Pass the Nutanix Nutanix Certified Advanced Professional (NCAP) NCM-MCI-5.15 Questions and answers with CertsForce

Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
Questions # 21:

In a Nutanix cluster, a Protection Domain contains 50 entities that are replicated to a remote Single Node Replication Target.

The current schedule configuration is as follows:

• Repeat every 6 hours

• Local Retention Policy 1

• Remote Retention Policy 8

• Starting time 12 am

At 8 am on Monday, the administrator discovers that a protected VM is corrupted. The latest good state was Sunday 2 pm. The administrator needs to maintain current protection.

Which strategy should the administrator use to meet these requirements?

Options:

A.

From the Remote site, activate the Protection Domain, then re-protect the entity.


B.

From the Remote site, restore the VM from the local snapshot by selecting the correct snapshot


C.

From the local site, retrieve the correct remote snapshot, then restore the VM locally.


D.

From the local site, restore the VM from the local snapshot by selecting the correct snapshot.


Expert Solution
Questions # 22:

A customer has a four-node cluster and is using Volume Groups to provide storage services to a SQL cluster.

In the event of a CVM failure in the cluster, what is the expected IO path of the volume group’s iSCSI targets?

Options:

A.

vDisk directed at failure CVM are redirected to Data Services IP until CVM is reconnected


B.

vDisk directed to CVM that failed to disconnect and will not reconnect without manual intervention


C.

vDisk directed to failed CVM are redirected to another CVM and automatically reconnect


D.

vDisk directed at failed CVM will disconnect and reconnect when the failed CVM comes back online


Expert Solution
Questions # 23:

An administrator is notified that a bare metal database server is down. This database server is being served storage using a Nutanix Volume Group. Upon investigating, the administrator finds that the disks in the database server that map to the vDisks in the volume group have gone offline.

What is causing this issue?

Options:

A.

The Volume Group Load Balancer has been disabled.


B.

Port 9443 is blocked in the server firewall.


C.

Port 3260 has been blocked in the server firewall.


D.

A CVM serving the Volume Group has gone offline.


Expert Solution
Questions # 24:

An administrator is implementing a VDI solution. The workload will be a series of persistent desktops in a dedicated storage container within a four-node cluster. Storage optimizations should be set on the dedicated storage container to give optimal performance including during a node failure event.

Which storage optimizations should the administrator set to meet the requirements?

Options:

A.

Compression, Deduplication, and Erasure Coding


B.

Deduplication and Erasure Coding


C.

Compression and Deduplication


D.

Compression only


Expert Solution
Questions # 25:

Over the period of 2 to 3 weeks, a cluster displays the following:

•Periods where Warning Alerts of memory usage over 75% are asserted

•Periods where Critical Warnings of memory usage over 90% are asserted

•Periods of slow of frozen VDI desktops have caused work stoppage or slowdown

•VDI clones have periodically not powered up when called, causing work stoppage

Which steps should be used to prioritize the administrator’s troubleshooting efforts?

Options:

A.

•Assess resource health on Hardware page

•Review the Analysis page for memory usage demand

•Determine the VDI workload-to-host affinity across the cluster


B.

•Analyze Alert Pages for a root cause of memory problem

•Analyze VM table page to access the VM functionality

•Analyze the VDI Clone properties for possible VDI Workload stress


C.

•Check Analysis page for CPU demand

•Verify VDI workload property for memory subscription

•Review the Hardware page to determine if the cluster has sufficient RAM


D.

•Review Analysis Page for memory use pattern

•Alert with VDI workload demand

•Analyze current and future workload in the Capacity Runaway tab for sufficient resources


Expert Solution
Questions # 26:

An administrator learns that some security settings in a cluster have been changed. The environment is out of compliance with required policies.

Which function should be used to revert any settings that have changed from the defaults and prevent further violations?

Options:

A.

Cluster Lockdown with strong password enforcement


B.

Advanced Intrusion Detection Environment (AIDE)


C.

Security Configuration Management Automation (SCMA)


D.

Defense Information Systems Agency STIG enforcement


Expert Solution
Questions # 27:

An administrator protected a DB VM running on a Nutanix cluster with NearSync Replication, which schedules to repeat every 15 minutes □ to a second site. The daily change rate is low. During nightly backups, the replication window is missed due to write volume.

Which two options describe the expected behavior? (Choose two.)

Options:

A.

NearSync stops working and fails over to the remote site.


B.

Protection Domain transitions back to the hourly schedule.


C.

The Administrator needs to re-enable it manually.


D.

The system continuously tries to get to the NearSync schedule.


Expert Solution
Questions # 28:

A VDI environment based on AHV Cluster is not performing well. The current environment is using only one bridge (Bridge0). The administrator needs to verify if nodes are using all network cards associated to Bridge0.

Which two menus should be used to check the current configuration? (Choose two.)

Options:

A.

Network Configuration item in Settings menu


B.

Host view in Network menu


C.

Host NICs tab in Hardware menu


D.

I/O Metrics tab in VM menu


Expert Solution
Questions # 29:

Microsegmentation was recently enabled in a Nutanix environment. The administrator wants to leverage Prism Central to create a policy that will block all traffic, regardless of direction, between two groups of VMs identified by their category.

Which policy should be used to meet this requirement?

Options:

A.

A Quarantine Policy


B.

An Isolation Environment Policy


C.

An Application Security Policy


D.

A Whitehst-Based Policy


Expert Solution
Questions # 30:

A customer needs a DR solution designed around the following requirements:

• There are 8 ms of latency between Sites A and B

• The administrator needs the shortest RPO/RTO possible

• Application consistent snapshots are required

• Use of Nutanix VSS

Which Data Protection Method should be used?

Options:

A.

Async


B.

Metro Availability


C.

Near Sync


D.

Cloud Connect


Expert Solution
Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions