incorrectly configured

Full Access
Question # 21

A VDI environment based on AHV Cluster is not performing well. The current environment is using only one bridge (Bridge0). The administrator needs to verify if nodes are using all network cards associated to Bridge0.

Which two menus should be used to check the current configuration? (Choose two.)

A.

Network Configuration item in Settings menu

B.

Host view in Network menu

C.

Host NICs tab in Hardware menu

D.

I/O Metrics tab in VM menu

Full Access
Question # 22

An administrator needs to evaluate if the existing configuration of Protection Domains meets the specified corporate recovery policy for SQL Data. The corporate policy requires that all SQL Servers be recoverable at the DR site within 30 minutes, and must result in a maximum of 60 minutes of data loss. SQL data must be required.

The protection domain is configured as follows:

• Application consistent snapshots are enabled

• The SQL server VMs are assigned to the Protection Domain as their own Consistency Group

• The Protection Domain schedule is configured as snapshots taken every 90 minutes from 7 am until 8 pm

What must be changed to meet the required policy?

A.

Revise the schedule tc be 15 minutes

B.

Revise the schedule to be 60 minutes

C.

Revise the schedule to be 30 minutes

D.

Revise the schedule to be 45 minutes

Full Access
Question # 23

An administrator needs to replace the self-signed certificate on a cluster. Which two requirements must be met as part of the process? (Choose two.)

A.

The cluster administrator must restart the interface gateway.

B.

The signed, intermediate and root certificates are chained.

C.

The existing certificate must be deleted prior to replacement.

D.

The imported files for the custom certificate must be PEM encoded.

Full Access
Question # 24

Nutanix Support Asked an administrator to provide AHV logs to help solve a support request.

Which task should be performed to provide log files to the support team?

A.

Run NCC Check from the command line

B.

Upload log files from /home/nutanix/data/logs folder

C.

collect logs from the health Page

D.

Enable Pulse to include additional support information

Full Access
Question # 25

Refer to the exhibit.

After performing ESXi to AHV conversion on a cluster, the alerts shown in the exhibit display on Prism. What should the administrator do to resolve this issue efficiently?

A.

Remove the VMs. create a new Protection Domain, and add VMs to it

B.

Remove VMs from the Protection Domain and add them back in.

C.

Delete the Protection Domain, create a new Protection Domain, and add the VMs to it

D.

Create a new Protection Domain and add the VMs to rt.

Full Access