Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Nutanix > Nutanix Certified Professional (NCP) > NCP-MCI-5.20

NCP-MCI-5.20 Nutanix Certified Professional - Multi cloud Infrastructure (NCP-5.20) Question and Answers

Question # 4

A two-node ROBO cluster is configured with a witness VM.

What happens when Node A goes down?

A.

The- cluster becomes unavailable and goes into read-only mode.

B.

All operations and services on the Node B are shut down and go into a waiting state.

C.

The cluster is unaffected and no administrator intervention is required.

D.

Node B sends a leadership request to the Witness VM and goes into single-node mode.

Full Access
Question # 5

The Stargate service becomes unavailable on a single CVM on an AHV node. What is used to maintain I/O operations in the cluster?

A.

Route injection

B.

iSCSl redirector

C.

Hypervisor HA

D.

ha.py

Full Access
Question # 6

Which two private key types are supported by the Nutanix SSL certificate implementation? (Choose two.)

A.

ECDSA

B.

ECDH

C.

ED25519

D.

RSA

Full Access
Question # 7

What requires iSCSI initiator configuration in the guest OS to use Volumes?

A.

SQL Server Always On Availability Group

B.

Microsoft Windows Failover Cluster

C.

Oracle RAC

D.

Exchange DAG

Full Access
Question # 8

Which two capabilities does IPAM provide in a Nutanix networking configuration? (Choose two.)

A.

Allows proxy server settings to be set up for a defined network

B.

Allows AHV to assign IP addresses automatically to VMs using DHCP

C.

Configures a VLAN with an IP subnet and assigns a group of IP addresses

D.

Configures firewall rules to prevent or allow certain TCP/IP traffic

Full Access
Question # 9

Which method can be used to migrate a VM configured for UEFI-boot from a Nutanix Hyper-V cluster to AHV?

A.

Live Migration

B.

Storage vMotion

C.

Nutanix Move

D.

Cloud Connect

Full Access
Question # 10

Which three configuration scenarios are valid for the deployment of Prism Central? (Choose three.)

A.

Environments use Network Address Translation.

B.

Prism Elements and Prism Central art in different subnets.

C.

Environments do not have Internet access.

D.

Prism Elements and Prism Central have proxy configured.

E.

Environments use the 192.168.5.0/24 CVM management network.

Full Access
Question # 11

An administrator needs to deploy an application with a large amount of data connected via Nutanix volumes.

Which two actions should the administrator take when designing the Volume Group? (Choose two.)

A.

Distribute workload across multiple virtual disks

B.

Enable RSS (Receive Side Scaling)

C.

Use multiple subnets for iSCSI traffic

D.

Enable thick provisioning on the Volume Group(s)

Full Access
Question # 12

What are two minimum prerequisites for live migration to succeed? (Choose two.)

A.

All AHV hosts have IP addresses in the same subnet

B.

All AHV hosts must be configured on the same VLAN

C.

All VMs have an IP address in the same subnet

D.

All VMs are configured for the same VLAN

Full Access
Question # 13

An administrator needs to relocate an AHV cluster to a new datacenter during a maintenance window. The cluster will use the same IPs in the new datacenter.

Which two steps should be taken to prepare for this task? (Choose two.)

A.

Reconfigure IPMI for the new datacenter

B.

Shut down all user VMs in the cluster

C.

Relocate the linked LDAP server

D.

Stop all Nutanix Files clusters

Full Access
Question # 14

How should an administrator configure a custom alert for a specific VM in Prism?

A.

Modify an existing alert to only alert on the specific VM.

B.

Modify VM settings to add the custom alert.

C.

Modify the alerts to add a new custom alert policy.

D.

Modify node settings to add the custom alert.

Full Access
Question # 15

A new Nutanix node includes Which license by default?

A.

Pro

B.

Ultimate

C.

Prism Pro

D.

Starter

Full Access
Question # 16

An administrator is migrating ESXi VMs to a Nutanix AHV cluster. The VM data is available to the AHV system.

Which process must the administrator complete below AHV VMs can be create?

A.

Import the VMs .vmx file using the Image Service

B.

Rename the –flat.vmdk files for the VM based on the VM UUID

C.

Import the VM’s –flad.vmdk files using the Image Service

D.

Import the VM’s .nvram file using the Image Service

Full Access
Question # 17

For security reason an administrator needs to logically separate management and data traffic on Nutanix cluster.

Which feature should the administrator select for this configuration?

A.

Prism Central

B.

Network Virtualization

C.

Network Segmentation

D.

Microsegmentation

Full Access
Question # 18

An administrator needs to shut down and relocate a Nutanix cluster.

Which step should the administrator take after shutting down all guest VMs on the cluster?

A.

Change the node and CVM IP addresses if necessary

B.

Execute the command: cluster stop on a CVM

C.

Put each host into maintenance mode

D.

Execute the command: cluster restart_genesis on a CVM

Full Access
Question # 19

A guest VM should be able to tolerate simultaneous failure of two nodes or drives.

What are the minimum requirements for the Nutanix cluster?

A.

3 nodes with cluster RF 3 and container RF 3

B.

3 nodes with cluster RF 3 and container RF 2

C.

5 nodes with cluster RF 2 and container RF 3

D.

5 nodes with cluster RF 3 and container RF 3

Full Access
Question # 20

What is the expected behavior of the VMs residing on that host when a controller VM becomes unavailable?

A.

A Live Migration will be performed on the affected VMs.

B.

The host will automatically redirect I/O and VMs will continue running.

C.

The impacted host and VMs will automatically shut down.

D.

VM High Availability will restart the impacted VMs on another host

Full Access
Question # 21

An administrator wants to configure key based SSH access for an AOS 5.5 Implementation

Which three components can be secured using this method?

A.

The cluster

B.

the CVM

C.

The hypervisor host

D.

Guest virtual machine

E.

prism element

Full Access
Question # 22

Which type of data is distributed by Zookeeper to ensure availability in the case of node or block failure?

A.

User Data

B.

Metadata

C.

Configuration Data

D.

Snapshot Data

Full Access
Question # 23

After an unplanned primary site outage, an administrator Activates a protection domain at the backup site.

Which steps must the administrator perform to bring the production VMs back up at the primary site?

A.

1. Log into the CVM on the backup site

2. Power down VMs that are running in DR Mode

3. Log into Prism Element on the primary site

4. Power on VMs

B.

1. Log into the CVM on the primary site

2. Deactivate and destroy VMs

3. Log into the backup site, choose the Protection Domain and click Migrate

4. Power on VMs

C.

1. Log into Prism Element on the primary site

2. Navigate to the DR tab and choose the protection domain

3. Click Migrate

4. Power on VMs

D.

1. Log into Prism Element on the backup site

2. Navigate to the DR tab and select the protection domain

3. Click Migrate

4. Power on VMs

Full Access
Question # 24

The external identity source (e.g., Active Directory) is unavailable.

Which account should be utilized as the Emergency Local Account lor both Prism Element and the CVM?

A.

Administrator

B.

root

C.

admin

D.

nutanix

Full Access
Question # 25

Which service performs snapshots in an AOS 5.15 implementations?

A.

Prism

B.

Stargate

C.

Zookeeper

D.

Medusa

Full Access
Question # 26

Which process should a cluster administrator follow to determine the uplink bond configuration node?

A.

Log into the Nutanix CVM and execute the command manage_ovs_update_uplinks

B.

Log into the Nutanix AHV host and execute the command ovs-appctl bond.show

C.

Log into the Nutanix AHV host and execute the command ifconfig br0

D.

Log into the Nutanix CVM and execute the command ovs-vsctl show

Full Access
Question # 27

An administrator is auditing the recent alerts on the cluster to report to the management.

Which dashboard in Prism Central can be used to generate this report?

A.

Alerts

B.

Explore

C.

Apps

D.

Analysis

Full Access
Question # 28

An administrator needs to take a single node down for maintenance. Which two steps should the administrator take? (Choose two)

A.

Make sure Auto Evacuation is enabled

B.

Shut down or live migrate all VMs off of the node.

C.

Verify the data resiliency status of the cluster.

D.

Reclaim the licenses to the Nutanix Support Portal.

Full Access
Question # 29

An Engineer logs into a CVM to troubleshoot connectivity loss between two CVMs and find the following interfaces subnets and WLANs configured.

-eth0 – VLAN10-10.1.10.0/24

eth01–No VLAN-192.168.5.0/24

eth2 – LAN20-10.1.20.0/24

Which two Nutanix networking features are being utilized? (Choose two)

A.

Internal vSwitch

B.

IP address management (IPAM)

C.

Network Load balancing

D.

Backplane LAN

Full Access
Question # 30

Which Nutanix Product combines the Distributed Storage Fabric & App Mobility Fabric?

A.

Xtract

B.

Prism

C.

Acropolis

D.

Calm

Full Access
Question # 31

An organization has a 3-node cluster, with utilization rates as follows:

  • 35% CPU
  • 40% RAM
  • 20% SSD
  • 35% HDD

A node in this cluster fails.

Which type of degradation will the client experience due to this node failure?

A.

The entire cluster will be down until the node is repaired.

B.

All VMs from that node will be offline until the node is repaired.

C.

VMs from the failed node will be offline until they restart on the remaining nodes.

D.

The cluster will be online but will experience performance issues due to utilization.

Full Access
Question # 32

An administrator is working with Nutanix Support and needs to provide logs for troubleshooting an issue. The cluster is located in a secure environment. Data such as IP addresses and VM names cannot be shared.

Which two methods can be used to anonymize the log data sent to Nutanix Support? (Choose two.)

A.

On the Health dashboard in Prism, use the Collect Logs option under Actions and choose Anonymize Output

B.

Run the ncc log_collector tool on a CVM, setting the —anonymize_output flag to true

C.

Under the User Profile in Prism, select Anonymize Log Output then run Log Collector from the Health dashboard.

D.

Run the ncc log_collector tool on a CVM, setting the — enhanced log collector flag to true,

Full Access
Question # 33

Two HDDs fail simultaneously on a single AHV host.

What are the chances of data loss?

A.

0%

B.

25%

C.

50%

D.

100%

Full Access
Question # 34

Which configuration should an administrator make in Prism to receive a summary of the alerts every 24 hours?

A.

Syslog

B.

Individual Alerts

C.

Email Digest

D.

SNMP

Full Access
Question # 35

An administrator is restarting a node and the CVM has not automatically restarted.

Which command should be used to start the CVM?

A.

cvm start cvm_name

B.

virsh start block-ID-(Node Letter)

C.

cvm start block-ID-(Node Letter)

D.

virsh start cvm name

Full Access
Question # 36

through what interfaces is/are (anti-)affinity rules configured. (Choose three)

A.

affinity :cli

B.

anti-affinity :cli

C.

affinity :prism

D.

anti-affinity :prism

Full Access
Question # 37

What is default behavior for VM High Availability for Nutanix AHV?

A.

VMs restart on other hosts as available resource allow

B.

No VMs restart because HA is not enabled by default

C.

All VMs restart because system reservation are already made

D.

Only VMs with High Availability explicitly enabled will restart

Full Access
Question # 38

A vDisk is read by multiple VMs. The cluster creates immutable copies of the vDisk. What are these vDisk copies called?

A.

Disk Clones

B.

Golden Images

C.

Volume Groups

D.

Shadow Clones

Full Access
Question # 39

How will an HDD failure affect VMs with data on the failed device?

A.

The VMs will crash, and will be restarted once the failed HDD has been replaced and the data has been restored.

B.

A live migration will be initiated, moving the affected VMs to a host that contains the replica data.

C.

The VMs will remain operational on that host and continue to function normally with no noticeable impact

D.

An HA event will occur, causing the affected VMs to restart on a node that contains the replica data.

Full Access
Question # 40

A node with Erasure Coding fails.

What is the impact?

A.

The node stops utilizing Erasure Coding.

B.

Potentially increased amount of data stored in the SSD tier.

C.

Increased Controller VM CPU Load.

D.

AQS unable to do deduplication during the Erasure Coding failure.

Full Access
Question # 41

Which node type does not deploy a Nutanix Controller VM?

A.

Storage Only

B.

Hyper Converged

C.

Compute Only

D.

All Flash

Full Access
Question # 42

An administrator is working with Nutanix Support and needs to provide logs for troubleshooting an issue. The cluster is located in a secure environment. Data such as IP addresses and VM names cannot be shared.

Which method should be used to anonymize the log data sent to Nutanix Support?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access