New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Nutanix NCP-5.15 - Nutanix Certified Professional - Multi cloud Infrastructure (NCP-MCI 5.15)

Page: 6 / 9
Total 278 questions

An administrator adds a node with older generation processors to an existing AHV cluster with newer generation processors. What is the effect on live migration?

A.

Live migration continues to function as expected and VMs can move to any AHV host.

B.

Live migration is prevented until the administrator enables the legacy migration option.

C.

Live migration is prevented until the administrator manually changes the newer processor level.

D.

Live migration of VMs is prevented between newer and older processors.

A Nutanix cluster is equipped with four nodes. Four VMs on this cluster have been configured with a VM-VM anti-affinity policy and are each being hosted by a different node.

What occurs to the cluster and these VMs during an AHV upgrade?

A.

One node hosts two VMs while the node being upgraded is in maintenance mode.

B.

One VM out of the four powers down when the node hosting it reboots.

C.

The AHV pre-upgrade checks fail until the administrator disables the anti-affinity policy.

D.

The AHV pre-upgrade checks fail until the four VMs are powered off.

Prism Central will be installed manually on an AHV cluster.

Which three disk images must be downloaded from the portal for the Prism Central VM? (Choose three.)

A.

var

B.

tmp

C.

boot

D.

home

E.

data

A customer has a 24-node cluster with all containers configured with RF3. Two different nodes have incurred a simultaneous HDD failure.

What is the result?

A.

The cluster runs in a degraded state until the failed drives are replaced and the data has been restored to three replicas.

B.

Sixty minutes after the failures a rebuild of the lost data can remaining HDDs begins to restore to three replicas.

C.

The VMs with data on those drives crash, and an HA event occurs, restarting them on a remaining healthy node.

D.

The Nutanix cluster recognizes the failures and immediately begins to rebuild lost data to three replicas.

An administrator is working with Nutanix Support and needs to provide logs for troubleshooting an issue. The cluster is located in a secure environment. Data such as IP addresses and VM names cannot be shared.

Which method should be used to anonymize the log data sent to Nutanix Support?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

CPU utilization climbs above 90% on several VMs. This causes performance degradation for a business-critical application.

How can alerts be configured to notify the administrator before VM CPU utilization hits 90%?

A.

On a CVM, use ncli to set the VM CPU Check threshold for the critical VMs to a value below 90%.

B.

On the Health dashboard, locate the VM CPU Check and lower the alert threshold below 90%.

C.

On a CVM, configure a cron job to run the VM CPU Check more frequently and email the result.

D.

On the Alerts dashboard, ensure that the VM CPU usage alert is not set to auto-resolve.

An administrator is implementing a VDI solution. The workload will be a series of persistent desktops in a dedicated storage container within a four-node cluster Storage optimizations should be set on the dedicated storage container to give optimal performance including during a node failure event

Which storage optimizations should the administrator set to meet the requirements?

A.

Compression only

B.

Deduplication and Erasure Coding

C.

Compressoion and Deduplication

D.

Compression Deduplication and Erasure Coding

Which data savings technique utilizes stripes and parity calculation in a Nutanix cluster?

A.

Compression

B.

Parity strip

C.

Erasure coding

D.

Deduplication

Microsegmentation was recently enabled in a Nutanix environment. The administrator wants to leverage Prism Central to create a policy that will block all traffic regardless of direction, between two groups of VMs identified by their category.

Which policy should be used to meet this requirement?

A.

An Application Security Policy

B.

A Quarantine Policy

C.

A Whitelist-Based Policy

D.

An Isolation Environment Policy

An administrator needs to shut down an AHV cluster to relocate hardware. The administrator upgrades NCC and runs health checks.

Which steps should the administrator perform next?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements.