ExamGecko
Home Home / Nutanix / NCP-MCI-6.5

Nutanix NCP-MCI-6.5 Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











An administrator has been tasked with increasing security on Nutanix cluster by disabling password authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH,

What is the easiest way for the administrator to meet these needs?

A.
Configure LDAP authentication through a secure server,
A.
Configure LDAP authentication through a secure server,
Answers
B.
Enable STIES vie commend line on SSH to CVM.
B.
Enable STIES vie commend line on SSH to CVM.
Answers
C.
Enable Cluster Lockdown and provide an RSA key.
C.
Enable Cluster Lockdown and provide an RSA key.
Answers
D.
Restrict access with User Management in Prism.
D.
Restrict access with User Management in Prism.
Answers
Suggested answer: C

Explanation:

'An administrator has been tasked with increasing security on Nutanix cluster by disabling password authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH, What is the easiest way for the administrator to meet these needs? Enable Cluster Lockdown and provide an RSA key.'

Cluster Lockdown mode disables password authentication when accessing the CVM and AHV hosts and instead requires key-based SSH. To enable Cluster Lockdown mode, you need to provide an RSA key.

Therefore, by enabling Cluster Lockdown mode and providing an RSA key, you can increase security on Nutanix cluster by disabling password authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH with minimal effort.

https://next.nutanix.com/how-it-works-22/streamlined-login-and-increase-security-key-based-ssh-login-37397

A user is complaining about slowness of a mission-critical MSSQL Server. The administrator logs into Prism Element to investigate the VM performance and observes what is shown in the diagram.

Which action would best improve VM performance?

A.
Disable hyperthreading in the BIOS.
A.
Disable hyperthreading in the BIOS.
Answers
B.
Add additional RAM to the user VM.
B.
Add additional RAM to the user VM.
Answers
C.
Add additional RAM to the host on which the VM is running.
C.
Add additional RAM to the host on which the VM is running.
Answers
D.
Ensure the host's CPUs ere not excessively overcommitted.
D.
Ensure the host's CPUs ere not excessively overcommitted.
Answers
Suggested answer: B

Explanation:

Prism Elementis a graphical user interface that allows you to manage Nutanix clusters1.You can use Prism Element charts to understand Nutanix cluster workloads and troubleshoot performance related issues2.

memory optimized virtual machine sizes offer the best performance for SQL Server workloads on Azure VMs. Adding more RAM to the user VM can help reduce paging and improve query execution times.

SQL Server performance can be affected by disk latency and throughput. By creating separate virtual disks for data and logs, you can spread activity across multiple spindles and reduce disk contention.

https://next.nutanix.com/how-it-works-22/differences-between-prism-element-prism-central-and-prism-pro-37137

Refer to exhibit:

Why has an anomaly been triggered?

A.
Controller reached 2500 IOPS.
A.
Controller reached 2500 IOPS.
Answers
B.
Observed IOPS exceed normal values.
B.
Observed IOPS exceed normal values.
Answers
C.
Normal Controller behavior has increased.
C.
Normal Controller behavior has increased.
Answers
D.
Observed values do not match predicted values.
D.
Observed values do not match predicted values.
Answers
Suggested answer: B

Refer to Exhibit:

Why has an anomaly been triggered?

A.
Because the CPU usage crossed the blue band.
A.
Because the CPU usage crossed the blue band.
Answers
B.
Because the blue band range increased over the last 2 days
B.
Because the blue band range increased over the last 2 days
Answers
C.
Because the CPU usage dropped belon' 20%
C.
Because the CPU usage dropped belon' 20%
Answers
D.
Because the CPU usage reached 100%
D.
Because the CPU usage reached 100%
Answers
Suggested answer: A

Explanation:

Nutanix leverages a method for determining the bands called 'Generalized Extreme Studentized Deviate Test'. A simple way to think about this is similar to a confidence interval where the values are between the lower and upper limits established by the algorithm.

Another web source3shows an example of how anomaly detection works in Nutanix Prism Central. In the video, you can see that when the observed value of a metric deviates significantly from the predicted value based on historical data, an anomaly event is triggered and displayed on a chart.

Therefore, by comparing the observed values with the predicted values based on historical data, Nutanix anomaly detection can identify abnormal behavior and alert you accordingly.

Refer to Exhibit:

An administrator needs to enable inline deduplication for a pre-existing storage container. When trying to enable deduplication on the storage container. this feature is grayed-out.

What is the reason for this behavior?

A.
Replication Factor 1 is configured on the storage container.
A.
Replication Factor 1 is configured on the storage container.
Answers
B.
The cluster has less than 5 nodes which is the minimum node-count to enable deduplication.
B.
The cluster has less than 5 nodes which is the minimum node-count to enable deduplication.
Answers
C.
Capacity reservation is not enabled on the storage container.
C.
Capacity reservation is not enabled on the storage container.
Answers
D.
The cluster has hybrid storage and deduplication is supported only on all-flash clusters.
D.
The cluster has hybrid storage and deduplication is supported only on all-flash clusters.
Answers
Suggested answer: D

Explanation:

Nutanix supports two types of deduplication: post-process and inline. Post-process deduplication runs periodically on a schedule and can be enabled on any cluster. Inline deduplication runs in real time before data is written to disk and can be enabled only on all-flash clusters.

Therefore, by checking the type of storage and the type of deduplication, you can determine if you can enable inline deduplication on a storage container or not.

Nutanix inline deduplicationis a feature that reduces the stored size and avoids duplicate data on a storage container1.It is recommended only on some specific scenarios, such as when using Nutanix Files or virtual desktop infrastructure (VDI) workloads12.

Refer to Exhibit:

An administrator is trying to create a custom alert policy for all VMs.

Why is the Alert warning if field greyed cut?

A.
The Alert critical if threshold is set.
A.
The Alert critical if threshold is set.
Answers
B.
The Behavioral Anomaly threshold is set.
B.
The Behavioral Anomaly threshold is set.
Answers
C.
The Enable Policy option checked.
C.
The Enable Policy option checked.
Answers
D.
The Auto resolve alerts option is checked.
D.
The Auto resolve alerts option is checked.
Answers
Suggested answer: B

Explanation:

when you create a custom alert policy, you can choose between two types of thresholds: Static Threshold and Behavioral Anomaly. Static Threshold allows you to set a fixed value for the metric that triggers the alert. Behavioral Anomaly allows you to use machine learning to detect abnormal behavior based on historical data.

If you select Behavioral Anomaly as the threshold type, you cannot set a warning level for the alert.You can only set a critical level that indicates how much deviation from normal behavior is considered an anomaly3. Therefore, the Alert warning if field is greyed out when you select Behavioral Anomaly.

Refer to Exhibit:

An administrator is attempting to create an additional virtual switch on a newly deployed AHV cluster, using the two currently disconnected interfaces. The administrator is unable to select the disconnected interfaces when creating the virtual switch.

What is the likely cause of this issue?

A.
Only one interface is available on the selected hosts.
A.
Only one interface is available on the selected hosts.
Answers
B.
Interfaces must be connected to the network before they can be assigned.
B.
Interfaces must be connected to the network before they can be assigned.
Answers
C.
The disconnected interfaces are currently assigned to virtual switch 0,
C.
The disconnected interfaces are currently assigned to virtual switch 0,
Answers
D.
Interfaces must be assigned to virtual switches via the cli
D.
Interfaces must be assigned to virtual switches via the cli
Answers
Suggested answer: B

Explanation:

In Nutanix AHV, when creating a virtual switch and trying to add network interfaces (NICs) to it, the NICs must be connected to the network before they can be selected and assigned to the switch. If the interfaces are showing as disconnected, the system will not allow them to be added to a virtual switch because it cannot verify their operational status or the presence of a live network connection.

It is a standard requirement for the interfaces to have physical connectivity (i.e., network cables plugged in and connected to a live switch port) so that the AHV host can detect the link status as up. Once the interfaces are connected and recognized by the host, they can then be added to a virtual switch in the Nutanix AHV.

It's important to note that while the command-line interface (CLI) is indeed a powerful tool for managing network configurations on AHV hosts, and some configurations do indeed require CLI, the inability to select disconnected interfaces is not specifically a limitation that requires the use of CLI to overcome. The focus should be on ensuring that the physical connectivity is established for the interfaces in question.

This behavior is consistent with networking best practices and Nutanix's network configuration guidelines, as detailed in the Nutanix AHV Networking Guide. This guide explains the requirements and procedures for configuring virtual switches and managing NICs in a Nutanix AHV environment.

After configuring Active Directory as the desired authentication service, an administrator is not able to login into Prism Central using privileged account.

Which configuration must be checked first?

A.
Account lock status
A.
Account lock status
Answers
B.
Role Mapping
B.
Role Mapping
Answers
C.
Local user account
C.
Local user account
Answers
D.
Cluster Lockdown
D.
Cluster Lockdown
Answers
Suggested answer: B

Explanation:

According to the Nutanix Community1, users can authenticate using their Active Directory credentials when Active Directory support is enabled for Prism Central.To enable Active Directory support, you need to configure Role Mapping12, which defines how Active Directory groups map to Prism Central roles.

https://next.nutanix.com/ncm-intelligent-operations-formerly-prism-pro-ultimate-26/configuring-authentication-38051

Refer to Exhibit:

An administrator is trying to put a node into maintenance mode but receives the message shown in the exhibit.

What is a potential reason for this dialog?

A.
LinuxVM1 uses a vDisks stored in a RF1 Datastore
A.
LinuxVM1 uses a vDisks stored in a RF1 Datastore
Answers
B.
LinuxVM1 uses a Volume Group
B.
LinuxVM1 uses a Volume Group
Answers
C.
LinuxVM1 uses a virtual GPU.
C.
LinuxVM1 uses a virtual GPU.
Answers
D.
LinuxVM1 uses e vDisks stored in a RF3 Datastore
D.
LinuxVM1 uses e vDisks stored in a RF3 Datastore
Answers
Suggested answer: A

Explanation:

According to the Nutanix Community1, host maintenance mode is used to safely migrate all the user virtual machines (VMs) in the host and make sure no VMs are running on the node. If a VM can't be migrated to another host, you need to shut down the VM for the host to enter into maintenance mode.

According to The Virtualist2, a storage container is a logical segmentation of a storage pool that can be mounted as an NFS datastore on ESXi hosts. You can choose a replication factor (RF) for each storage container, which determines how many copies of data are stored across different nodes.

Refer to exhibit:

What could be the cause for this behavior?

A.
RBAC is configured and the administrator's user doesn't have the right privileges.
A.
RBAC is configured and the administrator's user doesn't have the right privileges.
Answers
B.
The files were ISO but were uploaded as disk images hence cannot be used or edited.
B.
The files were ISO but were uploaded as disk images hence cannot be used or edited.
Answers
C.
Images are corrupted and must be re-uploaded.
C.
Images are corrupted and must be re-uploaded.
Answers
D.
Images were imported into Prism Central.
D.
Images were imported into Prism Central.
Answers
Suggested answer: A
Total 178 questions
Go to page: of 18