Nutanix Certified Professional - Multicloud Infrastructure v6.5 v1.0 (NCP-MCI v6.5)

Page:    1 / 5   
Total 67 questions

Refer to the exhibit.

After configuring modules for a Remote Syslog Server, the settings are as shown. The administrator notices that even though the level parameter is set to EMERGENCY, that all monitor logs are being sent.
What is the likely cause of this issue?

  • A. The true setting for Include Monitor Logs sends all monitor logs regardless of the level.
  • B. Having the Module Name set to STARGATE sends all monitor logs regardless of the level.
  • C. A Log Level of EMERGENCY includes all monitor logs.
  • D. A second rsyslog server is configured to send all monitor logs.


Answer : A

An administrator has been tasked with increasing security on a Nutanix cluster by disabling password authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH.
What is the easiest way for the administrator to meet these needs?

  • A. Restrict access with User Management in Prism.
  • B. Configure LDAP authentication through a secure server.
  • C. Enable Cluster Lockdown and provide an RSA key.
  • D. Enable STIGs via command line on SSH to a CVM.


Answer : C

In the event of a disk failure, which process will immediately and automatically scan Cassandra to find all data previously hosted on the failed disk, and all disks in that node?

  • A. Stargate
  • B. Genesis
  • C. Prism
  • D. Curator


Answer : D

An administrator needs to limit the amount of storage space that data stored in single container can consume.
Which action should the administrator take?

  • A. Enable reservations for rebuild capacity
  • B. Thick provision the container
  • C. Store VM snapshots in a different container
  • D. Set an advertised capacity for the container


Answer : D

Refer to the exhibit.

An administrator is trying to implement the solution that is shown in the exhibit, but has been unsuccessful.
Based on the diagram, what is causing the issue?

  • A. Active containers in both sites
  • B. Network latency
  • C. A remote Witness VM
  • D. Unsupported hypervisor


Answer : B

An administrator was reviewing various AOS logs when it was noticed that the time of the logs was off by several hours.
Which initial step was missed during the post process cluster configuration?

  • A. Setting the cluster time zone via CVM NCLI
  • B. Setting the cluster time zone via CVM ACLI
  • C. Setting the cluster time zone via PC GUI
  • D. Setting the cluster time zone via PE GUI


Answer : A

Which AOS process determines if an I/O from a user VM will be written to OpLog or to an Extent Store?

  • A. Zeus
  • B. Stargate
  • C. Cassandra
  • D. Curator


Answer : B

When configuring a syslog server in Prism Central, what two pieces of information are required? (Choose two.)

  • A. HTTPS URL
  • B. IP address/port
  • C. Transport protocol
  • D. Encryption secret


Answer : BC

An administrator needs to create a new Linux image and will need to do the following as part of the VM deployment:

Set the OS hostname -

Add custom users -

Add keys -

Run custom scripts -
What package needs to be installed in the Linux image to facilitate this automation?

  • A. CloudInit
  • B. NGT
  • C. Sysprep
  • D. Kickstart


Answer : A

An administrator manages an AHV cluster that is dedicated to a dev/test environment. The administrator is receiving complaints from users that they are unable to create new VMs on the cluster.
After reviewing the cluster, the administrator finds that the memory resources are almost fully utilized, with many VMs over-provisioned on memory.
What option is the most efficient resolution to enable additional VMs to be created?

  • A. Enable Memory HA on the aver-provisioned VMs.
  • B. Upgrade the nodes with additional memory DIMMs.
  • C. Enable Memory Overcommit on the over-provisioned VMs.
  • D. Disable HA Reservation on the cluster.


Answer : C

A user running a Computer Aided Design (CAD) application is complaining about slow response time within the VM, particularly when moving windows or rendering images.
Which VM metric will guide the administrator toward diagnosing the problem?

  • A. Swap In Rate
  • B. Storage Controller Latency
  • C. Hynenisor Memory Usage (%)
  • D. GPU Usage


Answer : D

A newly hired Nutanix administrator was tasked by the CIO to create a single VM on a test network. The network administrator stated that a native VLAN was used on the Cisco TOR switches with the following parameters:

IP address: 172.16.1.2 -

Network Mask: 258.255.252.0 -

Default gateway: 172.16.1.1 -

VLAN: 1 -
The same parameters were used to create a network profile on Nutanix, but when the VM was created, it had no L3 connectivity.
What should the Nutanix administrator do to fix this issue?

  • A. Use DHCP as opposed to static IP.
  • B. Change VLAN field from vian.1 to vlan.0.
  • C. Nutanix removed support for native VLAN.
  • D. Enable IPv6 on the VM.


Answer : B

An administrator needs to configure a new subnet on an AHV cluster and wants to ensure that VMs will automatically be assigned an IP address at creation time.
Which type of network does the administrator need to create?

  • A. Unmanaged Network
  • B. DHCP Network
  • C. Managed Network
  • D. Dynamic Network


Answer : C

A recently configured cluster is leveraging NearSync with a recovery schedule of 15 minutes. It is noticed that the cluster is consistently transitioning in and out of NearSync.
What action should be taken to potentially address this issue?

  • A. Change the NearSync schedule to 30 minutes.
  • B. Increase network bandwidth.
  • C. Configure a secondary schedule in the same Protection Domain.
  • D. Add vCPUs to the user VMs.


Answer : B

After configuring Active Directory as the desired authentication service, an administrator is not able to login into Prism Central using a privileged account.
Which configuration must be checked first?

  • A. Role Mapping
  • B. Cluster Lockdown
  • C. Local user account
  • D. Account lock status


Answer : A

Page:    1 / 5   
Total 67 questions