Pre-Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

NCP-MCI-7.5 Questions and Answers

Question # 6

An administrator receives intermittent “VM I/O latency” complaints from two application teams that share the same AHV cluster.

In Prism Central, multiple performance-related alerts appear across the same 30 minute window, but only some VMs are impacted.

The administrator needs to collect the most relevant platform logs for escalation, minimizing noise and ensuring the bundle covers the exact time window when the alert condition occurred. The organization also requires that the log bundle can be attached to a support case without manual repackaging.

Which approach best satisfies the requirement?

A.

Enable auto-resolve for the alert policy so the alert clears after the condition stops, then collect logs later if the alert returns.

B.

Create a new custom alert policy with a stricter threshold so the alert triggers more consistently, then rely on the alert history instead of collecting logs.

C.

Export the Alerts list to CSV (up to the export limit), then attach the CSV to the case as the primary diagnostic artifact for performance troubleshooting.

D.

In the alert details, identify impacted entities and timestamps, collect logs for the relevant time window, and upload the bundle using a case-number upload option.

Full Access
Question # 7

What is the default compression setting when a new storage container is created in Prism Central?

A.

Inline compression with a 0-minute delay

B.

Post-process compression with a 60-minute delay

C.

Post-process compression with a 0-minute delay

D.

Inline compression with a 60-minute delay

Full Access
Question # 8

A node in a 3-node cluster is running out of physical resources. All three nodes are equally configured. An administrator wants to live migrate VMs to another node, but is unable to do so.

What is causing this issue?

A.

VMs have vNUMA enabled.

B.

VMs have vGPU.

C.

VMs have memory overcommitment.

D.

VMs have GPU passthrough.

Full Access
Question # 9

A company has recently purchased five new Nutanix clusters. The lab manager has been tasked with remotely deploying the Nutanix infrastructure in the most efficient way possible. Which tool would best help to accomplish this task?

A.

Foundation for Windows/Mac

B.

Foundation Central

C.

Standalone Foundation VM

D.

Phoenix ISO image

Full Access
Question # 10

An administrator is trying to migrate a VM to a new container. The Migration of vDisks stalls.

What could be the cause of this?

A.

Insufficient storage space to create the source snapshot.

B.

Insufficient storage space in the target storage container.

C.

Insufficient storage space in the local storage container.

D.

Insufficient storage space to create the target snapshot.

Full Access
Question # 11

An administrator needs to protect a set of workloads across three sites (Site A, Site B, Site C) managed by different Prism Central instances. Which is the most efficient way to protect such VMs?

A.

Create a single protection policy from Site A and clone it to Site B and Site C.

B.

Create two protection policies, one from site A to B and one from site A to C.

C.

Create three different protection policies, one per Prism Central.

D.

Create a single protection policy for all three sites from the source cluster.

Full Access
Question # 12

Faced with prolonged times for hardware delivery, an administrator is looking for a way to be informed on time when cluster storage capacity is running low. In order for new hard disks to be delivered on time, the administrator needs to get a warning earlier than it is set currently.

Which action should the administrator take to receive a warning about cluster storage capacity running low earlier?

A.

Enable early warning Storage Container alert.

B.

Increase frequency of Storage Pool alerts.

C.

Decrease Storage Container Space Usage Exceeded alert Warning threshold.

D.

Decrease Storage Pool Capacity Usage Exceeded alert Critical threshold.

Full Access
Question # 13

An administrator is tasked with creating a Disaster Recovery plan between two clusters within Prism Central local AZ. To ensure a failover operation is successful, the administrator also needs the ability to test recovery in both directions.

What are the recommended networks required between the two clusters for successfully testing the recovery?

A.

Two Production Networks and One Test Network

B.

One Production Network and One Test Network

C.

Two Production Networks and Two Test Networks

D.

One Production Network and Two Test Networks

Full Access
Question # 14

What is the minimum number of nodes required for a storage container with Replication Factor 2 and Erasure Coding?

A.

3

B.

4

C.

5

D.

6

Full Access
Question # 15

A six-node cluster with the Reserve Rebuild Capacity option enabled has stopped accepting write requests. The cluster has also had several VM outages. What could the cause be?

A.

The cluster has reached its EC-X capacity limit.

B.

A node failed causing 2N/2D containers to degrade.

C.

The cluster has reached its resilient capacity limit.

D.

A node failed causing 1N/1D containers to degrade.

Full Access
Question # 16

An administrator needs to enable Marketplace in Prism Central before deploying Nutanix apps.

Which prerequisite must be met on the Prism Element cluster hosting Prism Central to enable Marketplace?

A.

Data services IP must be configured.

B.

SMTP must already be enabled.

C.

LACP must be configured on all uplinks.

D.

LDAP must be configured.

Full Access
Question # 17

The accounting department has been successfully utilizing Erasure Coding for a long time. During the weekend, there was a large increase in data usage. The administrator expected lower space usage on the storage container.

What could be the cause of this low space savings?

A.

Data Services IP is not configured

B.

Erasure coding auto deactivated

C.

Prism Central failure in the erasure coding cluster

D.

Erasure coding window default settings

Full Access
Question # 18

A company needs to comply with a new company policy requiring the use of an external, cloud based, recovery point location. To accomplish this task, an administrator needs to strengthen the Disaster Recovery configurations.

What is the most cost-efficient option?

A.

Enable Multicloud Snapshot Technology.

B.

Connect to DraaS domain availability zone type.

C.

Add a new NC2 Recovery Location.

D.

Create a runbook to clone recovery points to an S3 Bucket.

Full Access
Question # 19

An administrator configures network segmentation and places the Data Services IP (DSIP) in a secondary non-routable subnet while the cluster is registered to Prism Central. Prism Central cannot initiate or complete cluster upgrades. How should the administrator resolve this issue?

A.

Enable proxy ARP within the Nutanix VLAN to establish reachability.

B.

Disable segmentation on the local cluster until the next upgrade cycle.

C.

Configure an additional DSIP within the original subnet used for PC communication.

D.

Use a single uplink because segmented networks do not tolerate redundancy.

Full Access
Question # 20

An administrator attempts to provision a VM using remote storage, but the target container does not appear in the dropdown list. What is the most likely explanation?

A.

The storage container does not have a reservation.

B.

The Storage Container Type is not set as Shared.

C.

The Container Name contains a hyphen(-).

D.

The Container Name Length is 70 characters.

Full Access
Question # 21

A company has purchased Nutanix hardware for multiple remote branch offices. The IT team at headquarters needs to image and deploy all clusters remotely from a central location.

An administrator deploys Foundation Central from the Prism Central Marketplace.

What capability does Foundation Central provide in this scenario?

A.

Automated backup and recovery of cluster configurations across all sites

B.

Ability to remotely upgrade AOS and AHV on existing clusters

C.

Ability to register all remote clusters to Prism Central automatically after deployment

D.

Single pane of glass to create remote clusters without individual node configuration

Full Access
Question # 22

An administrator needs to protect a group of mission-critical virtual machines.

The business requirements are:

    Recovery Point Objective (RPO) must be set to 5 minutes.

    New mission critical VMs should be automatically protected.

Which data protection type supports this configuration?

A.

Protection Domain with NearSync replication

B.

Protection Policy with NearSync replication

C.

Protection Domain with Asynchronous replication

D.

Protection Policy with Asynchronous replication

Full Access
Question # 23

While configuring a remote site for PD-Based DR, an administrator elects to skip vStore mapping. Assuming the same container names don ' t exist on the two sites, what is the expected behavior of data placement at the remote site for replications?

A.

Replications fail to complete.

B.

The default container is always chosen.

C.

Container with lowest ID is chosen.

D.

A container is randomly chosen.

Full Access
Question # 24

A new cluster is being deployed for the accounting department with the following characteristics:

    There is a lot of infrequently used data.

    The data is critical for the company.

    Fault Tolerance 2 is required.

    The budget is tight.

In addition to compression, which storage efficiency mechanism and minimum required number of nodes should the administrator configure?

A.

Erasure Coding with six nodes

B.

Deduplication with five nodes

C.

Deduplication with six nodes

D.

Erasure Coding with five nodes

Full Access
Question # 25

An administrator is using Nutanix Move to migrate 10 VMs and has manually changed the preparation mode for two of the VMs.

What preparation mode will be used within the migration plan?

A.

Manual

B.

Automatic

C.

Hybrid

D.

Mixed

Full Access
Question # 26

An administrator needs to temporarily allow an external host to mount a Nutanix storage container via NFS for a data migration. Which approach is recommended?

A.

Use the container as a general-purpose NFS share.

B.

Allow a single host IP with 255.255.255.255 netmask.

C.

Enable user authentication for NFS without allowlist.

D.

Allow the entire subnet to simplify future migrations.

Full Access
Question # 27

An administrator has configured CVM security hardening on a Nutanix cluster with the following settings:

    IP Restriction State is set to enabled

    Password-based SSH access is disabled via Cluster Lockdown

The administrator attempts to SSH into the CVM from a new jump box and the connection is refused.

What should the administrator do to restore SSH access to the CVM?

A.

Log in to Prism Central Security Dashboard and remotely update the SSH whitelisted addresses for the affected cluster.

B.

Log in to Prism Element and update the Cluster Lockdown settings to add the new jump box IP address.

C.

Access the CVM using the local console or serial access and update the SSH whitelisted address to the new jump box IP.

D.

Restart the CVM to reset the IP restriction and regain SSH access from the new jump box IP.

Full Access
Question # 28

An administrator manages a Nutanix cluster hosting a mixed workload environment, including general-purpose VMs and a specific group of high-sensitivity " PCI-DSS " database servers. The cluster is currently configured with " Data-at-Rest Encryption " disabled at the global cluster level.

A new security mandate requires that all data associated with the " PCI-DSS " workloads must be encrypted at rest using a dedicated external Key Management Server (KMS) for key rotation. The general-purpose VMs, however, must remain unencrypted to avoid unnecessary encryption overhead. The administrator has already deployed and registered the required KMS instance with Prism Central.

Which sequence of configuration steps should the administrator perform in Prism Central to meet this specific encryption requirement?

A.

Enable Cluster-level Encryption in the Data-at-Rest settings and exclude all categories except the category assigned to the PCI-DSS VMs.

B.

Create a new Storage Container with " Software Encryption " enabled, map it to the external KMS, and migrate the PCI VMs to this container.

C.

Create a new Storage Policy, enable encryption within the policy settings, and associate it with category assigned to the PCI-DSS VMs.

D.

Deploy a dedicated Key Management Server and configure the PCI-DSS VMs to use guest-OS level BitLocker encryption.

Full Access
Question # 29

An administrator is planning a new AHV cluster deployment with multiple nodes and wants to include a cluster virtual IP for external access.

How many IPv4 addresses should be reserved?

A.

Two IPs per node + 2 IPs for VIP addresses

B.

Four IPs per node + 1 IP for VIP address

C.

Three IPs per node + 1 IP for VIP address

D.

Three IPs per node + 2 IPs for VIP addresses

Full Access
Question # 30

Refer to the exhibit.

An administrator is configuring Active Directory Authentication in Prism Element and wants to ensure all traffic is encrypted. Which port should the administrator use?

A.

389

B.

443

C.

636

D.

9440

Full Access
Question # 31

An administrator is tasked with configuring a remote site for Data Protection. At the source site, the VMs are in a storage container named Marketing, but they need the data to be replicated to a storage container named Backups at the destination site.

What must be configured in order to accomplish this goal?

A.

Network mapping

B.

Network Compression

C.

vStore mapping

D.

vStore PD

Full Access
Question # 32

Which interface must be used to create a container with Replication Factor 1?

A.

Prism Element

B.

Marketplace

C.

Prism Central

D.

Self-Service

Full Access
Question # 33

A new naming-convention policy for storage containers requires VM placement to follow the updated naming rules. Which action can be performed to comply with the policy?

A.

Perform live vDisk migration.

B.

Configure a new storage policy.

C.

Implement an image placement policy.

D.

Rename storage containers.

Full Access