Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

NCP-MCI-6.5 Questions and Answers

Question # 6

Which component is supported by Prism Central storage policies?

A.

Virtual Machines

B.

Volume Groups

C.

VM Templates

D.

Storage Containers

Full Access
Question # 7

Which data savings technique utilizes stripes and parity calculation in a Nutanix cluster?

A.

Compression

B.

Parity strip

C.

Erasure coding

D.

Deduplication

Full Access
Question # 8

An administrator has been tasked with increasing security on Nutanix cluster by disabling password authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH,

What is the easiest way for the administrator to meet these needs?

A.

Configure LDAP authentication through a secure server,

B.

Enable STIES vie commend line on SSH to CVM.

C.

Enable Cluster Lockdown and provide an RSA key.

D.

Restrict access with User Management in Prism.

Full Access
Question # 9

Which method can be used to migrate a VM configured for UEFI-boot from a Nutanix Hyper-V cluster to AHV?

A.

Live Migration

B.

Storage vMotion

C.

Nutanix Move

D.

Cloud Connect

Full Access
Question # 10

Async DR is configured between two sites. A network outage occurs at the primary site.

Which steps must the administrator perform to bring the VMs back into service at the backup site?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements. Not all procedures are valid. Identify any invalid procedures using the drop-down option.

Full Access
Question # 11

An administrator is configuring cross-hypervisor DR from an ESXi cluster to a new AHV cluster. When the administrator migrates a protection domain to the AHV cluster, the VMs fail to boot.

What should the administrator do to correct this problem?

A.

Increase the snapshot frequency to more than 6 hours.

B.

Uninstall VMware Tools from the VMs.

C.

Install Nutanix Guest Tools in the protected VMs.

D.

Add all VMs into a single consistency group.

Full Access
Question # 12

An administrator would like to leverage the Reliable Event Logging Protocol (RELP) with their Remote Syslog Server. After completing the configuration, it is observed that RELP logging is not working as expected.

What is the likely cause of this issue?

A.

The cluster does not have RELP installed.

B.

The GENESIS was the only one chosen to forward log information.

C.

The Remote Syslog Server was configure using TCP as the protocol.

D.

The remote server does not have rsyslog-relp installed.

Full Access
Question # 13

A vDisk is read by multiple VMs. The cluster creates immutable copies of the vDisk. What are these vDisk copies called?

A.

Disk Clones

B.

Golden Images

C.

Volume Groups

D.

Shadow Clones

Full Access
Question # 14

When a VM is connected to a Nutanix managed network, when is the IP addressed assigned?

A.

When the vNIC is created on the VM.

B.

When the VM is powered on.

C.

When the guest OS sends a DHCP request.

D.

When the guest OS receives a DHCP acknowledge.

Full Access
Question # 15

An administrator is adding a node with a higher AOS release to an existing cluster.

What is the most efficient action an administrator should take to ensure it is in a supported state?

A.

Destroy cluster and foundation with the new node in place

B.

Add the node to the cluster and leave the existing AOS version in place

C.

Perform standalone reimage of the new node and then add to cluster

D.

Add the node to the cluster and reboot all running VMs to use new release

Full Access
Question # 16

An administrator needs to provide access for a user to view real-time performance metric for all VMs on all clusters across the datacenter.

Which method accomplishes this with the least effort and ongoing maintenance?

A.

Configure IDP authentication and assign the user to the Cluster Admin role in Prism Central.

B.

Configure AD authentication and assign the user to the Viewer role in Prism Element.

C.

Configure AD authentication create a custom role, assign the user to the role, and apply the role to all clusters and VMs

Full Access
Question # 17

Which baseline is used to identify a Zombie VM?

A.

VM is powered off for the past 21 days.

B.

Memory usage is less than 1% and memory swap rate is equal to 0 Kbps for the past 21 days.

VM has no logins for the past 21 days

C.

VM has no logins for the past 21 days

D.

Fewer than 30 1/Os and less than 1000 bytes per day of network traffic for the past 21 days

Full Access
Question # 18

In Files, how many FSVMs are deployed by default?

A.

1

B.

2

C.

3

D.

5

Full Access
Question # 19

Refer to the Exhibit:

An administrator receives complaints of poor performance in a particular VM.

Based on the VM performance metric, what is the most likely cause of this behavior?

A.

Oplog is full cannot serve IO request from this VM.

B.

The host’s CPU is severely overloaded.

C.

SSD tier is not big enough to serve workloads’ IOPS demand.

D.

The VM needs more vCPUs

Full Access
Question # 20

An administrator is tasked with configuring network on an AHV cluster and wants to maximize throughput for the host with many small VMs while minimizing network switch configuration.

Which bond mode should the administrator select?

A.

Active-active

B.

Active-Active with Mac Pinning

C.

Active-Backup

D.

No-Uplink Bond

Full Access
Question # 21

What is the minimum time a newly created Deduplication storage policy takes to apply to the VMs in the container?

A.

5 Minutes

B.

10 minutes

C.

30 minutes

D.

60 minutes

Full Access
Question # 22

An administrator has a Custom backup application that requires a 2TB disk and runs m Windows. Throughput is considerably lower than expected.

The application was installed on a VM with the following configuration:

• FOU vCPUs with one core/vCPU

• 4GB of Memory

• One 50GB vDisk for the Windows installation

• One 2TB vDisk for the application

What is the recommended configuration change to improve throughput?

A.

Add 4GB of memory to the VM

B.

Increase the vCPUs assigned to the VM

C.

Span the 2TB disk across four vDisks

D.

Increase the number of cores per vCPU

Full Access
Question # 23

An administrator wants to expand the Failure Domain level of a cluster.

What two options are available? (Choose two.)

A.

Node

B.

Data Center

C.

Block

D.

Rack

Full Access
Question # 24

What requires iSCSI initiator configuration in the guest OS to use Volumes?

A.

SQL Server Always On Availability Group

B.

Microsoft Windows Failover Cluster

C.

Oracle RAC

D.

Exchange DAG

Full Access
Question # 25

Refer to exhibit:

Why has an anomaly been triggered?

A.

Controller reached 2500 IOPS.

B.

Observed IOPS exceed normal values.

C.

Normal Controller behavior has increased.

D.

Observed values do not match predicted values.

Full Access
Question # 26

A customer has a newly-deployed AHV cluster with nodes that have 2.x 10 GBE and 2.x interface. The customer wants to use all available network interfaces to provide connectivity to the VMs.

Which option should the administrator use to achieve this while remaining consistent with Nutanix recommendations?

A.

Create separate VLANs that map 10GbE and 1GbE interfaces.

B.

Createbond1 on virbr0 and add the 1GbE interfaces to it for VM use.

C.

Create a second bond on br0 on each host and assign the 1 GbE interfaces to it.

D.

Create a second bridge on each host and assign the 1GbE interfaces to it.

Full Access
Question # 27

How should an administrator enable secure access to Volumes using a password?

A.

iSER

B.

CHAP

C.

SAML

D.

LDAP

Full Access
Question # 28

Which two methods are available when migrating a VM from a legacy 3-tier solution using VMware ESXi to AHV? (Choose two.)

A.

Deploy the Move appliance.

B.

Use Cross-Hypervisor DR.

C.

Import the .vmdk into the Image Service.

D.

Use shared nothing live migration.

Full Access
Question # 29

When VM HA Reservation is enabled, what is the expected behavior for all failed VMs in the event of a host

failure?

A.

Restart on a best-effort basis if resources are available

B.

Perform a live migration to other hosts in the AHV cluster

C.

Restart on other hosts in the AHV cluster

D.

Perform a live migration on a best-effort basis if resources are available

Full Access
Question # 30

In which two scenarios is Native Key Management Server supported? (Choose two)

A.

XenServer and AHV mixed cluster.

B.

Hyper-V and AHV mixed cluster.

C.

KVM and AHV mixed cluster.

D.

ESXi and AHV mixed cluster.

Full Access
Question # 31

When creating a VM on an AHV cluster, how is the initial placement of the VM determined?

A.

AHV uses a round robin algorithm, placing new VMs onto hosts based on the numerical order of their UUID

B.

The administrator right clicks on the desired host and selects Power on VM from the dropdown menu

C.

The Acropolis Dynamic Scheduler selects a host which provides adequate resources for the VMs configuration

D.

Placement is determined by the host that holds the new_VM token at the time of VM creation

Full Access
Question # 32

Refer to the exhibit.

The Linux Admin role has been created to manage only Linux VMs in the environment. However, the Admin1 user does not have access to all Linux VMs.

What step should be taken to grant the proper access?

A.

Add the hosts to the entities KM for the role.

B.

Grant the admin1 user the viewer role (or the cluster.

C.

Add the role to the Linux images.

D.

Add the proper category to each Linux VM.

Full Access
Question # 33

An Administrator is working on a one-node ROBO cluster configurations

Which statement is true for this configuration?

A.

Witness vm required to break cluster quoram

B.

Supported hardware is NX-1175-G5 and G6

C.

witness vm should be 8vcp and 20gb ram

D.

the minimum RPO 8 hours required

Full Access
Question # 34

AHV IPAM assigns an IP address from the address pool when creating a managed VM NIC.

At which two instances does the address release back to the pool? (Choose two)

A.

The IP address lease expires

B.

The VM NIC is deleted.

C.

The IP address is changed to static.

D.

The VM is deleted.

Full Access
Question # 35

Refer to Exhibit.

An administrator increases the cluster RF to 3. The containers are not modified.

What will the new values in the data resiliency dashboard be for FAILURES TOLERABLE for the Zookeeper and Extent Groups components?

A.

Zookeeper = 1 and Extent Groups = 1

B.

Zookeeper = 2 and Extent Groups = 2

C.

Zookeeper = 2 and Extent Groups = 1

D.

Zookeeper = 1 and Extent Groups = 2

Full Access
Question # 36

Where are Leap Availability Zones configured?

A.

Cloud Connect

B.

Controller VM

C.

Prism Element

D.

Prism Central

Full Access
Question # 37

An administrator wants to reduce the largest amount of alert emails received from Prism Central.

Which two settings should the administrator customize to meet this requirement? (Choose two)

A.

Skip empty digest email

B.

Every Single Alert

C.

Dally Digest

D.

Email Recipients

Full Access
Question # 38

Which two access protocols are supported by Files? (Choose two.)

A.

ISCSI

B.

SMB

C.

FCOE

D.

NFS

Full Access
Question # 39

Where should an administrator unregister Prism Element from Prism Central?

A.

From a Host SSH session

B.

From the Prism Central web console

C.

From the Prism Element web console

D.

From a CVM SSH session

Full Access
Question # 40

Refer to Exhibit:

An administrator is attempting to create an additional virtual switch on a newly deployed AHV cluster, using the two currently disconnected interfaces. The administrator is unable to select the disconnected interfaces when creating the virtual switch.

What is the likely cause of this issue?

A.

Only one interface is available on the selected hosts.

B.

Interfaces must be connected to the network before they can be assigned.

C.

The disconnected interfaces are currently assigned to virtual switch 0,

D.

Interfaces must be assigned to virtual switches via the cli

Full Access
Question # 41

Which command should an administrator run from the CLI to view the uplink state of all AHV nodes in the

cluster?

A.

allssh show_uplinks

B.

manage_ovs show_uplinks

C.

allssh manage_ovs show_uplinks

D.

manage ovs show uplinks

Full Access
Question # 42

Refer to the exhibit.

An administrator is trying to implement the solution that is shown in the exhibit, but has been unsuccessful.

Based on the diagram, what is causing the issue?

A.

A remote Witness VM

B.

Active containers in both sites

C.

Network latency

D.

Unsupported hypervisor

Full Access
Question # 43

What is the default network bond setting for an AHV host configuration?

A.

active-backup

B.

active-active

C.

balance-slb

D.

balance-tcp

Full Access
Question # 44

The customer is seeing high memory utilization on a mission critical VM. Users report that the application is unavailable. The guest OS does not support hot add components.

How should the administrator fix this issue?

A.

Access the CVM on the host that is running the VM:

*Open acli

*Run a command to increase the amount of RAM assigned to the VM

B.

From the Prism web console:

*Go to the VM dashboard

*Select the VM from the VMs list

*Choose Update

*Adjust the amount of memory assigned to the VM

C.

Go to Control Panel in the VM:

*Select the Computer Properties

*Increase the amount of RAM assigned

D.

During the next maintenance window:

*Select the VM from the VMs list

*Perform a graceful shutdown

Full Access
Question # 45

Which three upgrades should an administrator be able to perform using Lifecycle Management? (Choose Three)

A.

AOS

B.

BMC

C.

BIOS

D.

Hypervisor

E.

HBA Firmware

Full Access
Question # 46

An administrator wants to have a VM on an AHV cluster with access to multiple VLANs. What is the most efficient way to achieve this?

A.

Update a vNIC on the VM to operate in trunked mode for all desired VLANs.

B.

Create a network in AHV associated with all those VLANs on all hosts.

C.

Use SFPs that allow the needed VLANs.

D.

Use one vNIC per VLAN for the VM.

Full Access
Question # 47

Which two capabilities does IPAM provide in a Nutanix networking configuration? (Choose two.)

A.

Allows proxy server settings to be set up for a defined network

B.

Allows AHV to assign IP addresses automatically to VMs using DHCP

C.

Configures a VLAN with an IP subnet and assigns a group of IP addresses

D.

Configures firewall rules to prevent or allow certain TCP/IP traffic

Full Access
Question # 48

What is the name of the internal bridge used by AHV nodes and CVMs?

A.

vnet0

B.

br1

C.

br0

D.

virbr0

Full Access
Question # 49

Administrator is creating a Windows 10 VM that will be used for a virtual desktop template. After creating the VM and booting to the ISO, the administrator is unable to install Windows and receives the following error.

What steps does the administrator need to take to install the OS?

A.

Load the Nutanix VirtIO Serial Bus Driver.

B.

Load the VirtIO Network Ethernet Adaper.

C.

Load the Nutanix Virtual Balloon Driver.

D.

Load the Virtual SCSI pass-through controller.

Full Access
Question # 50

What does Nutanix recommend when setting up the node networkring?

A.

Include NIC models from different vendors in the same bond

B.

Include at least two physically interfaces in every bond.

C.

Combine NIC models from different vendors in the same bond.

D.

Combine NIC models from different vendors in the same bond.

Full Access
Question # 51

Microsegmentation was recently enabled in a Nutanix environment. The administrator wants to leverage Prism Central to create a policy that will block all traffic regardless of direction, between two groups of VMs identified by their category.

Which policy should be used to meet this requirement?

A.

An Application Security Policy

B.

A Quarantine Policy

C.

A Whitelist-Based Policy

D.

An Isolation Environment Policy

Full Access
Question # 52

A node with Erasure Coding fails.

What is the impact?

A.

The node stops utilizing Erasure Coding.

B.

Potentially increased amount of data stored in the SSD tier.

C.

Increased Controller VM CPU Load.

D.

AQS unable to do deduplication during the Erasure Coding failure.

Full Access