Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

NCP-5.15 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

NCP-5.15 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Nutanix Certified Professional - Multi cloud Infrastructure (NCP-MCI 5.15)
  • Last Update: Apr 23, 2024
  • Questions and Answers: 278
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

NCP-5.15 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

NCP-5.15 Practice Exam Questions with Answers Nutanix Certified Professional - Multi cloud Infrastructure (NCP-MCI 5.15) Certification

Question # 6

The administrator wants a container to be displayed and limited to 1TB in the hypervisor.

What advanced container setting must the administrator set?

A.

Advertised Capacity

B.

Reserved Capacity

C.

Advertised Quota

D.

Reserved Quota

Full Access
Question # 7

A two-node ROBO cluster is configured with a witness VM.

NCP-5.15 question answer

What happens when Node A goes down?

A.

The- cluster becomes unavailable and goes into read-only mode.

B.

All operations and services on the Node B are shut down and go into a waiting state.

C.

The cluster is unaffected and no administrator intervention is required.

D.

Node B sends a leadership request to the Witness VM and goes into single-node mode.

Full Access
Question # 8

An administrator migrates a VM onto a new Nutanix cluster- After the migration, the administrator observes the following conditions:

• Cluster memory utilization: 64%

• Cluster CPU utilization: 19%

• Cluster storage utilization. 32%

• Average VM CPU utilization: 25%

• Average VM CPU ready%: 24%

• Average VM memory utilization: 60%

Which two changes should the administrator make to improve VM performance? (Choose two.)

A.

Reduce the number of vCPUs assigned to VMs.

B.

Add more memory to the VMs.

C.

Reduce the number of VMs on the hosts.

D.

Replace high core count CPUs with high clock rate CPUs.

Full Access
Question # 9

An administrator wants to use Volumes to connect to physical servers that are not able to be virtualized.

Which three things must be configured for Volumes to support iSCSI clients? (Choose three)

A.

Enable external client access

B.

Client OS iSCSI initiator

C.

iSCSI Multipathing I/O

D.

Cluster Virtual IP address

E.

Data Services IP address

Full Access
Question # 10

In a default configuration of an AHV cluster, a single node fails.

What happens to the running VMs on that node?

A.

The cluster restarts all VMs in the event of a host failure

B.

The VMs do a live migration to the master node in the cluster

C.

The VMs do a live migration to any other node in the cluster

D.

The cluster attempts to restart VMs on other hosts

Full Access
Question # 11

In which two scenarios is Nutanix Key Management Server supported?

A.

XenServer and AHV mixed cluster

B.

KVM and AHV mixed cluster

C.

Data-at-Rest Encryption

D.

Cluster’s local KMS.

Full Access
Question # 12

When a VM is restarted on a new host during an HA event, how is the I/O data path impacted?

A.

All data and I/O associated with the VM are migrated to the new host.

B.

All write I/O occurs on the new host. When reading old data, the I/O is served from the host the VM previously resided on.

C.

All I/O continues to be served from the host the VM previously resided on.

D.

All write I/O occurs on the new host. When reading old data, the I/O may be forwarded by the local CVM to the remote CVM.

Full Access
Question # 13

On nutanix cluster in which distribution is open ldap authentication management system.?

A.

Red Hat

B.

Ubuntu

C.

Suse

D.

CentOS

Full Access
Question # 14

A customer has a newly-deployed AHV cluster with nodes that have 2.x 10 GBE and 2.x interface. The customer wants to use all available network interfaces to provide connectivity to the VMs.

Which option should the administrator use to achieve this while remaining consistent with Nutanix recommendations?

A.

Create separate VLANs that map 10GbE and 1GbE interfaces.

B.

Createbond1 on virbr0 and add the 1GbE interfaces to it for VM use.

C.

Create a second bond on br0 on each host and assign the 1 GbE interfaces to it.

D.

Create a second bridge on each host and assign the 1GbE interfaces to it.

Full Access
Question # 15

Which two access protocols are supported by Files? (Choose two.)

A.

ISCSI

B.

SMB

C.

FCOE

D.

NFS

Full Access
Question # 16

what is the result of a cvm becoming unavailable?

A.

a route is added to the host's routing table

B.

the guest VMs on the same node are stunted

C.

VMs running on the node's host are migrated

D.

a route is dded to the CVM's touting table

Full Access
Question # 17

What are the two effects of using Data-at-Rest Encryption on a Nutanix cluster? (Choose two.)

A.

Software-based Data-at-Rest Encryption cannot be disabled.

B.

An External KMS server must exist outside of the encrypted cluster.

C.

Native KMS requires minimum of a four-node cluster.

D.

Encryption is only supported on an empty cluster.

Full Access
Question # 18

Which Nutanix Product combines the Distributed Storage Fabric & App Mobility Fabric?

A.

Xtract

B.

Prism

C.

Acropolis

D.

Calm

Full Access
Question # 19

When license needs to be reclaimed from Host: ( Choose 2)

A.

While Destroying the Cluster

B.

If you move nodes from one cluster to another , First reclaim the licenses, move the nodes, Then Re-Apply lincences

C.

Return licences to your Inventory when you remove one or more nodes from cluster

Full Access
Question # 20

Which two features require the Nutanix Guest Tools package is installed (Choose Two)

A.

Self-Service Restore

B.

Volume Snapshot Services

C.

Network Visualization

D.

Image service

E.

Prism Central

Full Access
Question # 21

What policy would maximize throughput for the brO uplink of a host?

A.

Switch Dependent, Dynamic

B.

Active-Active

C.

Active-Backup with MAC pinning

D.

Route based on ip hash

Full Access
Question # 22

Which prism dashboard should an administrator use to set the frequency of NCC?

A.

data protection

B.

cluster health

C.

Alerts

D.

Tasks

Full Access
Question # 23

Which command should an administrator run from the CLI to view the uplink state of all AHV nodes in the

cluster?

A.

allssh show_uplinks

B.

manage_ovs show_uplinks

C.

allssh manage_ovs show_uplinks

D.

manage ovs show uplinks

Full Access
Question # 24

An administrator needs to bring down a host in a Nutanix Cluster for maintenance reasons. The administrator puts the host in maintenance mode.

What should the administrator do to perform an orderly shutdown of the CVM?

A.

Execute the cvm_shutdown -P new command from the CVM.

B.

Enter Fever off Server - immediate from the IPMI console.

C.

Enter Fewer off Server-orderly Shutdown from the IPMI console.

D.

Execute the cvm_shutdown -P now command from the host.

Full Access
Question # 25

Which two targets are valid options when selecting a remote site to Prism? (Choose Two)

A.

XI Cloud Services

B.

Physical Cluster

C.

Network attached storage

D.

Cloud

E.

Tape Library

Full Access
Question # 26

what is included in, or enabled by, the nutanix NGT bundle? (Choose two)

A.

crash consistent snapshot

B.

mouse and keyboard emulation

C.

mobility drivers

D.

application consistent snapshot

Full Access
Question # 27

Which configuration can be used the data encryption on a nutanix cluster regardless of the hardware configuration?

A.

Self-Encryption Drives

B.

Software Encryption

C.

In-line Compression

D.

SSL Certificate

Full Access
Question # 28

Which two levels of encryption are supported in a Nutanix cluster running third-party hypervisor? (Choose two.)

A.

Node

B.

Cluster

C.

Container

D.

VM

Full Access
Question # 29

An administrator is configuring protection domains to support a business-critical application. The business can sustain a maximum of 40 minutes of data loss for this application.

Which value should the administrator configure for the snapshot frequency of the protection domain?

A.

15 minutes

B.

20 minutes

C.

30 minutes

D.

40 minutes

Full Access
Question # 30

what information is shared through pulse? multi answer

A.

system level statistics

B.

metadata

C.

identification data

D.

system alerts

Full Access
Question # 31

An administrator has observed that when an all- AHV host restarts unexpectedly one VM it hosts does not restart as expected.

Which cluster on VM configuration explains this behavior?

A.

No other all-flash nodes have capacity to host the VM

B.

Nutanix Guest Tools are not installed on the VM

C.

Affinity for the VM is set for only the host that rebooted

D.

VM high availability is not enabled

Full Access
Question # 32

What certificate must be installed on the cluster to support client certificates?

A.

Wildcard certificate

B.

SSL server certificate

C.

SAN certificate

D.

Trusted CA certificate

Full Access
Question # 33

When creating Windows 2016 Server VM on AHV, what must be available during the OS installation process?

A.

Nutanix Move

B.

Bootable USB

C.

Nutanix Guest Tools

D.

virtIO drivers

Full Access
Question # 34

When destroying a Nutanix cluster, what is the end result?

A.

All drives in the nodes are set to Common Criteria EAL 2+ standard.

B.

All nodes in the cluster are set to the default factory configuration.

C.

All guest VM data is unrecoverable after destroying the cluster. The cluster configuration data is retained.

D.

All drives in the nodes are sanitized with the DoD 5220.22-M standard, assuring all data is destroyed.

Full Access
Question # 35

An administrator notices that most of the VMs in the cluster are on one host. Users report that an application seems to respond slowly. The application server VM has significantly more memory assigned to it than other VMs.

How should the administrator fix this issue?

A.

Reduce the amount of memory assigned to the VM.

B.

Migrate the VM to a different host.

C.

Add more memory to the VM.

D.

Increase the memory on the CVM.

Full Access
Question # 36

In which two scenarios is Native Key Management Server supported? (Choose two)

A.

XenServer and AHV mixed cluster.

B.

Hyper-V and AHV mixed cluster.

C.

KVM and AHV mixed cluster.

D.

ESXi and AHV mixed cluster.

Full Access
Question # 37

How many Prism Central instances are required to deploy Leap:'

A.

One per availability zone

B.

One per customer environment

C.

One per physical site

D.

One per AHV cluster

Full Access
Question # 38

What is the default network bond setting for an AHV host configuration?

A.

active-backup

B.

active-active

C.

balance-slb

D.

balance-tcp

Full Access
Question # 39

An administrator wants to create a trunked interface on a VM on AOS 5.15x.

Which two steps should the administrator take first to achieve this? (Choose two)

A.

Use acli

B.

Log in over PE web UI.

C.

SSH to CVM.

D.

Update VM dialog.

Full Access
Question # 40

An administrator needs to run a mixed Exchange and SQL workload with a guaranteed amount of container

space for each application.

How should the administrator meet this requirement?

A.

Create one container and set capacity reservation

B.

Create two containers and reserve space for containers

C.

Create one container and enable compression

D.

Create two containers and reserve space for vDisks

Full Access
Question # 41

Refer to the exhibit.

NCP-5.15 question answer

The Linux Admin role has been created to manage only Linux VMs in the environment. However, the Admin1 user does not have access to all Linux VMs.

What step should be taken to grant the proper access?

A.

Add the hosts to the entities KM for the role.

B.

Grant the admin1 user the viewer role (or the cluster.

C.

Add the role to the Linux images.

D.

Add the proper category to each Linux VM.

Full Access