New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Nutanix NCP-5.15 - Nutanix Certified Professional - Multi cloud Infrastructure (NCP-MCI 5.15)

Page: 3 / 9
Total 278 questions

An administrator is working with Nutanix Support and needs to provide logs for troubleshooting an issue. The cluster is located in a secure environment. Data such as IP addresses and VM names cannot be shared.

Which two methods can be used to anonymize the log data sent to Nutanix Support? (Choose two.)

A.

On the Health dashboard in Prism, use the Collect Logs option under Actions and choose Anonymize Output

B.

Run the ncc log_collector tool on a CVM, setting the —anonymize_output flag to true

C.

Under the User Profile in Prism, select Anonymize Log Output then run Log Collector from the Health dashboard.

D.

Run the ncc log_collector tool on a CVM, setting the — enhanced log collector flag to true,

An Engineer logs into a CVM to troubleshoot connectivity loss between two CVMs and find the following interfaces subnets and WLANs configured.

-eth0 – VLAN10-10.1.10.0/24

eth01–No VLAN-192.168.5.0/24

eth2 – LAN20-10.1.20.0/24

Which two Nutanix networking features are being utilized? (Choose two)

A.

Internal vSwitch

B.

IP address management (IPAM)

C.

Network Load balancing

D.

Backplane LAN

Which two items are required to manually upload an AOS update to a Nutanix Cluster? (Choose two)

A.

YML file

B.

JSON file

C.

AOS Binary

D.

AOS zip file

E.

AFS Binary file

An administrator is examining a VM's performance on the Prism VM dashboard and has identified that it is seeing periodic spikes in CPU utilization.

Which method allows the administrator to examine the history of the VM's CPU utilization?

A.

Install the Nutanix Guest Tools package in the VM.

B.

Use the VM console and query the CPU usage data stored in the VM.

C.

Add the VM's CPU usage graph to the Analysis dashboard.

D.

Export the graph data from the VM dashboard to a CSV file.

to build the vm on the ahv cluster, after amigration, what “Add Disk” operation(s) can be used? (Choose two)

A.

clone from ADSF file

B.

clone from storagepool

C.

clone from image service

D.

clone from vm list

What are the resource requirements for a single small Prism Central instance?

A.

4 vCPUs. 16 GB of memory, and 400 GiB of storage

B.

2 vCPUs, 8 GB of memory, and 500 GiB o* storage

C.

4 vCPUs, 16 GB of memory, and 500 GiB of storage

D.

8 vCPUs. 32 GB of memory, and 500 GiB of storage

which cli is used to run this command? (cluster version)

A.

ecli

B.

bash shell

C.

ncli

D.

acli

An administrator is working with sensitive data and wants to encrypt that data by Nutanix Software Encryption.

Which three types of information and components are required to enable this configuration? (Choose three)

A.

Key Management Server (KMS)

B.

Root Certificate Authority (CA)

C.

Signed Certificate for each CVM

D.

KMS Certificate

E.

Self-Encryption Drives (SED)

Which Nutanix feature allows a Nutanix cluster to present iSCSI storage to an external devices?

A.

Acropolis File Service

B.

Acropolis block service

C.

Storage Pool

D.

Storage container

An administrator has a 4-node Nutanix cluster running on AHV. The administrator creates a new storage container and makes that all available to all hosts.

Which storage protocol is used for Virtual Machines to access virtual disks on the storage container?

A.

NFS

B.

SMB/CIFS

C.

iSCSI

D.

Fiber Channel