Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Nutanix NCP-MCI-7.5 - Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) 7.5

Page: 1 / 4
Total 110 questions

An administrator needs an account for automation that can be granted granular permissions and being authenticated without an interactive user password.

Which statement best describes how a Prism Central service account authenticates?

A.

Using the cluster admin password and inherits full admin privileges

B.

Using an external KMS key and is limited to encryption operations

C.

Using a CA-signed SSL certificate imported into the Prism Central

D.

Using a shared secret key managed through IAM and can be assigned RBAC roles

An administrator needs to protect a volume group using a protection policy that supports an RPO of 1 hour. The environment consists of two clusters in different geographic regions. Which replication type should be used?

A.

NearSync

B.

Synchronous

C.

Metro Availability

D.

Asynchronous

After scaling out Prism Central to improve resiliency, which additional configuration should an administrator complete?

A.

Deploy the Witness service in a separate failure domain.

B.

Configure a Protection Domain to include all Prism Central VMs.

C.

Enable High Availability Reservations for Prism Element cluster.

D.

Set up VM-VM anti-affinity rules between Prism Central VMs.

An administrator is troubleshooting intermittent VM I/O stalls that appear across hosts and clusters.

The issue is sporadic, and the administrator needs to rapidly collect the correct platform logs for deeper analysis and possible escalation. The administrator wants to use a supported mechanism designed for efficient log collection, and must ensure the environment prerequisites are met so the tool can be used successfully.

Which option correctly describes the supported approach and a key prerequisite?

A.

Use Logbay to collect logs, which is available once the node has a CVM deployed or the AHV compute node has been added to the cluster.

B.

Use Panacea to troubleshoot the incident, retrieving the required host and CVM logs directly, without first collecting a log bundle from the cluster.

C.

Use storage policy compliance reports and evaluations, include the underlying system logs needed to diagnose performance issues.

D.

Use ADS to export diagnostic bundles automatically whenever built-in log collection function detects contention hotspots.

An administrator needs to protect a group of mission-critical virtual machines.

The business requirements are:

    Recovery Point Objective (RPO) must be set to 5 minutes.

    New mission critical VMs should be automatically protected.

Which data protection type supports this configuration?

A.

Protection Domain with NearSync replication

B.

Protection Policy with NearSync replication

C.

Protection Domain with Asynchronous replication

D.

Protection Policy with Asynchronous replication

What is the default compression setting when a new storage container is created in Prism Central?

A.

Inline compression with a 0-minute delay

B.

Post-process compression with a 60-minute delay

C.

Post-process compression with a 0-minute delay

D.

Inline compression with a 60-minute delay

A VM is protected by a protection policy and the volume group is configured with CHAP authentication. An administrator rotates the VM’s password as part of the monthly routine. What action must the administrator perform to ensure the password is retained in the event of a failover?

A.

Update the associated recovery plan.

B.

Set the password as part of startup policy.

C.

Update the associated protection policy.

D.

Set the password in the VG recovery points.

An administrator has configured CVM security hardening on a Nutanix cluster with the following settings:

    IP Restriction State is set to enabled

    Password-based SSH access is disabled via Cluster Lockdown

The administrator attempts to SSH into the CVM from a new jump box and the connection is refused.

What should the administrator do to restore SSH access to the CVM?

A.

Log in to Prism Central Security Dashboard and remotely update the SSH whitelisted addresses for the affected cluster.

B.

Log in to Prism Element and update the Cluster Lockdown settings to add the new jump box IP address.

C.

Access the CVM using the local console or serial access and update the SSH whitelisted address to the new jump box IP.

D.

Restart the CVM to reset the IP restriction and regain SSH access from the new jump box IP.

An administrator is tasked with deploying a new VM with Secure Boot enabled for a UEFI boot configuration.

Which bus type should the administrator use to deploy the VirtIO ISO?

A.

SCSI

B.

IDE

C.

SATA

D.

SAS

An administrator is migrating from a standalone ESXi host and needs to provide access to an AHV storage container.

How should the administrator complete this task?

A.

Setup the AHV storage container as an NFS share.

B.

Import the ESXi host to the AHV cluster.

C.

Create user for authentication to NFS access.

D.

Add the ESXi host IP to Filesystem Whitelist.