Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

NCP-MCI-6.5 Questions and Answers

Question # 6

An administrator initially performed a cluster Foundation using a flat switch without any VLAN configuration. After the Foundation, the administrator moved the dual 25Gb data ports and single 1Gb IPMI port to the actual switches with the below network configurations:

. All VLANs are tagged

. VLAN 1000 for CVM\Hypervisor traffic

· VLAN 1001 for User VM traffic

. VLAN 100 for IPMI traffic

After moving the IPMI network links, the administrator can no longer ping the IPMI IPs.

Which two changes does the administrator need to make? (Choose two.)

A.

SSH to AHV and set the VLAN ID using IPMI Tool.

B.

SSH to CVM and restart network services on all host.

C.

SSH to AHV and change the IP address using IPMI tool.

D.

SSH to CVM and restart Genesis on all CVMs.

Full Access
Question # 7

A configuration is single domain, single forest, and does not use SSL.

Which port number should be used to configure LDAP?

A.

389

B.

3269

C.

636

D.

3268

Full Access
Question # 8

An administrator has been alerted to a VM that has high I/O latency and wants to determine if there are any other factors, such as insufficient network or memory resources that correlate, as part of a troubleshooting process.

Which type of chart should the administrator create to allow all relevant data to be easily exported to CSV for later analysis?

A.

A VM entity chart with each of the relevant metrics.

B.

A cluster metric chart for each of the relevant metrics

C.

A cluster entity chart with each of the relevant metrics

D.

A VM metric chart for each of the relevant metrics

Full Access
Question # 9

Which three cluster operations require an administrator to reclaim licenses?(Choose three)

A.

Destroy a cluster.

B.

Upgrade a cluster

C.

Migrate a cluster

D.

Remove a Node from a cluster

E.

Move Nodes between clusters.

Full Access
Question # 10

A two-node ROBO cluster is configured with a witness VM.

What happens when Node A goes down?

A.

The- cluster becomes unavailable and goes into read-only mode.

B.

All operations and services on the Node B are shut down and go into a waiting state.

C.

The cluster is unaffected and no administrator intervention is required.

D.

Node B sends a leadership request to the Witness VM and goes into single-node mode.

Full Access
Question # 11

Prism Central will be installed manually on an AHV cluster.

Which three disk images must be downloaded from the portal for the Prism Central VM? (Choose three.)

A.

var

B.

tmp

C.

boot

D.

home

E.

data

Full Access
Question # 12

An administrator is commissioning a Nutanix Enterprise Cloud. Once the user VMs have been deployed and are running, the administrator finds that VMs on the same host are able to communicate, but are unable to communicate between hosts.

What must be changed to enable full inter-VM communications?

A.

Change the spanning-tree port type on the switch.

B.

Change the network the VMs are connected to

C.

Update the switch to specifically allow VLAN 15

D.

The VMs need to have static IP addresses.

Full Access
Question # 13

Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness?

A.

Continuous Data Protection

B.

Copy-on-Write

C.

Split-mirror

D.

Redirect-On-Write

Full Access
Question # 14

Async DR is configured between two sites. A network outage occurs at the primary site.

Which steps must the administrator perform to bring the VMs back into service at the backup site?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements. Not all procedures are valid. Identify any invalid procedures using the drop-down option.

Full Access
Question # 15

An administrator has created a Nutanix managed it a VLAN ID of 512.

Several VMs have been created, and the administrator notices that the can successfully communicate with other VMs on that VLAN.

Provided they are on the host, but cannot communicate with VMs that reside on different hosts in the cluster.

What is most likely thee cause of this issue?

A.

There is a firewall rule blockingVLAN512 traffic.

B.

VLANS12 is a reserved VLAN ID, and not usable for guest VMs.

C.

The VLAN was not created on the upstream switches.

D.

The administrator did not create the VLAN on all hosts

Full Access
Question # 16

Refer to exhibit:

Why has an anomaly been triggered?

A.

Controller reached 2500 IOPS.

B.

Observed IOPS exceed normal values.

C.

Normal Controller behavior has increased.

D.

Observed values do not match predicted values.

Full Access
Question # 17

How should an administrator configure a custom alert for a specific VM in Prism?

A.

Modify an existing alert to only alert on the specific VM.

B.

Modify VM settings to add the custom alert.

C.

Modify the alerts to add a new custom alert policy.

D.

Modify node settings to add the custom alert.

Full Access
Question # 18

In the event of a disk failure, which process will immediately ad automatically scans Cassandra to find all data previously hosted on the failed disk, and all disks in that node?

A.

Curator

B.

Stargate

C.

Genesis

D.

Prism

Full Access
Question # 19

A customer has a 24-node cluster with all containers configured with RF3. Two different nodes have incurred a simultaneous HDD failure.

What is the result?

A.

The cluster runs in a degraded state until the failed drives are replaced and the data has been restored to three replicas.

B.

Sixty minutes after the failures a rebuild of the lost data can remaining HDDs begins to restore to three replicas.

C.

The VMs with data on those drives crash, and an HA event occurs, restarting them on a remaining healthy node.

D.

The Nutanix cluster recognizes the failures and immediately begins to rebuild lost data to three replicas.

Full Access
Question # 20

An administrator manages a cluster and notices several failed components shown in the exhibit.

What two options does the administrator have to run all NCC checks manually? (Choose two.)

A.

Using the Actions drop-down menu in the Health dashboard of Prism Element.

B.

Running ncc health_checks run-alll on the CVM

C.

Using the action action drop-down menu in the Health dashboard of Prism Central

D.

Running noc health_checks run_all on the PC VM

Full Access
Question # 21

What is a requirement to enable Flow Networking?

A.

A dedicated virtual switch has been created for Flow Networking.

B.

Flow Micro segmentation must be enabled.

C.

Microservices infrastructure must be enabled.

D.

Prims Central is using a three-node scale-out deployment

Full Access
Question # 22

Refer to Exhibit:

After configuring modules for a Remote Syslog Server, the settings are as shown. The administrator notices that even though the level parameter is set to EMERGENCY, that all monitor logs are being sent.

What is the likely cause of this issue?

A.

A second rsyslog server is configured to send all monitor logs.

B.

Having the Module Name set to STARGATE sends all monitor logs regardless of the level.

C.

A Log Level of EMERGENCY includes all monitor logs.

D.

The true setting for Include Monitor Logs sends all monitor logs regardless of the level.

Full Access
Question # 23

An administrator needs to configure Prism to send encrypted messages to a set of recipients.

Which setting must be applied?

A.

Use SMTP Port 25

B.

Configure Prism Central to use Cluster Lockdown

C.

Install SSL certificates on Prism Central

D.

Set SMTP Security Mode to STARTTLS

Full Access
Question # 24

When configuring Prism Central, which two log modules are able to forward messages to an external syslog server? (Choose two.

A.

API Audit

B.

Flow

C.

DNS

D.

NTP Synchronization

Full Access
Question # 25

How many SSL certificates are used by Prism Element on a Nutanix cluster?

A.

1

B.

5

C.

256

D.

2048

Full Access
Question # 26

A newly-hired Nutanix administrator was tasked by the CIO to create a single VM on a test network. The network administrator stated that a native VLAN was used on the Cisco TOR switches with the following parameters:

IP address:172,16.1.2

Network Mask: 255.255.255.0

Default gateway: 172.16.1.1

VLAN:1

The same parameters were used to create a network profile on Nutanix, but the when the VM was on …

What should the Nutanix administrator do to fix this issue?

A.

Nutanix removed support for native VLAN.

B.

Change VLAN field from vlan. 1 to vlan.0.

C.

Enable IPv6 on the VM.

D.

Use DHCP as opposed to static IP

Full Access
Question # 27

The customer is seeing high memory utilization on a mission critical VM. Users report that the application is unavailable. The guest OS does not support hot add components.

How should the administrator fix this issue?

A.

Access the CVM on the host that is running the VM:

*Open acli

*Run a command to increase the amount of RAM assigned to the VM

B.

From the Prism web console:

*Go to the VM dashboard

*Select the VM from the VMs list

*Choose Update

*Adjust the amount of memory assigned to the VM

C.

Go to Control Panel in the VM:

*Select the Computer Properties

*Increase the amount of RAM assigned

D.

During the next maintenance window:

*Select the VM from the VMs list

*Perform a graceful shutdown

Full Access
Question # 28

An administrator needs to deploy an application with a large amount of data connected via Nutanix volumes.

Which two actions should the administrator take when designing the Volume Group? (Choose two.)

A.

Distribute workload across multiple virtual disks

B.

Enable RSS (Receive Side Scaling)

C.

Use multiple subnets for iSCSI traffic

D.

Enable thick provisioning on the Volume Group(s)

Full Access
Question # 29

In which two scenarios is an automated live migration likely to occur? (Choose two)

A.

Cluster resource hotspot

B.

AOS upgrade

C.

Network upgrade

D.

Hypervisor upgrade

Full Access
Question # 30

Which two capabilities does IPAM provide in a Nutanix networking configuration? (Choose two.)

A.

Allows proxy server settings to be set up for a defined network

B.

Allows AHV to assign IP addresses automatically to VMs using DHCP

C.

Configures a VLAN with an IP subnet and assigns a group of IP addresses

D.

Configures firewall rules to prevent or allow certain TCP/IP traffic

Full Access
Question # 31

An administrator is working with Nutanix Support and needs to provide logs for troubleshooting an issue. The cluster is located in a secure environment. Data such as IP addresses and VM names cannot be shared.

Which method should be used to anonymize the log data sent to Nutanix Support?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 32

An administrator needs to relocate an AHV cluster to a new datacenter during a maintenance window. The cluster will use the same IPs in the new datacenter.

Which two steps should be taken to prepare for this task? (Choose two.)

A.

Reconfigure IPMI for the new datacenter

B.

Shut down all user VMs in the cluster

C.

Relocate the linked LDAP server

D.

Stop all Nutanix Files clusters

Full Access
Question # 33

An administrator has created several custom alert policies, which are applied to the same entities. Prism Central displays a message that a similar policy exists.

In what order of precedence are overlapping policies evaluated?

Full Access
Question # 34

An administrator needs to bring down a host in a Nutanix Cluster for maintenance reasons. The administrator puts the host in maintenance mode.

What should the administrator do to perform an orderly shutdown of the CVM?

A.

Execute the cvm_shutdown -P new command from the CVM.

B.

Enter Fever off Server - immediate from the IPMI console.

C.

Enter Fewer off Server-orderly Shutdown from the IPMI console.

D.

Execute the cvm_shutdown -P now command from the host.

Full Access
Question # 35

What Nutanix feature provides effective caching optimization In VDI environments?

A.

Remote Protection Group

B.

Local Protection Group

C.

Snap Clones

D.

Shadow Clones

Full Access
Question # 36

Which node type does not deploy a Nutanix Controller VM?

A.

Storage Only

B.

Hyper Converged

C.

Compute Only

D.

All Flash

Full Access
Question # 37

On a Nutanix cluster, what does Network Segmentation refer to?

A.

A distributed firewall for security VM to VM traffic.

B.

Physically separating management traffic from guest VM traffic.

C.

Isolating intra-cluster traffic from guest VM traffic.

D.

Isolating management traffic from storage replication traffic.

Full Access
Question # 38

A user is complaining about slowness of a mission-critical MSSQL Server. The administrator logs into Prism Element to investigate the VM performance and observes what is shown in the diagram.

Which action would best improve VM performance?

A.

Disable hyperthreading in the BIOS.

B.

Add additional RAM to the user VM.

C.

Add additional RAM to the host on which the VM is running.

D.

Ensure the host's CPUs ere not excessively overcommitted.

Full Access
Question # 39

Which best practice should be followed when creating a bond in a Nutanix cluster?

A.

Place NICs of different speeds within the same bond

B.

Configure the bond to use LACP

C.

Only utilize NICs of the same speed within the same bond

D.

Use the default bond configuration after installation

Full Access
Question # 40

Which two types of granular RBAC does Nutanix provide for AHV hosts? (Choose two.)

A.

Category based

B.

Project based

C.

Disk based

D.

Cluster based

Full Access
Question # 41

Microsegmentation was recently enabled in a Nutanix environment. The administrator wants to leverage Prism Central to create a policy that will block all traffic regardless of direction, between two groups of VMs identified by their category.

Which policy should be used to meet this requirement?

A.

An Application Security Policy

B.

A Quarantine Policy

C.

A Whitelist-Based Policy

D.

An Isolation Environment Policy

Full Access
Question # 42

When a configuring a syslog server in Prism Central, what two pieces information are required? (Choose two.)

A.

HTTPS URL

B.

Encryption secret

C.

Transport protocol

D.

IP address/port

Full Access
Question # 43

The administrator wants a container to be displayed and limited to 1TB in the hypervisor.

What advanced container setting must the administrator set?

A.

Advertised Capacity

B.

Reserved Capacity

C.

Advertised Quota

D.

Reserved Quota

Full Access
Question # 44

A node with Erasure Coding fails.

What is the impact?

A.

The node stops utilizing Erasure Coding.

B.

Potentially increased amount of data stored in the SSD tier.

C.

Increased Controller VM CPU Load.

D.

AQS unable to do deduplication during the Erasure Coding failure.

Full Access
Question # 45

Refer to Exhibit:

Why has an anomaly been triggered?

A.

Because the CPU usage crossed the blue band.

B.

Because the blue band range increased over the last 2 days

C.

Because the CPU usage dropped belon' 20%

D.

Because the CPU usage reached 100%

Full Access
Question # 46

What is the name of the internal bridge used by AHV nodes and CVMs?

A.

vnet0

B.

br1

C.

br0

D.

virbr0

Full Access
Question # 47

An administrator wants to receive an environment summary report when a host failure occurs.

Which action would address the administrator’s need?

A.

Enable App Discovery

B.

Edit report schedule

C.

Configure an alert policy

D.

Create a playbook

Full Access
Question # 48

An administrator is configuring data protection and DR for a multi-tier application. All VMs must be protected at the same time.

What must the administrator do to meet this requirement?

A.

Create a consistency group for each VM with identical schedules

B.

Create a consistency group for the application and place all VMs in it

C.

Create a protection domain for the application and select auto-protect related entities

D.

Create a protection domain for each VM with identical schedules

Full Access
Question # 49

A system administrator needs to add more VMs to their Nutanix cluster.

Which two actions should the administrator perform to determine if the current cluster can accommodate the new VMs? (Choose two)

A.

Enable Deduplication and Ensure Coding

B.

Utilize Optimize Resources for VM efficiency

C.

Determine utilization with Cluster Runway

D.

Perform an inventory with Life Cycle Management

Full Access
Question # 50

A cluster has RF2. The cluster loses two drives on different nodes in the same storage tier.

What is the effect on the replicas of the VMs?

A.

Some VM data may be lost

B.

No VMs lose data if the node has two or more SSDs

C.

Some VMs may reboot and gain access to data

D.

No VMs lose data because of RF2

Full Access
Question # 51

How should an administrator correct an SSL error when connecting to a Nutanix cluster?

A.

Add the SSL certificate to the workstation’s trusted people store

B.

Create a new self-signed certificate for the cluster with a 4096 bit key

C.

Create a new SSL certificate for the cluster signed by an AD certificate authority

D.

Add the SSL certificate to an AD group policy applied to all computer objects

Full Access
Question # 52

What is he recommended approach for a constrained VM?

A.

Reboot the VM

B.

Delete the VM.

C.

Increase the VM resources.

D.

Decrease the VM resources

Full Access
Question # 53

An administrator adds a node with older generation processors to an existing AHV cluster with newer generation processors. What is the effect on live migration?

A.

Live migration continues to function as expected and VMs can move to any AHV host.

B.

Live migration is prevented until the administrator enables the legacy migration option.

C.

Live migration is prevented until the administrator manually changes the newer processor level.

D.

Live migration of VMs is prevented between newer and older processors.

Full Access