Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Nutanix NCP-BC-7.5 - Nutanix Certified Professional - Business Continuity (NCP-BC) 7.5

Page: 1 / 4
Total 109 questions

An administrator executes an Unplanned Failover. The VMs recover at the Recovery Site and are powered on. However, the application owners report that the VMs are completely isolated and cannot communicate with any other services on the network. The administrator checks the Recovery Plan and notices the Network Mapping section was left blank.

What is the expected configuration for VMs recovered without a valid Network Mapping?

A.

The VMs attach to the same VLAN ID they used at the source site.

B.

The VMs are recovered without the network adapters attached.

C.

The VMs are recovered with their network adapters disconnected.

D.

The VMs attach to the management network of the cluster.

An administrator wants to run a test failover and maps the primary production virtual network to the recovery site production virtual network for the test. What are the two most likely outcomes? (Choose two.)

A.

Test failover can overlap with production networking and can lead to IP conflicts.

B.

Using production networks on recovery AZ for test failover provides the most accurate validation.

C.

It defeats the intended isolation between production and test workflows.

D.

Test failover does not require network mapping, so the selection of production or test networks will have no impact.

An administrator needs to provide leadership with a report showing the timeframe of each step during Recovery Plan failover testing. How should the administrator produce this report?

A.

Filter the Events log in Prism Central for Recovery Plan activity.

B.

Review the built-in execution report from the test failover results.

C.

Generate a custom report within Prism Central Intelligent Operations.

D.

Use ncli on a CVM to query Recovery Plan execution history.

How does the system behave if the network cannot sustain the data change rate required to maintain a 1-minute RPO between the primary and recovery AZs?

A.

The VMs continue to be protected in 1-minute RPO, but write I/O is degraded.

B.

The system automatically switches to Asynchronous replication mode.

C.

The protected VMs are failed over.

D.

All write I/O to the protected VMs is paused.

An administrator has VMs in a container named VMData on Cluster A that need to be replicated to Cluster B. In order to configure new replications to Cluster B, the administrator creates a container named VMData on Cluster B with an advertised capacity of 200GB.

The VMs on Cluster A in the VMData container have these characteristics:

    Large VMs taking up 4TB of space

    Low data churn rate

    100GB of recovery points

    NGT is installed

    Recovery points are application-consistent

After replications begin the administrator quickly notices replications are not progressing.

What best explains what happened?

A.

Low data churn rate of source VMs slows the replication rate to the remote site.

B.

Replications can ' t proceed if there are duplicate container names.

C.

First replication is a full copy of the VMs and the container isn ' t large enough.

D.

Application-consistent snapshots take up double the space on remote clusters.

A Protection Domain exists with a VM, but no new snapshots are being created and replication never starts. Which is the most likely DR setup issue?

A.

The Protection Domain has no entities that are protected

B.

The Protection Domain has no schedule configured

C.

The remote site has no vStore mapping

D.

Bandwidth throttling is set too low

After an unplanned outage, all VMs were successfully failed over to the recovery site, and users are now accessing workloads from there. The DR dashboard shows the failover is complete and replication from the original primary site has stopped. As part of post-failover cleanup, what is the most appropriate next action to ensure the DR configuration reflects the current production state and is ready for future protection?

A.

Delete all existing recovery points to prevent data inconsistency.

B.

Leave the environment as-is since workloads are functioning normally.

C.

Re-protect workloads so that the current production site is protected.

D.

Immediately initiate another failover to restore the original configuration.

After performing a failover of encrypted AHV VMs from an on-premises AZ to a recovery AZ, an administrator notices that newly written data is not encrypted. Which post-failover cleanup task must be performed to correct this issue?

A.

Enable replication traffic encryption.

B.

Reassign storage policies and categories.

C.

Reconfigure the replication schedule.

D.

Recreate the recovery plan and categories.

What is the bandwidth limit of a single Nutanix Cloud Gateway for IPSec traffic?

A.

250 Mbps

B.

500 Mbps

C.

1 Gbps

D.

10 Gbps

What is the expected outcome that the administrator must manage?

A.

The primary site will continue to serve I/O locally to prevent downtime, while the secondary site remains in standby.

B.

The secondary site will acquire the lock after a built-in delay, and the primary site will halt all I/O.

C.

The Witness will automatically shut down the secondary site to protect data integrity on the primary site.

D.

Both sites will attempt to acquire the lock, but the primary site will acquire the lock and continue to serve I/O locally to prevent downtime.