Summer Sale Coupon - 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sbfdisc

NCP-MCI-5.20 PDF

$44

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

NCP-MCI-5.20 PDF + Testing Engine

$70.4

$175.99

3 Months Free Update

  • Exam Name: Nutanix Certified Professional - Multi cloud Infrastructure (NCP-5.20)
  • Last Update: Apr 19, 2024
  • Questions and Answers: 280
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

NCP-MCI-5.20 Engine

$52.8

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

NCP-MCI-5.20 Practice Exam Questions with Answers Nutanix Certified Professional - Multi cloud Infrastructure (NCP-5.20) Certification

Question # 6

What is the default network bond setting for an AHV host configuration?

A.

active-backup

B.

active-active

C.

balance-slb

D.

balance-tcp

Full Access
Question # 7

An administrator is configuring cross-hypervisor DR from an ESXi cluster to a new AHV cluster. When the administrator migrates a protection domain to the AHV cluster, the VMs fail to boot.

What should the administrator do to correct this problem?

A.

Increase the snapshot frequency to more than 6 hours.

B.

Uninstall VMware Tools from the VMs.

C.

Install Nutanix Guest Tools in the protected VMs.

D.

Add all VMs into a single consistency group.

Full Access
Question # 8

Which two capabilities does IPAM provide in a Nutanix networking configuration? (Choose two.)

A.

Allows proxy server settings to be set up for a defined network

B.

Allows AHV to assign IP addresses automatically to VMs using DHCP

C.

Configures a VLAN with an IP subnet and assigns a group of IP addresses

D.

Configures firewall rules to prevent or allow certain TCP/IP traffic

Full Access
Question # 9

An administrator responsible for a VDl environment needs to investigate reports of slow logins. The administrator finds that increasing the number of vCPUs from 2 to 4 will reduce the login times. Production workloads are consuming 75% of the host CPU on the cluster. The administrator increases the vCPU count on all of the VDl VMs.

What are two impacts on the cluster? (Choose two)

A.

Increasing CPU counts will decrease memory utilization

B.

Increase memory utilization%

C.

Increase CPU utilization%

D.

Increase CPU ready%

Full Access
Question # 10

An administrator is configuring data protection and DR for a multi-tier application. All VMs must be protected at the same time.

What must the administrator do to meet this requirement?

A.

Create a consistency group for each VM with identical schedules

B.

Create a consistency group for the application and place all VMs in it

C.

Create a protection domain for the application and select auto-protect related entities

D.

Create a protection domain for each VM with identical schedules

Full Access
Question # 11

The external identity source (e.g., Active Directory) is unavailable.

Which account should be utilized as the Emergency Local Account lor both Prism Element and the CVM?

A.

Administrator

B.

root

C.

admin

D.

nutanix

Full Access
Question # 12

Which feature must be enabled in order to ensure that VMs are restarted on other hosts in the event of a host failure?

A.

High Availability

B.

VM Snapshots

C.

Network Segmentation

D.

Live Migration

Full Access
Question # 13

Which command should an administrator run from the CLI to view the uplink state of all AHV nodes in the

cluster?

A.

allssh show_uplinks

B.

manage_ovs show_uplinks

C.

allssh manage_ovs show_uplinks

D.

manage ovs show uplinks

Full Access
Question # 14

When destroying a Nutanix cluster, what is the end result?

A.

All drives in the nodes are set to Common Criteria EAL 2+ standard.

B.

All nodes in the cluster are set to the default factory configuration.

C.

All guest VM data is unrecoverable after destroying the cluster. The cluster configuration data is retained.

D.

All drives in the nodes are sanitized with the DoD 5220.22-M standard, assuring all data is destroyed.

Full Access
Question # 15

the analysis dashboard allows you to create which 2 type of charts? (Choose two)

A.

entity (vm,host,disk,memory,etc.)

B.

metric (IOPS, sequential reads, etc).

C.

open support cases

D.

out-of-band management

Full Access
Question # 16

An administrator is restarting a node and the CVM has not automatically restarted.

Which command should be used to start the CVM?

A.

cvm start cvm_name

B.

virsh start block-ID-(Node Letter)

C.

cvm start block-ID-(Node Letter)

D.

virsh start cvm name

Full Access
Question # 17

How should an administrator make sure that the LCM Framework is always up to date and upgraded to the latest version?

A.

From the Life Cycle Management page in Prism Element, click Perform Inventory, then edit settings and

set LCM Auto Inventory to Daily

B.

From the Life Cycle Management page in Prism Central, click Perform Inventory, then edit settings and

click the Enable LCM Auto Inventory checkbox

C.

From the Life Cycle Management page in Prism Element, click Perform Inventory, then edit settings and

click the Enable LCM Auto Inventory checkbox

D.

From the Life Cycle Management page in Prism Central, click Perform Inventory every morning

Full Access
Question # 18

For security reason an administrator needs to logically separate management and data traffic on Nutanix cluster.

Which feature should the administrator select for this configuration?

A.

Prism Central

B.

Network Virtualization

C.

Network Segmentation

D.

Microsegmentation

Full Access
Question # 19

What is the purpose of a Leap availability zone?

A.

To pair two AHV Clusters for synchronous replication.

B.

To support high availability across two AHV clusters.

C.

To support DR across two Prism Central instances.

D.

To pair two VMs to enable fault tolerance with zero downtime.

Full Access
Question # 20

Client needs a backup solution to allow the ability to replicate small data sets to public cloud. The RPO of this tertiary data must be 24 hrs or better.

Which solution should an engineer recommend to the client base on these requirement?

A.

Protection Domain

B.

Cloud Connect

C.

NearSync

D.

XI Cloud service

Full Access
Question # 21

The feature that enables you to back up and restore copies of virtual machines and files to and from an on-prem cluster and a Nutanix Controller VM on the Amazon Web Service (AWS) or Microsoft Azure cloud.

A.

XI-Leap

B.

Cloud Connect

C.

Acropolis Block Service

Full Access
Question # 22

What certificate must be installed on the cluster to support client certificates?

A.

Wildcard certificate

B.

SSL server certificate

C.

SAN certificate

D.

Trusted CA certificate

Full Access
Question # 23

An administrator needs to determine current CPU usage across multiple clusters

Which method should the administrator use to get the information?

A.

Prism central home

B.

prism central home +ad widgtes

C.

Prism central explore clusters

D.

Prism central home manage dashboards.

Full Access
Question # 24

A node with Erasure Coding fails.

What is the impact?

A.

The node stops utilizing Erasure Coding.

B.

Potentially increased amount of data stored in the SSD tier.

C.

Increased Controller VM CPU Load.

D.

AQS unable to do deduplication during the Erasure Coding failure.

Full Access
Question # 25

An administrator needs to bring down a host in a Nutanix Cluster for maintenance reasons. The administrator puts the host in maintenance mode.

What should the administrator do to perform an orderly shutdown of the CVM?

A.

Execute the cvm_shutdown -P new command from the CVM.

B.

Enter Fever off Server - immediate from the IPMI console.

C.

Enter Fewer off Server-orderly Shutdown from the IPMI console.

D.

Execute the cvm_shutdown -P now command from the host.

Full Access
Question # 26

When installing Nutanix Guest Tools (NGT) on an ESXi-hosted VM, which port should be enabled on the VM to allow communication with the NGT-Controller VM service?

A.

2000

B.

2074

C.

8080

D.

9943

Full Access
Question # 27

A configuration is single domain, single forest, and does not use SSL.

Which port number should be used to configure LDAP?

A.

389

B.

3269

C.

636

D.

3268

Full Access
Question # 28

An administrator needs to deploy an application with a large amount of data connected via Nutanix volumes.

Which two actions should the administrator take when designing the Volume Group? (Choose two.)

A.

Distribute workload across multiple virtual disks

B.

Enable RSS (Receive Side Scaling)

C.

Use multiple subnets for iSCSI traffic

D.

Enable thick provisioning on the Volume Group(s)

Full Access
Question # 29

Which two access protocols are supported by Files? (Choose two.)

A.

ISCSI

B.

SMB

C.

FCOE

D.

NFS

Full Access
Question # 30

The administrator wants a container to be displayed and limited to 1TB in the hypervisor.

What advanced container setting must the administrator set?

A.

Advertised Capacity

B.

Reserved Capacity

C.

Advertised Quota

D.

Reserved Quota

Full Access
Question # 31

Which two private key types are supported by the Nutanix SSL certificate implementation? (Choose two.)

A.

ECDSA

B.

ECDH

C.

ED25519

D.

RSA

Full Access
Question # 32

A customer has a newly-deployed AHV cluster with nodes that have 2.x 10 GBE and 2.x interface. The customer wants to use all available network interfaces to provide connectivity to the VMs.

Which option should the administrator use to achieve this while remaining consistent with Nutanix recommendations?

A.

Create separate VLANs that map 10GbE and 1GbE interfaces.

B.

Createbond1 on virbr0 and add the 1GbE interfaces to it for VM use.

C.

Create a second bond on br0 on each host and assign the 1 GbE interfaces to it.

D.

Create a second bridge on each host and assign the 1GbE interfaces to it.

Full Access
Question # 33

Microsegmentation was recently enabled in a Nutanix environment. The administrator wants to leverage Prism Central to create a policy that will block all traffic regardless of direction, between two groups of VMs identified by their category.

Which policy should be used to meet this requirement?

A.

An Application Security Policy

B.

A Quarantine Policy

C.

A Whitelist-Based Policy

D.

An Isolation Environment Policy

Full Access
Question # 34

The Linux administration team has requested access rights to any current or future Linux VM in the environment

What entity should be selected when assigning this new role?

A.

Image

B.

AHV Cluster

C.

Category

D.

Project

Full Access
Question # 35

What is the expected operation during node addition when the new node has a different AOS version?

A.

The entire cluster is upgraded to the latest one-click release.

B.

The node is added and a separate upgrade operation must be performed.

C.

The addition fails and forces the administrator to image using standalone Foundation.

D.

The node is automatically re-imaged using the software currently running in the cluster.

Full Access
Question # 36

A node in an otherwise healthy RF2 cluster fails and the administrator receives an alert about it.

Which statement is true in this situation?

A.

An administrator needs to log in and initiate manual data replication.

B.

An automatic curator scan has been initiated to replicate the unavailable data.

C.

The data resiliency tile in Prism Element shows Warning status.

D.

Access to all storage has been lost and VMs are not accessible anymore.

Full Access
Question # 37

An administrator needs to configure the cluster to ensure all VMs are capable of being restarted in the event of a host failure.

Which option provides this functionality?

A.

VM Affinity

B.

Live Migration

C.

Best Effort

D.

HA Reservation

Full Access
Question # 38

A new Nutanix node includes Which license by default?

A.

Pro

B.

Ultimate

C.

Prism Pro

D.

Starter

Full Access
Question # 39

When host affinity policies are enabled, how does this affect the AHV cluster?

A.

Micro segmentation rules will not be applied to VMs with affinity policies set on them.

B.

Metro Availability will no longer work as designed and will result in Split Brain.

C.

Host affinity rules do not affect any other aspects of the AHV cluster.

D.

The VM-host affinity cannot be applied on a cluster that has HA reservations configured.

Full Access
Question # 40

An administrator wants to have a VM on an AHV cluster with access to multiple VLANs. What is the most efficient way to achieve this?

A.

Update a vNIC on the VM to operate in trunked mode for all desired VLANs.

B.

Create a network in AHV associated with all those VLANs on all hosts.

C.

Use SFPs that allow the needed VLANs.

D.

Use one vNIC per VLAN for the VM.

Full Access
Question # 41

Which set of steps should be used to stop the cluster in Nutanix operations?

A.

1. Shut down Nutanix CVMs and Guest VMs. 2. Log on to a running controller VM in the cluster with SSH. 3. Stop the Nutanix cluster.

B.

1. Shut down Nutanix controller VMs. 2. Log on to a running controller VM in the cluster with SSH. 3. Stop the Nutanix cluster.

C.

1. Shut down all Guest VMs. 2. Log on to a running controller VM in the cluster with SSH. 3. Stop the Nutanix cluster.

D.

1. Log on to a running Controller VM in the cluster with SSH. 2. Shut down all other Controller VMs. 3.Stop the Nutanix clusters.

Full Access
Question # 42

An administrator has a cluster in a secure environment. The administrator wants to disable password authentication over SSH to access the cluster.

Which configure should the administrator use to disable password authentication over SSH?

A.

Modify the SSH configuration on each host

B.

Enable Cluster Lockdown in Prism

C.

Modify the SSH Configuration on each CVM

D.

Configure a proxy server in Prism

Full Access