Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

NCP-MCI-5.20 Questions and Answers

Question # 6

An administrator needs to power down an AHV node in order to replace a failed DIMM?

Which step should the administrator take after placing the node into maintenance mode?

A.

Execute the command cluster status

B.

Power of the node

C.

Shut Down the nutanix CVM

D.

Reboot the Nutanix CVM

Full Access
Question # 7

Which service performs snapshots in an AOS 5.15 implementations?

A.

Prism

B.

Stargate

C.

Zookeeper

D.

Medusa

Full Access
Question # 8

A Nutanix administrator needs to replace a self-signed SSL certificate with a CA generated certificate in Prism.

Which three files are required to install the CA generated certificate in Prism? (Choose three)

A.

CA Certificate or Chain (ca_chain_certs.cer)

B.

Public Certificate (PublicCert.ker)

C.

Certificate Signing Request (server.csr)

D.

Private Server Key (private_server.key)

E.

Public Server Key (public_server.key)

Full Access
Question # 9

What is Prism Central primarily used for?

A.

Multi-cluster network configuration

B.

Container creation

C.

Multi-cluster Single Sign On

D.

Data reduction configuration

Full Access
Question # 10

An administrator needs to bring down a host in a Nutanix Cluster for maintenance reasons. The administrator puts the host in maintenance mode.

What should the administrator do to perform an orderly shutdown of the CVM?

A.

Execute the cvm_shutdown -P new command from the CVM.

B.

Enter Fever off Server - immediate from the IPMI console.

C.

Enter Fewer off Server-orderly Shutdown from the IPMI console.

D.

Execute the cvm_shutdown -P now command from the host.

Full Access
Question # 11

An administrator is configuring data protection and DR for a multi-tier application. All VMs must be protected at the same time.

What must the administrator do to meet this requirement?

A.

Create a consistency group for each VM with identical schedules

B.

Create a consistency group for the application and place all VMs in it

C.

Create a protection domain for the application and select auto-protect related entities

D.

Create a protection domain for each VM with identical schedules

Full Access
Question # 12

An administrator has set up a local web server accessible to the Nutanix clusters.

Which two steps are required to set up LCM for an environment without Internet access? (Choose two.)

A.

Download the lcai_disconnecced_version. tar.gz LCM bundle from the support portal.

B.

Edit LCM Advanced Settings in Prism Element and enter the address of the web server.

C.

Edit LCM Advanced Settings m Prism Central and enter the address of the web server.

D.

Download the lcm_dark_site_version. tar . gz LCM bundle from the support portal.

Full Access
Question # 13

An administrator adds a node with older generation processors to an existing AHV cluster with newer generation processors. What is the effect on live migration?

A.

Live migration continues to function as expected and VMs can move to any AHV host.

B.

Live migration is prevented until the administrator enables the legacy migration option.

C.

Live migration is prevented until the administrator manually changes the newer processor level.

D.

Live migration of VMs is prevented between newer and older processors.

Full Access
Question # 14

Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness?

A.

Continuous Data Protection

B.

Copy-on-Write

C.

Split-mirror

D.

Redirect-On-Write

Full Access
Question # 15

AHV IPAM assigns an IP address from the address pool when creating a managed VM NIC.

At which two instances does the address release back to the pool? (Choose two)

A.

The IP address lease expires

B.

The VM NIC is deleted.

C.

The IP address is changed to static.

D.

The VM is deleted.

Full Access
Question # 16

Microsegmentation was recently enabled in a Nutanix environment. The administrator wants to leverage Prism Central to create a policy that will block all traffic regardless of direction, between two groups of VMs identified by their category.

Which policy should be used to meet this requirement?

A.

An Application Security Policy

B.

A Quarantine Policy

C.

A Whitelist-Based Policy

D.

An Isolation Environment Policy

Full Access
Question # 17

A cluster has RF2. The cluster loses two drives on different nodes in the same storage tier.

What is the effect on the replicas of the VMs?

A.

Some VM data may be lost

B.

No VMs lose data if the node has two or more SSDs

C.

Some VMs may reboot and gain access to data

D.

No VMs lose data because of RF2

Full Access
Question # 18

The administrator wants a container to be displayed and limited to 1TB in the hypervisor.

What advanced container setting must the administrator set?

A.

Advertised Capacity

B.

Reserved Capacity

C.

Advertised Quota

D.

Reserved Quota

Full Access
Question # 19

Which two capabilities does IPAM provide in a Nutanix networking configuration? (Choose two.)

A.

Allows proxy server settings to be set up for a defined network

B.

Allows AHV to assign IP addresses automatically to VMs using DHCP

C.

Configures a VLAN with an IP subnet and assigns a group of IP addresses

D.

Configures firewall rules to prevent or allow certain TCP/IP traffic

Full Access
Question # 20

An administrator is reviewing performance of a core banking system that routinely has 20,000 concurrent users. During, business hours, the CPU on the applications servers runs at close to 100%. The administrator needs to determine if there is a performance issue specific to the app servers, the database servers, or all servers on the cluster.

Which metrics should the administrator review in Prism Analysis Graphs?

A.

Cluster IO, Network, Database and App Server CPU

B.

Cluster CPU and Memory Only

C.

Cluster IO, CPU, Memory and Database and App Server CPU

D.

Cluster IO, CPU, Memory, Network, App Server CPU

Full Access
Question # 21

An Administrator is working on a one-node ROBO cluster configurations

Which statement is true for this configuration?

A.

Witness vm required to break cluster quoram

B.

Supported hardware is NX-1175-G5 and G6

C.

witness vm should be 8vcp and 20gb ram

D.

the minimum RPO 8 hours required

Full Access
Question # 22

Where are Leap Availability Zones configured?

A.

Cloud Connect

B.

Controller VM

C.

Prism Element

D.

Prism Central

Full Access
Question # 23

What is the default network bond setting for an AHV host configuration?

A.

active-backup

B.

active-active

C.

balance-slb

D.

balance-tcp

Full Access
Question # 24

Which two private key types are supported by the Nutanix SSL certificate implementation? (Choose two.)

A.

ECDSA

B.

ECDH

C.

ED25519

D.

RSA

Full Access
Question # 25

Refer to the exhibit.

System Non-Root Partition Usage shows a warning or critical alert The administrator needs to change the frequency of checks and alerts to respond more quickly.

Where in Prism Element should the administrator change the frequency of checks and alerts?

A.

Health Dashboard > Manage Crocks > Frequency

B.

Alerts Dashboard > Manage Checks > Schedule

C.

Health Dashboard > Manage Checks > Schedule

D.

Alerts Dashboard > Manage Checks > Frequency

Full Access
Question # 26

Which two methods are available when migrating a VM from a legacy 3-tier solution using VMware ESXi to AHV? (Choose two.)

A.

Deploy the Move appliance.

B.

Use Cross-Hypervisor DR.

C.

Import the .vmdk into the Image Service.

D.

Use shared nothing live migration.

Full Access
Question # 27

An administrator wants to be able to manage their application from prism central.

Which feature must the administrator enable to allow for application management?

A.

Capacity runaway

B.

self-service portal

C.

entity explorer

D.

Image management

Full Access
Question # 28

An Administrator wants to present storage to an external non-Nutanix host via iSCSI.

Which construct should the administrator in configure to create the iSCSI volume?

A.

Volume Group

B.

Protection Domain

C.

Storage container

D.

Storage Pool

Full Access
Question # 29

An administrator wants to configure key based SSH access for an AOS 5.5 Implementation

Which three components can be secured using this method?

A.

The cluster

B.

the CVM

C.

The hypervisor host

D.

Guest virtual machine

E.

prism element

Full Access
Question # 30

An administrator is implementing a VDI solution. The workload will be a series of persistent desktops in a dedicated storage container within a four-node cluster Storage optimizations should be set on the dedicated storage container to give optimal performance including during a node failure event

Which storage optimizations should the administrator set to meet the requirements?

A.

Compression only

B.

Deduplication and Erasure Coding

C.

Compressoion and Deduplication

D.

Compression Deduplication and Erasure Coding

Full Access
Question # 31

What is the maximum number of tested and supported vDisks (including snapshots) that is a Nutanix cluster can maintain?

A.

250,000

B.

800,000

C.

500,000

D.

600,000

Full Access
Question # 32

An administrator has just executed a maintenance window for some applications running on their nutanix cluster. After completing the maintenance, they want to assess the health of the cluster and make sure that there is no impact during the maintenance.

Which three dashboards in prism will assist the administrator in making this determination? (Choose Three)

A.

Data Protection

B.

Cluster Health

C.

Tasks

D.

Alerts

E.

Analysis

Full Access
Question # 33

An Engineer logs into a CVM to troubleshoot connectivity loss between two CVMs and find the following interfaces subnets and WLANs configured.

-eth0 – VLAN10-10.1.10.0/24

eth01–No VLAN-192.168.5.0/24

eth2 – LAN20-10.1.20.0/24

Which two Nutanix networking features are being utilized? (Choose two)

A.

Internal vSwitch

B.

IP address management (IPAM)

C.

Network Load balancing

D.

Backplane LAN

Full Access
Question # 34

An administrator has configured a VM with affinity to a single host. Which AOS feature will this impact?

A.

AOS Upgrades B.

VM High AvailabilitC.

Snapshots and Clones

B.

Erasure Coding

Full Access
Question # 35

An administrator wants to secure an application running on an AHV cluster by limiting incoming and outgoing traffic destinations. The administrator creates a security policy for the application.

What is the next step?

A.

Apply the Security Policy

B.

Create an isolation policy

C.

Add the Security policy to an existing isolation policy

D.

Restart the VM hosting application

Full Access
Question # 36

When installing Nutanix Guest Tools (NGT) on an ESXi-hosted VM, which port should be enabled on the VM to allow communication with the NGT-Controller VM service?

A.

2000

B.

2074

C.

8080

D.

9943

Full Access
Question # 37

A customer creates a new AHV network within the cluster to provide VM connectivity for VLAN1001. Network traffic to VMs connected to it is inconsistent.

What should be validated as part of the customer´s troubleshooting process?

Full Access
Question # 38

which cli is used to run this command? (cluster version)

A.

ecli

B.

bash shell

C.

ncli

D.

acli

Full Access
Question # 39

Which options are available when a live migration is performed on a VM in an AOS 5.5 implementation?

A.

The VM can be moved on a different host

B.

the VM can be moved to a different host and a different storage container

C.

the VM can be moved to a different storage container

D.

the VM can be moved to a different (remote) site

Full Access
Question # 40

An administrator is preparing to migrate VMs from a legacy ESXi cluster to a new AHV cluster.

Which action must be the administrator perform on the AHV cluster to migrate VM data?

A.

Install the Nutanix Virt0 drivers

B.

Whitelist the ESXi cluster IP address

C.

Create placeholder VMs

D.

Install Nutanix Self servicing restore.

Full Access
Question # 41

In a managed network, in which scenario will AHV use the last network IP address for the DHCP server?

A.

When setting a static IP address

B.

When not selecting Override DHCP server

C.

When changing the ClDR range

D.

When deleting the DHCP network

Full Access
Question # 42

An administrator has a 4-node Nutanix cluster running on Hyper-V. The administrator create a new storage container and makes that available to all hosts.

Which storage protocol should be administrator use for the hosts to gain access to the storage container?

A.

NFS

B.

iSCSI

C.

SMB/CIFS

D.

Fiber Channel

Full Access