Free Nutanix Certified Professional-Multicloud Infrastructure (NCP-MCI) 6.5 Exam Exam Braindumps (page: 1)

Page 1 of 44

An administrator is setting up a Nutanix cluster and needs to configure the default VLAN.

Which configuration should the administrator choose?

  1. Vlan.0
  2. Vlan.1
  3. Vlan.2
  4. Vlan.7

Answer(s): B

Explanation:

Nutanix cluster is a group of Nutanix nodes that share data and resources across a network1. A VLAN is a virtual LAN that allows devices on different physical LANs to communicate as if they were on the same network by default, a virtual NIC (VM NIC) on a guest VM operates in access mode and can send and receive traffic only over its own specified VLAN. The default VLAN ID for access mode interfaces is 1.

Therefore, by choosing Vlan.1 as the default VLAN, you can simplify the network configuration and avoid potential issues with other VLAN IDs.



An administrator has been tasked with increasing security on Nutanix cluster by disabling password authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH.

What is the easiest way for the administrator to meet these needs?

  1. Configure LDAP authentication through a secure server,
  2. Enable STIES vie commend line on SSH to CVM.
  3. Enable Cluster Lockdown and provide an RSA key.
  4. Restrict access with User Management in Prism.

Answer(s): C

Explanation:

"An administrator has been tasked with increasing security on Nutanix cluster by disabling password authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH, What is the easiest way for the administrator to meet these needs? Enable Cluster Lockdown and provide an RSA key."

Cluster Lockdown mode disables password authentication when accessing the CVM and AHV hosts and instead requires key-based SSH. To enable Cluster Lockdown mode, you need to provide an RSA key.

Therefore, by enabling Cluster Lockdown mode and providing an RSA key, you can increase security on Nutanix cluster by disabling password authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH with minimal effort.


Reference:

https://next.nutanix.com/how-it-works-22/streamlined-login-and-increase-security-key-based-ssh- login-37397



A user is complaining about slowness of a mission-critical MSSQL Server. The administrator logs into Prism Element to investigate the VM performance and observes what is shown in the diagram.



Which action would best improve VM performance?

  1. Disable hyperthreading in the BIOS.
  2. Add additional RAM to the user VM.
  3. Add additional RAM to the host on which the VM is running.
  4. Ensure the host's CPUs ere not excessively overcommitted.

Answer(s): B

Explanation:

Prism Element is a graphical user interface that allows you to manage Nutanix clusters1. You can use Prism Element charts to understand Nutanix cluster workloads and troubleshoot performance related issues.
Memory optimized virtual machine sizes offer the best performance for SQL Server workloads on Azure VMs. Adding more RAM to the user VM can help reduce paging and improve query execution times.

SQL Server performance can be affected by disk latency and throughput. By creating separate virtual disks for data and logs, you can spread activity across multiple spindles and reduce disk contention.


Reference:

https://next.nutanix.com/how-it-works-22/differences-between-prism-element-prism-central-and- prism-pro-37137



Refer to exhibit:



Why has an anomaly been triggered?

  1. Controller reached 2500 IOPS.
  2. Observed IOPS exceed normal values.
  3. Normal Controller behavior has increased.
  4. Observed values do not match predicted values.

Answer(s): D

Explanation:

Nutanix anomaly detection is a feature that monitors seasonal trends for time-series data (e.g. CPU usage, memory usage, latency, etc.) and establishes a "band" of expected values based on historical data12. Only values that hit outside the "band" will trigger an event / alert1.

Nutanix leverages a method for determining the bands called `Generalized Extreme Studentized Deviate Test'. A simple way to think about this is similar to a confidence interval where the values are between the lower and upper limits established by the algorithm.

Another web source3 shows an example of how anomaly detection works in Nutanix Prism Central. In the video, you can see that when the observed value of a metric deviates significantly from the predicted value based on historical data, an anomaly event is triggered and displayed on a chart.

Therefore, by comparing the observed values with the predicted values based on historical data, Nutanix anomaly detection can identify abnormal behavior and alert you accordingly.



Page 1 of 44



Post your Comments and Discuss Nutanix Nutanix Certified Professional-Multicloud Infrastructure (NCP-MCI) 6.5 Exam exam with other Community members:

Blitz1 5/25/2024 6:08:56 AM
q66 should be A. user should first login to a workstation , change their pass and then login to PC.
ROMANIA
upvote

Blitz1 5/25/2024 3:29:04 AM
Q28 should be CD ( data drive and AOS) as per https://portal.nutanix.com/page/documents/kbs/details?targetId=kA00e000000LKMKCA4
ROMANIA
upvote

Blitz1 5/24/2024 12:31:21 PM
q21 should be D Isolating Backplane Traffic by using VLANs (Logical Segmentation) You can separate management traffic from storage replication (or backplane) traffic by creating a separate network segment (LAN) for storage replication. For more information about the types of traffic seen on the management plane and the backplane https://portal.nutanix.com/page/documents/details?targetId=Nutanix-Security-Guide-v6_8:wc-network-segmentation-intro-wc-c.html
ROMANIA
upvote

Blitz1 5/24/2024 11:32:52 AM
Q12 should be D. Prism Central applies storage policies to Categories. You need to tag the VMs and VGs in Categories. You might also attach VGs to VMs. When you apply different storage policies through different categories to a VG and VM tagged to each other, the storage policies are applied independently. The storage policy applied to the tagged VG does not affect the tagged VM and vice versa. https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-vpc_2024_1:mul-cluster-storage-policy-pc-c.html
ROMANIA
upvote

Anonymous 2/16/2024 3:56:31 AM
Q6 should be A https://portal.nutanix.com/page/documents/kbs/details?targetId=kA00e000000LUKeCAO#:~:text=Dedup%20and%20EC%20are%20not%20supported%20for%20RF1,RF1%20container%20does%20not%20support%20increasing%20replication%20factor.
QATAR
upvote

Agathenta 12/16/2023 1:36:00 PM
q35 should be a
Anonymous
upvote

Erineo 11/2/2023 5:34:00 PM
q14 is b&c to reduce you will switch off mail for every single alert and you will switch on daily digest to get a mail once per day, you might even skip the empty digest mail but i see this as a part of the daily digest adjustment
Anonymous
upvote

Andrus 12/17/2023 12:09:00 PM
q52 should be d. vm storage controller bandwidth represents the amount of data (in terms of bandwidth) that a vms storage controller is using to read and write data to the storage fabric.
Anonymous
upvote

Andrus 12/17/2023 12:09:49 PM
Q52 should be D. VM Storage Controller Bandwidth represents the amount of data (in terms of bandwidth) that a VM's storage controller is using to read and write data to the storage fabric.
Anonymous
upvote

Agathenta 12/16/2023 1:36:17 PM
Q35 Should be A
Anonymous
upvote

Ezekiel 12/16/2023 5:32:06 AM
Question 27 should be C. Images are often associated with categories, and the clusters need to be added to the correct category to access those images.
Anonymous
upvote

Erineo 11/2/2023 6:32:25 PM
Q 28 is C&D explained in https://portal.nutanix.com/page/documents/kbs/details?targetId=kA00e000000LKMKCA4
Anonymous
upvote

Erineo 11/2/2023 5:34:46 PM
Q14 is B&C To reduce you will switch off mail for every single alert and you will switch on daily digest to get a mail once per day, you might even skip the empty digest mail but I see this as a part of the daily digest adjustment
Anonymous
upvote

Erineo 11/2/2023 4:25:06 PM
Q80, correct answer is A Nutanix AHV assigns an IP address from the address pool when it creates a managed VM NIC; the address releases back to the pool when the VM NIC or VM is deleted. With a managed network, AHV intercepts DHCP requests from guest VMs and bypasses traditional network-based DHCP servers. AHV uses the last network IP address in the assigned network for the managed network DHCP server unless you select Override DHCP server when you create the network.
Anonymous
upvote