NCP Mci 6.5
NCP Mci 6.5
Nutanix
NCP-MCI-6.5
Nutanix Certified Professional-Multicloud Infrastructure (NCP-MCI) 6.5 Exam
https://www.examsboost.com/
Product Version
Up to Date products, reliable and verified.
Questions and Answers in PDF Format.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Total Questions: 175
Latest Version: 7.3
Question: 1
Refer to the exhibit.
Which two initial cluster configuration tasks were missed during the deployment process?
(Choose two.)
Answer: A, D
Explanation:
According to the image description, the exhibit shows a screenshot of a computer screen with a
table of data. The table has 6 columns and 4 rows. The columns are labeled “Date”, “Time”,
“Status”, “Details”, “Configuration”, and “Duration”. The rows contain information about
different configurations and their statuses. The background is a light blue color. There is a pop-
up message on the bottom right corner of the screen that reads “This question has been
answered. Click here to enable the edit button.”
Based on the table data, it seems that the screenshot is taken from the Prism Central web
console, showing the results of a cluster health check report. The report shows that there are
four failed checks: Host Password Policy, CVM Password Policy, NTP Configuration, and Cluster
Time Skew2. These checks indicate that some initial cluster configuration tasks were missed
during the deployment process.
The Host Password Policy check verifies that the host passwords are not set to default values
and are compliant with the password policy defined in Prism Central3. The CVM Password Policy
check verifies that the CVM passwords are not set to default values and are compliant with the
password policy defined in Prism Central4. These checks are important for ensuring the security
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
and compliance of the cluster. Therefore, changing the host and CVM passwords from their
default values and following the password policy guidelines are two initial cluster configuration
tasks that were missed.
Question: 2
An administrator needs to configure a new subnet on an AHV cluster and want to ensure that
VMs will automatically be assigned an IP address at creation time.
Which type of network does the administrator need to create?
A. Dynamic Network
B. Unmanaged Network
C. Managed Network
D. DHCP Network
Answer: C
Explanation:
A managed network is a type of network that can be created on an AHV cluster and allows VMs
to automatically be assigned an IP address at creation time. A managed network uses the
Nutanix IP Address Management (IPAM) service, which provides DHCP and DNS functionality for
the VMs on the network. A managed network can be configured with a subnet range, a default
gateway, and DNS servers. The IPAM service will allocate IP addresses from the subnet range to
the VMs and register their hostnames in the DNS servers. The IPAM service will also release the
IP addresses when the VMs are deleted or moved to another network1.
To create a managed network on an AHV cluster, the administrator can use Prism Element or
Prism Central. The steps are as follows2:
In Prism Element, go to the Network Configuration page and click Create Network.
In Prism Central, go to the Networks page and click Create.
Enter a name and description for the network.
Select Managed as the network type.
Enter the subnet range, default gateway, and DNS servers for the network.
Optionally, enable VLAN tagging and enter a VLAN ID for the network.
Click Save.
Question: 3
An administrator was reviewing various AOS logs when a it was noticed that the time of the logs
were off by several hours.
Which initial step was missed during the post process cluster configuration?
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
B. Setting the cluster time zone via CVM NCLI
C. Setting the cluster time zone via PE GUI
D. Setting the cluster time zone via CVM ACLI
Answer: B
Explanation:
The cluster time zone is a setting that determines the time zone used by all CVMs in the cluster.
The cluster time zone affects the timestamps of Nutanix logs, events, alerts, and reports. The
cluster time zone also affects the scheduling of tasks such as snapshots, replication, and
upgrades. By default, the cluster time zone is set to UTC (Coordinated Universal Time) when the
cluster is created3.
To change the cluster time zone, the administrator needs to use the ncli (Nutanix command-line
interface) on any CVM in the cluster. The steps are as follows4:
Log in to any CVM using SSH.
Run ncli cluster get-timezone to check the current cluster time zone.
Run ncli cluster set-timezone timezone=<timezone> to change the cluster time zone,
where <timezone> is a valid time zone identifier (for example, America/New_York).
Run ncli cluster get-timezone again to verify that the cluster time zone has been changed.
Note that changing the cluster time zone does not affect the time zone of Prism Element or
Prism Central VMs. To change their time zone, the administrator needs to use Prism Element UI
or Prism Central UI respectively5.
Question: 4
Which AOS process determine if an I/O from a user will be written to OpLog or to an Extent
Store?
A. Stargate
B. Curtor
C. Cassandara
D. Zeus
Answer: A
Explanation:
Stargate is the AOS process that handles all I/O operations for the cluster. It is responsible for
determining whether an I/O from a user will be written to the OpLog or to the Extent Store,
based on the type and size of the I/O. Stargate also performs data tiering, compression,
deduplication, and erasure coding1. Stargate runs on every CVM and communicates with other
Stargates to ensure data locality and redundancy2.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Question: 5
A recently configured cluster is leveraging NearSync with a recovery schedule of 15 minutes. It is
noticed that the cluster is consistently transitioning in an Out of NearSyne.
What action should be taken to potentially address this issue?
Answer: A
Explanation:
One of the possible reasons for a cluster to transition out of NearSync is insufficient network
bandwidth between the source and target clusters. NearSync requires a minimum network
bandwidth of 10 Mbps per VM for replication3. If the network bandwidth is lower than the
required amount, the replication of recovery points may take longer than the configured RPO,
resulting in an Out of NearSync condition. To address this issue, you can increase the network
bandwidth between the clusters or reduce the number of VMs protected by NearSync4.
Question: 6
Which scenario would benefit most from Erasure Coding being enabled on a container?
A. Long term storage of data which is written once and read infrequently
B. High performance database where all is relatively hot.
C. VDI use cases where a single VM is cloned 100’s of times
D. WEB and API Servers
Answer: A
Explanation:
The correct answer is A. Long term storage of data which is written once and read infrequently.
Erasure Coding is a feature that increases the usable capacity on a Nutanix cluster by reducing
the amount of data replication. Instead of replicating data, Erasure Coding uses parity
information to rebuild data in the event of a disk failure. The capacity savings of Erasure Coding
is in addition to deduplication and compression savings1.
Erasure Coding is most beneficial for scenarios where the data is written once and read
infrequently, such as long term storage of archival data, backup data, or cold data. This is
because Erasure Coding has some trade-offs and limitations that may affect the performance
and availability of the cluster. Some of these trade-offs and limitations are2:
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Erasure Coding requires more CPU and memory resources than replication, as it involves more
complex calculations for encoding and decoding data.
Erasure Coding increases the network bandwidth consumption, as it involves more data
transfers between nodes for encoding and decoding data.
Erasure Coding reduces the resiliency of the cluster, as it can tolerate fewer node failures than
replication. For example, a cluster with redundancy factor 2 can tolerate one node failure with
replication, but only two disk failures with Erasure Coding.
Erasure Coding is not effective for workloads that have many overwrites or random writes, as it
involves more overhead for updating the parity information.
Erasure Coding is not supported for some features, such as volume groups, file server VMs, or
Metro Availability.
Therefore, if an administrator needs to configure a container on a Nutanix cluster, they should
enable Erasure Coding only if the container will store data that is written once and read
infrequently. This way, they can maximize the capacity savings of Erasure Coding without
compromising the performance and availability of the cluster.
Question: 7
An administrator logs into the Nutanix Support Portal and notices there is a new version of the
LCM Framework available. In an effort ensure LCM is providing the latest features, the
administrator would like to upgrade LCM.
How can the LCM Framework be upgraded?
Answer: A
Explanation:
LCM (Life Cycle Manager) is a feature that allows Nutanix administrators to perform one-click
firmware and software upgrades for Nutanix clusters and components. LCM fetches inventory
and update information from a pre-configured URL that contains the latest versions of firmware
and software packages. However, upgrading Nutanix AOS does not automatically update the
fetch URL. To update the fetch URL, the administrator needs to update the LCM framework. The
LCM framework is the core component of LCM that provides the logic and functionality for
inventory, download, and upgrade operations1.
To upgrade the LCM framework, the administrator needs to perform an LCM inventory. An LCM
inventory is a process that scans the cluster and its components for their current firmware and
software versions and compares them with the available versions from the fetch URL. If there is
a newer version of the LCM framework available, it will be shown as an update option under
Cluster Software Component in the Available Updates page. The administrator can then select
and apply the LCM framework update to upgrade it to the latest version2.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
The administrator can perform an LCM inventory using Prism Element or Prism Central. The
steps are as follows3:
In Prism Element, go to the Network Configuration page and click Life Cycle Management.
In Prism Central, go to the Services page and click Life Cycle Management.
Click Inventory in the toolbar and select Perform Inventory from the drop-down menu.
Wait for the inventory process to complete and check for any available updates.
Question: 8
An administrator has been asked to enable block awareness and increase the fault tolerance to
FT2 on a Nutanix AHV cluster with the following configuration:
Four blocks
One node per block
Will the administrator be able to accomplish these tasks?
Answer: D
Explanation:
Fault tolerance (FT) is the ability of a cluster to withstand node failures and maintain data
availability. FT is determined by the replication factor (RF) of the data, which is the number of
copies of each data block stored on different nodes. FT = RF - 1, meaning that the cluster can
tolerate as many node failures as one less than the RF. Block awareness is a feature that
enhances fault tolerance by ensuring that data copies are distributed across different blocks,
which are groups of nodes that share a power source and network switch. Block awareness
requires a minimum of three blocks and a minimum of six nodes in the cluster.
In this scenario, the administrator has been asked to enable block awareness and increase the
fault tolerance to FT2 on a Nutanix AHV cluster with the following configuration: Four blocks,
One node per block. The administrator will not be able to accomplish these tasks because:
To enable block awareness, the cluster needs at least six nodes, but it only has four nodes.
To increase the fault tolerance to FT2, the cluster needs at least five nodes per RF3 or seven
nodes per RF4, but it only has four nodes.
Therefore, the administrator will need to add more nodes to the cluster before enabling block
awareness and increasing the fault tolerance to FT2.
Question: 9
What Nutanix feature provides effective caching optimization In VDI environments?
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
A. Remote Protection Group
B. Local Protection Group
C. Snap Clones
D. Shadow Clones
Answer: D
Explanation:
Shadow Clones is a Nutanix feature that provides effective caching optimization in VDI
environments. VDI stands for Virtual Desktop Infrastructure, which is a technology that allows
users to access virtual desktops hosted on a centralized server. VDI environments typically have
a high degree of similarity among desktop images, which means that many VMs access the same
data blocks from the storage layer. Shadow Clones leverages this similarity by creating read-only
copies of frequently accessed data blocks on each node’s SSD tier, reducing network traffic and
improving performance. Shadow Clones works automatically and transparently without any
configuration or intervention from the administrator.
Question: 10
Which capability refers to the storage of VM data on the node where the VM is running and
ensure that the read I/O does not have to traverse the network?
A. Intelligent Locally
B. Data Locality
C. Intelligent Tiering
D. Data Tiering
Answer: B
Explanation:
Data locality is the capability of storing VM data on the node where the VM is running and
ensuring that the read I/O does not have to traverse the network. Data locality is a unique
feature of Nutanix that provides high performance and low latency for VMs by minimizing
network traffic and crosstalk. Data locality works by writing one copy of the data local to the VM
and the other copy (or copies) on other nodes. When a VM migrates to another node, Nutanix
also moves its data to the new node and serves all I/O requests locally. Data locality also adapts
to changing workloads and access patterns by dynamically moving data to where it is needed
most1.
Question: 11
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
An administrator has received reports of users being disconnected from remote desktop
sessions to a specific VM.
Which VM metric is most useful isolating the cause of the issue?
Answer: D
Explanation:
Virtual NIC receive packet dropped is the most useful VM metric for isolating the cause of users
being disconnected from remote desktop sessions to a specific VM. This metric shows the
number of packets that are dropped by the virtual NIC of the VM due to insufficient buffer space
or other reasons. Packet drops can indicate network congestion, misconfiguration, or
performance issues that can affect the quality and availability of remote desktop
sessions. Packet drops can also cause retransmissions, delays, and errors in TCP-based protocols
such as RDP2. To view this metric in Prism, go to Entities > Compute & Storage > VMs >
Summary View and select a VM. Then, in the Details View, go to Metrics > Performance and
select Virtual NIC receive packet dropped from the drop-down menu3.
Question: 12
What does Nutanix recommend when setting up the node networkring?
Answer: B
Explanation:
A bond is a logical interface that combines two or more physical interfaces on an AHV host. A
bond provides high availability and load balancing for the network traffic of the host and its
VMs. A bond can have different modes that determine how the traffic is distributed and how
the bond handles failures of the physical interfaces. The most common bond modes are active-
backup, active-active, and LACP1.
Nutanix recommends including at least two physical interfaces in every bond to ensure high
availability and redundancy. If one of the physical interfaces fails or is disconnected, the other
interface can take over the traffic without affecting the connectivity of the host or its
VMs. Having at least two physical interfaces in a bond also allows for maintenance operations
such as firmware upgrades or cable replacements without downtime2.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Nutanix does not recommend including NIC models from different vendors in the same bond, as
this may cause compatibility issues or performance degradation. Nutanix also does not
recommend using only one physical interface in a bond, as this provides no redundancy or load
balancing benefits3.
Question: 13
An administrator is not able to log into Prism Central by using a new Active Directory user
account. After Logging with the local user, the administrator verified that Directory Services and
Role Mapping setting are valid.
What is the most likely cause of this issue?
Answer: A
Explanation:
The change password at next logon attribute is a setting that forces a user to change their
password when they log on to a domain for the first time or after their password has
expired. This attribute is enabled by default for new Active Directory user accounts or when an
administrator resets a user’s password4.
However, Prism Central does not support this attribute for Active Directory authentication.
Users with this attribute enabled will not be able to log on to Prism Central using their Active
Directory credentials. They will receive an error message saying “Invalid credentials” or
“Authentication failed” when they try to log on5.
Therefore, if an administrator is not able to log on to Prism Central using a new Active Directory
user account, the most likely cause of this issue is that the change password at next logon
attribute is set for that user account. To resolve this issue, the administrator should disable this
attribute for the user account or log on to a domain workstation first and change their password
before accessing Prism Central6.
Question: 14
Administrator is creating a Windows 10 VM that will be used for a virtual desktop template.
After creating the VM and booting to the ISO, the administrator is unable to install Windows and
receives the following error.
What steps does the administrator need to take to install the OS?
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
A. Load the Nutanix VirtIO Serial Bus Driver.
B. Load the VirtIO Network Ethernet Adaper.
C. Load the Nutanix Virtual Balloon Driver.
D. Load the Virtual SCSI pass-through controller.
Answer: D
Explanation:
The error message shown in the image indicates that Windows 10 setup cannot find any drives
to install the OS. This is because the Nutanix AHV hypervisor uses a virtual SCSI pass-through
controller to present disks to the VMs, and Windows 10 does not have a built-in driver for this
device. Therefore, the administrator needs to load the Nutanix VirtIO driver for the virtual SCSI
pass-through controller during the OS installation process. The Nutanix VirtIO driver package
contains various drivers that are specifically used by Windows VMs hosted in the Nutanix
environment to enhance their stability and performance1. The administrator can download the
latest Nutanix VirtIO driver package from the VirtIO downloads page of the Nutanix support
portal. The administrator can then follow these steps to load the driver and install the OS2:
On the Windows 10 setup screen, click Load driver.
Insert a USB drive or mount an ISO image that contains the Nutanix VirtIO driver package.
Browse to the location of the driver package and select the folder that matches the OS
architecture (32-bit or 64-bit).
Select the vioscsi.inf file and click Next.
Wait for the driver to load and then click Refresh.
Select the disk where you want to install Windows 10 and click Next.
Question: 15
Refer to Exhibit:
After configuring modules for a Remote Syslog Server, the settings are as shown. The
administrator notices that even though the level parameter is set to EMERGENCY, that all
monitor logs are being sent.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
What is the likely cause of this issue?
Answer: C
Explanation:
Question: 16
While installing Windows 2019 on a new VM on an AHV cluster, an administrator notices there
aren’t any drives listed for the install.
What might the problem be?
A. VirtIO drivers have not yet been installed and the disks are IDE disks.
B. VirtIO drivers have not yet been installed and the disks are SCSI disks.
C. VirtIO drivers must be installed on AHV for installations of Windows.
D. VirtIO drivers aren’t supported on this version of Windows 2019.
Answer: B
Explanation:
VirtIO drivers are device drivers that are specifically designed for virtualized environments. They
allow the guest operating system to communicate directly with the underlying hardware,
bypassing the emulation layer. This improves the performance and efficiency of the virtual
machines. VirtIO drivers are supported by various hypervisors, including Nutanix AHV1.
Nutanix AHV uses SCSI disks for VMs by default. However, Windows does not have native
support for SCSI disks and requires VirtIO drivers to recognize them. Therefore, if an
administrator is installing Windows 2019 on a new VM on an AHV cluster, they need to install
the VirtIO drivers before selecting the destination disk for the installation. Otherwise, they will
not see any drives listed for the install2.
To install the VirtIO drivers during Windows installation, the administrator can use one of the
following methods3:
Use a VirtIO ISO image that contains the driver files. The administrator can download the VirtIO
ISO image from the Nutanix support portal and upload it to the AHV image service. Then, they
can attach the VirtIO ISO image to the VM as a CD-ROM device and load the driver from it during
Windows installation.
Use a Nutanix Guest Tools (NGT) ISO image that contains the driver files and other tools. The
administrator can download the NGT ISO image from Prism Element or Prism Central and attach
it to the VM as a CD-ROM device. Then, they can load the driver from it during Windows
installation.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Use a floppy disk image that contains only the driver files. The administrator can create a floppy
disk image using tools such as WinImage or WinRAR and upload it to the AHV image service.
Then, they can attach the floppy disk image to the VM as a floppy device and load the driver
from it during Windows installation.
Question: 17
Which baseline is used to identify a Zombie VM?
Answer: D
Explanation:
The correct answer is D. Fewer than 30 I/Os and less than 1000 bytes per day of network traffic
for the past 21 days.
A zombie VM is a type of inactive VM that is powered on but does very little activity. A zombie
VM wastes host resources such as CPU, memory, disk, and network that could be used by other
VMs. A zombie VM can be identified by using the VM Profile feature in Prism Central. The VM
Profile feature analyzes the resource utilization of each VM and assigns it a profile based on its
efficiency and impact on other VMs. The profiles are as follows1:
Efficient: The VM is well-provisioned and has optimal resource utilization.
Over-provisioned: The VM has more resources than it needs and has low resource utilization.
Constrained: The VM has less resources than it needs and has high resource utilization.
Inactive: The VM has no resource utilization and is idle or powered off.
Bully: The VM has high resource utilization and causes contention for other VMs.
A zombie VM is a subtype of an inactive VM that meets the following criteria2:
The VM is powered on for the past 21 days.
The VM does fewer than 30 read or write I/Os (total) per day for the past 21 days.
The VM receives or transfers fewer than 1000 bytes per day of network traffic for the past 21
days.
To identify a zombie VM, the administrator can use Prism Central to view the VM Profile
dashboard and filter by profile type. The dashboard shows the number of VMs in each profile
type, as well as their resource consumption and efficiency score. The administrator can also drill
down into each VM to see its detailed metrics and recommendations for optimization.
Question: 18
An administrator manages a cluster and notices several failed components shown in the exhibit.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
What two options does the administrator have to run all NCC checks manually? (Choose two.)
A. Using the Actions drop-down menu in the Health dashboard of Prism Element.
B. Running ncc health_checks run-alll on the CVM
C. Using the action action drop-down menu in the Health dashboard of Prism Central
D. Running noc health_checks run_all on the PC VM
Answer: A, B
Explanation:
Prism Element and NCC are two ways to run all NCC checks manually on a Nutanix cluster. Prism
Element is the web console that provides management and monitoring capabilities for a single
Nutanix cluster. Prism Element has a Health dashboard that shows the status of various
components and services in the cluster, such as disks, nodes, CVMs, NCC, and alerts. The Health
dashboard also allows the administrator to run NCC checks manually by using the Actions drop-
down menu on the right side of the screen. The administrator can choose to run all NCC checks
or specific checks based on the category or severity. The NCC checks will run in the background
and generate a report that can be viewed or downloaded from the Summary tab. This method is
easier and faster than running NCC from the command line on the CVM.
NCC stands for Nutanix Cluster Check, which is a framework of scripts that performs system
checks and validations on Nutanix clusters. NCC can detect issues related to hardware, software,
configuration, hypervisor, networking, and more. NCC can be run from the command line
interface (CLI) of any CVM in the cluster by using the ncc command. To run all NCC checks
manually, the administrator can use the command ncc health_checks run_all, which will execute
all available checks and display the results on the screen. This method is more comprehensive
and detailed than running NCC from Prism Element.
Question: 19
A newly-hired Nutanix administrator was tasked by the CIO to create a single VM on a test
network. The network administrator stated that a native VLAN was used on the Cisco TOR
switches with the following parameters:
IP address:172,16.1.2
Network Mask: 255.255.255.0
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Default gateway: 172.16.1.1
VLAN:1
The same parameters were used to create a network profile on Nutanix, but the when the VM
was on …
What should the Nutanix administrator do to fix this issue?
Answer: B
Explanation:
A native VLAN is a VLAN that is assigned to untagged traffic on a trunk port of a switch. A trunk
port can carry traffic from multiple VLANs, but it needs to have a native VLAN to handle traffic
that does not have a VLAN tag. The native VLAN is usually VLAN 1 by default on most switches,
but it can be changed to any other VLAN number2. When creating a network profile on Nutanix,
the administrator needs to specify the VLAN ID that matches the VLAN configuration on the
physical switch. However, if the network profile uses the same VLAN ID as the native VLAN on
the switch, it will cause network connectivity issues for the VMs connected to that network
profile. This is because Nutanix AHV uses 802.1Q tagging for all network traffic, including traffic
in the native VLAN. The switch will expect untagged traffic in the native VLAN and will drop any
tagged traffic in that VLAN3. To fix this issue, the administrator needs to change the VLAN field
from vlan. 1 to vlan. 0 in the network profile on Nutanix. This will tell Nutanix AHV to send
untagged traffic for that network profile and match the native VLAN configuration on the
switch4.
Question: 20
An administrator needs to provide access for a user to view real-time performance metric for all
VMs on all clusters across the datacenter.
Which method accomplishes this with the least effort and ongoing maintenance?
A. Configure IDP authentication and assign the user to the Cluster Admin role in Prism Central.
B. Configure AD authentication and assign the user to the Viewer role in Prism Element.
C. Configure AD authentication create a custom role, assign the user to the role, and apply the
role to all clusters and VMs
Answer: C
Explanation:
The best method to provide access for a user to view real-time performance metrics for all VMs
on all clusters across the datacenter is to configure AD authentication create a custom role,
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
assign the user to the role, and apply the role to all clusters and VMs. This method accomplishes
this with the least effort and ongoing maintenance because:
AD authentication allows Nutanix Prism Central to integrate with an existing Active Directory
(AD) domain and use AD users and groups for authentication and authorization5. This simplifies
user management and avoids creating local users on Prism Central.
Creating a custom role allows Nutanix Prism Central to define granular permissions for different
actions and entities based on specific needs6. This ensures that users only have access to what
they need and nothing more.
Assigning the user to the custom role allows Nutanix Prism Central to grant access rights for that
user based on the role definition7. This avoids assigning permissions individually for each user.
Applying the role to all clusters and VMs allows Nutanix Prism Central to propagate the access
rights for that role across all entities in scope8. This ensures that users can view real-time
performance metrics for all VMs on all clusters without having to configure each entity
separately.
Question: 21
When a configuring a syslog server in Prism Central, what two pieces information are required?
(Choose two.)
A. HTTPS URL
B. Encryption secret
C. Transport protocol
D. IP address/port
Answer: C, D
Explanation:
According to the Nutanix Prism Central Guide, to configure a syslog server in Prism Central, you
need to specify the transport protocol (TCP or UDP) and the IP address/port of the syslog server.
Question: 22
Upon logging into Prism Central, an administrator notices high cluster latency.
How can the administrator analyze data with the least number of steps or actions?
Answer: B
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Explanation:
According to the Nutanix Prism Central Guide, you can click on any chart in a widget to expand it
and view more details about the data elements.
Question: 23
An administrator is tasked with configuring network on an AHV cluster and wants to maximize
throughput for the host with many small VMs while minimizing network switch configuration.
Which bond mode should the administrator select?
A. Active-active
B. Active-Active with Mac Pinning
C. Active-Backup
D. No-Uplink Bond
Answer: A
Explanation:
According to the Nutanix AHV Networking Guide, active-active bond mode provides load
balancing and fault tolerance for network traffic by distributing packets across multiple
interfaces using a hashing algorithm based on source and destination MAC addresses, IP
addresses, and TCP/UDP ports. This mode does not require any special configuration on the
network switch and can improve throughput for hosts with many small VMs.
Question: 24
Which component is supported by Prism Central storage policies?
A. Virtual Machines
B. Volume Groups
C. VM Templates
D. Storage Containers
Answer: A
Explanation:
According to the Nutanix Prism Central Guide, Prism Central allows you to apply storage policies
on a per VM basis using Category, so that the VM uses the storage configuration defined in the
storage policy. Using a storage policy, you can manage parameters of VMs, such as encryption,
type of or lack of data compression, and IOPS or Throughput throttling values to be applied to
the entities.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Question: 25
An administrator would like to leverage the Reliable Event Logging Protocol (RELP) with their
Remote Syslog Server. After completing the configuration, it is observed that RELP logging is not
working as expected.
What is the likely cause of this issue?
Answer: D
Explanation:
According to the Red Hat Customer Portal, to use RELP with Rsyslog, you need to install the
rsyslog-relp package on both the server and the client. If the remote server does not have
rsyslog-relp installed, RELP logging will not work as expected.
Question: 26
Which two predefined views can be added to a report to identify inefficient VMs?
Answer: B, D
Explanation:
Zombie VMs and overprovisioned VMs are two types of inefficient VMs that can waste
resources and increase costs in a Nutanix environment. Zombie VMs are VMs that are powered
on but have no activity or utilization for a long period of time. Overprovisioned VMs are VMs
that have more resources allocated than they actually need or use. Both types of VMs can be
identified by adding predefined views to a report in Prism Central.
A predefined view is a template that defines what data is displayed and how that data is
represented in a report. Prism Central provides several predefined views for different purposes,
such as capacity planning, performance analysis, anomaly detection, and efficiency
optimization. To add a predefined view to a report, go to Operations > Reports > New Report
and select the desired view from the list1.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
The Zombie VMs List view shows the list of zombie VMs in the environment based on the CPU
usage, memory usage, disk IOPS, and network throughput metrics. The view also shows the
amount of resources wasted by these VMs and the potential savings that can be achieved by
deleting or resizing them2.
The Overprovisioned VMs List view shows the list of overprovisioned VMs in the environment
based on the CPU usage, memory usage, disk IOPS, and network throughput metrics. The view
also shows the amount of resources wasted by these VMs and the potential savings that can be
achieved by resizing them3.
By adding these two views to a report, an administrator can identify inefficient VMs and take
appropriate actions to optimize resource utilization and reduce costs.
Question: 27
When a VM is connected to a Nutanix managed network, when is the IP addressed assigned?
Answer: B
Explanation:
When a VM is connected to a Nutanix managed network, the IP address is assigned when the
VM is powered on. A Nutanix managed network is a network that is created and managed by
Prism Central using IP address management (IPAM). IPAM allows Prism Central to automatically
assign IP addresses to VMs from a pool of available addresses in a subnet. IPAM also tracks the
IP address usage and availability across clusters and networks4.
When a VM is connected to a Nutanix managed network, the administrator can choose one of
the following assignment types for the IP address:
Assign Static IP: This option allows the administrator to manually specify a static IP address for
the VM from the subnet range. The IP address will not change unless the administrator changes
it.
Assign with DHCP: This option allows Prism Central to dynamically assign an IP address for the
VM from the subnet range using DHCP. The IP address may change depending on the DHCP
lease time and availability.
No Private IP: This option allows the administrator to skip assigning an IP address for the
VM. This option is useful for scenarios where the administrator wants to use an external IPAM
solution or assign an IP address later5.
Regardless of the assignment type, the IP address is assigned when the VM is powered on. This
is because Prism Central needs to communicate with the hypervisor (AHV or ESXi) to configure
the virtual NIC (vNIC) of the VM with the IP address information. This communication can only
happen when the VM is in a powered on state6.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Question: 28
Which two capabilities does IPAM provide in a Nutanix networking configuration? (Choose two.)
Answer: B, C
Explanation:
According to the Nutanix Support & Insights, IPAM enables AHV to assign IP addresses
automatically to VMs using DHCP. You can configure each virtual network and associated VLAN
with a specific IP subnet, associated domain settings, and group of IP address pools available for
assignment.
Question: 29
Which method can be used to migrate a VM configured for UEFI-boot from a Nutanix Hyper-V
cluster to AHV?
A. Live Migration
B. Storage vMotion
C. Nutanix Move
D. Cloud Connect
Answer: C
Explanation:
Nutanix Move is a tool that allows you to migrate VMs from different sources to Nutanix AHV
with minimal downtime and complexity. Nutanix Move supports migration from Hyper-V to
AHV, including VMs configured for UEFI-boot. UEFI stands for Unified Extensible Firmware
Interface, which is a standard for the software interface between the operating system and the
firmware. UEFI-boot is a mode of booting that uses UEFI instead of BIOS (Basic Input/Output
System) to load the operating system. UEFI-boot offers some advantages over BIOS-boot, such
as faster boot time, larger disk support, and better security features1.
To migrate a VM configured for UEFI-boot from a Nutanix Hyper-V cluster to AHV, you need to
use Nutanix Move and follow these steps2:
Download and deploy the Nutanix Move appliance on the AHV cluster.
Log in to the Nutanix Move web console and add the source Hyper-V environment and the
target AHV environment.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Create a migration plan and select the VMs that you want to migrate. You can choose either
automatic or manual preparation mode for the migration.
Start the migration plan and monitor the progress. The migration plan will perform data
seeding, which is the process of copying the VM data from the source to the target in the
background.
When the data seeding is complete, perform a cutover, which is the process of shutting down
the source VMs and powering on the target VMs. The cutover will also configure the boot device
for the UEFI-boot VMs on AHV.
Verify that the migrated VMs are working as expected on AHV.
Question: 30
An administrator needs to report on any alerts generated by a Nutanix cluster that affected the
cluster's availability over the past 10 days.
Which method should be used to locate these events?
A. On the Health dashboard, use the Log Collector to export data based on time stamp.
B. Export the cluster event log to a CSV on the Alerts dashboard.
C. On the Alerts dashboard, filter based on Impact Type and the desired Time Range.
D. Configure an Alert Policy to generate an email with the data on the Health dashboard.
Answer: C
Explanation:
Question: 31
CPU utilization climbs above 90% on several VMs. This causes performance degradation for a
business-critical application.
How can alerts be configured to notify the administrator before VM CPU utilization hits 90%?
A. On a CVM, use ncli to set the VM CPU Check threshold for the critical VMs to a value below
90%.
B. On the Health dashboard, locate the VM CPU Check and lower the alert threshold below 90%.
C. On a CVM, configure a cron job to run the VM CPU Check more frequently and email the
result.
D. On the Alerts dashboard, ensure that the VM CPU usage alert is not set to auto-resolve.
Answer: B
Explanation:
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Question: 32
In Files, how many FSVMs are deployed by default?
A. 1
B. 2
C. 3
D. 5
Answer: C
Explanation:
According to the Nutanix Files Guide, Nutanix Files instances are composed of a set of VMs
(called FSVMs). Files requires at least three FSVMs running on three nodes to satisfy a quorum
for high availability. By default, Files deploys three FSVMs when you create a file server instance.
Question: 33
A two-node ROBO cluster is configured with a witness VM.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Answer: D
Explanation:
According to the Nutanix Support & Insights, in a two-node ROBO cluster with a witness VM, if
one node goes down, the other node sends a leadership request to the witness VM and goes
into single-node mode. The cluster remains available and can tolerate another failure of either
the witness VM or the network link.
Question: 34
How will an HDD failure affect VMs with data on the failed device?
A. The VMs will crash, and will be restarted once the failed HDD has been replaced and the data
has been restored.
B. A live migration will be initiated, moving the affected VMs to a host that contains the replica
data.
C. The VMs will remain operational on that host and continue to function normally with no
noticeable impact
D. An HA event will occur, causing the affected VMs to restart on a node that contains the
replica data.
Answer: D
Explanation:
According to the Troubleshooting hosted disk I/O performance problems (1008885), when using
VMware hosted products, consider that both the virtual machines and host operating system
often share the same disk resources and hardware. If a hard disk fails, the virtual machines that
have data on the failed device will experience an HA event, causing them to restart on a node
that contains the replica data.
Question: 35
A guest VM should be able to tolerate simultaneous failure of two nodes or drives.
What are the minimum requirements for the Nutanix cluster?
Answer: D
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Explanation:
Question: 36
Which three cluster operations require an administrator to reclaim licenses?(Choose three)
A. Destroy a cluster.
B. Upgrade a cluster
C. Migrate a cluster
D. Remove a Node from a cluster
E. Move Nodes between clusters.
Answer: A, D, E
Explanation:
https://portal.nutanix.com/page/documents/details/?targetId=Web_Console_Guide-
Prism_v4_7:lic_licensing_managing_c.html
Reclaiming Licenses (Including License Renewal)
You can reclaim and optionally re-apply licenses for nodes in your clusters:
You must reclaim licenses when you plan to destroy a cluster. First reclaim the licenses, then
destroy the cluster. You do not need to reclaim Starter licenses. These licenses are automatically
applied whenever you create a cluster, including after you have destroyed a cluster.
Return licenses to your inventory when you remove one or more nodes from a cluster. Also, if
you move nodes from one cluster to another, first reclaim the licenses, move the nodes, then
re-apply the licenses.
You can reclaim licenses for nodes in your clusters in cases where you want to make
modifications or downgrade licenses. For example, applying an Ultimate license to all nodes in a
cluster where some nodes are currently licensed as Pro and some nodes are licensed as
Ultimate. You might also want to transition nodes from Ultimate to Pro licensing.
You must reclaim licenses when you renew licenses. First reclaim the expired licenses, then
apply new licenses.
Question: 37
When configuring Prism Central, which two log modules are able to forward messages to an
external syslog server? (Choose two.
A. API Audit
B. Flow
C. DNS
D. NTP Synchronization
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Answer: A, B
Explanation:
Question: 38
An administrator has been alerted to a VM that has high I/O latency and wants to determine if
there are any other factors, such as insufficient network or memory resources that correlate, as
part of a troubleshooting process.
Which type of chart should the administrator create to allow all relevant data to be easily
exported to CSV for later analysis?
Answer: D
Explanation:
Question: 39
How should an administrator correct an SSL error when connecting to a Nutanix cluster?
Answer: C
Explanation:
Question: 40
A node with Erasure Coding fails.
What is the impact?
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
A. The node stops utilizing Erasure Coding.
B. Potentially increased amount of data stored in the SSD tier.
C. Increased Controller VM CPU Load.
D. AQS unable to do deduplication during the Erasure Coding failure.
Answer: B
Explanation:
When a node with Erasure Coding fails, the cluster will automatically rebuild the missing data
using replication factor (RF) 2 or 3, depending on the cluster configuration. This means that the
data that was previously stored using Erasure Coding will now be stored using full copies, which
may increase the amount of data stored in the SSD tier1.
Question: 41
A configuration is single domain, single forest, and does not use SSL.
Which port number should be used to configure LDAP?
A. 389
B. 3269
C. 636
D. 3268
Answer: A
Explanation:
Port 389 is the default port for LDAP without SSL encryption. Port 636 is used for LDAP over SSL
(LDAPS). Port 3268 and 3269 are used for Global Catalog (GC) and Global Catalog over SSL
(GCSSL), respectively2.
Question: 42
The Linux administration team has requested access rights to any current or future Linux VM in
the environment
What entity should be selected when assigning this new role?
A. Image
B. AHV Cluster
C. Category
D. Project
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Answer: C
Explanation:
Categories are key-value pairs that can be used to tag entities such as VMs, images, networks,
and projects in Prism Central. Categories can be used to create dynamic groups of entities based
on their attributes, and assign roles and permissions to those groups3. In this case, a category
such as OS=Linux can be used to group all Linux VMs and grant access rights to the Linux
administration team.
Question: 43
HOTSPOT
What is the proper sequence to perform a one-click upgrade to a Nutanix cluster?
Item instructions: For each procedure, indicate the order in which that procedure must take
place to meet the item requirements. Not all procedures are valid. Identify any invalid
procedures using the drop-down option.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Answer:
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Explanation:
Question: 44
A customer wants to isolate a group of VMs within their Nutanix environment for security
reasons. The customer creates a VM with two NICs to act as a firewall and installs the
appropriate software and certificates.
However, no one from the outside can access the application.
What is the likely cause of this problem?
Answer: C
Explanation:
One of the NICs needs to be configured on the internal VLAN. This is because the VMs that are
isolated need to communicate with the firewall VM through a private network, and the firewall
VM needs to communicate with the external network through a public network. The internal
VLAN is a logical network that can be created and managed by AHV1. If the firewall VM does not
have a NIC on the internal VLAN, it will not be able to route traffic between the isolated VMs
and the outside world.
Question: 45
Which two methods are available when migrating a VM from a legacy 3-tier solution using
VMware ESXi to AHV? (Choose two.)
Answer: A, C
Explanation:
Deploy the Move appliance and Import the .vmdk into the Image Service. These are two
methods that can be used to migrate a VM from VMware ESXi to AHV2. The Move appliance is a
tool that automates the migration process by converting the VM disks and configuration to AHV
format and transferring them to the Nutanix cluster3. The Image Service is a feature that allows
users to upload and manage disk images that can be used to create or clone VMs on AHV4. By
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
importing the .vmdk file of the VMware VM into the Image Service, users can create a new AHV
VM from that image.
Question: 46
A customer has a 24-node cluster with all containers configured with RF3. Two different nodes
have incurred a simultaneous HDD failure.
What is the result?
A. The cluster runs in a degraded state until the failed drives are replaced and the data has been
restored to three replicas.
B. Sixty minutes after the failures a rebuild of the lost data can remaining HDDs begins to restore
to three replicas.
C. The VMs with data on those drives crash, and an HA event occurs, restarting them on a
remaining healthy node.
D. The Nutanix cluster recognizes the failures and immediately begins to rebuild lost data to
three replicas.
Answer: D
Explanation:
This is because Nutanix uses a distributed storage fabric (DSF) that replicates data across
multiple nodes and drives to ensure data resiliency. When a drive fails, the cluster detects the
failure and initiates a data rebuild process to restore the replication factor (RF) of the affected
containers. The data rebuild process does not affect the availability or performance of the VMs,
as they can still access their data from other replicas on other nodes or drives. Therefore, there
is no need to wait for 60 minutes, use a shared volume group, or trigger an HA event.
Question: 47
An Administrator is working on a one-node ROBO cluster configurations
Which statement is true for this configuration?
Answer: B
Explanation:
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Question: 48
In which two scenarios is an automated live migration likely to occur? (Choose two)
Answer: A, B
Explanation:
Automated live migration is a feature of Nutanix that allows the cluster to automatically move
VMs from one host to another without any downtime, in order to optimize the performance and
availability of the cluster. According to the Nutanix documentation1, automated live migration
can occur in the following scenarios:
Cluster resource hotspot: When a host or a group of hosts experience high resource utilization,
such as CPU, memory, or network, the cluster can automatically migrate some VMs to other
hosts with lower utilization, in order to balance the load and avoid performance degradation.
AOS upgrade: When upgrading the Nutanix software (AOS), the cluster can automatically
migrate the VMs from the host that is being upgraded to another host in the same availability
zone, in order to maintain the VM availability and minimize the impact of the upgrade process.
AHV host maintenance mode: When putting an AHV host into maintenance mode, the cluster
can automatically migrate all the VMs from that host to another host in the same availability
zone, in order to prepare the host for maintenance operations such as hardware replacement or
firmware update.
Question: 49
An administrator wants to create a trunked interface on a VM on AOS 5.15x.
Which two steps should the administrator take first to achieve this? (Choose two)
A. Use acli
B. Log in over PE web UI.
C. SSH to CVM.
D. Update VM dialog.
Answer: A, C
Explanation:
Explanation/Reference:
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
#sthash.3uIAHeXZ.dpbs
Question: 50
What is the default network bond setting for an AHV host configuration?
A. active-backup
B. active-active
C. balance-slb
D. balance-tcp
Answer: A
Explanation:
https://next.nutanix.com/blog-40/network-load-balancing-with-acropolis-hypervisor-6463
Question: 51
Which best practice should be followed when creating a bond in a Nutanix cluster?
Answer: A
Explanation:
Question: 52
When VM HA Reservation is enabled, what is the expected behavior for all failed VMs in the
event of a host
failure?
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Answer: C
Explanation:
Question: 53
Which three upgrades should an administrator be able to perform using Lifecycle Management?
(Choose Three)
A. AOS
B. BMC
C. BIOS
D. Hypervisor
E. HBA Firmware
Answer: B, C, E
Explanation:
Question: 54
An administrator has set up a local web server accessible to the Nutanix clusters.
Which two steps are required to set up LCM for an environment without Internet access?
(Choose two.)
A. Download the lcai_disconnecced_version. tar.gz LCM bundle from the support portal.
B. Edit LCM Advanced Settings in Prism Element and enter the address of the web server.
C. Edit LCM Advanced Settings m Prism Central and enter the address of the web server.
D. Download the lcm_dark_site_version. tar . gz LCM bundle from the support portal.
Answer: B, D
Explanation:
Question: 55
A cluster has RF2. The cluster loses two drives on different nodes in the same storage tier.
What is the effect on the replicas of the VMs?
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
A. Some VM data may be lost
B. No VMs lose data if the node has two or more SSDs
C. Some VMs may reboot and gain access to data
D. No VMs lose data because of RF2
Answer: A
Explanation:
Question: 56
Which change can be made on a cluster with software-based Data-at-Rest Encryption enabled?
Answer: D
Explanation:
Question: 57
An administrator is reviewing performance of a core banking system that routinely has 20,000
concurrent users. During, business hours, the CPU on the applications servers runs at close to
100%. The administrator needs to determine if there is a performance issue specific to the app
servers, the database servers, or all servers on the cluster.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Answer: D
Explanation:
In this case, the administrator wants to investigate the performance of a core banking system
that consists of application servers and database servers. The application servers have high CPU
utilization during business hours, which may indicate a bottleneck or a resource contention
issue. The administrator needs to review multiple metrics in Prism Analysis Graphs to identify
the root cause and determine if there is a problem with the app servers only, or with other
components as well.
The metrics that are relevant for this analysis are:
Cluster IO: This metric shows the input/output operations per second (IOPS) and throughput
(MBps) of the cluster. It can help to understand if there is a high demand for disk IO from the
VMs or if there is any latency or congestion in the storage layer.
Cluster CPU: This metric shows the CPU utilization (%) and load average of the cluster. It can
help to understand if there is enough CPU capacity in the cluster to handle the workload or if
there is any imbalance or contention among hosts.
Cluster Memory: This metric shows the memory utilization (%) and available memory (GB) of the
cluster. It can help to understand if there is enough memory capacity in the cluster to support
the VMs or if there is any pressure or swapping in the memory layer.
Network: This metric shows the network throughput (MBps) and packets per second (pps) of the
cluster. It can help to understand if there is enough network bandwidth in the cluster to transfer
data between hosts and VMs or if there is any congestion or packet loss in the network layer.
App Server CPU: This metric shows the CPU utilization (%) and load average of each application
server VM. It can help to understand if there is any variation or anomaly in the performance of
each app server or if there is any correlation with other metrics.
Database Server CPU: This metric shows the CPU utilization (%) and load average of each
database server VM. It can help to understand if there is any variation or anomaly in the
performance of each database server or if there is any correlation with other metrics.
Question: 58
A VM in a 12-node Nutanix cluster is hosting an application that has specific Physical GPU
requirements. Only three nodes in the cluster meet this requirement.
The administrator wants to allow a general workload to be distributed across all nodes in the
cluster and must make sure that the node hosting the VM meets its requirements.
How should the administrator perform this task?
A. Create a sperate three-node cluster using the nodes that meet the requirement.
B. Configure VM-Host affinity for the nodes that meet the application's GPU requirement.
C. Over-Provision the application VM with additional virtual GPUs.
D. Configure anti-affinity rules between the application VM and the other VMs running on the
cluster.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Answer: B
Explanation:
Configure VM-Host affinity for the nodes that meet the application’s GPU requirement. This is
because VM-Host affinity allows the administrator to specify which nodes a VM can run on or
must not run on1. By creating a VM-Host affinity rule that binds the application VM to the three
nodes that have the physical GPU, the administrator can ensure that the VM will always run on a
node that meets its requirement, regardless of any HA or migration events. This also allows the
other nodes in the cluster to host other VMs without any restrictions.
Question: 59
Where should an administrator unregister Prism Element from Prism Central?
Answer: A
Explanation:
This is because there is no GUI method to unregister a cluster from Prism Central, so the process
requires SSH access to the PC VM as well as to a CVM of the cluster2. The unregistration process
involves getting the UUID of the cluster from the CVM and then using that to trigger de-
registration from PC command line2. The unregistration process also involves cleaning up any
associated metadata and configuration on both PC and PE2. Therefore, the administrator needs
to use a Host SSH session to perform this task.
Question: 60
How should an administrator configure a custom alert for a specific VM in Prism?
Answer: C
Explanation:
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
https://portal.nutanix.com/page/documents/details/?targetId=Prism-Central-Guide-Prism-
v510:mul-alert-policies-user-defined-configure-pc-c.html
Question: 61
Which two private key types are supported by the Nutanix SSL certificate implementation?
(Choose two.)
A. ECDSA
B. ECDH
C. ED25519
D. RSA
Answer: A, D
Explanation:
Question: 62
In which two scenarios is Native Key Management Server supported? (Choose two)
Answer: B, D
Explanation:
Question: 63
In Nutanix clusters, which feature ensures VMs can be migrated and restarted on another host
in case of failure?
A. High Availability
B. Protection Domain
C. Host Affinity Rules
D. Availability Zone
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Answer: A
Explanation:
Question: 64
HOTSPOT
An administrator needs to shut down an AHV cluster to relocate hardware. The administrator
upgrades NCC and runs health checks.
Which steps should the administrator perform next?
Item instructions: For each procedure, indicate the order in which that procedure must take
place to meet the item requirements.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Answer:
Explanation:
https://next.nutanix.com/how-it-works-22/scheduled-power-outage-relocating-cluster-
hardware-if-you-need-to-shut-down-all-the-nodes-in-your-ahv-cluster-here-s-how-37326
Question: 65
What is the expected operation during node addition when the new node has a different AOS
version?
Answer: D
Explanation:
The node is automatically re-imaged using the software currently running in the cluster. This is
because Nutanix supports a feature called Auto Re-Image that allows adding nodes with
different AOS versions to an existing cluster without manual intervention. The Auto Re-Image
feature detects the AOS version mismatch and automatically downloads and installs the same
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
AOS version as the cluster on the new node. This ensures that the cluster remains in a consistent
state and avoids any compatibility issues.
Question: 66
In a default configuration of an AHV cluster, a single node fails.
What happens to the running VMs on that node?
Answer: D
Explanation:
Question: 67
Where can an administrator change a CVM password?
Answer: D
Explanation:
Question: 68
An administrator needs to boot a VM to a bootable CD. The administrator tries to configure the
VM to boot to it, select to add disk, and goes to the images available. The image for the
bootable CD is unavailable.
What is the Likely issue?
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
C. The VM needs to have a standard disk attached before it can boot to a CD.
D. The bootable CD image is corrupted during creation.
Answer: B
Explanation:
Question: 69
A Nutanix cluster is equipped with four nodes. Four VMs on this cluster have been configured
with a VM-VM anti-affinity policy and are each being hosted by a different node.
What occurs to the cluster and these VMs during an AHV upgrade?
A. One node hosts two VMs while the node being upgraded is in maintenance mode.
B. One VM out of the four powers down when the node hosting it reboots.
C. The AHV pre-upgrade checks fail until the administrator disables the anti-affinity policy.
D. The AHV pre-upgrade checks fail until the four VMs are powered off.
Answer: A
Explanation:
One node hosts two VMs while the node being upgraded is in maintenance mode. This is
because Nutanix supports a feature called Rolling Upgrade that allows upgrading AHV on a
cluster without any downtime or impact to the VMs. The Rolling Upgrade feature performs the
upgrade one node at a time, by putting the node in maintenance mode, evacuating the VMs to
other nodes, upgrading AHV, and then bringing the node back online. The VM-VM anti-affinity
policy ensures that the four VMs are not placed on the same node during the evacuation
process, so one node will host two VMs temporarily while the other node is being upgraded.
Question: 70
How many SSL certificates are used by Prism Element on a Nutanix cluster?
A. 1
B. 5
C. 256
D. 2048
Answer: A
Explanation:
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
According to the Nutanix Prism Element Guide, Prism Element uses a single SSL certificate on a
Nutanix cluster. The certificate is used to secure the communication between the web browser
and the Prism web console. The certificate is also used to authenticate the cluster to external
services, such as Active Directory, SMTP, and SNMP. The certificate can be either self-signed or
signed by a trusted certificate authority (CA). The certificate can be replaced or renewed
through the Prism web console or the ncli command-line interface.
Question: 71
Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness?
Answer: B
Explanation:
According to the Dell Unity: Data Reduction Technical White Paper1, snapshots and clones on
Dell Unity use the Copy-on-Write (CoW) algorithm to maximize efficiency and effectiveness.
CoW is a technique that defers the copying of data until it is modified. This means that
snapshots and clones only consume space when changes are made to the source or the clone,
respectively. CoW also preserves the original data in case of a rollback or recovery operation.
Question: 72
HOTSPOT
Async DR is configured between two sites. A network outage occurs at the primary site.
Which steps must the administrator perform to bring the VMs back into service at the backup
site?
Item instructions: For each procedure, indicate the order in which that procedure must take
place to meet the item requirements. Not all procedures are valid. Identify any invalid
procedures using the drop-down option.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Answer:
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Explanation:
Question: 73
What are two minimum prerequisites for live migration to succeed? (Choose two.)
Answer: A, D
Explanation:
According to section 5 of the exam blueprint guide1, one of the topics covered is live migration.
Live migration is the process of moving a running VM from one host to another without any
downtime or interruption of service. To perform live migration, there are some prerequisites
that must be met, such as:
All AHV hosts have IP addresses in the same subnet
All VMs are configured for the same VLAN
The source and destination hosts have enough resources to accommodate the VM
The VM does not have any PCI devices attached
Question: 74
When creating a VM on an AHV cluster, how is the initial placement of the VM determined?
A. AHV uses a round robin algorithm, placing new VMs onto hosts based on the numerical order
of their UUID
B. The administrator right clicks on the desired host and selects Power on VM from the
dropdown menu
C. The Acropolis Dynamic Scheduler selects a host which provides adequate resources for the
VMs configuration
D. Placement is determined by the host that holds the new_VM token at the time of VM
creation
Answer: C
Explanation:
According to section 6 of the exam blueprint guide1, one of the topics covered is VM placement
options. When creating a new VM on an AHV cluster, there are two ways to determine its initial
placement:
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Automatic placement: The Acropolis Dynamic Scheduler (ADS) selects a host that provides
adequate resources for the VM’s configuration, such as CPU, memory, disk space, and network
bandwidth. ADS also considers factors such as host load, power state, availability domains, and
affinity rules.
Manual placement: The administrator can specify a host or a host group where they want to
place the VM.
Question: 75
Which command should an administrator run from the CLI to view the uplink state of all AHV
nodes in the
cluster?
A. allssh show_uplinks
B. manage_ovs show_uplinks
C. allssh manage_ovs show_uplinks
D. manage ovs show uplinks
Answer: C
Explanation:
According to section 4 of the exam blueprint guide1, one of the topics covered is AHV
networking components and configuration settings. One of these components is Open vSwitch
(OVS), which is a software switch that provides network connectivity between VMs and physical
networks. OVS has two types of ports:
Uplink ports: These are physical ports that connect to external networks or switches.
Internal ports: These are virtual ports that connect to VMs or other internal networks.
To view the uplink state of all AHV nodes in the cluster, an administrator can use the
manage_ovs command with the show_uplinks option. This command displays information such
as port name, link state, speed, duplex mode, MTU size, bond mode, and bond status. However,
this command only works on a single node. To run the command on all nodes in the cluster, an
administrator can use the allssh command, which executes a command on all CVMs in parallel.
Therefore, the correct command is:
allssh manage_ovs show_uplinks
Question: 76
What is Prism Central primarily used for?
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
D. Data reduction configuration
Answer: C
Explanation:
According to the web search results, Prism Central is a multi-cluster manager that provides a
single, centralized management interface for Nutanix environments12. One of the features of
Prism Central is multi-cluster Single Sign On (SSO), which allows users to log in once and access
multiple clusters without re-entering credentials3.
Question: 77
Which component ensures uniform distribution of data throughout the cluster to eliminate hot
spots and speed up rebuilds?
A. Cassandra
B. Distributed Storage Fabric
C. High Availability
D. Acropolis App Mobility Fabric
Answer: B
Explanation:
According to the web search results, Distributed Storage Fabric (DSF) is the scale-out storage
technology that makes HCI and cloud possible45. DSF pools the storage devices that are directly
attached to a cluster of servers and presents them to applications across a variety of storage
protocols4. DSF also manages and protects data by a fine-grained, distributed metadata system
that ensures uniform distribution of data throughout the cluster to eliminate hot spots and
speed up rebuilds
Question: 78
An administrator is configuring data protection and DR for a multi-tier application. All VMs must
be protected at the same time.
What must the administrator do to meet this requirement?
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Answer: B
Explanation:
According to the web search results, a consistency group is a group of related applications or
services that must be recovered together in order to work properly, and this means more than
being recovered at the same time67. They also typically need to be recovered to the same point
in time6. Therefore, to meet the requirement of protecting all VMs of a multi-tier application at
the same time, the administrator must create a consistency group for the application and place
all VMs in it8. This way, the administrator can apply data protection policies and schedules to
the entire consistency group as a single unit8.
Question: 79
An administrator logs in to Prism Element goes to the Network view, and sees the output shown
in the exhibit.
Which three steps must the administrator take to increase throughput to the host? (Choose
three.)
Answer: A, B, C
Explanation:
These are the three steps that the administrator must take to increase throughput to the host.
According to the network diagram, the host has two 10Gb interfaces and two 1Gb interfaces in
the default bond, but only one of the 10Gb interfaces is connected to a switch. The other 10Gb
interface is disconnected and has a red “X” on it. The two 1Gb interfaces are also disconnected
and have dotted lines. This means that the host is using only one 10Gb interface for all its
network traffic, which limits its maximum bandwidth to 10 Gbps.
To increase the throughput, the administrator should connect both 10Gb interfaces to the
physical switch, preferably to different switches for redundancy and high availability. This will
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
allow the host to use both 10Gb interfaces for network traffic, which can increase its maximum
bandwidth to 20 Gbps. However, this also requires changing the bond mode from active-backup
to balance-slb or balance-tcp, which are load balancing modes that distribute network traffic
across multiple interfaces based on source MAC address or TCP session1. The default bond
mode of active-backup only uses one interface at a time and switches to another interface only
when the active one fails2.
Finally, the administrator should remove any 1Gb interfaces still connected from the default
bond, as they are not needed and may cause performance issues or conflicts with the load
balancing modes. The 1Gb interfaces can be used for other purposes, such as management or
backup networks, by creating separate bonds or bridges for them3. Alternatively, they can be
left disconnected if they are not required.
Question: 80
AHV IPAM assigns an IP address from the address pool when creating a managed VM NIC.
At which two instances does the address release back to the pool? (Choose two)
Answer: B, D
Explanation:
https://portal.nutanix.com/page/documents/solutions/details/?targetId=BP-2029_AHV:BP-
2029_AHV
Administrators can use Acropolis with IPAM to deliver a complete virtualization deployment,
including network management, from the unified Prism interface. This capability radically
simplifies the traditionally complex network management associated with provisioning VMs and
assigning network addresses. To avoid address overlap, be sure to work with your network team
to reserve a range of addresses for VMs before enabling the IPAM feature.
The Acropolis master assigns an IP address from the address pool when creating a managed VM
NIC; the address releases back to the pool when the VM NIC or VM is deleted.
Question: 81
Refer to the exhibit.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
The Linux Admin role has been created to manage only Linux VMs in the environment. However,
the Admin1 user does not have access to all Linux VMs.
What step should be taken to grant the proper access?
Answer: D
Explanation:
According to the Nutanix Prism Central Guide, role-based access control (RBAC) in Prism Central
allows you to create custom roles and assign them to users or groups based on the categories of
the entities they need to manage1. Categories are key-value pairs that you can assign to entities
such as VMs, hosts, clusters, images, etc. to group them logically2. For example, you can create
a category key called “OS” and assign values such as “Linux” or “Windows” to different VMs
based on their operating system.
In the exhibit, the Linux Admin role has been created with the following settings:
The role has the “VM Admin” permission, which allows the user to perform all actions on VMs3.
The role has been assigned to the admin1 user.
The role has been scoped to the entities that have the category key “OS” and the value “Linux”.
However, the admin1 user does not have access to all Linux VMs in the environment. This
means that some of the Linux VMs do not have the proper category assigned to them. To grant
the proper access, the administrator should add the category key “OS” and the value “Linux” to
each Linux VM that needs to be managed by the Linux Admin role. This can be done either
individually or in bulk through Prism Central4. Once the categories are added, the admin1 user
will be able to see and manage all Linux VMs in the environment.
Question: 82
When installing Nutanix Guest Tools (NGT) on an ESXi-hosted VM, which port should be enabled
on the VM to allow communication with the NGT-Controller VM service?
A. 2000
B. 2074
C. 8080
D. 9943
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Answer: D
Explanation:
NGT is a software package that enables advanced VM management features provided by
Nutanix, such as file-level restore, VM mobility, and application-consistent snapshots12. To use
NGT, you need to enable the NGT feature for a VM in the Prism Element web console, mount
the NGT installer (ISO disk file) in the VM, and install NGT in the VM1. However, before installing
NGT, you need to ensure that the VM can communicate with the NGT-Controller VM service,
which runs on the Controller VM (CVM) of each Nutanix node3. The NGT-Controller VM service
listens on port 9943 for incoming requests from the guest VMs3. Therefore, you need to enable
port 9943 on the ESXi-hosted VM to allow communication with the NGT-Controller VM service.
Question: 83
Where are Leap Availability Zones configured?
A. Cloud Connect
B. Controller VM
C. Prism Element
D. Prism Central
Answer: D
Explanation:
Terminology
Availability Zone – it is represented by all resources (Nutanix Clusters) connected to Prism
Central or Xi Leap Availability zone. Depends on the architecture, Availability zone can represent
geographic territory, datacenter or server room in the datacenter. Protection policies – in
protection policies you set up (RPO, Retention), rules to auto-apply policies to virtual machines
https://vmwaremine.com/2019/02/08/nutanix-leap-runbooks-part-1/#sthash.VwrzSzhQ.dpbs
Question: 84
Refer to Exhibit.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
An administrator increases the cluster RF to 3. The containers are not modified.
What will the new values in the data resiliency dashboard be for FAILURES TOLERABLE for the
Zookeeper and Extent Groups components?
Answer: C
Explanation:
According to the web search results, the cluster redundancy factor (RF) determines how many
copies of the cluster metadata and configuration data are stored on different nodes. By default,
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
the cluster RF is 2, which means that there are three copies of the Zookeeper and Cassandra
data on the cluster. If the cluster RF is increased to 3, then there will be five copies of the
Zookeeper and Cassandra data on the cluster12. This means that the Zookeeper component can
tolerate two failures, as it can still operate with a quorum of three nodes out of five3.
However, the container replication factor (RF) determines how many copies of the VM data and
oplog are stored on different nodes. The container RF can be set independently for each
container, and it can be different from the cluster RF. For example, a container can have RF 2
even if the cluster has RF 34. In this case, the container will only have two copies of the VM data
and oplog on the cluster, regardless of the cluster RF. This means that the Extent Groups
component can only tolerate one failure, as it needs at least one copy of the VM data and oplog
to be available5.
Therefore, if the administrator increases the cluster RF to 3, but does not modify the containers,
then the new values in the data resiliency dashboard will be Zookeeper = 2 and Extent Groups =
1.
Question: 85
Which three configuration scenarios are valid for the deployment of Prism Central? (Choose
three.)
Answer: A, B, C
Explanation:
Prism Central is a multi-cluster manager that provides a single, centralized management
interface for Nutanix environments1. Prism Central can be deployed in different configuration
scenarios, depending on the network and security requirements of the environment. Some of
the valid scenarios are:
Environments use Network Address Translation (NAT): NAT is a method of mapping one IP
address space to another by modifying network address information in IP datagram packet
headers while they are in transit across a traffic routing device2. NAT can be used to enable
communication between Prism Central and Prism Elements that are in different networks or
subnets3. For example, Prism Central can be deployed in a public cloud and use NAT to access
Prism Elements that are in a private data center3.
Prism Elements and Prism Central are in different subnets: A subnet is a logical subdivision of an
IP network that allows multiple networks to share a single physical network4. Prism Elements
and Prism Central can be in different subnets as long as they can communicate with each other
through routing or NAT3. For example, Prism Central can be deployed in a management subnet
and access Prism Elements that are in different application subnets3.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Environments do not have Internet access: Internet access is not required for the deployment of
Prism Central, as long as the environment meets the prerequisites and considerations for
installing or upgrading Prism Central. For example, Prism Central can be deployed in a dark site,
which is an environment that does not have Internet access or has restricted Internet access. In
this case, the administrator needs to manually enable microservices infrastructure and
download the required software packages from another source.
Question: 86
An administrator wants to use Volumes to connect to physical servers that are not able to be
virtualized.
Which three things must be configured for Volumes to support iSCSI clients? (Choose three)
Answer: B, D, E
Explanation:
https://portal.nutanix.com/page/documents/details/?targetId=Web-Console-Guide-Prism-
v51:wc-block-services-c.html
Question: 87
An administrator needs to run a mixed Exchange and SQL workload with a guaranteed amount
of container
space for each application.
How should the administrator meet this requirement?
Answer: D
Explanation:
NOS_v4_0:wc_security_authentication_wc_t.html
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Question: 88
What is the expected behavior of the VMs residing on that host when a controller VM becomes
unavailable?
Answer: B
Explanation:
According to the Nutanix Support & Insights web search result1, if the owner Controller VM
becomes unavailable, the address moves to another Controller VM, ensuring that it is always
available. This IP address is also used as a cluster-wide address by clients configured as part of
Nutanix Files and other products. Therefore, the host will automatically redirect I/O and VMs
will continue running without any interruption.
Question: 89
An administrator wants to have a VM on an AHV cluster with access to multiple VLANs. What is
the most efficient way to achieve this?
A. Update a vNIC on the VM to operate in trunked mode for all desired VLANs.
B. Create a network in AHV associated with all those VLANs on all hosts.
C. Use SFPs that allow the needed VLANs.
D. Use one vNIC per VLAN for the VM.
Answer: A
Explanation:
According to the Nutanix Support & Insights web search result2, VM NICs on AHV can operate in
two modes: Access and Trunked. Access NICs are the default, and allow one VLAN on the NIC.
Trunked NICs allow multiple VLANs on a single NIC for VMs that are VLAN aware. If you must use
trunked NICs, follow the steps described in the web search result2. Therefore, the most efficient
way to have a VM on an AHV cluster with access to multiple VLANs is to update a vNIC on the
VM to operate in trunked mode for all desired VLANs.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Question: 90
Which two access protocols are supported by Files? (Choose two.)
A. ISCSI
B. SMB
C. FCOE
D. NFS
Answer: B, D
Explanation:
According to the Network File System web search result3, NFS (Network File System) is a
distributed file system protocol that allows a user on a client computer to access files over a
network in a manner similar to how local storage is accessed. NFS is one of the access protocols
supported by Files. According to the [MS-WPO]: File Access Services Protocols web search
result4, SMB (Server Message Block) is a Windows file sharing protocol that enables applications
to discover, access, and share files that are hosted on or made available by a file server, using a
network between them, in a secure and managed environment. SMB is another access protocol
supported by Files. Therefore, SMB and NFS are two access protocols supported by Files.
Question: 91
An administrator is adding a node with a higher AOS release to an existing cluster.
What is the most efficient action an administrator should take to ensure it is in a supported
state?
Answer: C
Explanation:
According to the web search results, the most efficient action an administrator should take to
ensure a supported state when adding a node with a higher AOS release to an existing cluster is
to perform a standalone reimage of the new node and then add it to the cluster1. This way, the
new node will have the same AOS version as the existing nodes, and there will be no
compatibility issues or downtime. Therefore, option C is correct, while options A, B, and D are
not.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Question: 92
An administrator is configuring cross-hypervisor DR from an ESXi cluster to a new AHV cluster.
When the administrator migrates a protection domain to the AHV cluster, the VMs fail to boot.
What should the administrator do to correct this problem?
Answer: C
Explanation:
According to the web search results, one of the requirements for cross-hypervisor disaster
recovery (CHDR) is to install and configure Nutanix Guest Tools (NGT) on all the VMs2. NGT
configures the VM with all the required drivers for VM portability. Without NGT, the VMs may
fail to boot after being migrated to a different hypervisor type.
Question: 93
A customer has a newly-deployed AHV cluster with nodes that have 2.x 10 GBE and 2.x
interface. The customer wants to use all available network interfaces to provide connectivity to
the VMs.
Which option should the administrator use to achieve this while remaining consistent with
Nutanix recommendations?
Answer: D
Explanation:
According to the web search results, one of the best practices for Nutanix AHV networking is to
create a second bridge on each host and assign the 1GbE interfaces to it3. This way, the
customer can use both 10GbE and 1GbE interfaces for VM traffic, and also benefit from network
isolation and redundancy.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Question: 94
How should an administrator enable secure access to Volumes using a password?
A. iSER
B. CHAP
C. SAML
D. LDAP
Answer: B
Explanation:
https://portal.nutanix.com/page/documents/details/?targetId=Web-Console-Guide-Prism-
v50:wc-block-services-enabling-t.html
Provision storage on the Nutanix cluster by creating a volume group. Create a client whitelist to
enable access to the volume group by using the IP addresses or client initiator IQNs in a whitelist
(as part of the volume group configuration). Create a secret for the volume group if you are
using CHAP authentication.
Question: 95
What is the function of the virbr0 bridge on AHV?
A. To carry all traffic between the user VMs and the upstream network.
B. To carry management and storage communication between user VMs and the CVM.
C. To carry management and storage communication between user VMs and AHV host.
D. To carry storage communication between the guest VMs and the CVM
Answer: C
Explanation:
http://www.vstellar.com/2019/01/10/ahv-networking-part-1-
basics/#:~:text=AHV%20Network%20Architecture&text=virbr0%20is%20an%20internal%20switc
h,virbr0)%20have%20IP%20address%20192.168.
Question: 96
Which data savings technique utilizes stripes and parity calculation in a Nutanix cluster?
A. Compression
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
B. Parity strip
C. Erasure coding
D. Deduplication
Answer: C
Explanation:
According to the Nutanix Support & Insights web search result1, erasure coding is a data savings
technique that utilizes stripes and parity calculation in a Nutanix cluster. Erasure coding
increases the usable capacity on a cluster by reducing the replication factor of data blocks.
Instead of replicating data, erasure coding uses parity information to rebuild data in the event of
a disk or node failure. Erasure coding can save up to 50% of storage space compared to
replication factor 2, and up to 75% compared to replication factor 32.
Question: 97
The administrator wants a container to be displayed and limited to 1TB in the hypervisor.
What advanced container setting must the administrator set?
A. Advertised Capacity
B. Reserved Capacity
C. Advertised Quota
D. Reserved Quota
Answer: A
Explanation:
According to the Nutanix Support & Insights web search result3, advertised capacity is an
advanced container setting that allows the administrator to reserve an advertised storage space
for a storage container. An advertised capacity setting gives the hypervisor a maximum storage
size that the storage container can use. This setting can be any arbitrary value greater than or
equal to the resiliency required. The hypervisor ensures that the storage container storage
doesn’t go beyond the advertised capacity. If the administrator wants a container to be
displayed and limited to 1TB in the hypervisor, they should set the advertised capacity to 1TB.
Question: 98
Prism Central will be installed manually on an AHV cluster.
Which three disk images must be downloaded from the portal for the Prism Central VM?
(Choose three.)
A. var
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
B. tmp
C. boot
D. home
E. data
Answer: C, D, E
Explanation:
https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-Prism-
v5_10:mul-pc-install-scratch-c.html
According to the Nutanix Support & Insights web search result4, Prism Central can be installed
manually on an AHV cluster by using three disk images: boot, home, and data. These disk images
must be downloaded from the portal for the Prism Central VM and uploaded to an image
service on the AHV cluster. The boot image contains the operating system and kernel for Prism
Central. The home image contains the configuration files and logs for Prism Central. The data
image contains the database and application files for Prism Central.
Question: 99
An administrator is working with Nutanix Support and needs to provide logs for troubleshooting
an issue. The cluster is located in a secure environment. Data such as IP addresses and VM
names cannot be shared.
Which method should be used to anonymize the log data sent to Nutanix Support?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Answer: D
Explanation:
Question: 100
The customer is seeing high memory utilization on a mission critical VM. Users report that the
application is unavailable. The guest OS does not support hot add components.
How should the administrator fix this issue?
Answer: B
Explanation:
The best way to fix this issue is to increase the amount of memory assigned to the VM from the
Prism web console. This option allows the administrator to modify the VM configuration without
accessing the CVM or shutting down the VM. The Prism web console provides a simple and
intuitive interface for managing Nutanix clusters and VMs1. To change the memory allocation
for a VM, the administrator can follow these steps2:
Go to the VM dashboard
Select the VM from the VMs list
Choose Update
Adjust the amount of memory assigned to the VM
Click Save
Question: 101
How many Prism Central instances are required to deploy Leap:'
Answer: B
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Explanation:
The number of Prism Central instances required to deploy Leap is one per customer
environment. Prism Central is a multi-cluster manager that provides a single, centralized
management interface for Nutanix environments3. Leap is a native cloud extension that
provides disaster recovery as a service (DRaaS) for Nutanix environments4. To use Leap,
customers need to have one Prism Central instance deployed in their primary site, and register it
with their Xi Cloud Services account5. This Prism Central instance can manage multiple Nutanix
clusters across different physical sites or availability zones6.
Question: 102
What requires iSCSI initiator configuration in the guest OS to use Volumes?
Answer: B
Explanation:
The only option that requires iSCSI initiator configuration in the guest OS to use Volumes is
Microsoft Windows Failover Cluster. Volumes is an enterprise-class, software-defined block
storage solution that exposes storage resources directly to virtualized guest operating systems
or physical hosts using the iSCSI protocol7. To use Volumes, customers need to configure iSCSI
initiators on their hosts or guest OSes. However, some applications or services can use native
storage adapters instead of iSCSI initiators when running on AHV VMs. These include:
SQL Server Always On Availability Group: This is a high availability and disaster recovery solution
for SQL Server databases that uses Windows Server Failover Clustering (WSFC) and Availability
Groups (AGs) as its core components. When running on AHV VMs, SQL Server Always On
Availability Group can use native storage adapters instead of iSCSI initiators.
Oracle RAC: This is a clustered database system that provides high availability and scalability for
Oracle databases. When running on AHV VMs, Oracle RAC can use native storage adapters
instead of iSCSI initiators.
Exchange DAG: This is a group of up to 16 mailbox servers that hosts a set of databases and
provides automatic database-level recovery from failures that affect individual servers or
databases. When running on AHV VMs, Exchange DAG can use native storage adapters instead
of iSCSI initiators.
Question: 103
What is the name of the internal bridge used by AHV nodes and CVMs?
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
A. vnet0
B. br1
C. br0
D. virbr0
Answer: C
Explanation:
According to the Nutanix Support & Insights web search result1, the name of the internal bridge
used by AHV nodes and CVMs is br0. The internal bridge is an Open vSwitch (OVS) bridge that
connects the AHV host management interface, the CVM interface, and the VM vNICs. The
internal bridge also acts as a gateway for the CVM and VM traffic to reach the external network
through the host physical NICs.
Question: 104
An administrator adds a node with older generation processors to an existing AHV cluster with
newer generation processors. What is the effect on live migration?
A. Live migration continues to function as expected and VMs can move to any AHV host.
B. Live migration is prevented until the administrator enables the legacy migration option.
C. Live migration is prevented until the administrator manually changes the newer processor
level.
D. Live migration of VMs is prevented between newer and older processors.
Answer: D
Explanation:
According to the Migration to a different processor web search result2, live migration of VMs
depends on the source and destination hosts having the same CPU functions (CPU flags). Live
migration requires the source and destination hosts to have CPUs from the same manufacturer,
and only CPU functions which both hosts support are provided (same CPU generation, or by
using VMware Enhanced vMotion Compatibility (EVC)). If the administrator adds a node with
older generation processors to an existing AHV cluster with newer generation processors, then
live migration of VMs is prevented between newer and older processors, unless EVC is enabled.
Question: 105
An administrator needs to bring down a host in a Nutanix Cluster for maintenance reasons. The
administrator puts the host in maintenance mode.
What should the administrator do to perform an orderly shutdown of the CVM?
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
A. Execute the cvm_shutdown -P new command from the CVM.
B. Enter Fever off Server - immediate from the IPMI console.
C. Enter Fewer off Server-orderly Shutdown from the IPMI console.
D. Execute the cvm_shutdown -P now command from the host.
Answer: A
Explanation:
According to the How to use the cvm_shutdown script web search result3, the cvm_shutdown
script signals HA when shutting down the CVM (Controller VM) to forward the storage traffic to
another healthy CVM. Instead of using sudo shutdown or sudo reboot commands, this script
should be used to minimize I/O hits in user VMs running on the present hypervisor host. The
cvm_shutdown -P now command will initiate the shutdown process on the CVM immediately.
Therefore, if the administrator needs to perform an orderly shutdown of the CVM, they should
execute this command from the CVM.
Question: 106
The Stargate service becomes unavailable on a single CVM on an AHV node. What is used to
maintain I/O operations in the cluster?
A. Route injection
B. iSCSl redirector
C. Hypervisor HA
D. ha.py
Answer: A
Explanation:
According to the Nutanix Support & Insights web search result1, route injection is used to
maintain I/O operations in the cluster when the Stargate service becomes unavailable on a
single CVM on an AHV node. Route injection is a mechanism that allows the CVMs to
communicate with each other and redirect the I/O requests to another healthy CVM in the
cluster. Route injection uses the Linux kernel routing table to add or delete routes dynamically,
based on the availability of the Stargate service on each CVM.
Question: 107
An administrator notices that most of the VMs in the cluster are on one host. Users report that
an application seems to respond slowly. The application server VM has significantly more
memory assigned to it than other VMs.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
How should the administrator fix this issue?
Answer: A
Explanation:
According to the Troubleshoot high memory issues on Azure virtual machines web search
result2, one of the common factors in a low memory situation is over-provisioning memory for a
VM. Over-provisioning memory can cause memory pressure, which leads to swapping and
degraded performance. Therefore, to fix this issue, the administrator should reduce the amount
of memory assigned to the VM, based on the average hardware requirements for that operating
system and application load.
Question: 108
A vDisk is read by multiple VMs. The cluster creates immutable copies of the vDisk. What are
these vDisk copies called?
A. Disk Clones
B. Golden Images
C. Volume Groups
D. Shadow Clones
Answer: D
Explanation:
According to the Nutanix Support & Insights web search result3, shadow clones are vDisk copies
that are created by the cluster when a vDisk is read by multiple VMs. Shadow clones are
immutable copies of a vDisk that are stored in different nodes in the cluster, and are used to
improve read performance and reduce network traffic. Shadow clones are automatically created
and deleted by the cluster, based on the demand and availability of resources.
Question: 109
Which node type does not deploy a Nutanix Controller VM?
A. Storage Only
B. Hyper Converged
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
C. Compute Only
D. All Flash
Answer: C
Explanation:
A Compute Only node is a node that does not have any local storage devices and only provides
compute resources to the cluster2. A Compute Only node does not run a CVM, but instead relies
on the CVMs of other nodes to access the distributed storage fabric2
Question: 110
Refer to the exhibit.
System Non-Root Partition Usage shows a warning or critical alert The administrator needs to
change the frequency of checks and alerts to respond more quickly.
Where in Prism Element should the administrator change the frequency of checks and alerts?
Answer: C
Explanation:
According to the Nutanix Support & Insights web search result1, the administrator can change
the frequency of checks and alerts for the System Non-Root Partition Usage in Prism Element by
going to the Health Dashboard > Manage Checks > Schedule. The administrator can select the
check name, such as disk_usage_check, and click on Edit Schedule. The administrator can then
choose the desired frequency, such as every 15 minutes, every hour, or every day, and click on
Save. This will change how often the check runs and alerts are generated.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Question: 111
An administrator migrates a VM onto a new Nutanix cluster- After the migration, the
administrator observes the following conditions:
• Cluster memory utilization: 64%
• Cluster CPU utilization: 19%
• Cluster storage utilization. 32%
• Average VM CPU utilization: 25%
• Average VM CPU ready%: 24%
• Average VM memory utilization: 60%
Which two changes should the administrator make to improve VM performance? (Choose two.)
Answer: A, C
Explanation:
According to the CPU (%) - VMware Docs web search result2, one of the possible causes of high
CPU ready % is over-provisioning vCPUs for a VM or having too many VMs on a host. CPU ready
% indicates the percentage of time that the VM was ready, but could not get scheduled to run
on the physical CPU. High CPU ready % can lead to VM performance problems, such as slow
response time or application latency. To improve VM performance, the administrator should
reduce the number of vCPUs assigned to VMs or reduce the number of VMs on the hosts, so
that there is less contention for CPU resources.
Question: 112
An administrator needs to deploy an application with a large amount of data connected via
Nutanix volumes.
Which two actions should the administrator take when designing the Volume Group? (Choose
two.)
Answer: A, B
Explanation:
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
According to the Nutanix Volumes - Recommendations And Best Practices web search result3,
two actions that the administrator should take when designing the Volume Group are:
Distribute workload across multiple virtual disks: Use multiple disks rather than a single large
disk for an application. Consider using a minimum of one disk per Nutanix node to distribute the
workload across all nodes in a cluster. Multiple disks per Nutanix node may also improve an
application’s performance. For performance-intensive environments, we recommend using
between four and eight disks per CVM for a given workload.
Enable RSS (Receive Side Scaling): Receive-side scaling (RSS) allows the system to use multiple
CPUs for network activity. With RSS enabled, multiple CPU cores process network traffic,
preventing a single CPU core from becoming a bottleneck. Enabling RSS within hosts can be
beneficial for heavy iSCSI workloads. For VMs running in ESXi environments, RSS requires
VMXNET3 VNICs. For Hyper-V environments, enable VMQ to take full advantage of Virtual RSS.
Question: 113
Microsegmentation was recently enabled in a Nutanix environment. The administrator wants to
leverage Prism Central to create a policy that will block all traffic regardless of direction,
between two groups of VMs identified by their category.
Which policy should be used to meet this requirement?
Answer: D
Explanation:
According to the web search results, the policy that should be used to meet this requirement is
an Isolation Environment Policy. An Isolation Environment Policy is a type of security policy that
can be created in Prism Central using Flow Network Security, which is a feature that provides
microsegmentation and network security for Nutanix environments1. An Isolation Environment
Policy allows the administrator to isolate a group of VMs from another group of VMs based on
their categories, and block all traffic between them regardless of direction2. This policy can be
useful for creating isolated environments for testing, development, or compliance purposes2.
Question: 114
A system administrator needs to add more VMs to their Nutanix cluster.
Which two actions should the administrator perform to determine if the current cluster can
accommodate the new VMs? (Choose two)
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
A. Enable Deduplication and Ensure Coding
B. Utilize Optimize Resources for VM efficiency
C. Determine utilization with Cluster Runway
D. Perform an inventory with Life Cycle Management
Answer: B, C
Explanation:
According to the web search results, the two actions that the administrator should perform to
determine if the current cluster can accommodate the new VMs are:
Utilize Optimize Resources for VM efficiency: Optimize Resources is a feature in Prism Central
that helps the administrator improve the efficiency and performance of their VMs by identifying
and resolving issues such as overprovisioning, inactivity, constraints, or bullying3. By using
Optimize Resources, the administrator can reclaim unused resources and optimize the resource
allocation for their VMs3.
Determine utilization with Cluster Runway: Cluster Runway is a feature in Prism Central that
helps the administrator estimate how long their cluster can continue to run normally based on
the current consumption rate of CPU, memory, and storage resources4. By using Cluster
Runway, the administrator can see how adding more VMs will affect the resource utilization and
capacity of their cluster4.
Question: 115
An administrator responsible for a VDl environment needs to investigate reports of slow logins.
The administrator finds that increasing the number of vCPUs from 2 to 4 will reduce the login
times. Production workloads are consuming 75% of the host CPU on the cluster. The
administrator increases the vCPU count on all of the VDl VMs.
What are two impacts on the cluster? (Choose two)
Answer: C, D
Explanation:
According to the web search results, the two impacts on the cluster that will result from
increasing the vCPU count on all of the VDI VMs are:
Increase CPU utilization%: CPU utilization is the percentage of time that a CPU is busy executing
instructions5. By increasing the vCPU count on all of the VDI VMs, the administrator will
increase the demand for CPU resources on the cluster, which will increase the CPU utilization
percentage6.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Increase CPU ready%: CPU ready is the percentage of time that a vCPU is ready to run but is
waiting for a physical CPU to become available5. By increasing the vCPU count on all of the VDI
VMs, the administrator will increase the contention for physical CPU resources on the cluster,
which will increase the CPU ready percentage6. A high CPU ready percentage can indicate
performance issues such as latency or slowdowns5.
Question: 116
An administrator needs to relocate an AHV cluster to a new datacenter during a maintenance
window. The cluster will use the same IPs in the new datacenter.
Which two steps should be taken to prepare for this task? (Choose two.)
Answer: B, D
Explanation:
According to the web search results, two steps that should be taken to prepare for relocating an
AHV cluster to a new datacenter during a maintenance window are:
Shut down all user VMs in the cluster: This step is necessary to ensure that there is no data loss
or corruption during the relocation process. The user VMs can be shut down either individually
or in bulk by using the Prism Element web console or the acli command-line interface1.
Stop all Nutanix Files clusters: If the AHV cluster hosts any Nutanix Files clusters, they should be
stopped before relocating the cluster. Nutanix Files clusters are composed of one or more
virtual machines that provide file services to clients. Stopping a Nutanix Files cluster will stop all
the file server VMs and release the resources they consume2. The Nutanix Files clusters can be
stopped by using the Prism Element web console or the ncli command-line interface3.
Question: 117
An administrator is commissioning a Nutanix Enterprise Cloud. Once the user VMs have been
deployed and are running, the administrator finds that VMs on the same host are able to
communicate, but are unable to communicate between hosts.
What must be changed to enable full inter-VM communications?
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Answer: C
Explanation:
According to the web search results, one possible cause of inter-VM communication failure
between hosts is that the switch is not configured to allow VLAN 15 traffic. VLAN 15 is the
default VLAN ID used by AHV for internal communication between CVMs and hosts. If the switch
blocks or drops VLAN 15 packets, it will prevent inter-VM communication across hosts4. To
enable full inter-VM communication, the administrator should update the switch to specifically
allow VLAN 15 traffic on the ports connected to the AHV hosts.
Question: 118
An administrator has a Custom backup application that requires a 2TB disk and runs m
Windows. Throughput is considerably lower than expected.
The application was installed on a VM with the following configuration:
• FOU vCPUs with one core/vCPU
• 4GB of Memory
• One 50GB vDisk for the Windows installation
• One 2TB vDisk for the application
What is the recommended configuration change to improve throughput?
Answer: C
Explanation:
According to the web search results, one recommended configuration change to improve
throughput for a custom backup application that requires a 2TB disk and runs on Windows is to
span the 2TB disk across four vDisks. Spanning is a technique that allows you to create a single
logical disk from multiple physical disks. Spanning can improve throughput by distributing I/O
requests across multiple disks and reducing contention5. To span a disk across four vDisks, the
administrator should create four vDisks of equal size (500 GB each) and attach them to the
VM. Then, in Windows Disk Management, create a spanned volume from the four vDisks and
format it as NTFS6.
Question: 119
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
An administrator is implementing a VDI solution. The workload will be a series of persistent
desktops in a dedicated storage container within a four-node cluster Storage optimizations
should be set on the dedicated storage container to give optimal performance including during a
node failure event
Which storage optimizations should the administrator set to meet the requirements?
A. Compression only
B. Deduplication and Erasure Coding
C. Compressoion and Deduplication
D. Compression Deduplication and Erasure Coding
Answer: D
Explanation:
According to the web search results, three storage optimizations that should be set on a
dedicated storage container for a VDI solution with persistent desktops are compression,
deduplication and erasure coding. Compression is a technique that reduces the size of data by
removing redundant information. Deduplication is a technique that eliminates duplicate copies
of data blocks and stores only unique blocks. Erasure coding is a technique that increases usable
capacity by reducing the replication factor of data blocks and using parity information
instead7. These three optimizations can improve performance and save storage space for VDI
workloads, especially during a node failure event when data needs to be rebuilt from parity
information8. The administrator can enable these optimizations by using Prism Element web
console or ncli command-line interface9.
Question: 120
HOTSPOT
An administrator has created several custom alert policies, which are applied to the same
entities. Prism Central displays a message that a similar policy exists.
In what order of precedence are overlapping policies evaluated?
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Answer:
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Explanation:
Question: 121
After the initial configuration and upgrade of NCC, the administrator notices these critical alerts:
. IPMI 10.7.133.33 is using default password
. Host 10.7.133.25 is using default password
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
. CVM 10.7.133.31 is using default password
Which two initial cluster configuration tasks were missed during the deployment process?
(Choose two.)
Answer: A, C
Explanation:
The critical alerts listed are indicating that the default passwords are still in use for IPMI, the
host, and the Controller Virtual Machine (CVM). This suggests that the passwords for these
components were not changed from the default during the initial cluster configuration and
deployment process, which is a critical security practice.
A) CVM password changes: The alert for the CVM using the default password indicates that the
CVM password has not been changed. It is a standard security measure to change default
passwords to prevent unauthorized access.
C) Host password changes: Similarly, the alert for the host using the default password indicates
that the default password for the host has not been updated. This applies to the passwords used
to access the hypervisor host directly.
Changing default passwords is a critical step in securing the Nutanix environment. This is
highlighted in Nutanix's best practices and security guidelines, which recommend changing
default passwords as part of the initial configuration to ensure that the environment is not left
vulnerable to unauthorized access due to known default credentials. This process is typically
part of the initial setup procedures outlined in the Nutanix documentation for cluster
deployment and security configuration.
The IPMI alert also points to the need for changing default passwords, but since IPMI (Intelligent
Platform Management Interface) is not specifically mentioned in the provided options, it falls
under the broader category of host-level password changes, which would be covered by option
C.
BIOS password changes (Option B) and Password policy changes (Option D) are also important
but were not directly flagged by the alerts mentioned. BIOS password changes are usually a
separate task and not indicated by the alerts given, while password policy changes are related to
the policies governing password complexity and rotation rather than the initial password setup.
Question: 122
Refer to the Exhibit:
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
An administrator is adding a new node to a cluster. The node has been imaged to the same
versions of AHV and AOS that the cluster is
running, configured with appropriate IP addresses, and br0-up has been configured in the same
manner as the existing uplink bonds.
When attempting to add the node to the cluster with the Expand Cluster function in Prism, the
cluster is unable to find the new node.
Based on the above output from the new node, what is most likely the cause of this issue?
Answer: B
Explanation:
The output in the exhibit indicates that the node's network interfaces (eth0-eth3) are bonded
together using LACP (Link Aggregation Control Protocol) with 'balance-tcp' as the bonding mode
and LACP speed set to 'fast'. For LACP to function correctly, the switch ports to which the node
is connected must also be configured to support LACP. If the ports on the upstream switch are
not configured for LACP, the bond will not be able to establish properly, and the node will not
communicate effectively on the network, making it undiscoverable when attempting to expand
the cluster.
The absence of an operational LACP configuration could prevent the new node from joining the
existing cluster as the node's network interfaces would not be able to pass traffic correctly. This
can be verified by checking the switch configuration to ensure that the ports are set to
participate in an LACP bond.
The other options, such as a firewall blocking discovery traffic (Option A) or the node being on
different VLANs (Option C), are possible causes for a node not being discovered, but given the
specific command output provided, the most likely cause is related to the switch port
configuration for LACP. Option D, regarding completing LACP configuration after cluster
expansion, is not correct because LACP needs to be operational for the node to communicate
with the cluster during the expansion process.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Proper LACP configuration is critical for network communication in a Nutanix AHV cluster, and
this is covered in detail in the Nutanix AHV and Networking documentation. It outlines the steps
for configuring network bonds and LACP on both the AHV hosts and the connecting network
infrastructure.
Question: 123
Refer to Exhibit:
A. A critical alert will be triggered if I/O working set size goes over 6000 MB.
B. A critical alert will be triggered when there is an anomaly above 4000 MB.
C. A warning alert will be triggered after 3 anomalies have been catch.
D. A warning alert will be triggered if I/O working set size goes over the blue band.
Answer: B
Explanation:
A) This statement is incorrect because there is no static threshold set to trigger a critical alert at
6000 MB. The graph shows a peak that goes above 6000 MB, but the alert configuration below
does not specify a static threshold at this value.
B) This is the correct statement. The configuration under "Behavioral Anomaly" is set to alert
every time there is an anomaly, with a critical level alert set to trigger when the I/O working set
size is between 0 MB and 4000 MB. The graph illustrates that the anomalies (highlighted in pink)
occur when the working set size exceeds the normal range (blue band). Therefore, any anomaly
detected above 4000 MB would trigger a critical alert.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
C) This statement is incorrect because there is no indication that a warning alert is configured to
trigger after 3 anomalies. The exhibit does not show any configuration that specifies an alert
based on the number of anomalies.
D) This statement is incorrect as there's no indication that a warning alert will be triggered
based on the I/O working set size exceeding the blue band. The alert settings are configured to
ignore anomalies below 4000 MB and to trigger a critical alert for anomalies above this
threshold.
The settings displayed in the exhibit are typically part of Nutanix's Prism infrastructure
management platform, which can set various thresholds for performance metrics and trigger
alerts based on those thresholds. The behavior is defined in the Prism documentation where the
alert configuration is outlined.
Question: 124
An administrator is setting up a Nutanix cluster and needs to configure the default VLAN.
Which configuration should the administrator choose?
A. Vlan.0
B. Vlan.1
C. Vlan.2
D. Vlan.7
Answer: A
Explanation:
https://next.nutanix.com/installation-configuration-23/nutanix-vlan-34170
Question: 125
An administrator has been tasked with increasing security on Nutanix cluster by disabling
password authentication when accessing the CVM and AHV hosts and instead moving to key-
based SSH,
What is the easiest way for the administrator to meet these needs?
Answer: C
Explanation:
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
"An administrator has been tasked with increasing security on Nutanix cluster by disabling
password authentication when accessing the CVM and AHV hosts and instead moving to key-
based SSH, What is the easiest way for the administrator to meet these needs? Enable Cluster
Lockdown and provide an RSA key."
Cluster Lockdown mode disables password authentication when accessing the CVM and AHV
hosts and instead requires key-based SSH. To enable Cluster Lockdown mode, you need to
provide an RSA key.
Therefore, by enabling Cluster Lockdown mode and providing an RSA key, you can increase
security on Nutanix cluster by disabling password authentication when accessing the CVM and
AHV hosts and instead moving to key-based SSH with minimal effort.
https://next.nutanix.com/how-it-works-22/streamlined-login-and-increase-security-key-based-
ssh-login-37397
Question: 126
A user is complaining about slowness of a mission-critical MSSQL Server. The administrator logs
into Prism Element to investigate the VM performance and observes what is shown in the
diagram.
Answer: B
Explanation:
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Prism Element is a graphical user interface that allows you to manage Nutanix clusters1. You can
use Prism Element charts to understand Nutanix cluster workloads and troubleshoot
performance related issues2.
memory optimized virtual machine sizes offer the best performance for SQL Server workloads
on Azure VMs. Adding more RAM to the user VM can help reduce paging and improve query
execution times.
SQL Server performance can be affected by disk latency and throughput. By creating separate
virtual disks for data and logs, you can spread activity across multiple spindles and reduce disk
contention.
https://next.nutanix.com/how-it-works-22/differences-between-prism-element-prism-central-
and-prism-pro-37137
Question: 127
Refer to exhibit:
Answer: B
Explanation:
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Question: 128
Refer to Exhibit:
Answer: A
Explanation:
Nutanix leverages a method for determining the bands called ‘Generalized Extreme Studentized
Deviate Test’. A simple way to think about this is similar to a confidence interval where the
values are between the lower and upper limits established by the algorithm.
Another web source3 shows an example of how anomaly detection works in Nutanix Prism
Central. In the video, you can see that when the observed value of a metric deviates significantly
from the predicted value based on historical data, an anomaly event is triggered and displayed
on a chart.
Therefore, by comparing the observed values with the predicted values based on historical data,
Nutanix anomaly detection can identify abnormal behavior and alert you accordingly.
Question: 129
Refer to Exhibit:
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
An administrator needs to enable inline deduplication for a pre-existing storage container.
When trying to enable deduplication on the storage container. this feature is grayed-out.
What is the reason for this behavior?
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Answer: D
Explanation:
Nutanix supports two types of deduplication: post-process and inline. Post-process
deduplication runs periodically on a schedule and can be enabled on any cluster. Inline
deduplication runs in real time before data is written to disk and can be enabled only on all-flash
clusters.
Therefore, by checking the type of storage and the type of deduplication, you can determine if
you can enable inline deduplication on a storage container or not.
Nutanix inline deduplication is a feature that reduces the stored size and avoids duplicate data
on a storage container1. It is recommended only on some specific scenarios, such as when using
Nutanix Files or virtual desktop infrastructure (VDI) workloads12.
Question: 130
Refer to Exhibit:
Answer: B
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Explanation:
when you create a custom alert policy, you can choose between two types of thresholds: Static
Threshold and Behavioral Anomaly. Static Threshold allows you to set a fixed value for the
metric that triggers the alert. Behavioral Anomaly allows you to use machine learning to detect
abnormal behavior based on historical data.
If you select Behavioral Anomaly as the threshold type, you cannot set a warning level for the
alert. You can only set a critical level that indicates how much deviation from normal behavior is
considered an anomaly3. Therefore, the Alert warning if field is greyed out when you select
Behavioral Anomaly.
Question: 131
Refer to Exhibit:
Answer: B
Explanation:
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
In Nutanix AHV, when creating a virtual switch and trying to add network interfaces (NICs) to it,
the NICs must be connected to the network before they can be selected and assigned to the
switch. If the interfaces are showing as disconnected, the system will not allow them to be
added to a virtual switch because it cannot verify their operational status or the presence of a
live network connection.
It is a standard requirement for the interfaces to have physical connectivity (i.e., network cables
plugged in and connected to a live switch port) so that the AHV host can detect the link status as
up. Once the interfaces are connected and recognized by the host, they can then be added to a
virtual switch in the Nutanix AHV.
It's important to note that while the command-line interface (CLI) is indeed a powerful tool for
managing network configurations on AHV hosts, and some configurations do indeed require CLI,
the inability to select disconnected interfaces is not specifically a limitation that requires the use
of CLI to overcome. The focus should be on ensuring that the physical connectivity is established
for the interfaces in question.
This behavior is consistent with networking best practices and Nutanix's network configuration
guidelines, as detailed in the Nutanix AHV Networking Guide. This guide explains the
requirements and procedures for configuring virtual switches and managing NICs in a Nutanix
AHV environment.
Question: 132
After configuring Active Directory as the desired authentication service, an administrator is not
able to login into Prism Central using privileged account.
Which configuration must be checked first?
Answer: B
Explanation:
According to the Nutanix Community1, users can authenticate using their Active Directory
credentials when Active Directory support is enabled for Prism Central. To enable Active
Directory support, you need to configure Role Mapping12, which defines how Active Directory
groups map to Prism Central roles.
https://next.nutanix.com/ncm-intelligent-operations-formerly-prism-pro-ultimate-
26/configuring-authentication-38051
Question: 133
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Refer to Exhibit:
An administrator is trying to put a node into maintenance mode but receives the message
shown in the exhibit.
What is a potential reason for this dialog?
Answer: A
Explanation:
According to the Nutanix Community1, host maintenance mode is used to safely migrate all the
user virtual machines (VMs) in the host and make sure no VMs are running on the node. If a VM
can’t be migrated to another host, you need to shut down the VM for the host to enter into
maintenance mode.
According to The Virtualist2, a storage container is a logical segmentation of a storage pool that
can be mounted as an NFS datastore on ESXi hosts. You can choose a replication factor (RF) for
each storage container, which determines how many copies of data are stored across different
nodes.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Question: 134
Refer to exhibit:
A. RBAC is configured and the administrator's user doesn't have the right privileges.
B. The files were ISO but were uploaded as disk images hence cannot be used or edited.
C. Images are corrupted and must be re-uploaded.
D. Images were imported into Prism Central.
Answer: A
Explanation:
Question: 135
Which component can be associated with a storage policy?
A. Subnet
B. Catalog
C. Vm
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
D. Category
Answer: C
Explanation:
A storage policy can be associated with a VM. A storage policy is a set of rules that define how
data objects are stored and protected. It specifies the characteristics of storage, data protection,
and data placement for virtual disks that are assigned to a VM. Subnets, catalogs, and categories
are not associated with storage
policies.https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-
vpc_2022_6:mul-cluster-storage-policy-summary-view-pc-r.html
Question: 136
An administrator recently added new SSDs to a Nutanix cluster and knows the firmware will be
out of date, Due to security constraints, the cluster does not have access to the Internet.
Which two steps must be completed to update the firmware? (Choose two.)
Answer: A, B
Explanation:
Question: 137
An administrator wants to reduce the largest amount of alert emails received from Prism
Central.
Which two settings should the administrator customize to meet this requirement? (Choose two)
Answer: C, D
Explanation:
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
According to the Nutanix Support & Insights website1, you can configure alert emails through
Prism Central by enabling or disabling customer email notification for each alert. You can also
modify or create custom alert policies for different entities and clusters23.
Question: 138
An administrator needs to periodically send information about cluster efficiency via email to a
set of users.
What should be configured to accomplish this task?
Answer: D
Explanation:
To periodically send information about cluster efficiency via email to a set of users, the
administrator can follow these steps:
Create a report in Prism Central that contains the relevant information about cluster efficiency.
Add a schedule to the report to generate and send the report via email to the set of users at a
specified frequency.
This will ensure that the users receive regular updates about the cluster efficiency without the
need for manual intervention.
Question: 139
An administrator wants to ensure that data in a container is stored in the most space efficient
manner as quickly as possible after being written,
Which space efficiency too meets this requirement?
A. Inline Compression
B. Thin Provisioning
C. Cache Deduplication
D. Erasure Coding
Answer: A
Explanation:
inline compression is a technique that compresses all incoming write I/O operations over 4 KB
inline in the persistent write buffer (oplog)23. This approach enables you to use oplog capacity
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
more efficiently and helps drive sustained performance2. From AOS 5.18 onward, inline
compression (compression delay=0) is enabled by default for all new containers24.
https://portal.nutanix.com/page/documents/solutions/details?targetId=TN-2032-Data-
Efficiency:TN-2032-Data-Efficiency
Question: 140
An administrator is preparing to deploy a new application on an AHV cluster, Security
requirements dictate that all virtual servers supporting this application must be prevented from
communicating with unauthorized hosts.
Which option would achieve this goal?
A. Create a new VLAN, create a subnet on the cluster with the VLAN tag, deploy servers with
vNlCs in the new subnet.
B. Create a new Application Security Policy restricting communication to the authorized hosts
and apply it to the servers in enforce mode.
C. Create a new solation Environment policy apply it to the new servers and all authorized hosts.
D. Create new' subnet and assign to an existing VPC assign the IP prefix and gateway for the
subnet, deploy servers with vNlC5 in the new subnet.
Answer: B
Explanation:
An Application Security Policy is a security feature in Nutanix AHV that can be used to restrict
network communication between virtual servers based on a variety of criteria, such as IP
address, port, and protocol. By creating a policy that restricts communication to authorized
hosts and applying it to the servers in enforce mode, the administrator can prevent
unauthorized communication between virtual servers.
https://www.nutanix.com/products/ahv
Question: 141
An administrator wants to receive an environment summary report when a host failure occurs.
Which action would address the administrator’s need?
Answer: D
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Explanation:
"Playbook allows you to define a trigger that results in the execution of an action or a series of
actions. A trigger may be an event that occurs in the system, such as an alert or a request made
by you. The resultant actions that you configure can be VM actions, communication actions,
alert actions, or report actions."
https://portal.nutanix.com/page/documents/details?targetId=Intelligent-Operations-Guide-
vpc_2023_3:ssp-report-management-ssp-pc-
c.html#:~:text=The%20environment%20summary%20report%20provides,is%20registered%20to
%20Prism%20Central.
Question: 142
An administrator has been notified by a user that a Microsoft SQL Server instance is not
performing well.
When reviewing the utilization metrics, the following concerns are noted:
Memory consumption has been above 95% for several months
Memory consumption has been spiking to 100% for the last five days
Storage latency is 2ms.
When logging into Prism Central, how could the administrator quickly verify if this VM has
performance bottlenecks?
Answer: B
Explanation:
This will allow the administrator to quickly identify VMs that are overprovisioned or
underutilized based on their performance metrics.
https://www.nutanix.com/support-services/training-certification/certifications/certification-
details-nutanix-certified-professional-multicloud-infrastructure-6_5
Question: 143
Which Nutanix service control ncli, the HTML5 UI, and Rest API?
A. Prism
B. Cassandra
C. Zookeeper
D. Chronos
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Answer: A
Explanation:
Prism is the central service control used by Nutanix to manage the clusters. It provides a unified
view of the entire system, and it is used to control the HTML5 UI, the nCLI, and the REST API.
Prism is used to manage the resources of the system, such as the nodes, storage, and networks,
as well as to monitor the performance of the system and the applications running on it.
https://www.nutanixbible.com/2f-book-of-basics-cluster-components.html
Prism
Key Role: UI and API
· Prism is the management gateway for components and administrators to configure and
monitor the Nutanix cluster. This includes Ncli, the HTML5 UI, and REST API.
· Prism runs on every node in the cluster and uses an elected leader like all components in the
cluster. All requests are forwarded to the leader using Linux Iptables. This allows access to
PRISM using any CVM Ip address.
· Prism communicates with Zeus for cluster configuration data and Cassandra for statistics to
present to the user. It also communicates with the ESXi hosts for VM status and related
information
These are only some of the essential services that make up the CVM functionality. For more
information on all the services and various Nutanix Cluster components, refer to the portal
documentation.
Question: 144
On a Nutanix cluster, what does Network Segmentation refer to?
Answer: C
Explanation:
network segmentation on Nutanix clusters refers to creating a separate network for service-
specific communication and isolating different types of traffic over selected VLANs or physical
interfaces.
https://next.nutanix.com/ncm-intelligent-operations-formerly-prism-pro-ultimate-26/network-
segmentation-isolating-service-specific-traffic-39463
https://next.nutanix.com/how-it-works-22/network-segmentation-basics-38414
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Question: 145
An administrator has an AHV cluster that is comprised of 4 nodes with the following
configuration in each node:
CPU:2 each 2.4GHz, 12 core
Memory: 256GB
Disk: 6 each 1.92 SSD
A VM with 16 vCPUs and 96GB of RAM is being created on the cluster.
How should the administrator configure the VM to assure optimal performance?
Answer: C
Explanation:
The best way to configure the VM for optimal performance is to set it up with 2 vNUMA nodes.
This will ensure that the VM is configured to take advantage of the CPU and memory resources
available in each node, and it will also ensure that all of the cores are utilized for the best
performance. Additionally, the administrator should ensure that the VM has an affinity policy
set up so that the vCPUs are evenly distributed across the four nodes. Finally, Flash Mode should
be enabled in order to take advantage of the high-performance SSDs that are available in the
cluster
Question: 146
An administrator needs to limit the amount of storage space that data stored in single container
can consume.
Which action should the administrator take?
Answer: B
Explanation:
The best way for the administrator to limit the amount of storage space that data stored in a
single container can consume is to set an advertised capacity for the container. This will ensure
that the data stored in the container doesn't exceed the set limit, and it will also help prevent
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
any potential performance issues due to resource contention. Additionally, the administrator
should consider thick provisioning the container, which will pre-allocate the amount of storage
space that can be used by the container. This will help ensure that the data stored in the
container doesn't exceed the advertised capacity.
Question: 147
An administrator needs to configure Prism to send encrypted messages to a set of recipients.
Which setting must be applied?
Answer: D
Explanation:
The best way for the administrator to configure Prism to send encrypted messages to a set of
recipients is to set the SMTP Security Mode to STARTTLS. This will ensure that all messages sent
over SMTP are encrypted and secure. Additionally, the administrator should consider installing
SSL certificates on Prism Central to ensure that the messages are being sent securely. Finally, the
administrator should consider configuring Prism Central to use Cluster Lockdown, which will
help ensure that the messages are only sent to the intended recipients.
Question: 148
Which two permission assignment tasks can be accomplished via Prism Element? (Choose two.)
Answer: B, C
Explanation:
Question: 149
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
In the event of a disk failure, which process will immediately ad automatically scans Cassandra
to find all data previously hosted on the failed disk, and all disks in that node?
A. Curator
B. Stargate
C. Genesis
D. Prism
Answer: A
Explanation:
Curator is the process that runs on every node in a Nutanix cluster and is responsible for data
management tasks such as deduplication, compression, erasure coding, and replication factor
compliance. Curator also handles disk failure recovery by scanning Cassandra to find all data
previously hosted on the failed disk, and all disks in that node. Curator then rebuilds the data on
other nodes in the cluster using the distributed storage fabric1.
Question: 150
An Administrator has been asked to deploy VMs using a specific image. The image has been
configured with settings and applications that will be used by engineering to develop a new
product by the company.
The image is not available on the desired cluster, but it is available in other cluster associated
with Prism Central.
Why isno’t the image available?
Answer: C
Explanation:
Question: 151
After running an LCM inventory it is noticed that there are a number of firmware and software
updates available. The administrator would like to avoid any host reboots, but would like to
apply some of the available updates?
Which two updates can be done while avoiding a host reboot? (Choose two.)
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
A. M.2 Drives
B. AHV
C. Data Drives
D. AOS
Answer: C, D
Explanation:
Question: 152
An administrator is troubleshooting vDisk performance issues in a Nutanix cluster with hybrid
disks. The VMs all have Flash Mode enabled.
But users are reporting disk latency.
What could cause the performance issues?
Answer: D
Explanation:
data size for flash mode exceeds 25% of the SSD capacity could cause the performance
issues. Flash mode is a feature that allows vDisks to be pinned to SSDs for faster access, but it
has a limit of 25% of the SSD capacity per node. If this limit is exceeded, some vDisks may be
evicted from flash mode and cause disk latency2.
Question: 153
An administrator is performing validation testing of a new-deploy cluster. During this test, the
administrator disconnect each LAN interface from each of the nodes while pinging the
hypervisor and guest VMs.
When the first interface is disconnected, pings continue as expected to the hypervisor, but pings
stop responding from the guest. Pings continue when the interface is reconnected. When the
second interface is disconnected, pings continue to both the hypervisor and guest VMs.
What could be the cause of this error?
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
C. Portfast is not enabled on the switch ports
D. One of the network interfaces has a bad patch cable.
Answer: B
Explanation:
switch ports are configured with different VLANs could be the cause of this error. If the switch
ports are not configured with the same VLANs as the network interfaces on each node, then
there could be a mismatch in network connectivity when one interface is disconnected1. This
could affect the guest VMs that are using a different VLAN than the hypervisor.
Question: 154
What is the minimum time a newly created Deduplication storage policy takes to apply to the
VMs in the container?
A. 5 Minutes
B. 10 minutes
C. 30 minutes
D. 60 minutes
Answer: C
Explanation:
https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-
vpc_2023_3:mul-cluster-storage-policy-pc-c.html
Question: 155
Refer to the exhibit.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
An administrator is adding a new node to a cluster. The node has been imaged to the same
versions of AHV and AOS that the cluster running, configured with appropriate IP addresses, and
br0-up has been configured the same the existing uplink bonds
When attempting to add the node to the cluster with the Expand Cluster function in Prism , the
cluster is unable to find the new node.
Based on the above output from the new node, what is most likely the cause of this issue?
A. The ports on the upstream switch are not configured for LACP.
B. The existing and the expansion node are on different VLANs.
C. There is a firewall blocking the discovery traffic from the tlu
D. LACP configuration must be completed after cluster expansion
Answer: B
Explanation:
The correct answer is B. The existing and the expansion node are on different VLANs.
The output shows that the new node has a br0-up bond with four interfaces: eth0, eth1, eth2,
and eth3. The bond is configured with LACP active and LACP fallback set to false. This means
that the bond will only work if the upstream switch supports LACP and is configured to form an
LACP group with the four interfaces. However, the output also shows that the bond has no IP
address assigned to it, which indicates that the bond is not operational. One possible reason for
this is that the existing and the expansion node are on different VLANs, and the upstream switch
is not configured to allow the VLAN traffic on the LACP group. This would prevent the new node
from communicating with the cluster and being discovered by the Expand Cluster function in
Prism.
To verify this, the administrator can check the VLAN configuration on the upstream switch and
compare it with the existing nodes. Alternatively, the administrator can use the “manage_ovs
show_uplinks” command on an existing node and compare the output with the new node. If
there is a VLAN mismatch, the administrator can either change the VLAN configuration on the
switch or on the new node to match the existing nodes.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Question: 156
Refer to the exhibit.
An administrator is trying to implement the solution that is shown in the exhibit, but has been
unsuccessful.
Based on the diagram, what is causing the issue?
A. A remote Witness VM
B. Active containers in both sites
C. Network latency
D. Unsupported hypervisor
Answer: C
Explanation:
The correct answer is C. Network latency.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
The diagram shows a solution that uses synchronous replication between two remote
protection domains, cluster site A and cluster site B. Synchronous replication is a feature that
allows near-zero RPO (recovery point objective) by replicating data to the remote site before
acknowledging writes to the local site. However, synchronous replication has some
requirements and limitations that must be met for it to work properly. One of these
requirements is that the network latency between the two sites must be less than or equal to 5
ms1. If the network latency is higher than 5 ms, the synchronous replication will fail and the
protection policy will be suspended2.
Therefore, based on the diagram, the most likely cause of the issue is that the network latency
between cluster site A and cluster site B is higher than 5 ms, which prevents the synchronous
replication from working. To verify this, the administrator can use the “ncli cluster ping”
command to measure the network latency between the two sites3. If the network latency is
indeed higher than 5 ms, the administrator can either improve the network performance or
switch to a different replication mode, such as near-synchronous or asynchronous.
Question: 157
The administrator recently had a node fail in an AHV Nutanix cluster. All of the VMs restarted on
other nodes in the cluster, but they discovered that the VMs that make up a SQL cluster were
running on the failed host. The administrator has been asked to take measures to prevent a SQL
outage in the future.
What affinity option will prevent the SQL VMs from running on the same hos?
Answer: A
Explanation:
A VM-VM anti-Affinity policy is a rule that ensures that two or more VMs don’t run on the same
AHV host. It’s useful when an application provides HA and an AHV host can’t be an application’s
single point of failure1. In this case, the SQL cluster VMs should have a VM-VM anti-Affinity
policy configured to prevent them from running on the same host and causing an outage if that
host fails. A VM-VM anti-Affinity policy can be created using the aCLI commands2. The other
options are not relevant for this scenario.
Question: 158
After logging into Prism Element, an administrator presses the letter A on the Keyboard.
What is the expected outcome of this input?
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
A. Alerts page will launch
B. Analysis will launch
C. About Nutanix page will launch
D. API Explorer page will launch
Answer: D
Explanation:
API Explorer page will launch when an administrator presses the letter A on the keyboard after
logging into Prism Element. This is one of the keyboard shortcuts that Prism Element provides
for accessibility and ease of use1. API Explorer is a tool that allows users to explore and test
Nutanix REST APIs within Prism Element1.
https://www.nutanixbible.com/3b-book-of-prism-navigation.html
Question: 159
An administrator needs to increase bandwidth available to the AHV host and to the CVM.
How should the administrator complete this task?
Answer: B
Explanation:
The default network configuration for AHV hosts and CVMs is a bond named br0-up with two or
more uplinks in active-backup mode. This means that only one uplink is active at a time, while
the others are in standby mode. This provides high availability, but not load balancing or
increased bandwidth. To increase the bandwidth available to the AHV host and the CVM, the
administrator can change the bond mode to Active-Active, which allows all uplinks to be used
simultaneously. This can be done using the manage-ovs commands on each AHV host. The steps
are as follows1:
Log in to the AHV host using SSH.
Enter maintenance mode on the CVM by running allssh 'cluster status | grep -i cvm | grep -i
down'.
Change the bond mode to Active-Active by running manage_ovs --bond_mode active-active
update_uplinks br0-up <uplink_list>, where <uplink_list> is a comma-separated list of uplink
interfaces (for example, eth0,eth1).
Verify the bond mode by running manage_ovs show_uplinks.
Exit maintenance mode on the CVM by running allssh 'cluster start'.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Question: 160
Which inefficient VM Profile can be used to identify a VM that consumes too many resources
and causes other VMs to starve?
A. Over-provisioned VM
B. Inactive VM
C. Bully VM
D. Constrained VM
Answer: C
Explanation:
A bully VM is a VM that consumes too many resources and causes other VMs to starve. A bully
VM can affect the performance and availability of other VMs on the same host or cluster by
hogging CPU, memory, disk, or network resources. A bully VM can be identified by using the VM
Profile feature in Prism Central2. The VM Profile feature analyzes the resource utilization of
each VM and assigns it a profile based on its efficiency and impact on other VMs. The profiles
are as follows3:
Efficient: The VM is well-provisioned and has optimal resource utilization.
Over-provisioned: The VM has more resources than it needs and has low resource utilization.
Constrained: The VM has less resources than it needs and has high resource utilization.
Inactive: The VM has no resource utilization and is idle or powered off.
Bully: The VM has high resource utilization and causes contention for other VMs.
To identify a bully VM, the administrator can use Prism Central to view the VM Profile
dashboard and filter by profile type. The dashboard shows the number of VMs in each profile
type, as well as their resource consumption and efficiency score. The administrator can also drill
down into each VM to see its detailed metrics and recommendations for optimization.
Question: 161
What is he recommended approach for a constrained VM?
A. Reboot the VM
B. Delete the VM.
C. Increase the VM resources.
D. Decrease the VM resources
Answer: C
Explanation:
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
A constrained VM is one that does not have enough resources for the demand and can lead to
performance bottlenecks. A VM is considered constrained when it exhibits one or more of the
following baseline values, based on the past 21 days: CPU usage > 90% (moderate), 95% (severe)
CPU ready time > 5%, 10% Memory usage > 90%, 95% Memory swap rate > 0 Kbps1. To provide
adequate host resources, resize (increase) the constrained VMs1.
Question: 162
An administrator wants to expand the Failure Domain level of a cluster.
What two options are available? (Choose two.)
A. Node
B. Data Center
C. Block
D. Rack
Answer: C, D
Explanation:
Nutanix clusters are resilient to a drive, node, block, and rack failures because they use
redundancy factor 2 by default, allowing Nutanix clusters to self-heal2. Failure scenarios can be
thought of in terms of fault domains, which are the physical or logical parts of a computing
environment or location that are adversely affected when a device or service experiences an
issue or outage3. There are four fault domains in a Nutanix cluster: Disk, Node, Block, and
Rack4. Block and Rack are two options that are available for expanding the failure domain level
of a cluster. Block fault tolerance is enabled by default and ensures that data is replicated across
different blocks in a cluster5. Rack fault tolerance has to be configured manually and ensures
that data is replicated across different racks in a cluster4.
Question: 163
What is a requirement to enable Flow Networking?
Answer: C
Explanation:
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Flow Networking is a feature that enables software-defined networking for AHV clusters. It
allows users to create and manage virtual private clouds (VPCs), subnets, and network services
such as NAT, DHCP, routing, and VPN. Flow Networking also supports service insertion and
chaining, which enables integration with third-party network functions such as firewalls and
load balancers. Flow Networking is built on top of the microservices infrastructure (MSP) in
Prism Central, which provides the platform for running various Nutanix services such as Calm,
Karbon, and Objects. Therefore, to enable Flow Networking, the MSP must be enabled first on
Prism Central1. The MSP can be enabled from the Prism Central settings page or from the
command line interface (CLI) of the Prism Central VM2. Enabling the MSP will also enable Flow
Microsegmentation, which is another feature that provides network security and visibility for
AHV clusters.
Question: 164
A user running a Computer Aided Design (CAD) application is complaining about slow response
time within the VM, particular when moving windows or rendering images.
Which VM metric will guide the administrator toward diagnosing the problem?
Answer: B
Explanation:
A GPU (graphics processing unit) is a specialized hardware device that can accelerate graphics
rendering and computation for applications that use APIs such as DirectX, OpenGL, CUDA, and
OpenCL. A GPU can also offload the CPU from encoding and decoding tasks for remote display
protocols such as Frame Remote Desktop Protocol (FRP). A VM can use a GPU either by directly
accessing a physical GPU (pGPU) on the host or by using a virtual GPU (vGPU) that shares a
pGPU with other VMs. A user running a computer aided design (CAD) application may benefit
from using a GPU or a vGPU to improve the performance and responsiveness of the application,
especially when moving windows or rendering images. However, if the GPU or vGPU is not
properly configured or provisioned, the user may experience slow response time within the VM.
Therefore, to diagnose the problem, the administrator should monitor the GPU Usage metric for
the VM. The GPU Usage metric shows the percentage of GPU resources that are consumed by
the VM over time3. The administrator can use Prism Central to view the GPU Usage metric for
each VM in a chart or a widget4. The administrator can also use Prism Central to view other
metrics related to GPU performance, such as GPU Memory Usage, GPU Encoder Usage, and GPU
Decoder Usage3. By analyzing these metrics, the administrator can determine if the VM is using
the GPU efficiently and optimally, or if it needs more or less GPU resources.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Question: 165
An administrator needs to ensure logs, alerts and information is consistent across clusters that
are located in different countries.
Which service needs to be configured?
A. SMTP
B. DNS
C. SNMP
D. NTP
Answer: D
Explanation:
NTP service needs to be configured to ensure logs, alerts and information is consistent across
clusters that are located in different countries. NTP stands for Network Time Protocol and it is
used to synchronize the clocks of all the nodes in a cluster1. This helps to maintain accurate
timestamps for logs, alerts and other information that are generated by Nutanix clusters1.
Question: 166
An administrator manages an AHV cluster that is dedicated to a dev/test environment. The
administrator receiving complaints from users that they are unable to create new VMs on the
cluster.
After the reviewing the cluster, the administrator finds that the memory resources are almost
fully utilized, with many VMs over-provisioned on memory.
What option is the most efficient resolution to enable additional VMs to be created?
Answer: A
Explanation:
Enable Memory Overcommit on the over-provisioned VMs is the most efficient resolution to
enable additional VMs to be created. Memory overcommit allows VMs to use more memory
than physically available on a host by compressing and swapping memory pages to
storage1. This can improve memory utilization and increase VM density on a cluster1. However,
memory overcommit is not supported when HA is configured to use reserved hosts, so you may
need to disable HA reservation on the cluster before enabling memory overcommit1.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Question: 167
Refer to Exhibit:
The Update Source for LCM has been configured as shown in the exhibit. Inventory is failing
consistently.
What is the likely cause of this issue?
Answer: A
Explanation:
https://hyperhci.com/2019/07/22/nutanix-lcm-upgrade-process-failed-trouble-shooting/
Question: 168
During an AHV upgrade, an administrator finds that a critical VM was powered off rather than
migration to another host.
Which scenario explains this behavior?
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Answer: D
Explanation:
An agent VM is a special type of VM that is used for running services or applications that are not
affected by high availability (HA) events or host maintenance. An agent VM is never migrated to
any other host in the cluster. If an HA event occurs or the host is put in maintenance mode,
agent VMs are powered off and are powered on on the same host once that host returns to a
normal state. This behavior is different from regular VMs, which are migrated to another host in
the cluster if possible, or restarted on the same host if not possible1.
Therefore, during an AHV upgrade, an administrator may find that a critical VM was powered off
rather than migrated to another host if the VM was marked as an agent VM. This can be done
either from the Prism web console by selecting the Use this VM as an agent VM option in the
Update VM dialog box, or from the aCLI by using the vm.create or vm.update commands with
the agent_vm=true parameter2. To avoid this situation, the administrator should ensure that
any critical VMs are not marked as agent VMs before starting the AHV upgrade.
Question: 169
Which two types of granular RBAC does Nutanix provide for AHV hosts? (Choose two.)
A. Category based
B. Project based
C. Disk based
D. Cluster based
Answer: A, D
Explanation:
Nutanix provides two types of granular RBAC for AHV hosts: category based and cluster based3.
Category based RBAC allows administrators to assign roles to users or groups based on
categories, which are key-value pairs that can be applied to various entities in Prism Central,
such as clusters, hosts, VMs, images, and networks. Categories can be used to group entities by
different criteria, such as department, project, environment, or location. For example, an
administrator can create a category key named Department and assign different values to it,
such as Finance, Marketing, or Engineering. Then, the administrator can apply this category to
different clusters or hosts and assign roles to users or groups based on this category. This way,
users or groups can have different levels of access to different clusters or hosts depending on
their department4.
Cluster based RBAC allows administrators to assign roles to users or groups based on specific
clusters registered in Prism Central. For example, an administrator can create a role named
Cluster Admin and assign it to a user or group for a particular cluster. This way, the user or
group can have full access to that cluster and its hosts and VMs, but not to other clusters5.
https://portal.nutanix.com/page/documents/details?targetId=Nutanix-Security-Guide-v6_7:sec-
cluster-rbac-pc-c.html
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Question: 170
An administrator is tasked with configuring networking on an AHV cluster and needs to optimize
for maximum single VM throughput.
Which bond mode should the administrator select?
Answer: B
Explanation:
Active-Active is a bond mode that allows all uplinks in the bond to be used simultaneously for
traffic transmission and reception. This bond mode provides load balancing and increased
bandwidth for the AHV host and its VMs. Active-Active bond mode uses a hashing algorithm
based on source MAC addresses to distribute traffic across different uplinks in the bond. Each
individual VM NIC uses only a single bond member interface at a time, but multiple VM NICs are
spread across different bond member interfaces. As a result, it is possible for a Nutanix AHV
node with two 10 Gb interfaces to use up to 20 Gbps of network throughput, while individual
VMs have a maximum throughput of 10 Gbps6.
Therefore, if an administrator needs to optimize for maximum single VM throughput, they
should select Active-Active bond mode for their AHV cluster. This bond mode can be configured
using Prism Element UI or manage-ovs commands on each AHV host7. No additional
configuration is required on the upstream switch side, as long as the switches are
interconnected physically or virtually and both uplinks trunk the same VLANs8.
Question: 171
Refer to Exhibit:
An administrator wants to replace and old node with a node of newer generation in a 3-node
cluster. The administrator has already chosen the appropriate node. But unable to remove it
from the cluster.
Why is the Remove Host option not shown in the exhibit?
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
B. It is only possible to remove a host from a cluster using CLI.
C. It is not possible to remove a node from a the cluster using Prism Central
D. It is not possible to remove a host from a 3-node cluster.
Answer: D
Explanation:
A Nutanix cluster requires a minimum of three nodes to maintain quorum and data availability.
Removing a node from a 3-node cluster would violate the redundancy factor and cause data
loss. Therefore, it is not possible to remove a host from a 3-node cluster using Prism or CLI. The
only way to replace a node in a 3-node cluster is to use the Foundation tool, which will erase the
existing cluster configuration and create a new cluster with the new node1.
Question: 172
An administrator needs to create a new Linux image and will to do the following as part of the
VM deployment:
* Set the OS hostname
* Add custom users
* Add keys
* Run custom scripts
What package needs to be installed in the Linux image to facilitate this automation?
A. CloudInit
B. Sysprep
C. Kickstart
D. NGT
Answer: A
Explanation:
CloudInit is a package that contains utilities for early initialization of cloud instances. It allows
you to customize virtual machines provided by a cloud vendor by modifying the generic OS
configuration on boot. You can use CloudInit to set the OS hostname, add custom users, add
keys, run custom scripts, and more2. CloudInit is supported by most major Linux and FreeBSD
operating systems and works across different cloud platforms3. Sysprep is a tool for Windows
operating systems that prepares an installation for cloning, auditing, and customer delivery4.
Question: 173
An administrator has created a Nutanix managed it a VLAN ID of 512.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Several VMs have been created, and the administrator notices that the can successfully
communicate with other VMs on that VLAN.
Provided they are on the host, but cannot communicate with VMs that reside on different hosts
in the cluster.
What is most likely thee cause of this issue?
Answer: C
Explanation:
The correct answer is C. The VLAN was not created on the upstream switches.
A VLAN (virtual local area network) is a logical segmentation of a physical network that allows
devices on the same VLAN to communicate with each other, regardless of their physical
location. A VLAN also isolates the devices on different VLANs from each other, unless there is a
router or a layer 3 switch that can route traffic between VLANs. To create a VLAN, the
administrator needs to configure the network devices that are involved in the VLAN, such as
switches, routers, and hosts. The administrator also needs to assign a unique VLAN ID to each
VLAN, which is a number between 1 and 4094 that identifies the VLAN1.
In Nutanix AHV, the administrator can create a Nutanix managed network with a specific VLAN
ID for guest VMs. This network can be assigned to VM NICs using Prism Element or Prism
Central. However, creating a Nutanix managed network does not automatically create the VLAN
on the upstream switches that connect the AHV hosts. The administrator needs to manually
configure the upstream switches to allow the VLAN traffic on the ports that connect to the AHV
hosts. The administrator also needs to ensure that the upstream switches are interconnected
physically or virtually and can forward traffic between different VLANs if needed2.
Therefore, if an administrator has created a Nutanix managed network with a VLAN ID of 512
and notices that the VMs on that network can only communicate with other VMs on the same
host, but not with VMs on different hosts in the cluster, the most likely cause of this issue is that
the VLAN was not created on the upstream switches. This means that the switches are dropping
or blocking the traffic with VLAN ID 512 and preventing it from reaching other hosts or VMs. To
resolve this issue, the administrator should create the VLAN on the upstream switches and allow
it on the ports that connect to the AHV hosts3.
Question: 174
An administrator is concerned about the amount of data that a VM reading and writing to the
storage fabric.
Which metric will provide that data?
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
C. VM Storage Controller IOPS
D. VM Storage Controller Bandwidth
Answer: D
Explanation:
The correct answer is D. VM Storage Controller Bandwidth.
VM Storage Controller Bandwidth is a metric that measures the amount of data that a VM is
reading and writing to the storage fabric. The storage fabric is the network of storage controllers
(CVMs) that provide distributed and fault-tolerant storage services to the VMs on the Nutanix
cluster. The VM Storage Controller Bandwidth metric shows the read and write bandwidth in
megabytes per second (MBps) for each VM. The higher the bandwidth, the more data the VM is
transferring to and from the storage fabric1.
The administrator can use Prism Central to view the VM Storage Controller Bandwidth metric
for each VM in a chart or a widget. The administrator can also use Prism Central to view other
metrics related to the VM’s storage performance, such as VM Storage Controller IOPS, VM
Storage Controller Latency, and VM Disk Usage2.
Question: 175
Refer to the Exhibit:
Answer: B
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Explanation:
Based on the VM performance metrics shown in the exhibit, the most likely cause of the poor
performance in the particular VM is that the host’s CPU is severely overloaded. This is indicated
by the high percentage of Hypervisor CPU Ready Time, which is shown as 96% in the CPU ready
chart. CPU Ready Time is a metric that shows the amount of time a VM is ready to run but is
unable to run because the host CPU resources are not available. In a healthy environment, this
value is typically low. A high percentage indicates that the VMs are waiting for available CPU
cycles, which means the CPU is not able to schedule the VM effectively, often due to
overcommitment or heavy CPU load.
When the CPU ready time is consistently high, it is a clear indicator that the VM is frequently
waiting for CPU resources, which can lead to performance issues such as sluggishness or delays
in processing. It is not related to the storage subsystem (Oplog fullness or SSD tier size), nor
directly to the number of vCPUs assigned to the VM. While adding more vCPUs might seem like
a solution, it could actually exacerbate the issue if the host is already CPU constrained.
To resolve this issue, an administrator should consider balancing the load across the hosts more
effectively, possibly by using Nutanix's built-in automation and balancing features, or by scaling
out the cluster to add more CPU resources. It is also advisable to check for any VMs with
unusually high CPU demand and to adjust resource allocation as needed. Nutanix provides
extensive documentation and guidelines in their Resource Management Guide to help
administrators identify and resolve such performance issues.
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/
Thank You for Trying Our Product
FEATURES
Visit us athttps://www.examsboost.com/test/ncp-mci-6-5/