Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

NCP-MCI-6.5 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

NCP-MCI-6.5 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) v6.5 exam
  • Last Update: Apr 26, 2024
  • Questions and Answers: 175
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

NCP-MCI-6.5 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

NCP-MCI-6.5 Practice Exam Questions with Answers Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) v6.5 exam Certification

Question # 6

In the event of a disk failure, which process will immediately ad automatically scans Cassandra to find all data previously hosted on the failed disk, and all disks in that node?

A.

Curator

B.

Stargate

C.

Genesis

D.

Prism

Full Access
Question # 7

Async DR is configured between two sites. A network outage occurs at the primary site.

Which steps must the administrator perform to bring the VMs back into service at the backup site?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements. Not all procedures are valid. Identify any invalid procedures using the drop-down option.

NCP-MCI-6.5 question answer

Full Access
Question # 8

Refer to the exhibit.

NCP-MCI-6.5 question answer

System Non-Root Partition Usage shows a warning or critical alert The administrator needs to change the frequency of checks and alerts to respond more quickly.

Where in Prism Element should the administrator change the frequency of checks and alerts?

A.

Health Dashboard > Manage Crocks > Frequency

B.

Alerts Dashboard > Manage Checks > Schedule

C.

Health Dashboard > Manage Checks > Schedule

D.

Alerts Dashboard > Manage Checks > Frequency

Full Access
Question # 9

An administrator is working with Nutanix Support and needs to provide logs for troubleshooting an issue. The cluster is located in a secure environment. Data such as IP addresses and VM names cannot be shared.

Which method should be used to anonymize the log data sent to Nutanix Support?

A)

NCP-MCI-6.5 question answer

B)

NCP-MCI-6.5 question answer

C)

NCP-MCI-6.5 question answer

D)

NCP-MCI-6.5 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 10

A recently configured cluster is leveraging NearSync with a recovery schedule of 15 minutes. It is noticed that the cluster is consistently transitioning in an Out of NearSyne.

What action should be taken to potentially address this issue?

A.

Increase network bandwidth

B.

Change the NearSync schedule to 30 minutes.

C.

Add a vCPUs to the user VMs.

D.

Configure a secondary schedule in the same Protection Domain.

Full Access
Question # 11

An administrator needs to limit the amount of storage space that data stored in single container can consume.

Which action should the administrator take?

A.

Enable reservation for rebuild capacity

B.

Set an advertised capacity for the container

C.

Store VM snapshots in a different container

D.

Thick prevision the container

Full Access
Question # 12

How many Prism Central instances are required to deploy Leap:'

A.

One per availability zone

B.

One per customer environment

C.

One per physical site

D.

One per AHV cluster

Full Access
Question # 13

An administrator would like to leverage the Reliable Event Logging Protocol (RELP) with their Remote Syslog Server. After completing the configuration, it is observed that RELP logging is not working as expected.

What is the likely cause of this issue?

A.

The cluster does not have RELP installed.

B.

The GENESIS was the only one chosen to forward log information.

C.

The Remote Syslog Server was configure using TCP as the protocol.

D.

The remote server does not have rsyslog-relp installed.

Full Access
Question # 14

What is the minimum time a newly created Deduplication storage policy takes to apply to the VMs in the container?

A.

5 Minutes

B.

10 minutes

C.

30 minutes

D.

60 minutes

Full Access
Question # 15

The administrator wants a container to be displayed and limited to 1TB in the hypervisor.

What advanced container setting must the administrator set?

A.

Advertised Capacity

B.

Reserved Capacity

C.

Advertised Quota

D.

Reserved Quota

Full Access
Question # 16

Which command should an administrator run from the CLI to view the uplink state of all AHV nodes in the

cluster?

A.

allssh show_uplinks

B.

manage_ovs show_uplinks

C.

allssh manage_ovs show_uplinks

D.

manage ovs show uplinks

Full Access
Question # 17

An administrator needs to periodically send information about cluster efficiency via email to a set of users.

What should be configured to accomplish this task?

A.

Configure Efficiency widget in Prism Central.

B.

Create a new' prism Central project.

C.

update Capacity Configurations in Prism Central.

D.

Add a schedule to Prism Central reports.

Full Access
Question # 18

An administrator is reviewing performance of a core banking system that routinely has 20,000 concurrent users. During, business hours, the CPU on the applications servers runs at close to 100%. The administrator needs to determine if there is a performance issue specific to the app servers, the database servers, or all servers on the cluster.

NCP-MCI-6.5 question answer

Which metrics should the administrator review in Prism Analysis Graphs?

A.

Cluster IO, Network, Database and App Server CPU

B.

Cluster CPU and Memory Only

C.

Cluster IO, CPU, Memory and Database and App Server CPU

D.

Cluster IO, CPU, Memory, Network, App Server CPU

Full Access
Question # 19

A newly-hired Nutanix administrator was tasked by the CIO to create a single VM on a test network. The network administrator stated that a native VLAN was used on the Cisco TOR switches with the following parameters:

IP address:172,16.1.2

Network Mask: 255.255.255.0

Default gateway: 172.16.1.1

VLAN:1

The same parameters were used to create a network profile on Nutanix, but the when the VM was on …

What should the Nutanix administrator do to fix this issue?

A.

Nutanix removed support for native VLAN.

B.

Change VLAN field from vlan. 1 to vlan.0.

C.

Enable IPv6 on the VM.

D.

Use DHCP as opposed to static IP

Full Access
Question # 20

After configuring Active Directory as the desired authentication service, an administrator is not able to login into Prism Central using privileged account.

Which configuration must be checked first?

A.

Account lock status

B.

Role Mapping

C.

Local user account

D.

Cluster Lockdown

Full Access
Question # 21

An Administrator has been asked to deploy VMs using a specific image. The image has been configured with settings and applications that will be used by engineering to develop a new product by the company.

The image is not available on the desired cluster, but it is available in other cluster associated with Prism Central.

Why isno’t the image available?

A.

The image bandwidth policy has prevented the image upload.

B.

The cluster should be removed from all categories.

C.

The cluster has not been added to the correct category

D.

The image placement policy was configured with enforcement.

Full Access
Question # 22

How should an administrator configure a custom alert for a specific VM in Prism?

A.

Modify an existing alert to only alert on the specific VM.

B.

Modify VM settings to add the custom alert.

C.

Modify the alerts to add a new custom alert policy.

D.

Modify node settings to add the custom alert.

Full Access
Question # 23

Which three configuration scenarios are valid for the deployment of Prism Central? (Choose three.)

A.

Environments use Network Address Translation.

B.

Prism Elements and Prism Central art in different subnets.

C.

Environments do not have Internet access.

D.

Prism Elements and Prism Central have proxy configured.

E.

Environments use the 192.168.5.0/24 CVM management network.

Full Access
Question # 24

A VM in a 12-node Nutanix cluster is hosting an application that has specific Physical GPU requirements. Only three nodes in the cluster meet this requirement.

The administrator wants to allow a general workload to be distributed across all nodes in the cluster and must make sure that the node hosting the VM meets its requirements.

How should the administrator perform this task?

A.

Create a sperate three-node cluster using the nodes that meet the requirement.

B.

Configure VM-Host affinity for the nodes that meet the application's GPU requirement.

C.

Over-Provision the application VM with additional virtual GPUs.

D.

Configure anti-affinity rules between the application VM and the other VMs running on the cluster.

Full Access
Question # 25

Refer to Exhibit:

NCP-MCI-6.5 question answer

An administrator is trying to create a custom alert policy for all VMs.

Why is the Alert warning if field greyed cut?

A.

The Alert critical if threshold is set.

B.

The Behavioral Anomaly threshold is set.

C.

The Enable Policy option checked.

D.

The Auto resolve alerts option is checked.

Full Access
Question # 26

What is the name of the internal bridge used by AHV nodes and CVMs?

A.

vnet0

B.

br1

C.

br0

D.

virbr0

Full Access
Question # 27

A customer has a newly-deployed AHV cluster with nodes that have 2.x 10 GBE and 2.x interface. The customer wants to use all available network interfaces to provide connectivity to the VMs.

Which option should the administrator use to achieve this while remaining consistent with Nutanix recommendations?

A.

Create separate VLANs that map 10GbE and 1GbE interfaces.

B.

Createbond1 on virbr0 and add the 1GbE interfaces to it for VM use.

C.

Create a second bond on br0 on each host and assign the 1 GbE interfaces to it.

D.

Create a second bridge on each host and assign the 1GbE interfaces to it.

Full Access
Question # 28

Which component is supported by Prism Central storage policies?

A.

Virtual Machines

B.

Volume Groups

C.

VM Templates

D.

Storage Containers

Full Access
Question # 29

Which Nutanix service control ncli, the HTML5 UI, and Rest API?

A.

Prism

B.

Cassandra

C.

Zookeeper

D.

Chronos

Full Access
Question # 30

On a Nutanix cluster, what does Network Segmentation refer to?

A.

A distributed firewall for security VM to VM traffic.

B.

Physically separating management traffic from guest VM traffic.

C.

Isolating intra-cluster traffic from guest VM traffic.

D.

Isolating management traffic from storage replication traffic.

Full Access
Question # 31

An administrator needs to report on any alerts generated by a Nutanix cluster that affected the cluster's availability over the past 10 days.

Which method should be used to locate these events?

A.

On the Health dashboard, use the Log Collector to export data based on time stamp.

B.

Export the cluster event log to a CSV on the Alerts dashboard.

C.

On the Alerts dashboard, filter based on Impact Type and the desired Time Range.

D.

Configure an Alert Policy to generate an email with the data on the Health dashboard.

Full Access
Question # 32

Which two private key types are supported by the Nutanix SSL certificate implementation? (Choose two.)

A.

ECDSA

B.

ECDH

C.

ED25519

D.

RSA

Full Access
Question # 33

Which baseline is used to identify a Zombie VM?

A.

VM is powered off for the past 21 days.

B.

Memory usage is less than 1% and memory swap rate is equal to 0 Kbps for the past 21 days.

VM has no logins for the past 21 days

C.

VM has no logins for the past 21 days

D.

Fewer than 30 1/Os and less than 1000 bytes per day of network traffic for the past 21 days

Full Access
Question # 34

CPU utilization climbs above 90% on several VMs. This causes performance degradation for a business-critical application.

How can alerts be configured to notify the administrator before VM CPU utilization hits 90%?

A.

On a CVM, use ncli to set the VM CPU Check threshold for the critical VMs to a value below 90%.

B.

On the Health dashboard, locate the VM CPU Check and lower the alert threshold below 90%.

C.

On a CVM, configure a cron job to run the VM CPU Check more frequently and email the result.

D.

On the Alerts dashboard, ensure that the VM CPU usage alert is not set to auto-resolve.

Full Access
Question # 35

An administrator has an AHV cluster that is comprised of 4 nodes with the following configuration in each node:

CPU:2 each 2.4GHz, 12 core

Memory: 256GB

Disk: 6 each 1.92 SSD

A VM with 16 vCPUs and 96GB of RAM is being created on the cluster.

How should the administrator configure the VM to assure optimal performance?

A.

With an affinity policy

B.

With memory overcommit

C.

With 2 vNUMA nodes

D.

With Flash Mode enabled

Full Access
Question # 36

An administrator wants to reduce the largest amount of alert emails received from Prism Central.

Which two settings should the administrator customize to meet this requirement? (Choose two)

A.

Skip empty digest email

B.

Every Single Alert

C.

Dally Digest

D.

Email Recipients

Full Access
Question # 37

An administrator needs to bring down a host in a Nutanix Cluster for maintenance reasons. The administrator puts the host in maintenance mode.

What should the administrator do to perform an orderly shutdown of the CVM?

A.

Execute the cvm_shutdown -P new command from the CVM.

B.

Enter Fever off Server - immediate from the IPMI console.

C.

Enter Fewer off Server-orderly Shutdown from the IPMI console.

D.

Execute the cvm_shutdown -P now command from the host.

Full Access
Question # 38

In which two scenarios is Native Key Management Server supported? (Choose two)

A.

XenServer and AHV mixed cluster.

B.

Hyper-V and AHV mixed cluster.

C.

KVM and AHV mixed cluster.

D.

ESXi and AHV mixed cluster.

Full Access
Question # 39

An administrator is performing validation testing of a new-deploy cluster. During this test, the administrator disconnect each LAN interface from each of the nodes while pinging the hypervisor and guest VMs.

When the first interface is disconnected, pings continue as expected to the hypervisor, but pings stop responding from the guest. Pings continue when the interface is reconnected. When the second interface is disconnected, pings continue to both the hypervisor and guest VMs.

What could be the cause of this error?

A.

This is normal behavior for a LAN Failover

B.

Switch ports are configured with different VLANs

C.

Portfast is not enabled on the switch ports

D.

One of the network interfaces has a bad patch cable.

Full Access
Question # 40

When VM HA Reservation is enabled, what is the expected behavior for all failed VMs in the event of a host

failure?

A.

Restart on a best-effort basis if resources are available

B.

Perform a live migration to other hosts in the AHV cluster

C.

Restart on other hosts in the AHV cluster

D.

Perform a live migration on a best-effort basis if resources are available

Full Access
Question # 41

Refer to Exhibit.

NCP-MCI-6.5 question answer

An administrator increases the cluster RF to 3. The containers are not modified.

What will the new values in the data resiliency dashboard be for FAILURES TOLERABLE for the Zookeeper and Extent Groups components?

A.

Zookeeper = 1 and Extent Groups = 1

B.

Zookeeper = 2 and Extent Groups = 2

C.

Zookeeper = 2 and Extent Groups = 1

D.

Zookeeper = 1 and Extent Groups = 2

Full Access
Question # 42

Which three cluster operations require an administrator to reclaim licenses?(Choose three)

A.

Destroy a cluster.

B.

Upgrade a cluster

C.

Migrate a cluster

D.

Remove a Node from a cluster

E.

Move Nodes between clusters.

Full Access
Question # 43

The administrator recently had a node fail in an AHV Nutanix cluster. All of the VMs restarted on other nodes in the cluster, but they discovered that the VMs that make up a SQL cluster were running on the failed host. The administrator has been asked to take measures to prevent a SQL outage in the future.

What affinity option will prevent the SQL VMs from running on the same hos?

A.

VM-VM anti-Affinity policy

B.

Create Affinity Category

C.

VM-Most Affinity policy

D.

Create Affinity Project

Full Access
Question # 44

In Files, how many FSVMs are deployed by default?

A.

1

B.

2

C.

3

D.

5

Full Access
Question # 45

How should an administrator enable secure access to Volumes using a password?

A.

iSER

B.

CHAP

C.

SAML

D.

LDAP

Full Access
Question # 46

What Nutanix feature provides effective caching optimization In VDI environments?

A.

Remote Protection Group

B.

Local Protection Group

C.

Snap Clones

D.

Shadow Clones

Full Access
Question # 47

In which two scenarios is an automated live migration likely to occur? (Choose two)

A.

Cluster resource hotspot

B.

AOS upgrade

C.

Network upgrade

D.

Hypervisor upgrade

Full Access
Question # 48

AHV IPAM assigns an IP address from the address pool when creating a managed VM NIC.

At which two instances does the address release back to the pool? (Choose two)

A.

The IP address lease expires

B.

The VM NIC is deleted.

C.

The IP address is changed to static.

D.

The VM is deleted.

Full Access
Question # 49

When a configuring a syslog server in Prism Central, what two pieces information are required? (Choose two.)

A.

HTTPS URL

B.

Encryption secret

C.

Transport protocol

D.

IP address/port

Full Access
Question # 50

Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness?

A.

Continuous Data Protection

B.

Copy-on-Write

C.

Split-mirror

D.

Redirect-On-Write

Full Access
Question # 51

When a VM is connected to a Nutanix managed network, when is the IP addressed assigned?

A.

When the vNIC is created on the VM.

B.

When the VM is powered on.

C.

When the guest OS sends a DHCP request.

D.

When the guest OS receives a DHCP acknowledge.

Full Access
Question # 52

An administrator is tasked with configuring networking on an AHV cluster and needs to optimize for maximum single VM throughput.

Which bond mode should the administrator select?

A.

Active-Active with Mac pinning

B.

Active-Active

C.

Active-Backup

D.

No Uplink Bond

Full Access