ExamGecko
Home Home / Nutanix / NCP-MCI-6.5

Nutanix NCP-MCI-6.5 Practice Test - Questions Answers, Page 18

Question list
Search
Search

Related questions











Where can an administrator change a CVM password?

A.
KMS Server Terminal
A.
KMS Server Terminal
Answers
B.
CVM setting in Prism Element
B.
CVM setting in Prism Element
Answers
C.
CVM setting in Prism Central
C.
CVM setting in Prism Central
Answers
D.
Prism CVM VM Console
D.
Prism CVM VM Console
Answers
Suggested answer: D

An administrator needs to boot a VM to a bootable CD. The administrator tries to configure the VM to boot to it, select to add disk, and goes to the images available. The image for the bootable CD is unavailable.

What is the Likely issue?

A.
The CD-ROM interface is too slow.
A.
The CD-ROM interface is too slow.
Answers
B.
The administrator selected a disk attached before it can boot to a CD.
B.
The administrator selected a disk attached before it can boot to a CD.
Answers
C.
The VM needs to have a standard disk attached before it can boot to a CD.
C.
The VM needs to have a standard disk attached before it can boot to a CD.
Answers
D.
The bootable CD image is corrupted during creation.
D.
The bootable CD image is corrupted during creation.
Answers
Suggested answer: B

After the initial configuration and upgrade of NCC, the administrator notices these critical alerts:

. IPMI 10.7.133.33 is using default password

. Host 10.7.133.25 is using default password

. CVM 10.7.133.31 is using default password

Which two initial cluster configuration tasks were missed during the deployment process? (Choose two.)

A.
CVM password changes
A.
CVM password changes
Answers
B.
BIOS password changes
B.
BIOS password changes
Answers
C.
Host password changes
C.
Host password changes
Answers
D.
Password policy changes
D.
Password policy changes
Answers
Suggested answer: A, C

Explanation:

The critical alerts listed are indicating that the default passwords are still in use for IPMI, the host, and the Controller Virtual Machine (CVM). This suggests that the passwords for these components were not changed from the default during the initial cluster configuration and deployment process, which is a critical security practice.

A) CVM password changes: The alert for the CVM using the default password indicates that the CVM password has not been changed. It is a standard security measure to change default passwords to prevent unauthorized access.

C) Host password changes: Similarly, the alert for the host using the default password indicates that the default password for the host has not been updated. This applies to the passwords used to access the hypervisor host directly.

Changing default passwords is a critical step in securing the Nutanix environment. This is highlighted in Nutanix's best practices and security guidelines, which recommend changing default passwords as part of the initial configuration to ensure that the environment is not left vulnerable to unauthorized access due to known default credentials. This process is typically part of the initial setup procedures outlined in the Nutanix documentation for cluster deployment and security configuration.

The IPMI alert also points to the need for changing default passwords, but since IPMI (Intelligent Platform Management Interface) is not specifically mentioned in the provided options, it falls under the broader category of host-level password changes, which would be covered by option C.

BIOS password changes (Option B) and Password policy changes (Option D) are also important but were not directly flagged by the alerts mentioned. BIOS password changes are usually a separate task and not indicated by the alerts given, while password policy changes are related to the policies governing password complexity and rotation rather than the initial password setup.

Refer to the Exhibit:

An administrator is adding a new node to a cluster. The node has been imaged to the same versions of AHV and AOS that the cluster is running, configured with appropriate IP addresses, and br0-up has been configured in the same manner as the existing uplink bonds.

When attempting to add the node to the cluster with the Expand Cluster function in Prism, the cluster is unable to find the new node.

Based on the above output from the new node, what is most likely the cause of this issue?

A.
There is a firewall blocking the discovery traffic from the cluster.
A.
There is a firewall blocking the discovery traffic from the cluster.
Answers
B.
The ports on the upstream switch are not configured for LACP.
B.
The ports on the upstream switch are not configured for LACP.
Answers
C.
The existing cluster and the expansion node are on different VLANs.
C.
The existing cluster and the expansion node are on different VLANs.
Answers
D.
LACP configuration must be completed after cluster expansion.
D.
LACP configuration must be completed after cluster expansion.
Answers
Suggested answer: B

Explanation:

The output in the exhibit indicates that the node's network interfaces (eth0-eth3) are bonded together using LACP (Link Aggregation Control Protocol) with 'balance-tcp' as the bonding mode and LACP speed set to 'fast'. For LACP to function correctly, the switch ports to which the node is connected must also be configured to support LACP. If the ports on the upstream switch are not configured for LACP, the bond will not be able to establish properly, and the node will not communicate effectively on the network, making it undiscoverable when attempting to expand the cluster.

The absence of an operational LACP configuration could prevent the new node from joining the existing cluster as the node's network interfaces would not be able to pass traffic correctly. This can be verified by checking the switch configuration to ensure that the ports are set to participate in an LACP bond.

The other options, such as a firewall blocking discovery traffic (Option A) or the node being on different VLANs (Option C), are possible causes for a node not being discovered, but given the specific command output provided, the most likely cause is related to the switch port configuration for LACP. Option D, regarding completing LACP configuration after cluster expansion, is not correct because LACP needs to be operational for the node to communicate with the cluster during the expansion process.

Proper LACP configuration is critical for network communication in a Nutanix AHV cluster, and this is covered in detail in the Nutanix AHV and Networking documentation. It outlines the steps for configuring network bonds and LACP on both the AHV hosts and the connecting network infrastructure.

Refer to Exhibit:

Which statement is true?

A.
A critical alert will be triggered if I/O working set size goes over 6000 MB.
A.
A critical alert will be triggered if I/O working set size goes over 6000 MB.
Answers
B.
A critical alert will be triggered when there is an anomaly above 4000 MB.
B.
A critical alert will be triggered when there is an anomaly above 4000 MB.
Answers
C.
A warning alert will be triggered after 3 anomalies have been catch.
C.
A warning alert will be triggered after 3 anomalies have been catch.
Answers
D.
A warning alert will be triggered if I/O working set size goes over the blue band.
D.
A warning alert will be triggered if I/O working set size goes over the blue band.
Answers
Suggested answer: B

Explanation:

A) This statement is incorrect because there is no static threshold set to trigger a critical alert at 6000 MB. The graph shows a peak that goes above 6000 MB, but the alert configuration below does not specify a static threshold at this value.

B) This is the correct statement. The configuration under 'Behavioral Anomaly' is set to alert every time there is an anomaly, with a critical level alert set to trigger when the I/O working set size is between 0 MB and 4000 MB. The graph illustrates that the anomalies (highlighted in pink) occur when the working set size exceeds the normal range (blue band). Therefore, any anomaly detected above 4000 MB would trigger a critical alert.

C) This statement is incorrect because there is no indication that a warning alert is configured to trigger after 3 anomalies. The exhibit does not show any configuration that specifies an alert based on the number of anomalies.

D) This statement is incorrect as there's no indication that a warning alert will be triggered based on the I/O working set size exceeding the blue band. The alert settings are configured to ignore anomalies below 4000 MB and to trigger a critical alert for anomalies above this threshold.

The settings displayed in the exhibit are typically part of Nutanix's Prism infrastructure management platform, which can set various thresholds for performance metrics and trigger alerts based on those thresholds. The behavior is defined in the Prism documentation where the alert configuration is outlined.


An administrator initially performed a cluster Foundation using a flat switch without any VLAN configuration. After the Foundation, the administrator moved the dual 25Gb data ports and single 1Gb IPMI port to the actual switches with the below network configurations:

. All VLANs are tagged

. VLAN 1000 for CVM\Hypervisor traffic

. VLAN 1001 for User VM traffic

. VLAN 100 for IPMI traffic

After moving the IPMI network links, the administrator can no longer ping the IPMI IPs.

Which two changes does the administrator need to make? (Choose two.)

A.
SSH to AHV and set the VLAN ID using IPMI Tool.
A.
SSH to AHV and set the VLAN ID using IPMI Tool.
Answers
B.
SSH to CVM and restart network services on all host.
B.
SSH to CVM and restart network services on all host.
Answers
C.
SSH to AHV and change the IP address using IPMI tool.
C.
SSH to AHV and change the IP address using IPMI tool.
Answers
D.
SSH to CVM and restart Genesis on all CVMs.
D.
SSH to CVM and restart Genesis on all CVMs.
Answers
Suggested answer: A, C

Explanation:

The issue described pertains to the inability to ping the IPMI IPs after moving the IPMI network links to the actual switches with specific VLAN configurations. The two changes that the administrator needs to make are:

A . SSH to AHV and set the VLAN ID using IPMI Tool: Since all VLANs are tagged in the new network configuration, the IPMI network interface needs to be aware of the VLAN it's supposed to communicate on. This can be achieved by setting the VLAN ID using the IPMI Tool on the AHV.

C . SSH to AHV and change the IP address using IPMI tool: If the IPMI IP addresses were initially set in a different subnet that is not routable in the new network configuration, the administrator would need to change the IPMI IP addresses to match the new network configuration. This can be done by SSHing to the AHV and using the IPMI Tool to change the IP address.

Which storage policy value can be inherited from a cluster?

A.
IO performance
A.
IO performance
Answers
B.
Storage Container
B.
Storage Container
Answers
C.
Compression
C.
Compression
Answers
D.
QoS
D.
QoS
Answers
Suggested answer: C

Explanation:

The storage policy value that can be inherited from a cluster is Compression. In the Nutanix Multicloud Infrastructure (NCP-MCI) 6.5, compression is a storage optimization feature that can be configured at the cluster level and inherited by all the entities within the cluster. This feature helps in reducing the storage footprint by compressing the data before writing it to the disk. The other options like IO performance, Storage Container, and QoS are not inherited from the cluster. They are configured and managed separately for each entity as per the requirements.

After deploying a cluster, time is not synchronizing properly.

What task needs to be performed?

A.
DNS configuration
A.
DNS configuration
Answers
B.
NTP configuration
B.
NTP configuration
Answers
C.
HA configuration
C.
HA configuration
Answers
D.
SMTP configuration
D.
SMTP configuration
Answers
Suggested answer: B

Explanation:

The task that needs to be performed when time is not synchronizing properly after deploying a cluster is NTP configuration. In the Nutanix Multicloud Infrastructure (NCP-MCI) 6.5, Network Time Protocol (NTP) is used to synchronize the system time across all the nodes in a cluster. If the time is not synchronizing properly, it indicates that there might be an issue with the NTP configuration. Therefore, checking and correcting the NTP configuration would be the appropriate action to resolve this issue. The other options like DNS configuration, HA configuration, and SMTP configuration are not directly related to time synchronization in a cluster.


Total 178 questions
Go to page: of 18