New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Nutanix NCP-5.15 Dumps Questions Answers

Page: 1 / 10
Total 278 questions

Nutanix Certified Professional - Multi cloud Infrastructure (NCP-MCI 5.15) Questions and Answers

Question 1

On nutanix cluster in which distribution is open ldap authentication management system.?

Options:

A.

Red Hat

B.

Ubuntu

C.

Suse

D.

CentOS

Buy Now
Question 2

An administrator is managing a highly active SQL workload that is writing I/Os in 2 MB chunks to a vDisk. The administrator wants to optimize capacity setting for the computer.

Which storage optimization technology should the administration select to meet these requirement?

Options:

A.

Erasure Coding

B.

Compression

C.

Capacity Deduplication

D.

Cache Deduplication

Question 3

How many IP addresses are required for a new Files cluster deployment?

Options:

A.

Two for each FSVM plus one for the cluster

B.

Two for each FSVM plus two for the cluster

C.

One for each FSVM plus one for the cluster

D.

One for each FSVM plus two for the cluster

Question 4

Client needs a backup solution to allow the ability to replicate small data sets to public cloud. The RPO of this tertiary data must be 24 hrs or better.

Which solution should an engineer recommend to the client base on these requirement?

Options:

A.

Protection Domain

B.

Cloud Connect

C.

NearSync

D.

XI Cloud service

Question 5

what additional features are available with prism pro(prism central with pro license)? (Choose two)

Options:

A.

centralized upgrades

B.

VM right-sizing

C.

vm tagging

Question 6

Which two items are required to manually upload an AOS update to a Nutanix Cluster? (Choose two)

Options:

A.

YML file

B.

JSON file

C.

AOS Binary

D.

AOS zip file

E.

AFS Binary file

Question 7

Which three settings are required for network switch discovery in Prism? (Choose Three)

Options:

A.

Switch Management IP Address

B.

AHV Host IP address

C.

Cluster CVM IP address

D.

SMTP Server IP address

E.

SNMP Community Name

Question 8

What should be validated as part of the customer's troubleshooting process?

Options:

A.

The VLAN has been configured to use the proper bridge.

B.

The VLAN has the proper gateway configured in the network settings in Prism.

C.

The VLAN is unique to the Nutanix cluster, and not in use elsewhere in the network.

D.

The VLAN is configured on the trunk of the upstream switch.

Question 9

Which options are available when a live migration is performed on a VM in an AOS 5.5 implementation?

Options:

A.

The VM can be moved on a different host

B.

the VM can be moved to a different host and a different storage container

C.

the VM can be moved to a different storage container

D.

the VM can be moved to a different (remote) site

Question 10

Which type of data is distributed by Zookeeper to ensure availability in the case of node or block failure?

Options:

A.

User Data

B.

Metadata

C.

Configuration Data

D.

Snapshot Data

Question 11

Which two methods are valid for migrating a VM from a Nutanix vSphere cluster to AHV? (Choose two.)

Options:

A.

Storage vMotion

B.

Live Migration

C.

Nutanix Move

D.

D. Cross-Hypervisor DR

Question 12

What is the maximum RPO that can be configured for VMs using the Near Sync feature?

Options:

A.

1 min

B.

10

C.

15

D.

60 min

Question 13

A catastrophic failure occurs at the primary data center. A protection domain has been set up. All required data has been replicated to an offsite DR location.

Which button should an administrator click on at the remote site's protection domain to bring up the replicated VMs?

Options:

A.

Migrate

B.

Replicate

C.

Online

D.

Activate

Question 14

In a managed network, in which scenario will AHV use the last network IP address for the DHCP server?

Options:

A.

When setting a static IP address

B.

When not selecting Override DHCP server

C.

When changing the ClDR range

D.

When deleting the DHCP network

Question 15

An administrator has a cluster in a secure environment. The administrator wants to disable password authentication over SSH to access the cluster.

Which configure should the administrator use to disable password authentication over SSH?

Options:

A.

Modify the SSH configuration on each host

B.

Enable Cluster Lockdown in Prism

C.

Modify the SSH Configuration on each CVM

D.

Configure a proxy server in Prism

Question 16

Which two targets are valid options when selecting a Remote Site in Prism? (Choose two)

Options:

A.

Physical Cluster

B.

Network attached storage

C.

XI Cloud Services

D.

Tape Library

E.

Cloud

Question 17

A new Nutanix node includes Which license by default?

Options:

A.

Pro

B.

Ultimate

C.

Prism Pro

D.

Starter

Question 18

Which two methods can be used to create VMs with UEFI firmware? (Choose two.)

Options:

A.

Prism web console

B.

PowerCLI

C.

aCLI commands

D.

vCenter 6.7

Question 19

An administrator creates a new VM, but it cannot be accessed over the network. When the administrator opens a console in the VM dashboard, the guest OS seems to be configured correctly. However, it can only ping 127.0.0.x addresses.

What is the likely issue?

Options:

A.

The VLAN configuration is incorrect.

B.

A volume group must be attached to the VM.

C.

Guest VM firewall is preventing outbound SSH connections.

D.

There is no network on the cluster.

Question 20

In an AHV cluster, an administrator needs to enable an application to share a disk b group but needs to enable the VMs to see the volume group.

How should the administrator accomplish this task?

Options:

A.

Create a shared folder for the VMs using Nutanix Files.

B.

Add the volume group to the VM using the update link from the VM dashboard.

C.

Configure a virtual disk on each VM with identical attributes in the storage dashboard.

D.

Add a disk to one VM and enable read/write on it from the other VM.

Question 21

What are the resource requirements for a single small Prism Central instance?

Options:

A.

4 vCPUs. 16 GB of memory, and 400 GiB of storage

B.

2 vCPUs, 8 GB of memory, and 500 GiB o* storage

C.

4 vCPUs, 16 GB of memory, and 500 GiB of storage

D.

8 vCPUs. 32 GB of memory, and 500 GiB of storage

Question 22

An administrator notices that most of the VMs in the cluster are on one host. Users report that an application seems to respond slowly. The application server VM has significantly more memory assigned to it than other VMs.

How should the administrator fix this issue?

Options:

A.

Reduce the amount of memory assigned to the VM.

B.

Migrate the VM to a different host.

C.

Add more memory to the VM.

D.

Increase the memory on the CVM.

Question 23

A guest VM should be able to tolerate simultaneous failure of two nodes or drives.

What are the minimum requirements for the Nutanix cluster?

Options:

A.

3 nodes with cluster RF 3 and container RF 3

B.

3 nodes with cluster RF 3 and container RF 2

C.

5 nodes with cluster RF 2 and container RF 3

D.

5 nodes with cluster RF 3 and container RF 3

Question 24

Refer to the exhibit.

System Non-Root Partition Usage shows a warning or critical alert The administrator needs to change the frequency of checks and alerts to respond more quickly.

Where in Prism Element should the administrator change the frequency of checks and alerts?

Options:

A.

Health Dashboard > Manage Crocks > Frequency

B.

Alerts Dashboard > Manage Checks > Schedule

C.

Health Dashboard > Manage Checks > Schedule

D.

Alerts Dashboard > Manage Checks > Frequency

Question 25

Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness?

Options:

A.

Continuous Data Protection

B.

Copy-on-Write

C.

Split-mirror

D.

Redirect-On-Write

Question 26

An administrator is implementing a VDI solution. The workload will be a series of persistent desktops in a dedicated storage container within a four-node cluster Storage optimizations should be set on the dedicated storage container to give optimal performance including during a node failure event

Which storage optimizations should the administrator set to meet the requirements?

Options:

A.

Compression only

B.

Deduplication and Erasure Coding

C.

Compressoion and Deduplication

D.

Compression Deduplication and Erasure Coding

Question 27

When installing Nutanix Guest Tools (NGT) on an ESXi-hosted VM, which port should be enabled on the VM to allow communication with the NGT-Controller VM service?

Options:

A.

2000

B.

2074

C.

8080

D.

9943

Question 28

Which three configuration scenarios are valid for the deployment of Prism Central? (Choose three.)

Options:

A.

Environments use Network Address Translation.

B.

Prism Elements and Prism Central art in different subnets.

C.

Environments do not have Internet access.

D.

Prism Elements and Prism Central have proxy configured.

E.

Environments use the 192.168.5.0/24 CVM management network.

Question 29

In which two scenarios is an automated live migration likely to occur? (Choose two)

Options:

A.

Cluster resource hotspot

B.

AOS upgrade

C.

Network upgrade

D.

Hypervisor upgrade

Question 30

A customer wants to isolate a group of VMs within their Nutanix environment for security reasons. The customer creates a VM with two NICs to act as a firewall and installs the appropriate software and certificates.

However, no one from the outside can access the application.

What is the likely cause of this problem?

Options:

A.

A shared volume group must be used by all isolated VMs

B.

More than one NIC cannot be added to a VM

C.

One of the NICs needs to be configured on the internal VLAN

D.

Wireshark is installed on the NAT VM

Question 31

In Files, how many FSVMs are deployed by default?

Options:

A.

1

B.

2

C.

3

D.

5

Question 32

A vDisk is read by multiple VMs. The cluster creates immutable copies of the vDisk. What are these vDisk copies called?

Options:

A.

Disk Clones

B.

Golden Images

C.

Volume Groups

D.

Shadow Clones

Question 33

A VM in a 12-node Nutanix cluster is hosting an application that has specific Physical GPU requirements. Only three nodes in the cluster meet this requirement.

The administrator wants to allow a general workload to be distributed across all nodes in the cluster and must make sure that the node hosting the VM meets its requirements.

How should the administrator perform this task?

Options:

A.

Create a sperate three-node cluster using the nodes that meet the requirement.

B.

Configure VM-Host affinity for the nodes that meet the application's GPU requirement.

C.

Over-Provision the application VM with additional virtual GPUs.

D.

Configure anti-affinity rules between the application VM and the other VMs running on the cluster.

Question 34

Which change can be made on a cluster with software-based Data-at-Rest Encryption enabled?

Options:

A.

Disable encryption on the cluster

B.

Deploy an additional Native KMS Server

C.

Enable encryption for a VM

D.

Change Native KMS to External KMS

Question 35

The Linux administration team has requested access rights to any current or future Linux VM in the environment

What entity should be selected when assigning this new role?

Options:

A.

Image

B.

AHV Cluster

C.

Category

D.

Project

Question 36

Which two methods are available when migrating a VM from a legacy 3-tier solution using VMware ESXi to AHV? (Choose two.)

Options:

A.

Deploy the Move appliance.

B.

Use Cross-Hypervisor DR.

C.

Import the .vmdk into the Image Service.

D.

Use shared nothing live migration.

Question 37

Which command should an administrator run from the CLI to view the uplink state of all AHV nodes in the

cluster?

Options:

A.

allssh show_uplinks

B.

manage_ovs show_uplinks

C.

allssh manage_ovs show_uplinks

D.

manage ovs show uplinks

Question 38

An administrator is commissioning a Nutanix Enterprise Cloud. Once the user VMs have been deployed and are running, the administrator finds that VMs on the same host are able to communicate, but are unable to communicate between hosts.

What must be changed to enable full inter-VM communications?

Options:

A.

Change the spanning-tree port type on the switch.

B.

Change the network the VMs are connected to

C.

Update the switch to specifically allow VLAN 15

D.

The VMs need to have static IP addresses.

Question 39

What requires iSCSI initiator configuration in the guest OS to use Volumes?

Options:

A.

SQL Server Always On Availability Group

B.

Microsoft Windows Failover Cluster

C.

Oracle RAC

D.

Exchange DAG

Question 40

In which two scenarios is Native Key Management Server supported? (Choose two)

Options:

A.

XenServer and AHV mixed cluster.

B.

Hyper-V and AHV mixed cluster.

C.

KVM and AHV mixed cluster.

D.

ESXi and AHV mixed cluster.

Question 41

What is the default network bond setting for an AHV host configuration?

Options:

A.

active-backup

B.

active-active

C.

balance-slb

D.

balance-tcp

Page: 1 / 10
Total 278 questions