Nutanix NCP-5.15 - Nutanix Certified Professional - Multi cloud Infrastructure (NCP-MCI 5.15)
An administrator is working with Nutanix Support and needs to provide logs for troubleshooting an issue. The cluster is located in a secure environment. Data such as IP addresses and VM names cannot be shared.
Which two methods can be used to anonymize the log data sent to Nutanix Support? (Choose two.)
An Engineer logs into a CVM to troubleshoot connectivity loss between two CVMs and find the following interfaces subnets and WLANs configured.
-eth0 – VLAN10-10.1.10.0/24
eth01–No VLAN-192.168.5.0/24
eth2 – LAN20-10.1.20.0/24
Which two Nutanix networking features are being utilized? (Choose two)
Which two items are required to manually upload an AOS update to a Nutanix Cluster? (Choose two)
An administrator is examining a VM's performance on the Prism VM dashboard and has identified that it is seeing periodic spikes in CPU utilization.
Which method allows the administrator to examine the history of the VM's CPU utilization?
to build the vm on the ahv cluster, after amigration, what “Add Disk†operation(s) can be used? (Choose two)
What are the resource requirements for a single small Prism Central instance?
which cli is used to run this command? (cluster version)
An administrator is working with sensitive data and wants to encrypt that data by Nutanix Software Encryption.
Which three types of information and components are required to enable this configuration? (Choose three)
Which Nutanix feature allows a Nutanix cluster to present iSCSI storage to an external devices?
An administrator has a 4-node Nutanix cluster running on AHV. The administrator creates a new storage container and makes that all available to all hosts.
Which storage protocol is used for Virtual Machines to access virtual disks on the storage container?
