ExamGecko
Home Home / Nutanix / NCP-MCI-6.5

Nutanix NCP-MCI-6.5 Practice Test - Questions Answers, Page 11

Question list
Search
Search

Related questions











Which two capabilities does IPAM provide in a Nutanix networking configuration? (Choose two.)

A.
Allows proxy server settings to be set up for a defined network
A.
Allows proxy server settings to be set up for a defined network
Answers
B.
Allows AHV to assign IP addresses automatically to VMs using DHCP
B.
Allows AHV to assign IP addresses automatically to VMs using DHCP
Answers
C.
Configures a VLAN with an IP subnet and assigns a group of IP addresses
C.
Configures a VLAN with an IP subnet and assigns a group of IP addresses
Answers
D.
Configures firewall rules to prevent or allow certain TCP/IP traffic
D.
Configures firewall rules to prevent or allow certain TCP/IP traffic
Answers
Suggested answer: B, C

Explanation:

According to theNutanix Support & Insights, IPAM enables AHV to assign IP addresses automatically to VMs using DHCP. You can configure each virtual network and associated VLAN with a specific IP subnet, associated domain settings, and group of IP address pools available for assignment.

Which three cluster operations require an administrator to reclaim licenses?(Choose three)

A.
Destroy a cluster.
A.
Destroy a cluster.
Answers
B.
Upgrade a cluster
B.
Upgrade a cluster
Answers
C.
Migrate a cluster
C.
Migrate a cluster
Answers
D.
Remove a Node from a cluster
D.
Remove a Node from a cluster
Answers
E.
Move Nodes between clusters.
E.
Move Nodes between clusters.
Answers
Suggested answer: A, D, E

Explanation:

https://portal.nutanix.com/page/documents/details/?targetId=Web_Console_Guide-Prism_v4_7:lic_licensing_managing_c.html

Reclaiming Licenses (Including License Renewal)

You can reclaim and optionally re-apply licenses for nodes in your clusters:

You must reclaim licenses when you plan to destroy a cluster. First reclaim the licenses, then destroy the cluster. You do not need to reclaim Starter licenses. These licenses are automatically applied whenever you create a cluster, including after you have destroyed a cluster.

Return licenses to your inventory when you remove one or more nodes from a cluster. Also, if you move nodes from one cluster to another, first reclaim the licenses, move the nodes, then re-apply the licenses.

You can reclaim licenses for nodes in your clusters in cases where you want to make modifications or downgrade licenses. For example, applying an Ultimate license to all nodes in a cluster where some nodes are currently licensed as Pro and some nodes are licensed as Ultimate. You might also want to transition nodes from Ultimate to Pro licensing.

You must reclaim licenses when you renew licenses. First reclaim the expired licenses, then apply new licenses.

When configuring Prism Central, which two log modules are able to forward messages to an external syslog server? (Choose two.

A.
API Audit
A.
API Audit
Answers
B.
Flow
B.
Flow
Answers
C.
DNS
C.
DNS
Answers
D.
NTP Synchronization
D.
NTP Synchronization
Answers
Suggested answer: A, B

An administrator has been alerted to a VM that has high I/O latency and wants to determine if there are any other factors, such as insufficient network or memory resources that correlate, as part of a troubleshooting process.

Which type of chart should the administrator create to allow all relevant data to be easily exported to CSV for later analysis?

A.
A VM entity chart with each of the relevant metrics.
A.
A VM entity chart with each of the relevant metrics.
Answers
B.
A cluster metric chart for each of the relevant metrics
B.
A cluster metric chart for each of the relevant metrics
Answers
C.
A cluster entity chart with each of the relevant metrics
C.
A cluster entity chart with each of the relevant metrics
Answers
D.
A VM metric chart for each of the relevant metrics
D.
A VM metric chart for each of the relevant metrics
Answers
Suggested answer: D

How should an administrator correct an SSL error when connecting to a Nutanix cluster?

A.
Add the SSL certificate to the workstation's trusted people store
A.
Add the SSL certificate to the workstation's trusted people store
Answers
B.
Create a new self-signed certificate for the cluster with a 4096 bit key
B.
Create a new self-signed certificate for the cluster with a 4096 bit key
Answers
C.
Create a new SSL certificate for the cluster signed by an AD certificate authority
C.
Create a new SSL certificate for the cluster signed by an AD certificate authority
Answers
D.
Add the SSL certificate to an AD group policy applied to all computer objects
D.
Add the SSL certificate to an AD group policy applied to all computer objects
Answers
Suggested answer: C

A node with Erasure Coding fails.

What is the impact?

A.
The node stops utilizing Erasure Coding.
A.
The node stops utilizing Erasure Coding.
Answers
B.
Potentially increased amount of data stored in the SSD tier.
B.
Potentially increased amount of data stored in the SSD tier.
Answers
C.
Increased Controller VM CPU Load.
C.
Increased Controller VM CPU Load.
Answers
D.
AQS unable to do deduplication during the Erasure Coding failure.
D.
AQS unable to do deduplication during the Erasure Coding failure.
Answers
Suggested answer: B

Explanation:

When a node with Erasure Coding fails, the cluster will automatically rebuild the missing data using replication factor (RF) 2 or 3, depending on the cluster configuration.This means that the data that was previously stored using Erasure Coding will now be stored using full copies, which may increase the amount of data stored in the SSD tier1.

A configuration is single domain, single forest, and does not use SSL.

Which port number should be used to configure LDAP?

A.
389
A.
389
Answers
B.
3269
B.
3269
Answers
C.
636
C.
636
Answers
D.
3268
D.
3268
Answers
Suggested answer: A

Explanation:

Port 389 is the default port for LDAP without SSL encryption. Port 636 is used for LDAP over SSL (LDAPS).Port 3268 and 3269 are used for Global Catalog (GC) and Global Catalog over SSL (GCSSL), respectively2.

The Linux administration team has requested access rights to any current or future Linux VM in the environment

What entity should be selected when assigning this new role?

A.
Image
A.
Image
Answers
B.
AHV Cluster
B.
AHV Cluster
Answers
C.
Category
C.
Category
Answers
D.
Project
D.
Project
Answers
Suggested answer: C

Explanation:

Categories are key-value pairs that can be used to tag entities such as VMs, images, networks, and projects in Prism Central.Categories can be used to create dynamic groups of entities based on their attributes, and assign roles and permissions to those groups3. In this case, a category such as OS=Linux can be used to group all Linux VMs and grant access rights to the Linux administration team.

A customer wants to isolate a group of VMs within their Nutanix environment for security reasons. The customer creates a VM with two NICs to act as a firewall and installs the appropriate software and certificates.

However, no one from the outside can access the application.

What is the likely cause of this problem?

A.
A shared volume group must be used by all isolated VMs
A.
A shared volume group must be used by all isolated VMs
Answers
B.
More than one NIC cannot be added to a VM
B.
More than one NIC cannot be added to a VM
Answers
C.
One of the NICs needs to be configured on the internal VLAN
C.
One of the NICs needs to be configured on the internal VLAN
Answers
D.
Wireshark is installed on the NAT VM
D.
Wireshark is installed on the NAT VM
Answers
Suggested answer: C

Explanation:

One of the NICs needs to be configured on the internal VLAN. This is because the VMs that are isolated need to communicate with the firewall VM through a private network, and the firewall VM needs to communicate with the external network through a public network.The internal VLAN is a logical network that can be created and managed by AHV1. If the firewall VM does not have a NIC on the internal VLAN, it will not be able to route traffic between the isolated VMs and the outside world.

Which two methods are available when migrating a VM from a legacy 3-tier solution using VMware ESXi to AHV? (Choose two.)

A.
Deploy the Move appliance.
A.
Deploy the Move appliance.
Answers
B.
Use Cross-Hypervisor DR.
B.
Use Cross-Hypervisor DR.
Answers
C.
Import the .vmdk into the Image Service.
C.
Import the .vmdk into the Image Service.
Answers
D.
Use shared nothing live migration.
D.
Use shared nothing live migration.
Answers
Suggested answer: A, C

Explanation:

Deploy the Move appliance and Import the .vmdk into the Image Service.These are two methods that can be used to migrate a VM from VMware ESXi to AHV2.The Move appliance is a tool that automates the migration process by converting the VM disks and configuration to AHV format and transferring them to the Nutanix cluster3.The Image Service is a feature that allows users to upload and manage disk images that can be used to create or clone VMs on AHV4. By importing the .vmdk file of the VMware VM into the Image Service, users can create a new AHV VM from that image.

Total 178 questions
Go to page: of 18