Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Nutanix NCP-MCI NCP-MCI-7.5 Questions and answers with CertsForce

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

An administrator needs to install multiple Prism Central instances on a single Prism Element management cluster.

Which statement is valid?

Options:

A.

Installing multiple Prism Central instances on a single cluster isn ' t supported.


B.

Only one Prism Central instance can be registered to the Prism Element cluster.


C.

After deploying the first Prism Central, the other instances can be set up from the Marketplace.


D.

It is possible to register and unregister Prism Element with the same Prism Central multiple times from the GUI.


Expert Solution
Questions # 2:

An administrator needs to enable software data-at-rest encryption on a 2-node ROBO cluster. The organization requires that encryption keys are stored on-premises outside of the cluster. Which KMS type should the administrator configure?

Options:

A.

Native KMS (local)


B.

Native KMS (remote)


C.

Cloud KMS


D.

External KMS


Expert Solution
Questions # 3:

Refer to Exhibit:

Question # 3

After logging into Prism Central, an administrator observes that there are a large number of constrained VMs.

What does this indicate about those VMs?

Options:

A.

They are inactive and in a zombie state.


B.

They are lacking in sufficient resources.


C.

They are over-sized and wasting memory.


D.

They are consuming too much CPU.


Expert Solution
Questions # 4:

An administrator needs to adjust the settings of an existing virtual machine. Which parameter is restricted from modification once the VM has been created?

Options:

A.

BIOS mode


B.

vCPU count


C.

Boot priority


D.

Memory allocation


Expert Solution
Questions # 5:

An administrator has 16 hosts in a cluster, including four undersized older hosts that needs to be removed from the cluster. Unfortunately new servers will take more than six months to be procured.

What policy should be defined within Prism Central to prevent five mission critical VMs from ever running on the older hosts?

Options:

A.

VM-Host Affinity Policy


B.

VM-VM Anti-Affinity Policy


C.

VM-Host Anti-Affinity Policy


D.

VM-VM Affinity Policy


Expert Solution
Questions # 6:

An administrator detects suspicious outbound connections from a single VM that hosts a web tier component.

The incident response requirement is to immediately quarantine the VM so it cannot communicate with any other workload, but still allow connectivity from a designated forensic tooling group so investigators can collect evidence.

The organization uses categories for policy scope and wants a change that can be applied quickly during an incident without redesigning existing policies.

Which action best meets the requirement?

Options:

A.

Assign the VM to the built-in Quarantine category with the Forensic value so quarantine behavior blocks traffic except to and from forensic tools.


B.

Assign the VM to the built-in Quarantine category with the Strict value and separately create a shared service policy to allow forensic access.


C.

Create an application policy that only allows outbound traffic to forensic tools, leaving inbound traffic as allow all for faster investigation.


D.

Create an isolation environment policy between the VM and all other categories to block traffic and manually add exceptions for forensic tools.


Expert Solution
Questions # 7:

An administrator is trying to migrate a VM to a new container. The Migration of vDisks stalls.

What could be the cause of this?

Options:

A.

Insufficient storage space to create the source snapshot.


B.

Insufficient storage space in the target storage container.


C.

Insufficient storage space in the local storage container.


D.

Insufficient storage space to create the target snapshot.


Expert Solution
Questions # 8:

An administrator needs to ensure that if a host remains in a disconnected status for 40 seconds, VMs running on a host are automatically restarted.

What method should the administrator use to ensure root file system corruption has not occurred and that the root file system of a host isn ' t in a read-only state?

Options:

A.

Host-based reservation method


B.

Root file system corruption method


C.

Segment-based reservation method


D.

Scheduler-based reservation method


Expert Solution
Questions # 9:

A new naming-convention policy for storage containers requires VM placement to follow the updated naming rules. Which action can be performed to comply with the policy?

Options:

A.

Perform live vDisk migration.


B.

Configure a new storage policy.


C.

Implement an image placement policy.


D.

Rename storage containers.


Expert Solution
Questions # 10:

An administrator supports multiple AHV clusters under Prism Central and uses Intelligent Operations playbooks for remediation.

The organization recently standardized alert policies, but the alert policy names and IDs change between environments due to automated deployments and periodic updates.

The requirement is to trigger a remediation playbook for any alert that matches a defined performance pattern (for example, impact type and severity plus a keyword pattern), regardless of which specific alert policy generated it, while avoiding unrelated non-performance alerts.

Which playbook trigger best meets the requirement?

Options:

A.

Alerts Matching Criteria trigger - configured with the required alert filters so the playbook triggers for any alert meeting the criteria.


B.

Webhook trigger - configured so an external system calls the playbook endpoint only when performance incidents are detected.


C.

Alert trigger - configured to a single alert policy so the playbook triggers only when that specific policy generates an alert.


D.

Event trigger - configured for a single event type so the playbook triggers when that event type is generated for the selected entities.


Expert Solution
Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions