ExamGecko
Home Home / Nutanix / NCP-MCI-6.5

Nutanix NCP-MCI-6.5 Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions











What is Prism Central primarily used for?

A.
Multi-cluster network configuration
A.
Multi-cluster network configuration
Answers
B.
Container creation
B.
Container creation
Answers
C.
Multi-cluster Single Sign On
C.
Multi-cluster Single Sign On
Answers
D.
Data reduction configuration
D.
Data reduction configuration
Answers
Suggested answer: C

Explanation:

According to the web search results, Prism Central is a multi-cluster manager that provides a single, centralized management interface for Nutanix environments12.One of the features of Prism Central is multi-cluster Single Sign On (SSO), which allows users to log in once and access multiple clusters without re-entering credentials3.

Which component ensures uniform distribution of data throughout the cluster to eliminate hot spots and speed up rebuilds?

A.
Cassandra
A.
Cassandra
Answers
B.
Distributed Storage Fabric
B.
Distributed Storage Fabric
Answers
C.
High Availability
C.
High Availability
Answers
D.
Acropolis App Mobility Fabric
D.
Acropolis App Mobility Fabric
Answers
Suggested answer: B

Explanation:

According to the web search results, Distributed Storage Fabric (DSF) is the scale-out storage technology that makes HCI and cloud possible45.DSF pools the storage devices that are directly attached to a cluster of servers and presents them to applications across a variety of storage protocols4.DSF also manages and protects data by a fine-grained, distributed metadata system that ensures uniform distribution of data throughout the cluster to eliminate hot spots and speed up rebuilds

An administrator is configuring data protection and DR for a multi-tier application. All VMs must be protected at the same time.

What must the administrator do to meet this requirement?

A.
Create a consistency group for each VM with identical schedules
A.
Create a consistency group for each VM with identical schedules
Answers
B.
Create a consistency group for the application and place all VMs in it
B.
Create a consistency group for the application and place all VMs in it
Answers
C.
Create a protection domain for the application and select auto-protect related entities
C.
Create a protection domain for the application and select auto-protect related entities
Answers
D.
Create a protection domain for each VM with identical schedules
D.
Create a protection domain for each VM with identical schedules
Answers
Suggested answer: B

Explanation:

According to the web search results, a consistency group is a group of related applications or services that must be recovered together in order to work properly, and this means more than being recovered at the same time67.They also typically need to be recovered to the same point in time6.Therefore, to meet the requirement of protecting all VMs of a multi-tier application at the same time, the administrator must create a consistency group for the application and place all VMs in it8.This way, the administrator can apply data protection policies and schedules to the entire consistency group as a single unit8.

An administrator logs in to Prism Element goes to the Network view, and sees the output shown in the exhibit.

Which three steps must the administrator take to increase throughput to the host? (Choose three.)

A.
Connect the 10Gb interfaces to the physical switch.
A.
Connect the 10Gb interfaces to the physical switch.
Answers
B.
Change the bond mode to balance-slb or balance---tcp.
B.
Change the bond mode to balance-slb or balance---tcp.
Answers
C.
Remove any 1Gb interfaces still connected from the default bond.
C.
Remove any 1Gb interfaces still connected from the default bond.
Answers
D.
Add a new switch to the network and connect 1Gb interfaces to it.
D.
Add a new switch to the network and connect 1Gb interfaces to it.
Answers
E.
Change the VLAN ID to a higher priority ID.
E.
Change the VLAN ID to a higher priority ID.
Answers
Suggested answer: A, B, C

Explanation:

These are the three steps that the administrator must take to increase throughput to the host. According to the network diagram, the host has two 10Gb interfaces and two 1Gb interfaces in the default bond, but only one of the 10Gb interfaces is connected to a switch. The other 10Gb interface is disconnected and has a red ''X'' on it. The two 1Gb interfaces are also disconnected and have dotted lines. This means that the host is using only one 10Gb interface for all its network traffic, which limits its maximum bandwidth to 10 Gbps.

To increase the throughput, the administrator should connect both 10Gb interfaces to the physical switch, preferably to different switches for redundancy and high availability. This will allow the host to use both 10Gb interfaces for network traffic, which can increase its maximum bandwidth to 20 Gbps.However, this also requires changing the bond mode from active-backup to balance-slb or balance-tcp, which are load balancing modes that distribute network traffic across multiple interfaces based on source MAC address or TCP session1.The default bond mode of active-backup only uses one interface at a time and switches to another interface only when the active one fails2.

Finally, the administrator should remove any 1Gb interfaces still connected from the default bond, as they are not needed and may cause performance issues or conflicts with the load balancing modes.The 1Gb interfaces can be used for other purposes, such as management or backup networks, by creating separate bonds or bridges for them3. Alternatively, they can be left disconnected if they are not required.

AHV IPAM assigns an IP address from the address pool when creating a managed VM NIC.

At which two instances does the address release back to the pool? (Choose two)

A.
The IP address lease expires
A.
The IP address lease expires
Answers
B.
The VM NIC is deleted.
B.
The VM NIC is deleted.
Answers
C.
The IP address is changed to static.
C.
The IP address is changed to static.
Answers
D.
The VM is deleted.
D.
The VM is deleted.
Answers
Suggested answer: B, D

Explanation:

https://portal.nutanix.com/page/documents/solutions/details/?targetId=BP-2029_AHV:BP-2029_AHV

Administrators can use Acropolis with IPAM to deliver a complete virtualization deployment, including network management, from the unified Prism interface. This capability radically simplifies the traditionally complex network management associated with provisioning VMs and assigning network addresses. To avoid address overlap, be sure to work with your network team to reserve a range of addresses for VMs before enabling the IPAM feature.

The Acropolis master assigns an IP address from the address pool when creating a managed VM NIC; the address releases back to the pool when the VM NIC or VM is deleted.

Refer to the exhibit.

The Linux Admin role has been created to manage only Linux VMs in the environment. However, the Admin1 user does not have access to all Linux VMs.

What step should be taken to grant the proper access?

A.
Add the hosts to the entities KM for the role.
A.
Add the hosts to the entities KM for the role.
Answers
B.
Grant the admin1 user the viewer role (or the cluster.
B.
Grant the admin1 user the viewer role (or the cluster.
Answers
C.
Add the role to the Linux images.
C.
Add the role to the Linux images.
Answers
D.
Add the proper category to each Linux VM.
D.
Add the proper category to each Linux VM.
Answers
Suggested answer: D

Explanation:

According to the Nutanix Prism Central Guide, role-based access control (RBAC) in Prism Central allows you to create custom roles and assign them to users or groups based on the categories of the entities they need to manage1. Categories are key-value pairs that you can assign to entities such as VMs, hosts, clusters, images, etc.to group them logically2. For example, you can create a category key called ''OS'' and assign values such as ''Linux'' or ''Windows'' to different VMs based on their operating system.

In the exhibit, the Linux Admin role has been created with the following settings:

The role has the ''VM Admin'' permission, which allows the user to perform all actions on VMs3.

The role has been assigned to the admin1 user.

The role has been scoped to the entities that have the category key ''OS'' and the value ''Linux''.

However, the admin1 user does not have access to all Linux VMs in the environment. This means that some of the Linux VMs do not have the proper category assigned to them. To grant the proper access, the administrator should add the category key ''OS'' and the value ''Linux'' to each Linux VM that needs to be managed by the Linux Admin role.This can be done either individually or in bulk through Prism Central4. Once the categories are added, the admin1 user will be able to see and manage all Linux VMs in the environment.

When installing Nutanix Guest Tools (NGT) on an ESXi-hosted VM, which port should be enabled on the VM to allow communication with the NGT-Controller VM service?

A.
2000
A.
2000
Answers
B.
2074
B.
2074
Answers
C.
8080
C.
8080
Answers
D.
9943
D.
9943
Answers
Suggested answer: D

Explanation:

NGT is a software package that enables advanced VM management features provided by Nutanix, such as file-level restore, VM mobility, and application-consistent snapshots12.To use NGT, you need to enable the NGT feature for a VM in the Prism Element web console, mount the NGT installer (ISO disk file) in the VM, and install NGT in the VM1.However, before installing NGT, you need to ensure that the VM can communicate with the NGT-Controller VM service, which runs on the Controller VM (CVM) of each Nutanix node3.The NGT-Controller VM service listens on port 9943 for incoming requests from the guest VMs3. Therefore, you need to enable port 9943 on the ESXi-hosted VM to allow communication with the NGT-Controller VM service.

Where are Leap Availability Zones configured?

A.
Cloud Connect
A.
Cloud Connect
Answers
B.
Controller VM
B.
Controller VM
Answers
C.
Prism Element
C.
Prism Element
Answers
D.
Prism Central
D.
Prism Central
Answers
Suggested answer: D

Explanation:

Terminology

Availability Zone--it is represented by all resources (Nutanix Clusters) connected to Prism Central or Xi Leap Availability zone. Depends on the architecture, Availability zone can represent geographic territory, datacenter or server room in thedatacenter.Protection policies--in protection policies you set up (RPO, Retention), rules to auto-apply policies to virtual machines

https://vmwaremine.com/2019/02/08/nutanix-leap-runbooks-part-1/#sthash.VwrzSzhQ.dpbs

Refer to Exhibit.

An administrator increases the cluster RF to 3. The containers are not modified.

What will the new values in the data resiliency dashboard be for FAILURES TOLERABLE for the Zookeeper and Extent Groups components?

A.
Zookeeper = 1 and Extent Groups = 1
A.
Zookeeper = 1 and Extent Groups = 1
Answers
B.
Zookeeper = 2 and Extent Groups = 2
B.
Zookeeper = 2 and Extent Groups = 2
Answers
C.
Zookeeper = 2 and Extent Groups = 1
C.
Zookeeper = 2 and Extent Groups = 1
Answers
D.
Zookeeper = 1 and Extent Groups = 2
D.
Zookeeper = 1 and Extent Groups = 2
Answers
Suggested answer: C

Explanation:

According to the web search results, the cluster redundancy factor (RF) determines how many copies of the cluster metadata and configuration data are stored on different nodes. By default, the cluster RF is 2, which means that there are three copies of the Zookeeper and Cassandra data on the cluster.If the cluster RF is increased to 3, then there will be five copies of the Zookeeper and Cassandra data on the cluster12.This means that the Zookeeper component can tolerate two failures, as it can still operate with a quorum of three nodes out of five3.

However, the container replication factor (RF) determines how many copies of the VM data and oplog are stored on different nodes. The container RF can be set independently for each container, and it can be different from the cluster RF.For example, a container can have RF 2 even if the cluster has RF 34. In this case, the container will only have two copies of the VM data and oplog on the cluster, regardless of the cluster RF.This means that the Extent Groups component can only tolerate one failure, as it needs at least one copy of the VM data and oplog to be available5.

Therefore, if the administrator increases the cluster RF to 3, but does not modify the containers, then the new values in the data resiliency dashboard will be Zookeeper = 2 and Extent Groups = 1.

Which three configuration scenarios are valid for the deployment of Prism Central? (Choose three.)

A.
Environments use Network Address Translation.
A.
Environments use Network Address Translation.
Answers
B.
Prism Elements and Prism Central art in different subnets.
B.
Prism Elements and Prism Central art in different subnets.
Answers
C.
Environments do not have Internet access.
C.
Environments do not have Internet access.
Answers
D.
Prism Elements and Prism Central have proxy configured.
D.
Prism Elements and Prism Central have proxy configured.
Answers
E.
Environments use the 192.168.5.0/24 CVM management network.
E.
Environments use the 192.168.5.0/24 CVM management network.
Answers
Suggested answer: A, B, C

Explanation:

Prism Central is a multi-cluster manager that provides a single, centralized management interface for Nutanix environments1. Prism Central can be deployed in different configuration scenarios, depending on the network and security requirements of the environment. Some of the valid scenarios are:

Environments use Network Address Translation (NAT): NAT is a method of mapping one IP address space to another by modifying network address information in IP datagram packet headers while they are in transit across a traffic routing device2.NAT can be used to enable communication between Prism Central and Prism Elements that are in different networks or subnets3.For example, Prism Central can be deployed in a public cloud and use NAT to access Prism Elements that are in a private data center3.

Prism Elements and Prism Central are in different subnets: A subnet is a logical subdivision of an IP network that allows multiple networks to share a single physical network4.Prism Elements and Prism Central can be in different subnets as long as they can communicate with each other through routing or NAT3.For example, Prism Central can be deployed in a management subnet and access Prism Elements that are in different application subnets3.

Environments do not have Internet access: Internet access is not required for the deployment of Prism Central, as long as the environment meets the prerequisites and considerations for installing or upgrading Prism Central. For example, Prism Central can be deployed in a dark site, which is an environment that does not have Internet access or has restricted Internet access. In this case, the administrator needs to manually enable microservices infrastructure and download the required software packages from another source.

Total 178 questions
Go to page: of 18