ExamGecko
Home Home / Nutanix / NCP-MCI-6.5

Nutanix NCP-MCI-6.5 Practice Test - Questions Answers, Page 13

Question list
Search
Search

Related questions











Which change can be made on a cluster with software-based Data-at-Rest Encryption enabled?

A.
Disable encryption on the cluster
A.
Disable encryption on the cluster
Answers
B.
Deploy an additional Native KMS Server
B.
Deploy an additional Native KMS Server
Answers
C.
Enable encryption for a VM
C.
Enable encryption for a VM
Answers
D.
Change Native KMS to External KMS
D.
Change Native KMS to External KMS
Answers
Suggested answer: D

An administrator is reviewing performance of a core banking system that routinely has 20,000 concurrent users. During, business hours, the CPU on the applications servers runs at close to 100%. The administrator needs to determine if there is a performance issue specific to the app servers, the database servers, or all servers on the cluster.

Which metrics should the administrator review in Prism Analysis Graphs?

A.
Cluster IO, Network, Database and App Server CPU
A.
Cluster IO, Network, Database and App Server CPU
Answers
B.
Cluster CPU and Memory Only
B.
Cluster CPU and Memory Only
Answers
C.
Cluster IO, CPU, Memory and Database and App Server CPU
C.
Cluster IO, CPU, Memory and Database and App Server CPU
Answers
D.
Cluster IO, CPU, Memory, Network, App Server CPU
D.
Cluster IO, CPU, Memory, Network, App Server CPU
Answers
Suggested answer: D

Explanation:

In this case, the administrator wants to investigate the performance of a core banking system that consists of application servers and database servers. The application servers have high CPU utilization during business hours, which may indicate a bottleneck or a resource contention issue. The administrator needs to review multiple metrics in Prism Analysis Graphs to identify the root cause and determine if there is a problem with the app servers only, or with other components as well.

The metrics that are relevant for this analysis are:

Cluster IO: This metric shows the input/output operations per second (IOPS) and throughput (MBps) of the cluster. It can help to understand if there is a high demand for disk IO from the VMs or if there is any latency or congestion in the storage layer.

Cluster CPU: This metric shows the CPU utilization (%) and load average of the cluster. It can help to understand if there is enough CPU capacity in the cluster to handle the workload or if there is any imbalance or contention among hosts.

Cluster Memory: This metric shows the memory utilization (%) and available memory (GB) of the cluster. It can help to understand if there is enough memory capacity in the cluster to support the VMs or if there is any pressure or swapping in the memory layer.

Network: This metric shows the network throughput (MBps) and packets per second (pps) of the cluster. It can help to understand if there is enough network bandwidth in the cluster to transfer data between hosts and VMs or if there is any congestion or packet loss in the network layer.

App Server CPU: This metric shows the CPU utilization (%) and load average of each application server VM. It can help to understand if there is any variation or anomaly in the performance of each app server or if there is any correlation with other metrics.

Database Server CPU: This metric shows the CPU utilization (%) and load average of each database server VM. It can help to understand if there is any variation or anomaly in the performance of each database server or if there is any correlation with other metrics.

A VM in a 12-node Nutanix cluster is hosting an application that has specific Physical GPU requirements. Only three nodes in the cluster meet this requirement.

The administrator wants to allow a general workload to be distributed across all nodes in the cluster and must make sure that the node hosting the VM meets its requirements.

How should the administrator perform this task?

A.
Create a sperate three-node cluster using the nodes that meet the requirement.
A.
Create a sperate three-node cluster using the nodes that meet the requirement.
Answers
B.
Configure VM-Host affinity for the nodes that meet the application's GPU requirement.
B.
Configure VM-Host affinity for the nodes that meet the application's GPU requirement.
Answers
C.
Over-Provision the application VM with additional virtual GPUs.
C.
Over-Provision the application VM with additional virtual GPUs.
Answers
D.
Configure anti-affinity rules between the application VM and the other VMs running on the cluster.
D.
Configure anti-affinity rules between the application VM and the other VMs running on the cluster.
Answers
Suggested answer: B

Explanation:

Configure VM-Host affinity for the nodes that meet the application's GPU requirement.This is because VM-Host affinity allows the administrator to specify which nodes a VM can run on or must not run on1. By creating a VM-Host affinity rule that binds the application VM to the three nodes that have the physical GPU, the administrator can ensure that the VM will always run on a node that meets its requirement, regardless of any HA or migration events. This also allows the other nodes in the cluster to host other VMs without any restrictions.

Where should an administrator unregister Prism Element from Prism Central?

A.
From a Host SSH session
A.
From a Host SSH session
Answers
B.
From the Prism Central web console
B.
From the Prism Central web console
Answers
C.
From the Prism Element web console
C.
From the Prism Element web console
Answers
D.
From a CVM SSH session
D.
From a CVM SSH session
Answers
Suggested answer: A

Explanation:

This is because there is no GUI method to unregister a cluster from Prism Central, so the process requires SSH access to the PC VM as well as to a CVM of the cluster2.The unregistration process involves getting the UUID of the cluster from the CVM and then using that to trigger de-registration from PC command line2.The unregistration process also involves cleaning up any associated metadata and configuration on both PC and PE2. Therefore, the administrator needs to use a Host SSH session to perform this task.

A Nutanix cluster is equipped with four nodes. Four VMs on this cluster have been configured with a VM-VM anti-affinity policy and are each being hosted by a different node.

What occurs to the cluster and these VMs during an AHV upgrade?

A.
One node hosts two VMs while the node being upgraded is in maintenance mode.
A.
One node hosts two VMs while the node being upgraded is in maintenance mode.
Answers
B.
One VM out of the four powers down when the node hosting it reboots.
B.
One VM out of the four powers down when the node hosting it reboots.
Answers
C.
The AHV pre-upgrade checks fail until the administrator disables the anti-affinity policy.
C.
The AHV pre-upgrade checks fail until the administrator disables the anti-affinity policy.
Answers
D.
The AHV pre-upgrade checks fail until the four VMs are powered off.
D.
The AHV pre-upgrade checks fail until the four VMs are powered off.
Answers
Suggested answer: A

Explanation:

One node hosts two VMs while the node being upgraded is in maintenance mode. This is because Nutanix supports a feature calledRolling Upgradethat allows upgrading AHV on a cluster without any downtime or impact to the VMs. The Rolling Upgrade feature performs the upgrade one node at a time, by putting the node in maintenance mode, evacuating the VMs to other nodes, upgrading AHV, and then bringing the node back online. The VM-VM anti-affinity policy ensures that the four VMs are not placed on the same node during the evacuation process, so one node will host two VMs temporarily while the other node is being upgraded.

How many SSL certificates are used by Prism Element on a Nutanix cluster?

A.
1
A.
1
Answers
B.
5
B.
5
Answers
C.
256
C.
256
Answers
D.
2048
D.
2048
Answers
Suggested answer: A

Explanation:

According to the Nutanix Prism Element Guide, Prism Element uses a single SSL certificate on a Nutanix cluster. The certificate is used to secure the communication between the web browser and the Prism web console. The certificate is also used to authenticate the cluster to external services, such as Active Directory, SMTP, and SNMP. The certificate can be either self-signed or signed by a trusted certificate authority (CA). The certificate can be replaced or renewed through the Prism web console or the ncli command-line interface.

Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness?

A.
Continuous Data Protection
A.
Continuous Data Protection
Answers
B.
Copy-on-Write
B.
Copy-on-Write
Answers
C.
Split-mirror
C.
Split-mirror
Answers
D.
Redirect-On-Write
D.
Redirect-On-Write
Answers
Suggested answer: B

Explanation:

According to the Dell Unity: Data Reduction Technical White Paper1, snapshots and clones on Dell Unity use the Copy-on-Write (CoW) algorithm to maximize efficiency and effectiveness. CoW is a technique that defers the copying of data until it is modified. This means that snapshots and clones only consume space when changes are made to the source or the clone, respectively. CoW also preserves the original data in case of a rollback or recovery operation.

What are two minimum prerequisites for live migration to succeed? (Choose two.)

A.
All AHV hosts have IP addresses in the same subnet
A.
All AHV hosts have IP addresses in the same subnet
Answers
B.
All AHV hosts must be configured on the same VLAN
B.
All AHV hosts must be configured on the same VLAN
Answers
C.
All VMs have an IP address in the same subnet
C.
All VMs have an IP address in the same subnet
Answers
D.
All VMs are configured for the same VLAN
D.
All VMs are configured for the same VLAN
Answers
Suggested answer: A, D

Explanation:

According to section 5 of the exam blueprint guide1, one of the topics covered is live migration. Live migration is the process of moving a running VM from one host to another without any downtime or interruption of service. To perform live migration, there are some prerequisites that must be met, such as:

All AHV hosts have IP addresses in the same subnet

All VMs are configured for the same VLAN

The source and destination hosts have enough resources to accommodate the VM

The VM does not have any PCI devices attached

When creating a VM on an AHV cluster, how is the initial placement of the VM determined?

A.
AHV uses a round robin algorithm, placing new VMs onto hosts based on the numerical order of their UUID
A.
AHV uses a round robin algorithm, placing new VMs onto hosts based on the numerical order of their UUID
Answers
B.
The administrator right clicks on the desired host and selects Power on VM from the dropdown menu
B.
The administrator right clicks on the desired host and selects Power on VM from the dropdown menu
Answers
C.
The Acropolis Dynamic Scheduler selects a host which provides adequate resources for the VMs configuration
C.
The Acropolis Dynamic Scheduler selects a host which provides adequate resources for the VMs configuration
Answers
D.
Placement is determined by the host that holds the new_VM token at the time of VM creation
D.
Placement is determined by the host that holds the new_VM token at the time of VM creation
Answers
Suggested answer: C

Explanation:

According to section 6 of the exam blueprint guide1, one of the topics covered is VM placement options. When creating a new VM on an AHV cluster, there are two ways to determine its initial placement:

Automatic placement: The Acropolis Dynamic Scheduler (ADS) selects a host that provides adequate resources for the VM's configuration, such as CPU, memory, disk space, and network bandwidth. ADS also considers factors such as host load, power state, availability domains, and affinity rules.

Manual placement: The administrator can specify a host or a host group where they want to place the VM.

Which command should an administrator run from the CLI to view the uplink state of all AHV nodes in the cluster?

A.
allssh show_uplinks
A.
allssh show_uplinks
Answers
B.
manage_ovs show_uplinks
B.
manage_ovs show_uplinks
Answers
C.
allssh manage_ovs show_uplinks
C.
allssh manage_ovs show_uplinks
Answers
D.
manage ovs show uplinks
D.
manage ovs show uplinks
Answers
Suggested answer: C

Explanation:

According to section 4 of the exam blueprint guide1, one of the topics covered is AHV networking components and configuration settings. One of these components is Open vSwitch (OVS), which is a software switch that provides network connectivity between VMs and physical networks. OVS has two types of ports:

Uplink ports: These are physical ports that connect to external networks or switches.

Internal ports: These are virtual ports that connect to VMs or other internal networks.

To view the uplink state of all AHV nodes in the cluster, an administrator can use the manage_ovs command with the show_uplinks option. This command displays information such as port name, link state, speed, duplex mode, MTU size, bond mode, and bond status. However, this command only works on a single node. To run the command on all nodes in the cluster, an administrator can use the allssh command, which executes a command on all CVMs in parallel. Therefore, the correct command is:

allssh manage_ovs show_uplinks

Total 178 questions
Go to page: of 18