Download as pdf or txt
Download as pdf or txt
You are on page 1of 115

Nutanix

NCP-MCI-6.5

Nutanix Certified
Professional -
Multicloud
Infrastructure
(NCP-MCI) v6.5 exam
Version: 4.1

[ Total Questions: 171]

Web: www.dumpscafe.com

Email: support@dumpscafe.com
IMPORTANT NOTICE
Feedback
We have developed quality product and state-of-art service to ensure our customers interest. If you have any
suggestions, please feel free to contact us at feedback@dumpscafe.com

Support
If you have any questions about our product, please provide the following items:

exam code
screenshot of the question
login id/email

please contact us at support@dumpscafe.com and our technical experts will provide support within 24 hours.

Copyright
The product of each order has its own encryption code, so you should use it independently. Any unauthorized
changes will inflict legal punishment. We reserve the right of final explanation for this statement.
Pass Exam Nutanix - NCP-MCI-6.5

Question #:1

When a VM is connected to a Nutanix managed network, when is the IP addressed assigned?

A. When the vNIC is created on the VM.

B. When the VM is powered on.

C. When the guest OS sends a DHCP request.

D. When the guest OS receives a DHCP acknowledge.

Answer: B

Explanation
When a VM is connected to a Nutanix managed network, the IP address is assigned when the VM is powered
on. A Nutanix managed network is a network that is created and managed by Prism Central using IP address
management (IPAM). IPAM allows Prism Central to automatically assign IP addresses to VMs from a pool of
available addresses in a subnet. IPAM also tracks the IP address usage and availability across clusters and
networks4.

When a VM is connected to a Nutanix managed network, the administrator can choose one of the following
assignment types for the IP address:

Assign Static IP: This option allows the administrator to manually specify a static IP address for the VM
from the subnet range. The IP address will not change unless the administrator changes it.

Assign with DHCP: This option allows Prism Central to dynamically assign an IP address for the VM
from the subnet range using DHCP. The IP address may change depending on the DHCP lease time and
availability.

No Private IP: This option allows the administrator to skip assigning an IP address for the VM. This
option is useful for scenarios where the administrator wants to use an external IPAM solution or assign
an IP address later5.

Regardless of the assignment type, the IP address is assigned when the VM is powered on. This is because
Prism Central needs to communicate with the hypervisor (AHV or ESXi) to configure the virtual NIC (vNIC)
of the VM with the IP address information. This communication can only happen when the VM is in a
powered on state6.

References: 4: IP Address Management - Prism Central Guide 5: Creating a New Report - Prism Central
Guide 6: IP Address Assignment - AHV Networking Guide

Question #:2

An administrator migrates a VM onto a new Nutanix cluster- After the migration, the administrator observes
the following conditions:

Verified Solution - 100% Result 1 of 112


Pass Exam Nutanix - NCP-MCI-6.5

• Cluster memory utilization: 64%

• Cluster CPU utilization: 19%

• Cluster storage utilization. 32%

• Average VM CPU utilization: 25%

• Average VM CPU ready%: 24%

• Average VM memory utilization: 60%

Which two changes should the administrator make to improve VM performance? (Choose two.)

A. Reduce the number of vCPUs assigned to VMs.

B. Add more memory to the VMs.

C. Reduce the number of VMs on the hosts.

D. Replace high core count CPUs with high clock rate CPUs.

Answer: A C

Explanation
According to the CPU (%) - VMware Docs web search result2, one of the possible causes of high CPU ready
% is over-provisioning vCPUs for a VM or having too many VMs on a host. CPU ready % indicates the
percentage of time that the VM was ready, but could not get scheduled to run on the physical CPU. High CPU
ready % can lead to VM performance problems, such as slow response time or application latency. To improve
VM performance, the administrator should reduce the number of vCPUs assigned to VMs or reduce the
number of VMs on the hosts, so that there is less contention for CPU resources.

Question #:3

Refer to Exhibit.

Verified Solution - 100% Result 2 of 112


Pass Exam Nutanix - NCP-MCI-6.5

An administrator increases the cluster RF to 3. The containers are not modified.

What will the new values in the data resiliency dashboard be for FAILURES TOLERABLE for the Zookeeper
and Extent Groups components?

A. Zookeeper = 1 and Extent Groups = 1

B. Zookeeper = 2 and Extent Groups = 2

C. Zookeeper = 2 and Extent Groups = 1

D. Zookeeper = 1 and Extent Groups = 2

Answer: C

Explanation
According to the web search results, the cluster redundancy factor (RF) determines how many copies of the
cluster metadata and configuration data are stored on different nodes. By default, the cluster RF is 2, which
means that there are three copies of the Zookeeper and Cassandra data on the cluster. If the cluster RF is
increased to 3, then there will be five copies of the Zookeeper and Cassandra data on the cluster12. This means
that the Zookeeper component can tolerate two failures, as it can still operate with a quorum of three nodes out
of five3.

However, the container replication factor (RF) determines how many copies of the VM data and oplog are
stored on different nodes. The container RF can be set independently for each container, and it can be different
from the cluster RF. For example, a container can have RF 2 even if the cluster has RF 34. In this case, the
container will only have two copies of the VM data and oplog on the cluster, regardless of the cluster RF. This
means that the Extent Groups component can only tolerate one failure, as it needs at least one copy of the VM
data and oplog to be available5.

Verified Solution - 100% Result 3 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Therefore, if the administrator increases the cluster RF to 3, but does not modify the containers, then the new
values in the data resiliency dashboard will be Zookeeper = 2 and Extent Groups = 1.

Question #:4

Refer to the exhibit.

The Linux Admin role has been created to manage only Linux VMs in the environment. However, the Admin1
user does not have access to all Linux VMs.

What step should be taken to grant the proper access?

A. Add the hosts to the entities KM for the role.

B. Grant the admin1 user the viewer role (or the cluster.

C. Add the role to the Linux images.

D. Add the proper category to each Linux VM.

Answer: D

Explanation
According to the Nutanix Prism Central Guide, role-based access control (RBAC) in Prism Central allows you
to create custom roles and assign them to users or groups based on the categories of the entities they need to
manage1. Categories are key-value pairs that you can assign to entities such as VMs, hosts, clusters, images,
etc. to group them logically2. For example, you can create a category key called “OS” and assign values such
as “Linux” or “Windows” to different VMs based on their operating system.

In the exhibit, the Linux Admin role has been created with the following settings:

The role has the “VM Admin” permission, which allows the user to perform all actions on VMs3.

The role has been assigned to the admin1 user.

The role has been scoped to the entities that have the category key “OS” and the value “Linux”.

However, the admin1 user does not have access to all Linux VMs in the environment. This means that some of

Verified Solution - 100% Result 4 of 112


Pass Exam Nutanix - NCP-MCI-6.5

the Linux VMs do not have the proper category assigned to them. To grant the proper access, the administrator
should add the category key “OS” and the value “Linux” to each Linux VM that needs to be managed by the
Linux Admin role. This can be done either individually or in bulk through Prism Central4. Once the categories
are added, the admin1 user will be able to see and manage all Linux VMs in the environment.

Question #:5

The Stargate service becomes unavailable on a single CVM on an AHV node. What is used to maintain I/O
operations in the cluster?

A. Route injection

B. iSCSl redirector

C. Hypervisor HA

D. ha.py

Answer: A

Explanation
According to the Nutanix Support & Insights web search result1, route injection is used to maintain I/O
operations in the cluster when the Stargate service becomes unavailable on a single CVM on an AHV node.
Route injection is a mechanism that allows the CVMs to communicate with each other and redirect the I/O
requests to another healthy CVM in the cluster. Route injection uses the Linux kernel routing table to add or
delete routes dynamically, based on the availability of the Stargate service on each CVM.

Question #:6

An administrator manages a cluster and notices several failed components shown in the exhibit.

What two options does the administrator have to run all NCC checks manually? (Choose two.)

A. Using the Actions drop-down menu in the Health dashboard of Prism Element.

B.

Verified Solution - 100% Result 5 of 112


Pass Exam Nutanix - NCP-MCI-6.5

B. Running ncc health_checks run-alll on the CVM

C. Using the action action drop-down menu in the Health dashboard of Prism Central

D. Running noc health_checks run_all on the PC VM

Answer: A B

Explanation
Prism Element and NCC are two ways to run all NCC checks manually on a Nutanix cluster. Prism Element is
the web console that provides management and monitoring capabilities for a single Nutanix cluster. Prism
Element has a Health dashboard that shows the status of various components and services in the cluster, such
as disks, nodes, CVMs, NCC, and alerts. The Health dashboard also allows the administrator to run NCC
checks manually by using the Actions drop-down menu on the right side of the screen. The administrator can
choose to run all NCC checks or specific checks based on the category or severity. The NCC checks will run
in the background and generate a report that can be viewed or downloaded from the Summary tab. This
method is easier and faster than running NCC from the command line on the CVM.

NCC stands for Nutanix Cluster Check, which is a framework of scripts that performs system checks and
validations on Nutanix clusters. NCC can detect issues related to hardware, software, configuration,
hypervisor, networking, and more. NCC can be run from the command line interface (CLI) of any CVM in the
cluster by using the ncc command. To run all NCC checks manually, the administrator can use the command
ncc health_checks run_all, which will execute all available checks and display the results on the screen. This
method is more comprehensive and detailed than running NCC from Prism Element.

References: : [Health Dashboard - Prism Element Guide] : [Nutanix Cluster Check (NCC) - Nutanix Support
& Insights] : [Running NCC Checks - Nutanix Support & Insights]

Question #:7

Refer to Exhibit:

Verified Solution - 100% Result 6 of 112


Pass Exam Nutanix - NCP-MCI-6.5

An administrator needs to enable inline deduplication for a pre-existing storage container. When trying to
enable deduplication on the storage container. this feature is grayed-out.

What is the reason for this behavior?

A. Replication Factor 1 is configured on the storage container.

B. The cluster has less than 5 nodes which is the minimum node-count to enable deduplication.

C. Capacity reservation is not enabled on the storage container.

D. The cluster has hybrid storage and deduplication is supported only on all-flash clusters.

Answer: D

Explanation
Nutanix supports two types of deduplication: post-process and inline. Post-process deduplication runs
periodically on a schedule and can be enabled on any cluster. Inline deduplication runs in real time before data
is written to disk and can be enabled only on all-flash clusters.

Therefore, by checking the type of storage and the type of deduplication, you can determine if you can enable
inline deduplication on a storage container or not.

Verified Solution - 100% Result 7 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Nutanix inline deduplication is a feature that reduces the stored size and avoids duplicate data on a storage
container1. It is recommended only on some specific scenarios, such as when using Nutanix Files or virtual
desktop infrastructure (VDI) workloads12.

Question #:8

An administrator needs to limit the amount of storage space that data stored in single container can consume.

Which action should the administrator take?

A. Enable reservation for rebuild capacity

B. Set an advertised capacity for the container

C. Store VM snapshots in a different container

D. Thick prevision the container

Answer: B

Explanation
The best way for the administrator to limit the amount of storage space that data stored in a single container
can consume is to set an advertised capacity for the container. This will ensure that the data stored in the
container doesn't exceed the set limit, and it will also help prevent any potential performance issues due to
resource contention. Additionally, the administrator should consider thick provisioning the container, which
will pre-allocate the amount of storage space that can be used by the container. This will help ensure that the
data stored in the container doesn't exceed the advertised capacity.

Question #:9

Which change can be made on a cluster with software-based Data-at-Rest Encryption enabled?

A. Disable encryption on the cluster

B. Deploy an additional Native KMS Server

C. Enable encryption for a VM

D. Change Native KMS to External KMS

Answer: D

Question #:10

An administrator would like to leverage the Reliable Event Logging Protocol (RELP) with their Remote
Syslog Server. After completing the configuration, it is observed that RELP logging is not working as

Verified Solution - 100% Result 8 of 112


Pass Exam Nutanix - NCP-MCI-6.5

expected.

What is the likely cause of this issue?

A. The cluster does not have RELP installed.

B. The GENESIS was the only one chosen to forward log information.

C. The Remote Syslog Server was configure using TCP as the protocol.

D. The remote server does not have rsyslog-relp installed.

Answer: D

Explanation
According to the Red Hat Customer Portal, to use RELP with Rsyslog, you need to install the rsyslog-relp
package on both the server and the client. If the remote server does not have rsyslog-relp installed, RELP
logging will not work as expected.

Question #:11

Administrator is creating a Windows 10 VM that will be used for a virtual desktop template. After creating the
VM and booting to the ISO, the administrator is unable to install Windows and receives the following error.

What steps does the administrator need to take to install the OS?

A. Load the Nutanix VirtIO Serial Bus Driver.

B. Load the VirtIO Network Ethernet Adaper.

C. Load the Nutanix Virtual Balloon Driver.

D. Load the Virtual SCSI pass-through controller.

Answer: D

Explanation
Answer: D. Load the Virtual SCSI pass-through controller.

The error message shown in the image indicates that Windows 10 setup cannot find any drives to install the
OS. This is because the Nutanix AHV hypervisor uses a virtual SCSI pass-through controller to present disks
to the VMs, and Windows 10 does not have a built-in driver for this device. Therefore, the administrator needs
to load the Nutanix VirtIO driver for the virtual SCSI pass-through controller during the OS installation
process. The Nutanix VirtIO driver package contains various drivers that are specifically used by Windows
VMs hosted in the Nutanix environment to enhance their stability and performance1. The administrator can

Verified Solution - 100% Result 9 of 112


Pass Exam Nutanix - NCP-MCI-6.5

download the latest Nutanix VirtIO driver package from the VirtIO downloads page of the Nutanix support
portal. The administrator can then follow these steps to load the driver and install the OS2:

On the Windows 10 setup screen, click Load driver.

Insert a USB drive or mount an ISO image that contains the Nutanix VirtIO driver package.

Browse to the location of the driver package and select the folder that matches the OS architecture
(32-bit or 64-bit).

Select the vioscsi.inf file and click Next.

Wait for the driver to load and then click Refresh.

Select the disk where you want to install Windows 10 and click Next.

References: 1: VirtIO Driver Versions for Windows 2: Installing Windows on AHV

Question #:12

An administrator is setting up a Nutanix cluster and needs to configure the default VLAN.

Which configuration should the administrator choose?

A. Vlan.0

B. Vlan.1

C. Vlan.2

D. Vlan.7

Answer: B

Explanation
Nutanix cluster is a group of Nutanix nodes that share data and resources across a network1. A VLAN is a
virtual LAN that allows devices on different physical LANs to communicate as if they were on the same
network2.

by default, a virtual NIC (VM NIC) on a guest VM operates in access mode and can send and receive traffic
only over its own specified VLAN. The default VLAN ID for access mode interfaces is 1.

Therefore, by choosing Vlan.1 as the default VLAN, you can simplify the network configuration and avoid
potential issues with other VLAN IDs.

Question #:13

An administrator wants to replace and old node with a node of newer generation in a 3-node cluster. The

Verified Solution - 100% Result 10 of 112


Pass Exam Nutanix - NCP-MCI-6.5

administrator has already chosen the appropriate node. But unable to remove it from the cluster.

Why is the Remove Host option not shown in the exhibit?

A. The host needs to be placed into maintenance Mode before.

B. It is only possible to remove a host from a cluster using CLI.

C. It is not possible to remove a node from a the cluster using Prism Central

D. It is not possible to remove a host from a 3-node cluster.

Answer: D

Explanation
A Nutanix cluster requires a minimum of three nodes to maintain quorum and data availability. Removing a
node from a 3-node cluster would violate the redundancy factor and cause data loss. Therefore, it is not
possible to remove a host from a 3-node cluster using Prism or CLI. The only way to replace a node in a
3-node cluster is to use the Foundation tool, which will erase the existing cluster configuration and create a
new cluster with the new node1.

Question #:14

Which Nutanix service control ncli, the HTML5 UI, and Rest API?

A. Prism

B. Cassandra

C. Zookeeper

D. Chronos

Answer: A

Explanation
Prism is the central service control used by Nutanix to manage the clusters. It provides a unified view of the
entire system, and it is used to control the HTML5 UI, the nCLI, and the REST API. Prism is used to manage
the resources of the system, such as the nodes, storage, and networks, as well as to monitor the performance of
the system and the applications running on it.

https://www.nutanixbible.com/2f-book-of-basics-cluster-components.html

PrismKey Role: UI and API

· Prism is the management gateway for components and administrators to configure and monitor the Nutanix
cluster. This includes Ncli, the HTML5 UI, and REST API.

· Prism runs on every node in the cluster and uses an elected leader like all components in the cluster. All

Verified Solution - 100% Result 11 of 112


Pass Exam Nutanix - NCP-MCI-6.5

requests are forwarded to the leader using Linux Iptables. This allows access to PRISM using any CVM Ip
address.

· Prism communicates with Zeus for cluster configuration data and Cassandra for statistics to present to the
user. It also communicates with the ESXi hosts for VM status and related information

These are only some of the essential services that make up the CVM functionality. For more information on all
the services and various Nutanix Cluster components, refer to the portal documentation.

Question #:15

Async DR is configured between two sites. A network outage occurs at the primary site.

Which steps must the administrator perform to bring the VMs back into service at the backup site?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the
item requirements. Not all procedures are valid. Identify any invalid procedures using the drop-down option.

Verified Solution - 100% Result 12 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Verified Solution - 100% Result 13 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Answer:

Question #:16

Where should an administrator unregister Prism Element from Prism Central?

A. From a Host SSH session

B. From the Prism Central web console

C. From the Prism Element web console

D. From a CVM SSH session

Answer: A

Verified Solution - 100% Result 14 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Explanation
This is because there is no GUI method to unregister a cluster from Prism Central, so the process requires SSH
access to the PC VM as well as to a CVM of the cluster2. The unregistration process involves getting the
UUID of the cluster from the CVM and then using that to trigger de-registration from PC command line2. The
unregistration process also involves cleaning up any associated metadata and configuration on both PC and
PE2. Therefore, the administrator needs to use a Host SSH session to perform this task.

Question #:17

In which two scenarios is Native Key Management Server supported? (Choose two)

A. XenServer and AHV mixed cluster.

B. Hyper-V and AHV mixed cluster.

C. KVM and AHV mixed cluster.

D. ESXi and AHV mixed cluster.

Answer: B D

Question #:18

Refer to exhibit:

Verified Solution - 100% Result 15 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Why has an anomaly been triggered?

A. Controller reached 2500 IOPS.

B. Observed IOPS exceed normal values.

C. Normal Controller behavior has increased.

D. Observed values do not match predicted values.

Answer: D

Explanation
Nutanix anomaly detection is a feature that monitors seasonal trends for time-series data (e.g. CPU usage,
memory usage, latency, etc.) and establishes a “band” of expected values based on historical data12. Only
values that hit outside the “band” will trigger an event / alert1.

Nutanix leverages a method for determining the bands called ‘Generalized Extreme Studentized Deviate Test’.
A simple way to think about this is similar to a confidence interval where the values are between the lower and
upper limits established by the algorithm.

Another web source3 shows an example of how anomaly detection works in Nutanix Prism Central. In the
video, you can see that when the observed value of a metric deviates significantly from the predicted value
based on historical data, an anomaly event is triggered and displayed on a chart.

Verified Solution - 100% Result 16 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Therefore, by comparing the observed values with the predicted values based on historical data, Nutanix
anomaly detection can identify abnormal behavior and alert you accordingly.

Question #:19

An administrator needs to periodically send information about cluster efficiency via email to a set of users.

What should be configured to accomplish this task?

A. Configure Efficiency widget in Prism Central.

B. Create a new' prism Central project.

C. update Capacity Configurations in Prism Central.

D. Add a schedule to Prism Central reports.

Answer: D

Explanation
To periodically send information about cluster efficiency via email to a set of users, the administrator can
follow these steps:

Create a report in Prism Central that contains the relevant information about cluster efficiency.

Add a schedule to the report to generate and send the report via email to the set of users at a specified
frequency.

This will ensure that the users receive regular updates about the cluster efficiency without the need for manual
intervention.

Question #:20

An administrator is not able to log into Prism Central by using a new Active Directory user account. After
Logging with the local user, the administrator verified that Directory Services and Role Mapping setting are
valid.

What is the most likely cause of this issue?

A. Change password at next logon attribute is set.

B. User does not belong to the Administrators group.

C. Active Directory functional level of wrong.

D. Prism Element authentication is not configured.

Verified Solution - 100% Result 17 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Answer: A

Explanation
The change password at next logon attribute is a setting that forces a user to change their password when they
log on to a domain for the first time or after their password has expired. This attribute is enabled by default for
new Active Directory user accounts or when an administrator resets a user’s password4.

However, Prism Central does not support this attribute for Active Directory authentication. Users with this
attribute enabled will not be able to log on to Prism Central using their Active Directory credentials. They will
receive an error message saying “Invalid credentials” or “Authentication failed” when they try to log on5.

Therefore, if an administrator is not able to log on to Prism Central using a new Active Directory user account,
the most likely cause of this issue is that the change password at next logon attribute is set for that user
account. To resolve this issue, the administrator should disable this attribute for the user account or log on to a
domain workstation first and change their password before accessing Prism Central6.

Question #:21

How many SSL certificates are used by Prism Element on a Nutanix cluster?

A. 1

B. 5

C. 256

D. 2048

Answer: A

Explanation
According to the Nutanix Prism Element Guide, Prism Element uses a single SSL certificate on a Nutanix
cluster. The certificate is used to secure the communication between the web browser and the Prism web
console. The certificate is also used to authenticate the cluster to external services, such as Active Directory,
SMTP, and SNMP. The certificate can be either self-signed or signed by a trusted certificate authority (CA).
The certificate can be replaced or renewed through the Prism web console or the ncli command-line interface.

Question #:22

An administrator wants to have a VM on an AHV cluster with access to multiple VLANs. What is the most
efficient way to achieve this?

A. Update a vNIC on the VM to operate in trunked mode for all desired VLANs.

B. Create a network in AHV associated with all those VLANs on all hosts.

C. Use SFPs that allow the needed VLANs.

D. Use one vNIC per VLAN for the VM.

Verified Solution - 100% Result 18 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Answer: A

Explanation
According to the Nutanix Support & Insights web search result2, VM NICs on AHV can operate in two
modes: Access and Trunked. Access NICs are the default, and allow one VLAN on the NIC. Trunked NICs
allow multiple VLANs on a single NIC for VMs that are VLAN aware. If you must use trunked NICs, follow
the steps described in the web search result2. Therefore, the most efficient way to have a VM on an AHV
cluster with access to multiple VLANs is to update a vNIC on the VM to operate in trunked mode for all
desired VLANs.

Question #:23

An administrator is adding a node with a higher AOS release to an existing cluster.

What is the most efficient action an administrator should take to ensure it is in a supported state?

A. Destroy cluster and foundation with the new node in place

B. Add the node to the cluster and leave the existing AOS version in place

C. Perform standalone reimage of the new node and then add to cluster

D. Add the node to the cluster and reboot all running VMs to use new release

Answer: C

Explanation
According to the web search results, the most efficient action an administrator should take to ensure a
supported state when adding a node with a higher AOS release to an existing cluster is to perform a standalone
reimage of the new node and then add it to the cluster1. This way, the new node will have the same AOS
version as the existing nodes, and there will be no compatibility issues or downtime. Therefore, option C is
correct, while options A, B, and D are not.

Question #:24

An administrator wants to ensure that data in a container is stored in the most space efficient manner as
quickly as possible after being written,

Which space efficiency too meets this requirement?

A. Inline Compression

B. Thin Provisioning

C. Cache Deduplication

D. Erasure Coding

Verified Solution - 100% Result 19 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Answer: A

Explanation
inline compression is a technique that compresses all incoming write I/O operations over 4 KB inline in the
persistent write buffer (oplog)23. This approach enables you to use oplog capacity more efficiently and helps
drive sustained performance2. From AOS 5.18 onward, inline compression (compression delay=0) is enabled
by default for all new containers24.

https://portal.nutanix.com/page/documents/solutions/details?targetId=TN-2032-Data-Efficiency:TN-2032-Data-Efficien

Question #:25

An administrator needs to create a new Linux image and will to do the following as part of the VM
deployment:

* Set the OS hostname

* Add custom users

* Add keys

* Run custom scripts

What package needs to be installed in the Linux image to facilitate this automation?

A. CloudInit

B. Sysprep

Answer: A

Explanation
CloudInit is a package that contains utilities for early initialization of cloud instances. It allows you to
customize virtual machines provided by a cloud vendor by modifying the generic OS configuration on
boot. You can use CloudInit to set the OS hostname, add custom users, add keys, run custom scripts, and
more2. CloudInit is supported by most major Linux and FreeBSD operating systems and works across
different cloud platforms3. Sysprep is a tool for Windows operating systems that prepares an installation for
cloning, auditing, and customer delivery4.

References: 1: Replacing Nodes in Nutanix Cluster - Nutanix Support & Insights 2: Customize a Linux VM
with cloud-init in Azure - Azure Virtual Machines 3: Cloud-Init - The standard for customising cloud
instances 4: Sysprep (Generalize) a Windows installation

Question #:26

Refer to Exhibit:

Verified Solution - 100% Result 20 of 112


Pass Exam Nutanix - NCP-MCI-6.5

An administrator is trying to create a custom alert policy for all VMs.

Why is the Alert warning if field greyed cut?

A. The Alert critical if threshold is set.

B. The Behavioral Anomaly threshold is set.

C. The Enable Policy option checked.

D. The Auto resolve alerts option is checked.

Answer: B

Explanation
when you create a custom alert policy, you can choose between two types of thresholds: Static Threshold and
Behavioral Anomaly. Static Threshold allows you to set a fixed value for the metric that triggers the alert.
Behavioral Anomaly allows you to use machine learning to detect abnormal behavior based on historical data.

If you select Behavioral Anomaly as the threshold type, you cannot set a warning level for the alert. You can
only set a critical level that indicates how much deviation from normal behavior is considered an anomaly 3.
Therefore, the Alert warning if field is greyed out when you select Behavioral Anomaly.

Verified Solution - 100% Result 21 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Question #:27

What is the function of the virbr0 bridge on AHV?

A. To carry all traffic between the user VMs and the upstream network.

B. To carry management and storage communication between user VMs and the CVM.

C. To carry management and storage communication between user VMs and AHV host.

D. To carry storage communication between the guest VMs and the CVM

Answer: C

Explanation
http://www.vstellar.com/2019/01/10/ahv-networking-part-1
-basics/#:~:text=AHV%20Network%20Architecture&text=virbr0%20is%20an%20internal%20switch,virbr0)%20have%

Question #:28

An Administrator has been asked to deploy VMs using a specific image. The image has been configured with
settings and applications that will be used by engineering to develop a new product by the company.

The image is not available on the desired cluster, but it is available in other cluster associated with Prism
Central.

Why isno’t the image available?

A. The image bandwidth policy has prevented the image upload.

B. The cluster should be removed from all categories.

C. The cluster has not been added to the correct category

D. The image placement policy was configured with enforcement.

Answer: D

Explanation
When a placement policy is enforced, images are only allowed to be deployed on clusters that are part of
categories that are associated with the policy. If the desired cluster is not associated with the policy, then the
image will not be available for deployment.

https://next.nutanix.com/how-it-works-22/image-management-for-ahv-clusters-and-dealing-with-the-inactive-image-37

Verified Solution - 100% Result 22 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Question #:29

An administrator is tasked with configuring networking on an AHV cluster and needs to optimize for
maximum single VM throughput.

Which bond mode should the administrator select?

A. Active-Active with Mac pinning

B. Active-Active

C. Active-Backup

D. No Uplink Bond

Answer: B

Explanation
Active-Active is a bond mode that allows all uplinks in the bond to be used simultaneously for traffic
transmission and reception. This bond mode provides load balancing and increased bandwidth for the AHV
host and its VMs. Active-Active bond mode uses a hashing algorithm based on source MAC addresses to
distribute traffic across different uplinks in the bond. Each individual VM NIC uses only a single bond
member interface at a time, but multiple VM NICs are spread across different bond member interfaces. As a
result, it is possible for a Nutanix AHV node with two 10 Gb interfaces to use up to 20 Gbps of network
throughput, while individual VMs have a maximum throughput of 10 Gbps6.

Therefore, if an administrator needs to optimize for maximum single VM throughput, they should select
Active-Active bond mode for their AHV cluster. This bond mode can be configured using Prism Element UI
or manage-ovs commands on each AHV host7. No additional configuration is required on the upstream switch
side, as long as the switches are interconnected physically or virtually and both uplinks trunk the same
VLANs8.

Question #:30

Which best practice should be followed when creating a bond in a Nutanix cluster?

A. Place NICs of different speeds within the same bond

B. Configure the bond to use LACP

C. Only utilize NICs of the same speed within the same bond

D. Use the default bond configuration after installation

Answer: A

Question #:31

Verified Solution - 100% Result 23 of 112


Pass Exam Nutanix - NCP-MCI-6.5

An administrator needs to boot a VM to a bootable CD. The administrator tries to configure the VM to boot to
it, select to add disk, and goes to the images available. The image for the bootable CD is unavailable.

What is the Likely issue?

A. The CD-ROM interface is too slow.

B. The administrator selected a disk attached before it can boot to a CD.

C. The VM needs to have a standard disk attached before it can boot to a CD.

D. The bootable CD image is corrupted during creation.

Answer: B
Question #:32

A Nutanix cluster is equipped with four nodes. Four VMs on this cluster have been configured with a VM-VM
anti-affinity policy and are each being hosted by a different node.

What occurs to the cluster and these VMs during an AHV upgrade?

A. One node hosts two VMs while the node being upgraded is in maintenance mode.

B. One VM out of the four powers down when the node hosting it reboots.

C. The AHV pre-upgrade checks fail until the administrator disables the anti-affinity policy.

D. The AHV pre-upgrade checks fail until the four VMs are powered off.

Answer: A

Explanation
One node hosts two VMs while the node being upgraded is in maintenance mode. This is because Nutanix
supports a feature called Rolling Upgrade that allows upgrading AHV on a cluster without any downtime or
impact to the VMs. The Rolling Upgrade feature performs the upgrade one node at a time, by putting the node
in maintenance mode, evacuating the VMs to other nodes, upgrading AHV, and then bringing the node back
online. The VM-VM anti-affinity policy ensures that the four VMs are not placed on the same node during the
evacuation process, so one node will host two VMs temporarily while the other node is being upgraded.

Question #:33

After configuring modules for a Remote Syslog Server, the settings are as shown. The administrator notices
that even though the level parameter is set to EMERGENCY, that all monitor logs are being sent.

What is the likely cause of this issue?

A. A second rsyslog server is configured to send all monitor logs.

B. Having the Module Name set to STARGATE sends all monitor logs regardless of the level.

C.

Verified Solution - 100% Result 24 of 112


Pass Exam Nutanix - NCP-MCI-6.5

C. A Log Level of EMERGENCY includes all monitor logs.

D. The true setting for Include Monitor Logs sends all monitor logs regardless of the level.

Answer: D

Explanation
This means that the rsyslog server is configured to include all monitor logs in addition to the messages with
EMERGENCY level.

It has a level parameter that specifies the severity of messages to be logged2. The level parameter can have
one of eight values: EMERG (emergency), ALERT, CRIT (critical), ERR (error), WARNING, NOTICE,
INFO (informational), and DEBUG2.

Question #:34

Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness?

A. Continuous Data Protection

B. Copy-on-Write

C. Split-mirror

D. Redirect-On-Write

Answer: B

Explanation
According to the Dell Unity: Data Reduction Technical White Paper1, snapshots and clones on Dell Unity use
the Copy-on-Write (CoW) algorithm to maximize efficiency and effectiveness. CoW is a technique that defers
the copying of data until it is modified. This means that snapshots and clones only consume space when
changes are made to the source or the clone, respectively. CoW also preserves the original data in case of a
rollback or recovery operation.

Question #:35

An administrator wants to reduce the largest amount of alert emails received from Prism Central.

Which two settings should the administrator customize to meet this requirement? (Choose two)

A. Skip empty digest email

B. Every Single Alert

C. Dally Digest

D. Email Recipients

Verified Solution - 100% Result 25 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Answer: C D

Explanation
According to the Nutanix Support & Insights website1, you can configure alert emails through Prism Central
by enabling or disabling customer email notification for each alert. You can also modify or create custom alert
policies for different entities and clusters23.

Question #:36

An administrator needs to run a mixed Exchange and SQL workload with a guaranteed amount of container

space for each application.

How should the administrator meet this requirement?

A. Create one container and set capacity reservation

B. Create two containers and reserve space for containers

C. Create one container and enable compression

D. Create two containers and reserve space for vDisks

Answer: D

Question #:37

Which three cluster operations require an administrator to reclaim licenses?(Choose three)

A. Destroy a cluster.

B. Upgrade a cluster

C. Migrate a cluster

D. Remove a Node from a cluster

E. Move Nodes between clusters.

Answer: A D E

Explanation
https://portal.nutanix.com/page/documents/details/?targetId=Web_Console_Guide-Prism_v4_7:lic_licensing_managing

Reclaiming Licenses (Including License Renewal)

Verified Solution - 100% Result 26 of 112


Pass Exam Nutanix - NCP-MCI-6.5

You can reclaim and optionally re-apply licenses for nodes in your clusters:

You must reclaim licenses when you plan to destroy a cluster. First reclaim the licenses, then destroy the
cluster. You do not need to reclaim Starter licenses. These licenses are automatically applied whenever
you create a cluster, including after you have destroyed a cluster.

Return licenses to your inventory when you remove one or more nodes from a cluster. Also, if you move
nodes from one cluster to another, first reclaim the licenses, move the nodes, then re-apply the licenses.

You can reclaim licenses for nodes in your clusters in cases where you want to make modifications or
downgrade licenses. For example, applying an Ultimate license to all nodes in a cluster where some
nodes are currently licensed as Pro and some nodes are licensed as Ultimate. You might also want to
transition nodes from Ultimate to Pro licensing.

You must reclaim licenses when you renew licenses. First reclaim the expired licenses, then apply new
licenses.

Question #:38

Which two private key types are supported by the Nutanix SSL certificate implementation? (Choose two.)

A. ECDSA

B. ECDH

C. ED25519

D. RSA

Answer: A D

Question #:39

In a default configuration of an AHV cluster, a single node fails.

What happens to the running VMs on that node?

A. The cluster restarts all VMs in the event of a host failure

B. The VMs do a live migration to the master node in the cluster

C. The VMs do a live migration to any other node in the cluster

D. The cluster attempts to restart VMs on other hosts

Answer: D

Question #:40

Verified Solution - 100% Result 27 of 112


Pass Exam Nutanix - NCP-MCI-6.5

What is the proper sequence to perform a one-click upgrade to a Nutanix cluster?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the
item requirements. Not all procedures are valid. Identify any invalid procedures using the drop-down option.

Verified Solution - 100% Result 28 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Verified Solution - 100% Result 29 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Answer:

Explanation
Step 1 ---> Login into Prism Element.

Step 2 ---> Select the Gear Icon at top right of the page.

Step 3 ---> Click Upgrade Software.

Step 4 ---> Select the component to upgrade.

Verified Solution - 100% Result 30 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Step 5 ---> Click download.

Step 6 ---> Once the download completes, select upgrade.

Invalid:-

1 - Select Prism Central.

2 - Select user login.

3 - On left select upgrade Prism Central.

Question #:41

An administrator needs to relocate an AHV cluster to a new datacenter during a maintenance window. The
cluster will use the same IPs in the new datacenter.

Which two steps should be taken to prepare for this task? (Choose two.)

A. Reconfigure IPMI for the new datacenter

B. Shut down all user VMs in the cluster

C. Relocate the linked LDAP server

D. Stop all Nutanix Files clusters

Answer: B D

Explanation
According to the web search results, two steps that should be taken to prepare for relocating an AHV cluster to
a new datacenter during a maintenance window are:

Shut down all user VMs in the cluster: This step is necessary to ensure that there is no data loss or
corruption during the relocation process. The user VMs can be shut down either individually or in bulk
by using the Prism Element web console or the acli command-line interface1.

Stop all Nutanix Files clusters: If the AHV cluster hosts any Nutanix Files clusters, they should be
stopped before relocating the cluster. Nutanix Files clusters are composed of one or more virtual
machines that provide file services to clients. Stopping a Nutanix Files cluster will stop all the file server
VMs and release the resources they consume2. The Nutanix Files clusters can be stopped by using the
Prism Element web console or the ncli command-line interface3.

Question #:42

An administrator has a Custom backup application that requires a 2TB disk and runs m Windows. Throughput
is considerably lower than expected.

Verified Solution - 100% Result 31 of 112


Pass Exam Nutanix - NCP-MCI-6.5

The application was installed on a VM with the following configuration:

• FOU vCPUs with one core/vCPU

• 4GB of Memory

• One 50GB vDisk for the Windows installation

• One 2TB vDisk for the application

What is the recommended configuration change to improve throughput?

A. Add 4GB of memory to the VM

B. Increase the vCPUs assigned to the VM

C. Span the 2TB disk across four vDisks

D. Increase the number of cores per vCPU

Answer: C

Explanation
According to the web search results, one recommended configuration change to improve throughput for a
custom backup application that requires a 2TB disk and runs on Windows is to span the 2TB disk across four
vDisks. Spanning is a technique that allows you to create a single logical disk from multiple physical
disks. Spanning can improve throughput by distributing I/O requests across multiple disks and reducing
contention5. To span a disk across four vDisks, the administrator should create four vDisks of equal size (500
GB each) and attach them to the VM. Then, in Windows Disk Management, create a spanned volume from the
four vDisks and format it as NTFS6.

Question #:43

An administrator wants to expand the Failure Domain level of a cluster.

What two options are available? (Choose two.)

A. Node

B. Data Center

C. Block

D. Rack

Answer: C D

Explanation
Nutanix clusters are resilient to a drive, node, block, and rack failures because they use redundancy factor 2 by

Verified Solution - 100% Result 32 of 112


Pass Exam Nutanix - NCP-MCI-6.5

default, allowing Nutanix clusters to self-heal2. Failure scenarios can be thought of in terms of fault domains,
which are the physical or logical parts of a computing environment or location that are adversely affected
when a device or service experiences an issue or outage3. There are four fault domains in a Nutanix cluster:
Disk, Node, Block, and Rack4. Block and Rack are two options that are available for expanding the failure
domain level of a cluster. Block fault tolerance is enabled by default and ensures that data is replicated across
different blocks in a cluster5. Rack fault tolerance has to be configured manually and ensures that data is
replicated across different racks in a cluster4.

References: 1: Behavioral Learning Tools - Prism Central Resource Management - Nutanix 2: How Nutanix
Handles Failures | Node Failure 3: Failure Domain Considerations - Nutanix Support & Insights 4:
[Understanding Fault Domains and Rack Awareness - Nutanix] 5: [Nutanix Cluster Architecture Overview -
Nutanix Bible]

Question #:44

Which AOS process determine if an I/O from a user will be written to OpLog or to an Extent Store?

A. Stargate

B. Curtor

C. Cassandara

D. Zeus

Answer: A

Explanation
Stargate is the AOS process that handles all I/O operations for the cluster. It is responsible for determining
whether an I/O from a user will be written to the OpLog or to the Extent Store, based on the type and size of
the I/O. Stargate also performs data tiering, compression, deduplication, and erasure coding1. Stargate runs on
every CVM and communicates with other Stargates to ensure data locality and redundancy2.

Question #:45

In Files, how many FSVMs are deployed by default?

A. 1

B. 2

C. 3

D. 5

Answer: C

Explanation

Verified Solution - 100% Result 33 of 112


Pass Exam Nutanix - NCP-MCI-6.5

According to the Nutanix Files Guide, Nutanix Files instances are composed of a set of VMs (called FSVMs).
Files requires at least three FSVMs running on three nodes to satisfy a quorum for high availability. By
default, Files deploys three FSVMs when you create a file server instance.

Question #:46

Upon logging into Prism Central, an administrator notices high cluster latency.

How can the administrator analyze data with the least number of steps or actions?

A. Modify Data Density in the main Prism Central dashboard.

B. Click on the chart in the widget to expand the data elements.

C. Take note of the duster name and create a new Analysis chart.

D. Click the cluster name in the cluster quick access widget.

Answer: B

Explanation
According to the Nutanix Prism Central Guide, you can click on any chart in a widget to expand it and view
more details about the data elements.

Question #:47

What is the expected behavior of the VMs residing on that host when a controller VM becomes unavailable?

A. A Live Migration will be performed on the affected VMs.

B. The host will automatically redirect I/O and VMs will continue running.

C. The impacted host and VMs will automatically shut down.

D. VM High Availability will restart the impacted VMs on another host

Answer: B

Explanation
According to the Nutanix Support & Insights web search result1, if the owner Controller VM becomes
unavailable, the address moves to another Controller VM, ensuring that it is always available. This IP address
is also used as a cluster-wide address by clients configured as part of Nutanix Files and other products.
Therefore, the host will automatically redirect I/O and VMs will continue running without any interruption.

Question #:48

An administrator wants to create a trunked interface on a VM on AOS 5.15x.

Which two steps should the administrator take first to achieve this? (Choose two)

Verified Solution - 100% Result 34 of 112


Pass Exam Nutanix - NCP-MCI-6.5

A. Use acli

B. Log in over PE web UI.

C. SSH to CVM.

D. Update VM dialog.

Answer: A C

Explanation
Explanation/Reference:

Question #:49

Refer to exhibit:

An administrator needs to update some images that were previously uploaded to their Nutanix cluster, while
logged into Prism Element when trying to update the images, the update icon is not enabled.

What could be the cause for this behavior?

A. RBAC is configured and the administrator's user doesn't have the right privileges.

B. The files were ISO but were uploaded as disk images hence cannot be used or edited.

Verified Solution - 100% Result 35 of 112


Pass Exam Nutanix - NCP-MCI-6.5

C. Images are corrupted and must be re-uploaded.

D. Images were imported into Prism Central.

Answer: D

Explanation
According to Nutanix Support & Insights1, image create, update, and delete (CUD) behavior depends on
whether a cluster (also known as Prism Element) is registered to Prism Central. Images created on a Prism
Element reside on Prism Element and can be managed from Prism Element. For better centralized
management, you can migrate images manually to Prism Central by using the image import feature.

Question #:50

An Administrator is working on a one-node ROBO cluster configurations

Which statement is true for this configuration?

A. Witness vm required to break cluster quoram

B. Supported hardware is NX-1175-G5 and G6

C. witness vm should be 8vcp and 20gb ram

D. the minimum RPO 8 hours required

Answer: B
Question #:51

What does Nutanix recommend when setting up the node networkring?

A. Include NIC models from different vendors in the same bond

B. Include at least two physically interfaces in every bond.

C. Combine NIC models from different vendors in the same bond.

D. Combine NIC models from different vendors in the same bond.

Answer: B

Explanation
A bond is a logical interface that combines two or more physical interfaces on an AHV host. A bond provides
high availability and load balancing for the network traffic of the host and its VMs. A bond can have different
modes that determine how the traffic is distributed and how the bond handles failures of the physical
interfaces. The most common bond modes are active-backup, active-active, and LACP1.

Verified Solution - 100% Result 36 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Nutanix recommends including at least two physical interfaces in every bond to ensure high availability and
redundancy. If one of the physical interfaces fails or is disconnected, the other interface can take over the
traffic without affecting the connectivity of the host or its VMs. Having at least two physical interfaces in a
bond also allows for maintenance operations such as firmware upgrades or cable replacements without
downtime2.

Nutanix does not recommend including NIC models from different vendors in the same bond, as this may
cause compatibility issues or performance degradation. Nutanix also does not recommend using only one
physical interface in a bond, as this provides no redundancy or load balancing benefits3.

Question #:52

An administrator needs to ensure logs, alerts and information is consistent across clusters that are located in
different countries.

Which service needs to be configured?

A. SMTP

B. DNS

C. SNMP

D. NTP

Answer: D

Explanation
NTP service needs to be configured to ensure logs, alerts and information is consistent across clusters that are
located in different countries. NTP stands for Network Time Protocol and it is used to synchronize the clocks
of all the nodes in a cluster1. This helps to maintain accurate timestamps for logs, alerts and other information
that are generated by Nutanix clusters1.

Question #:53

Which two types of granular RBAC does Nutanix provide for AHV hosts? (Choose two.)

A. Category based

B. Project based

C. Disk based

D. Cluster based

Answer: A D

Explanation
Nutanix provides two types of granular RBAC for AHV hosts: category based and cluster based3. Category

Verified Solution - 100% Result 37 of 112


Pass Exam Nutanix - NCP-MCI-6.5

based RBAC allows administrators to assign roles to users or groups based on categories, which are key-value
pairs that can be applied to various entities in Prism Central, such as clusters, hosts, VMs, images, and
networks. Categories can be used to group entities by different criteria, such as department, project,
environment, or location. For example, an administrator can create a category key named Department and
assign different values to it, such as Finance, Marketing, or Engineering. Then, the administrator can apply this
category to different clusters or hosts and assign roles to users or groups based on this category. This way,
users or groups can have different levels of access to different clusters or hosts depending on their
department4.

Cluster based RBAC allows administrators to assign roles to users or groups based on specific clusters
registered in Prism Central. For example, an administrator can create a role named Cluster Admin and assign it
to a user or group for a particular cluster. This way, the user or group can have full access to that cluster and
its hosts and VMs, but not to other clusters5.

Question #:54

A vDisk is read by multiple VMs. The cluster creates immutable copies of the vDisk. What are these vDisk
copies called?

A. Disk Clones

B. Golden Images

C. Volume Groups

D. Shadow Clones

Answer: D

Explanation
According to the Nutanix Support & Insights web search result3, shadow clones are vDisk copies that are
created by the cluster when a vDisk is read by multiple VMs. Shadow clones are immutable copies of a vDisk
that are stored in different nodes in the cluster, and are used to improve read performance and reduce network
traffic. Shadow clones are automatically created and deleted by the cluster, based on the demand and
availability of resources.

Question #:55

Which node type does not deploy a Nutanix Controller VM?

A. Storage Only

B. Hyper Converged

C. Compute Only

D. All Flash

Answer: C

Verified Solution - 100% Result 38 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Explanation
A Compute Only node is a node that does not have any local storage devices and only provides compute
resources to the cluster2. A Compute Only node does not run a CVM, but instead relies on the CVMs of other
nodes to access the distributed storage fabric2

Question #:56

An administrator is reviewing performance of a core banking system that routinely has 20,000 concurrent
users. During, business hours, the CPU on the applications servers runs at close to 100%. The administrator
needs to determine if there is a performance issue specific to the app servers, the database servers, or all
servers on the cluster.

Which metrics should the administrator review in Prism Analysis Graphs?

A. Cluster IO, Network, Database and App Server CPU

B. Cluster CPU and Memory Only

C. Cluster IO, CPU, Memory and Database and App Server CPU

D. Cluster IO, CPU, Memory, Network, App Server CPU

Answer: D

Explanation
In this case, the administrator wants to investigate the performance of a core banking system that consists of
application servers and database servers. The application servers have high CPU utilization during business
hours, which may indicate a bottleneck or a resource contention issue. The administrator needs to review
multiple metrics in Prism Analysis Graphs to identify the root cause and determine if there is a problem with
the app servers only, or with other components as well.

The metrics that are relevant for this analysis are:

Cluster IO: This metric shows the input/output operations per second (IOPS) and throughput (MBps) of
the cluster. It can help to understand if there is a high demand for disk IO from the VMs or if there is

Verified Solution - 100% Result 39 of 112


Pass Exam Nutanix - NCP-MCI-6.5

any latency or congestion in the storage layer.

Cluster CPU: This metric shows the CPU utilization (%) and load average of the cluster. It can help to
understand if there is enough CPU capacity in the cluster to handle the workload or if there is any
imbalance or contention among hosts.

Cluster Memory: This metric shows the memory utilization (%) and available memory (GB) of the
cluster. It can help to understand if there is enough memory capacity in the cluster to support the VMs or
if there is any pressure or swapping in the memory layer.

Network: This metric shows the network throughput (MBps) and packets per second (pps) of the cluster.
It can help to understand if there is enough network bandwidth in the cluster to transfer data between
hosts and VMs or if there is any congestion or packet loss in the network layer.

App Server CPU: This metric shows the CPU utilization (%) and load average of each application server
VM. It can help to understand if there is any variation or anomaly in the performance of each app server
or if there is any correlation with other metrics.

Database Server CPU: This metric shows the CPU utilization (%) and load average of each database
server VM. It can help to understand if there is any variation or anomaly in the performance of each
database server or if there is any correlation with other metrics.

Question #:57

Where are Leap Availability Zones configured?

A. Cloud Connect

B. Controller VM

C. Prism Element

D. Prism Central

Answer: D

Explanation
Terminology

Availability Zone – it is represented by all resources (Nutanix Clusters) connected to Prism Central or
Xi Leap Availability zone. Depends on the architecture, Availability zone can represent geographic
territory, datacenter or server room in the datacenter. Protection policies – in protection policies you set
up (RPO, Retention), rules to auto-apply policies to virtual machines

https://vmwaremine.com/2019/02/08/nutanix-leap-runbooks-part-1/#sthash.VwrzSzhQ.dpbs

Question #:58

Refer to Exhibit:

Verified Solution - 100% Result 40 of 112


Pass Exam Nutanix - NCP-MCI-6.5

An administrator is attempting to create an additional virtual switch on a newly deployed AHV cluster, using
the two currently disconnected interfaces. The administrator is unable to select the disconnected interfaces
when creating the virtual switch.

What is the likely cause of this issue?

A. Only one interface is available on the selected hosts.

B. Interfaces must be connected to the network before they can be assigned.

C. The disconnected interfaces are currently assigned to virtual switch 0,

D. Interfaces must be assigned to virtual switches via the cli

Answer: C

Explanation
when you create a new virtual switch on AHV, you need to select one or more uplink interfaces that are
connected to a physical network. You cannot select an interface that is already assigned to another virtual

Verified Solution - 100% Result 41 of 112


Pass Exam Nutanix - NCP-MCI-6.5

switch. By default, AHV creates a virtual switch called br0 that uses all available interfaces on the host2.
Therefore, if you want to use some of those interfaces for another virtual switch, you need to remove them
from br0 first.

https://masteringnutanix.com/2020/06/13/how-to-create-an-ahv-virtual-switch-with-single-uplink/

Question #:59

A newly-hired Nutanix administrator was tasked by the CIO to create a single VM on a test network. The
network administrator stated that a native VLAN was used on the Cisco TOR switches with the following
parameters:

IP address:172,16.1.2

Network Mask: 255.255.255.0

Default gateway: 172.16.1.1

VLAN:1

The same parameters were used to create a network profile on Nutanix, but the when the VM was on …

What should the Nutanix administrator do to fix this issue?

A. Nutanix removed support for native VLAN.

B. Change VLAN field from vlan. 1 to vlan.0.

C. Enable IPv6 on the VM.

D. Use DHCP as opposed to static IP

Answer: B

Explanation
A native VLAN is a VLAN that is assigned to untagged traffic on a trunk port of a switch. A trunk port can
carry traffic from multiple VLANs, but it needs to have a native VLAN to handle traffic that does not have a
VLAN tag. The native VLAN is usually VLAN 1 by default on most switches, but it can be changed to any
other VLAN number2. When creating a network profile on Nutanix, the administrator needs to specify the
VLAN ID that matches the VLAN configuration on the physical switch. However, if the network profile uses
the same VLAN ID as the native VLAN on the switch, it will cause network connectivity issues for the VMs
connected to that network profile. This is because Nutanix AHV uses 802.1Q tagging for all network traffic,
including traffic in the native VLAN. The switch will expect untagged traffic in the native VLAN and will
drop any tagged traffic in that VLAN3. To fix this issue, the administrator needs to change the VLAN field
from vlan. 1 to vlan. 0 in the network profile on Nutanix. This will tell Nutanix AHV to send untagged traffic
for that network profile and match the native VLAN configuration on the switch4.

Question #:60

Verified Solution - 100% Result 42 of 112


Pass Exam Nutanix - NCP-MCI-6.5

An administrator needs to configure Prism to send encrypted messages to a set of recipients.

Which setting must be applied?

A. Use SMTP Port 25

B. Configure Prism Central to use Cluster Lockdown

C. Install SSL certificates on Prism Central

D. Set SMTP Security Mode to STARTTLS

Answer: D

Explanation
The best way for the administrator to configure Prism to send encrypted messages to a set of recipients is to set
the SMTP Security Mode to STARTTLS. This will ensure that all messages sent over SMTP are encrypted
and secure. Additionally, the administrator should consider installing SSL certificates on Prism Central to
ensure that the messages are being sent securely. Finally, the administrator should consider configuring Prism
Central to use Cluster Lockdown, which will help ensure that the messages are only sent to the intended
recipients.

Question #:61

Which two permission assignment tasks can be accomplished via Prism Element? (Choose two.)

A. Grant a user permission to create VMs on a specific storage container

B. Grant a user permission to view details of all VMs on a specific cluster

C. Grant an active directory group permission to perform back operations

D. Grant a user permission to create and delete snapshots on a specific VM

Answer: B D

Explanation
Prism Element is a management interface that allows administrators to assign permissions to users and groups
on a per-cluster, per-VM, or per-storage container basis.

https://www.nutanix.com/content/dam/nutanix/resources/support/ncp-mci-ds.pdf

Question #:62

An administrator is configuring data protection and DR for a multi-tier application. All VMs must be protected
at the same time.

What must the administrator do to meet this requirement?

A.

Verified Solution - 100% Result 43 of 112


Pass Exam Nutanix - NCP-MCI-6.5

A. Create a consistency group for each VM with identical schedules

B. Create a consistency group for the application and place all VMs in it

C. Create a protection domain for the application and select auto-protect related entities

D. Create a protection domain for each VM with identical schedules

Answer: B

Explanation
According to the web search results, a consistency group is a group of related applications or services that
must be recovered together in order to work properly, and this means more than being recovered at the same
time67. They also typically need to be recovered to the same point in time6. Therefore, to meet the
requirement of protecting all VMs of a multi-tier application at the same time, the administrator must create a
consistency group for the application and place all VMs in it8. This way, the administrator can apply data
protection policies and schedules to the entire consistency group as a single unit8.

Question #:63

CPU utilization climbs above 90% on several VMs. This causes performance degradation for a
business-critical application.

How can alerts be configured to notify the administrator before VM CPU utilization hits 90%?

A. On a CVM, use ncli to set the VM CPU Check threshold for the critical VMs to a value below 90%.

B. On the Health dashboard, locate the VM CPU Check and lower the alert threshold below 90%.

C. On a CVM, configure a cron job to run the VM CPU Check more frequently and email the result.

D. On the Alerts dashboard, ensure that the VM CPU usage alert is not set to auto-resolve.

Answer: B
Question #:64

What Nutanix feature provides effective caching optimization In VDI environments?

A. Remote Protection Group

B. Local Protection Group

C. Snap Clones

D. Shadow Clones

Answer: D

Explanation

Verified Solution - 100% Result 44 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Shadow Clones is a Nutanix feature that provides effective caching optimization in VDI environments. VDI
stands for Virtual Desktop Infrastructure, which is a technology that allows users to access virtual desktops
hosted on a centralized server. VDI environments typically have a high degree of similarity among desktop
images, which means that many VMs access the same data blocks from the storage layer. Shadow Clones
leverages this similarity by creating read-only copies of frequently accessed data blocks on each node’s SSD
tier, reducing network traffic and improving performance. Shadow Clones works automatically and
transparently without any configuration or intervention from the administrator.

References: : [Fault Tolerance - Nutanix Bible] : [Block Awareness - Nutanix Bible] : [Block Awareness -
Nutanix Support & Insights] : [Shadow Clones - Nutanix Bible] : [Shadow Clones - Nutanix Support &
Insights] : [Shadow Clones - Nutanix Community]

Question #:65

How will an HDD failure affect VMs with data on the failed device?

A. The VMs will crash, and will be restarted once the failed HDD has been replaced and the data has been
restored.

B. A live migration will be initiated, moving the affected VMs to a host that contains the replica data.

C. The VMs will remain operational on that host and continue to function normally with no noticeable
impact

D. An HA event will occur, causing the affected VMs to restart on a node that contains the replica data.

Answer: D

Explanation
According to the Troubleshooting hosted disk I/O performance problems (1008885), when using VMware
hosted products, consider that both the virtual machines and host operating system often share the same disk
resources and hardware. If a hard disk fails, the virtual machines that have data on the failed device will
experience an HA event, causing them to restart on a node that contains the replica data.

Question #:66

An administrator has been alerted to a VM that has high I/O latency and wants to determine if there are any
other factors, such as insufficient network or memory resources that correlate, as part of a troubleshooting
process.

Which type of chart should the administrator create to allow all relevant data to be easily exported to CSV for
later analysis?

A. A VM entity chart with each of the relevant metrics.

B. A cluster metric chart for each of the relevant metrics

C.

Verified Solution - 100% Result 45 of 112


Pass Exam Nutanix - NCP-MCI-6.5

C. A cluster entity chart with each of the relevant metrics

D. A VM metric chart for each of the relevant metrics

Answer: D
Question #:67

On a Nutanix cluster, what does Network Segmentation refer to?

A. A distributed firewall for security VM to VM traffic.

B. Physically separating management traffic from guest VM traffic.

C. Isolating intra-cluster traffic from guest VM traffic.

D. Isolating management traffic from storage replication traffic.

Answer: C

Explanation
network segmentation on Nutanix clusters refers to creating a separate network for service-specific
communication and isolating different types of traffic over selected VLANs or physical interfaces.

https://next.nutanix.com/ncm-intelligent-operations-formerly-prism-pro-ultimate-26/network-segmentation-isolating-se

https://next.nutanix.com/how-it-works-22/network-segmentation-basics-38414

Question #:68

An administrator is performing validation testing of a new-deploy cluster. During this test, the administrator
disconnect each LAN interface from each of the nodes while pinging the hypervisor and guest VMs.

When the first interface is disconnected, pings continue as expected to the hypervisor, but pings stop
responding from the guest. Pings continue when the interface is reconnected. When the second interface is
disconnected, pings continue to both the hypervisor and guest VMs.

What could be the cause of this error?

A. This is normal behavior for a LAN Failover

B. Switch ports are configured with different VLANs

C. Portfast is not enabled on the switch ports

D. One of the network interfaces has a bad patch cable.

Answer: B

Explanation

Verified Solution - 100% Result 46 of 112


Pass Exam Nutanix - NCP-MCI-6.5

switch ports are configured with different VLANs could be the cause of this error. If the switch ports are not
configured with the same VLANs as the network interfaces on each node, then there could be a mismatch in
network connectivity when one interface is disconnected1. This could affect the guest VMs that are using a
different VLAN than the hypervisor.

Question #:69

After running an LCM inventory it is noticed that there are a number of firmware and software updates
available. The administrator would like to avoid any host reboots, but would like to apply some of the
available updates?

Which two updates can be done while avoiding a host reboot? (Choose two.)

A. M.2 Drives

B. AHV

C. Data Drives

D. AOS

Answer: A D

Explanation
AOS and M.2 Drives are two updates that can be done while avoiding a host reboot. AOS is the Acropolis
Operating System that includes the hypervisor, storage and management components of the Nutanix cluster,
and firmware and software updates can also be applied to it without requiring any host reboots

Question #:70

A VM in a 12-node Nutanix cluster is hosting an application that has specific Physical GPU requirements.
Only three nodes in the cluster meet this requirement.

The administrator wants to allow a general workload to be distributed across all nodes in the cluster and must
make sure that the node hosting the VM meets its requirements.

How should the administrator perform this task?

A. Create a sperate three-node cluster using the nodes that meet the requirement.

B. Configure VM-Host affinity for the nodes that meet the application's GPU requirement.

C. Over-Provision the application VM with additional virtual GPUs.

D. Configure anti-affinity rules between the application VM and the other VMs running on the cluster.

Answer: B

Verified Solution - 100% Result 47 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Explanation
Configure VM-Host affinity for the nodes that meet the application’s GPU requirement. This is because
VM-Host affinity allows the administrator to specify which nodes a VM can run on or must not run on1. By
creating a VM-Host affinity rule that binds the application VM to the three nodes that have the physical GPU,
the administrator can ensure that the VM will always run on a node that meets its requirement, regardless of
any HA or migration events. This also allows the other nodes in the cluster to host other VMs without any
restrictions.

Question #:71

Which scenario would benefit most from Erasure Coding being enabled on a container?

A. Long term storage of data which is written once and read infrequently

B. High performance database where all is relatively hot.

C. VDI use cases where a single VM is cloned 100’s of times

D. WEB and API Servers

Answer: A

Explanation
The correct answer is A. Long term storage of data which is written once and read infrequently.

Erasure Coding is a feature that increases the usable capacity on a Nutanix cluster by reducing the amount of
data replication. Instead of replicating data, Erasure Coding uses parity information to rebuild data in the event
of a disk failure. The capacity savings of Erasure Coding is in addition to deduplication and compression
savings1.

Erasure Coding is most beneficial for scenarios where the data is written once and read infrequently, such as
long term storage of archival data, backup data, or cold data. This is because Erasure Coding has some
trade-offs and limitations that may affect the performance and availability of the cluster. Some of these
trade-offs and limitations are2:

Erasure Coding requires more CPU and memory resources than replication, as it involves more complex
calculations for encoding and decoding data.

Erasure Coding increases the network bandwidth consumption, as it involves more data transfers
between nodes for encoding and decoding data.

Erasure Coding reduces the resiliency of the cluster, as it can tolerate fewer node failures than
replication. For example, a cluster with redundancy factor 2 can tolerate one node failure with
replication, but only two disk failures with Erasure Coding.

Erasure Coding is not effective for workloads that have many overwrites or random writes, as it involves
more overhead for updating the parity information.

Erasure Coding is not supported for some features, such as volume groups, file server VMs, or Metro

Verified Solution - 100% Result 48 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Availability.

Therefore, if an administrator needs to configure a container on a Nutanix cluster, they should enable Erasure
Coding only if the container will store data that is written once and read infrequently. This way, they can
maximize the capacity savings of Erasure Coding without compromising the performance and availability of
the cluster.

Question #:72

An administrator wants to use Volumes to connect to physical servers that are not able to be virtualized.

Which three things must be configured for Volumes to support iSCSI clients? (Choose three)

A. Enable external client access

B. Client OS iSCSI initiator

C. iSCSI Multipathing I/O

D. Cluster Virtual IP address

E. Data Services IP address

Answer: B D E

Explanation
https://portal.nutanix.com/page/documents/details/?targetId=Web-Console-Guide-Prism-v51:wc-block-services-c.html

Question #:73

An administrator has received reports of users being disconnected from remote desktop sessions to a specific
VM.

Which VM metric is most useful isolating the cause of the issue?

A. Storage Controller Bandwidth

B. Swap-Out Rate

C. Hypervisor CPU Ready time (%)

D. Virtual NIC receive packet dropped

Answer: D

Explanation
Virtual NIC receive packet dropped is the most useful VM metric for isolating the cause of users being
disconnected from remote desktop sessions to a specific VM. This metric shows the number of packets that are

Verified Solution - 100% Result 49 of 112


Pass Exam Nutanix - NCP-MCI-6.5

dropped by the virtual NIC of the VM due to insufficient buffer space or other reasons. Packet drops can
indicate network congestion, misconfiguration, or performance issues that can affect the quality and
availability of remote desktop sessions. Packet drops can also cause retransmissions, delays, and errors in
TCP-based protocols such as RDP2. To view this metric in Prism, go to Entities > Compute & Storage > VMs
> Summary View and select a VM. Then, in the Details View, go to Metrics > Performance and select Virtual
NIC receive packet dropped from the drop-down menu3.

Question #:74

Which method can be used to migrate a VM configured for UEFI-boot from a Nutanix Hyper-V cluster to
AHV?

A. Live Migration

B. Storage vMotion

C. Nutanix Move

D. Cloud Connect

Answer: C

Explanation
Nutanix Move is a tool that allows you to migrate VMs from different sources to Nutanix AHV with minimal
downtime and complexity. Nutanix Move supports migration from Hyper-V to AHV, including VMs
configured for UEFI-boot. UEFI stands for Unified Extensible Firmware Interface, which is a standard for the
software interface between the operating system and the firmware. UEFI-boot is a mode of booting that uses
UEFI instead of BIOS (Basic Input/Output System) to load the operating system. UEFI-boot offers some
advantages over BIOS-boot, such as faster boot time, larger disk support, and better security features1.

To migrate a VM configured for UEFI-boot from a Nutanix Hyper-V cluster to AHV, you need to use Nutanix
Move and follow these steps2:

Download and deploy the Nutanix Move appliance on the AHV cluster.

Log in to the Nutanix Move web console and add the source Hyper-V environment and the target AHV
environment.

Create a migration plan and select the VMs that you want to migrate. You can choose either automatic
or manual preparation mode for the migration.

Start the migration plan and monitor the progress. The migration plan will perform data seeding, which
is the process of copying the VM data from the source to the target in the background.

When the data seeding is complete, perform a cutover, which is the process of shutting down the source
VMs and powering on the target VMs. The cutover will also configure the boot device for the
UEFI-boot VMs on AHV.

Verify that the migrated VMs are working as expected on AHV.

Verified Solution - 100% Result 50 of 112


Pass Exam Nutanix - NCP-MCI-6.5

References: 1: UEFI Boot - Nutanix Support & Insights 2: Hyper-V to AHV and Hyper-V to Nutanix Clusters
on AWS VM Migration - Nutanix Support & Insights

Question #:75

An administrator is implementing a VDI solution. The workload will be a series of persistent desktops in a
dedicated storage container within a four-node cluster Storage optimizations should be set on the dedicated
storage container to give optimal performance including during a node failure event

Which storage optimizations should the administrator set to meet the requirements?

A. Compression only

B. Deduplication and Erasure Coding

C. Compressoion and Deduplication

D. Compression Deduplication and Erasure Coding

Answer: D

Explanation
According to the web search results, three storage optimizations that should be set on a dedicated storage
container for a VDI solution with persistent desktops are compression, deduplication and erasure coding.
Compression is a technique that reduces the size of data by removing redundant information. Deduplication is
a technique that eliminates duplicate copies of data blocks and stores only unique blocks. Erasure coding is a
technique that increases usable capacity by reducing the replication factor of data blocks and using parity
information instead7. These three optimizations can improve performance and save storage space for VDI
workloads, especially during a node failure event when data needs to be rebuilt from parity information8. The
administrator can enable these optimizations by using Prism Element web console or ncli command-line
interface9.

Question #:76

An administrator needs to configure a new subnet on an AHV cluster and want to ensure that VMs will
automatically be assigned an IP address at creation time.

Which type of network does the administrator need to create?

A. Dynamic Network

B. Unmanaged Network

C. Managed Network

D. DHCP Network

Answer: C

Verified Solution - 100% Result 51 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Explanation
A managed network is a type of network that can be created on an AHV cluster and allows VMs to
automatically be assigned an IP address at creation time. A managed network uses the Nutanix IP Address
Management (IPAM) service, which provides DHCP and DNS functionality for the VMs on the network. A
managed network can be configured with a subnet range, a default gateway, and DNS servers. The IPAM
service will allocate IP addresses from the subnet range to the VMs and register their hostnames in the DNS
servers. The IPAM service will also release the IP addresses when the VMs are deleted or moved to another
network1.

To create a managed network on an AHV cluster, the administrator can use Prism Element or Prism
Central. The steps are as follows2:

In Prism Element, go to the Network Configuration page and click Create Network.

In Prism Central, go to the Networks page and click Create.

Enter a name and description for the network.

Select Managed as the network type.

Enter the subnet range, default gateway, and DNS servers for the network.

Optionally, enable VLAN tagging and enter a VLAN ID for the network.

Click Save.

Question #:77

An administrator is commissioning a Nutanix Enterprise Cloud. Once the user VMs have been deployed and
are running, the administrator finds that VMs on the same host are able to communicate, but are unable to
communicate between hosts.

What must be changed to enable full inter-VM communications?

A. Change the spanning-tree port type on the switch.

B. Change the network the VMs are connected to

C. Update the switch to specifically allow VLAN 15

D. The VMs need to have static IP addresses.

Answer: C

Explanation
According to the web search results, one possible cause of inter-VM communication failure between hosts is
that the switch is not configured to allow VLAN 15 traffic. VLAN 15 is the default VLAN ID used by AHV
for internal communication between CVMs and hosts. If the switch blocks or drops VLAN 15 packets, it will

Verified Solution - 100% Result 52 of 112


Pass Exam Nutanix - NCP-MCI-6.5

prevent inter-VM communication across hosts4. To enable full inter-VM communication, the administrator
should update the switch to specifically allow VLAN 15 traffic on the ports connected to the AHV hosts.

Question #:78

How should an administrator enable secure access to Volumes using a password?

A. iSER

B. CHAP

C. SAML

D. LDAP

Answer: B

Explanation
https://portal.nutanix.com/page/documents/details/?targetId=Web-Console-Guide-Prism-v50:wc-block-services-enablin

Provision storage on the Nutanix cluster by creating a volume group. Create a client whitelist to enable access
to the volume group by using the IP addresses or client initiator IQNs in a whitelist (as part of the volume
group configuration). Create a secret for the volume group if you are using CHAP authentication.

Question #:79

The Linux administration team has requested access rights to any current or future Linux VM in the
environment

What entity should be selected when assigning this new role?

A. Image

B. AHV Cluster

C. Category

D. Project

Answer: C

Explanation
Categories are key-value pairs that can be used to tag entities such as VMs, images, networks, and projects in
Prism Central. Categories can be used to create dynamic groups of entities based on their attributes, and assign
roles and permissions to those groups3. In this case, a category such as OS=Linux can be used to group all
Linux VMs and grant access rights to the Linux administration team.

Question #:80

Verified Solution - 100% Result 53 of 112


Pass Exam Nutanix - NCP-MCI-6.5

A user running a Computer Aided Design (CAD) application is complaining about slow response time within
the VM, particular when moving windows or rendering images.

Which VM metric will guide the administrator toward diagnosing the problem?

A. Storage Controller Latency

B. GPU Usage

C. Swap in Rate

D. Hypervisor Memory Usage (%)

Answer: B

Explanation
A GPU (graphics processing unit) is a specialized hardware device that can accelerate graphics rendering and
computation for applications that use APIs such as DirectX, OpenGL, CUDA, and OpenCL. A GPU can also
offload the CPU from encoding and decoding tasks for remote display protocols such as Frame Remote
Desktop Protocol (FRP). A VM can use a GPU either by directly accessing a physical GPU (pGPU) on the
host or by using a virtual GPU (vGPU) that shares a pGPU with other VMs. A user running a computer aided
design (CAD) application may benefit from using a GPU or a vGPU to improve the performance and
responsiveness of the application, especially when moving windows or rendering images. However, if the
GPU or vGPU is not properly configured or provisioned, the user may experience slow response time within
the VM. Therefore, to diagnose the problem, the administrator should monitor the GPU Usage metric for the
VM. The GPU Usage metric shows the percentage of GPU resources that are consumed by the VM over
time3. The administrator can use Prism Central to view the GPU Usage metric for each VM in a chart or a
widget4. The administrator can also use Prism Central to view other metrics related to GPU performance, such
as GPU Memory Usage, GPU Encoder Usage, and GPU Decoder Usage3. By analyzing these metrics, the
administrator can determine if the VM is using the GPU efficiently and optimally, or if it needs more or less
GPU resources.

Question #:81

When VM HA Reservation is enabled, what is the expected behavior for all failed VMs in the event of a host

failure?

A. Restart on a best-effort basis if resources are available

B. Perform a live migration to other hosts in the AHV cluster

C. Restart on other hosts in the AHV cluster

D. Perform a live migration on a best-effort basis if resources are available

Answer: C

Verified Solution - 100% Result 54 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Question #:82

An administrator has been tasked with increasing security on Nutanix cluster by disabling password
authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH,

What is the easiest way for the administrator to meet these needs?

A. Configure LDAP authentication through a secure server,

B. Enable STIES vie commend line on SSH to CVM.

C. Enable Cluster Lockdown and provide an RSA key.

D. Restrict access with User Management in Prism.

Answer: C

Explanation
"An administrator has been tasked with increasing security on Nutanix cluster by disabling password
authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH, What is the
easiest way for the administrator to meet these needs? Enable Cluster Lockdown and provide an RSA key."

Cluster Lockdown mode disables password authentication when accessing the CVM and AHV hosts and
instead requires key-based SSH. To enable Cluster Lockdown mode, you need to provide an RSA key.

Therefore, by enabling Cluster Lockdown mode and providing an RSA key, you can increase security on
Nutanix cluster by disabling password authentication when accessing the CVM and AHV hosts and instead
moving to key-based SSH with minimal effort.

https://next.nutanix.com/how-it-works-22/streamlined-login-and-increase-security-key-based-ssh-login-37397

Question #:83

Refer to Exhibit:

Verified Solution - 100% Result 55 of 112


Pass Exam Nutanix - NCP-MCI-6.5

An administrator is trying to put a node into maintenance mode but receives the message shown in the exhibit.

What is a potential reason for this dialog?

A. LinuxVM1 uses a vDisks stored in a RFI Datastore

B. LinuxVM1 uses a Volume Group

C. LinuxVM1 uses a virtual GPU.

D. LinuxVM1 uses e vDisks stored in a RF3 Datastore

Answer: A

Explanation
According to the Nutanix Community1, host maintenance mode is used to safely migrate all the user virtual
machines (VMs) in the host and make sure no VMs are running on the node. If a VM can’t be migrated to
another host, you need to shut down the VM for the host to enter into maintenance mode.

According to The Virtualist2, a storage container is a logical segmentation of a storage pool that can be
mounted as an NFS datastore on ESXi hosts. You can choose a replication factor (RF) for each storage
container, which determines how many copies of data are stored across different nodes.

Question #:84

In the event of a disk failure, which process will immediately ad automatically scans Cassandra to find all data

Verified Solution - 100% Result 56 of 112


Pass Exam Nutanix - NCP-MCI-6.5

previously hosted on the failed disk, and all disks in that node?

A. Curator

B. Stargate

C. Genesis

D. Prism

Answer: A

Explanation
Curator is the process that runs on every node in a Nutanix cluster and is responsible for data management
tasks such as deduplication, compression, erasure coding, and replication factor compliance. Curator also
handles disk failure recovery by scanning Cassandra to find all data previously hosted on the failed disk, and
all disks in that node. Curator then rebuilds the data on other nodes in the cluster using the distributed storage
fabric1.

Question #:85

Which two predefined views can be added to a report to identify inefficient VMs?

A. Underprovisioned VMs List

B. Zombie VMs List

C. Constrained VMs List

D. Overprovisioned VMs List

Answer: B D

Explanation
Zombie VMs and overprovisioned VMs are two types of inefficient VMs that can waste resources and
increase costs in a Nutanix environment. Zombie VMs are VMs that are powered on but have no activity or
utilization for a long period of time. Overprovisioned VMs are VMs that have more resources allocated than
they actually need or use. Both types of VMs can be identified by adding predefined views to a report in Prism
Central.

A predefined view is a template that defines what data is displayed and how that data is represented in a
report. Prism Central provides several predefined views for different purposes, such as capacity planning,
performance analysis, anomaly detection, and efficiency optimization. To add a predefined view to a report, go
to Operations > Reports > New Report and select the desired view from the list1.

The Zombie VMs List view shows the list of zombie VMs in the environment based on the CPU usage,
memory usage, disk IOPS, and network throughput metrics. The view also shows the amount of resources
wasted by these VMs and the potential savings that can be achieved by deleting or resizing them2.

Verified Solution - 100% Result 57 of 112


Pass Exam Nutanix - NCP-MCI-6.5

The Overprovisioned VMs List view shows the list of overprovisioned VMs in the environment based on the
CPU usage, memory usage, disk IOPS, and network throughput metrics. The view also shows the amount of
resources wasted by these VMs and the potential savings that can be achieved by resizing them3.

By adding these two views to a report, an administrator can identify inefficient VMs and take appropriate
actions to optimize resource utilization and reduce costs.

References: 1: Reports Management - Prism Central Guide 2: Zombie VMs List - Prism Central
Guide 3: Overprovisioned VMs List - Prism Central Guide

Question #:86

When a configuring a syslog server in Prism Central, what two pieces information are required? (Choose two.)

A. HTTPS URL

B. Encryption secret

C. Transport protocol

D. IP address/port

Answer: C D

Explanation
According to the Nutanix Prism Central Guide, to configure a syslog server in Prism Central, you need to
specify the transport protocol (TCP or UDP) and the IP address/port of the syslog server.

Question #:87

An administrator was reviewing various AOS logs when a it was noticed that the time of the logs were off by
several hours.

Which initial step was missed during the post process cluster configuration?

A. Setting the cluster time zone via PC GUI

B. Setting the cluster time zone via CVM NCLI

C. Setting the cluster time zone via PE GUI

D. Setting the cluster time zone via CVM ACLI

Answer: B

Explanation
The cluster time zone is a setting that determines the time zone used by all CVMs in the cluster. The cluster
time zone affects the timestamps of Nutanix logs, events, alerts, and reports. The cluster time zone also affects

Verified Solution - 100% Result 58 of 112


Pass Exam Nutanix - NCP-MCI-6.5

the scheduling of tasks such as snapshots, replication, and upgrades. By default, the cluster time zone is set to
UTC (Coordinated Universal Time) when the cluster is created3.

To change the cluster time zone, the administrator needs to use the ncli (Nutanix command-line interface) on
any CVM in the cluster. The steps are as follows4:

Log in to any CVM using SSH.

Run ncli cluster get-timezone to check the current cluster time zone.

Run ncli cluster set-timezone timezone=<timezone> to change the cluster time zone,
where <timezone> is a valid time zone identifier (for example, America/New_York).

Run ncli cluster get-timezone again to verify that the cluster time zone has been changed.

Note that changing the cluster time zone does not affect the time zone of Prism Element or Prism Central
VMs. To change their time zone, the administrator needs to use Prism Element UI or Prism Central UI
respectively5.

Question #:88

Which two capabilities does IPAM provide in a Nutanix networking configuration? (Choose two.)

A. Allows proxy server settings to be set up for a defined network

B. Allows AHV to assign IP addresses automatically to VMs using DHCP

C. Configures a VLAN with an IP subnet and assigns a group of IP addresses

D. Configures firewall rules to prevent or allow certain TCP/IP traffic

Answer: B C

Explanation
According to the Nutanix Support & Insights, IPAM enables AHV to assign IP addresses automatically to
VMs using DHCP. You can configure each virtual network and associated VLAN with a specific IP subnet,
associated domain settings, and group of IP address pools available for assignment.

Question #:89

What is the expected operation during node addition when the new node has a different AOS version?

A. The entire cluster is upgraded to the latest one-click release.

B. The node is added and a separate upgrade operation must be performed.

C. The addition fails and forces the administrator to image using standalone Foundation.

D. The node is automatically re-imaged using the software currently running in the cluster.

Verified Solution - 100% Result 59 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Answer: D

Explanation
The node is automatically re-imaged using the software currently running in the cluster. This is because
Nutanix supports a feature called Auto Re-Image that allows adding nodes with different AOS versions to an
existing cluster without manual intervention. The Auto Re-Image feature detects the AOS version mismatch
and automatically downloads and installs the same AOS version as the cluster on the new node. This ensures
that the cluster remains in a consistent state and avoids any compatibility issues.

Question #:90

An administrator needs to shut down an AHV cluster to relocate hardware. The administrator upgrades NCC
and runs health checks.

Which steps should the administrator perform next?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the
item requirements.

Verified Solution - 100% Result 60 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Answer:

Verified Solution - 100% Result 61 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Question #:91

An administrator responsible for a VDl environment needs to investigate reports of slow logins. The
administrator finds that increasing the number of vCPUs from 2 to 4 will reduce the login times. Production
workloads are consuming 75% of the host CPU on the cluster. The administrator increases the vCPU count on
all of the VDl VMs.

What are two impacts on the cluster? (Choose two)

A. Increasing CPU counts will decrease memory utilization

B. Increase memory utilization%

Verified Solution - 100% Result 62 of 112


Pass Exam Nutanix - NCP-MCI-6.5

C. Increase CPU utilization%

D. Increase CPU ready%

Answer: C D

Explanation
According to the web search results, the two impacts on the cluster that will result from increasing the vCPU
count on all of the VDI VMs are:

Increase CPU utilization%: CPU utilization is the percentage of time that a CPU is busy executing
instructions5. By increasing the vCPU count on all of the VDI VMs, the administrator will increase the
demand for CPU resources on the cluster, which will increase the CPU utilization percentage6.

Increase CPU ready%: CPU ready is the percentage of time that a vCPU is ready to run but is waiting
for a physical CPU to become available5. By increasing the vCPU count on all of the VDI VMs, the
administrator will increase the contention for physical CPU resources on the cluster, which will increase
the CPU ready percentage6. A high CPU ready percentage can indicate performance issues such as
latency or slowdowns5.

Question #:92

An administrator is troubleshooting vDisk performance issues in a Nutanix cluster with hybrid disks. The VMs
all have Flash Mode enabled.

But users are reporting disk latency.

What could cause the performance issues?

A. Flash mode is disabled when a node fails.

B. Compression is disabled on the vDisk storage container.

C. The VMs vDisks are in multiple containers.

D. Data size for flash mode exceeds 25% of the SSD capacity.

Answer: D

Explanation
data size for flash mode exceeds 25% of the SSD capacity could cause the performance issues. Flash mode is a
feature that allows vDisks to be pinned to SSDs for faster access, but it has a limit of 25% of the SSD capacity
per node. If this limit is exceeded, some vDisks may be evicted from flash mode and cause disk latency 2.

Question #:93

A cluster has RF2. The cluster loses two drives on different nodes in the same storage tier.

Verified Solution - 100% Result 63 of 112


Pass Exam Nutanix - NCP-MCI-6.5

What is the effect on the replicas of the VMs?

A. Some VM data may be lost

B. No VMs lose data if the node has two or more SSDs

C. Some VMs may reboot and gain access to data

D. No VMs lose data because of RF2

Answer: A

Question #:94

In Nutanix clusters, which feature ensures VMs can be migrated and restarted on another host in case of
failure?

A. High Availability

B. Protection Domain

C. Host Affinity Rules

D. Availability Zone

Answer: A

Question #:95

How should an administrator correct an SSL error when connecting to a Nutanix cluster?

A. Add the SSL certificate to the workstation’s trusted people store

B. Create a new self-signed certificate for the cluster with a 4096 bit key

C. Create a new SSL certificate for the cluster signed by an AD certificate authority

D. Add the SSL certificate to an AD group policy applied to all computer objects

Answer: C

Question #:96

Refer to the exhibit.

Verified Solution - 100% Result 64 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Which two initial cluster configuration tasks were missed during the deployment process? (Choose two.)

A. Host password changes

B. Password policy changes

C. BIOS password changes

D. CVM password changes

Answer: A D

Explanation
According to the image description, the exhibit shows a screenshot of a computer screen with a table of data.
The table has 6 columns and 4 rows. The columns are labeled “Date”, “Time”, “Status”, “Details”,
“Configuration”, and “Duration”. The rows contain information about different configurations and their
statuses. The background is a light blue color. There is a pop-up message on the bottom right corner of the
screen that reads “This question has been answered. Click here to enable the edit button.”

Based on the table data, it seems that the screenshot is taken from the Prism Central web console, showing the
results of a cluster health check report. The report shows that there are four failed checks: Host Password
Policy, CVM Password Policy, NTP Configuration, and Cluster Time Skew2. These checks indicate that some
initial cluster configuration tasks were missed during the deployment process.

The Host Password Policy check verifies that the host passwords are not set to default values and are
compliant with the password policy defined in Prism Central3. The CVM Password Policy check verifies that
the CVM passwords are not set to default values and are compliant with the password policy defined in Prism
Central4. These checks are important for ensuring the security and compliance of the cluster. Therefore,
changing the host and CVM passwords from their default values and following the password policy guidelines
are two initial cluster configuration tasks that were missed.

References: 1: VM Details View - Nutanix Support & Insights 2: Cluster Health - Nutanix Support &

Verified Solution - 100% Result 65 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Insights 3: Host Password Policy - Nutanix Support & Insights 4: CVM Password Policy - Nutanix Support &
Insights

Question #:97

Refer to Exhibit:

Why has an anomaly been triggered?

A. Because the CPU usage crossed the blue band.

B. Because the blue band range increased over the last 2 days

C. Because the CPU usage dropped belon' 20%

D. Because the CPU usage reached 100%

Answer: A

Explanation
Nutanix leverages a method for determining the bands called ‘Generalized Extreme Studentized Deviate Test’.
A simple way to think about this is similar to a confidence interval where the values are between the lower and
upper limits established by the algorithm.

Verified Solution - 100% Result 66 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Another web source3 shows an example of how anomaly detection works in Nutanix Prism Central. In the
video, you can see that when the observed value of a metric deviates significantly from the predicted value
based on historical data, an anomaly event is triggered and displayed on a chart.

Therefore, by comparing the observed values with the predicted values based on historical data, Nutanix
anomaly detection can identify abnormal behavior and alert you accordingly.

Question #:98

What is a requirement to enable Flow Neworking?

A. A dedicated virtual switch has been created for Flow Networking.

B. Flow Micro segmentation must be enabled.

C. Microservices infrastructure must be enabled.

D. Prims Central is using a three-node scale-out deployment

Answer: C

Explanation
Flow Networking is a feature that enables software-defined networking for AHV clusters. It allows users to
create and manage virtual private clouds (VPCs), subnets, and network services such as NAT, DHCP, routing,
and VPN. Flow Networking also supports service insertion and chaining, which enables integration with
third-party network functions such as firewalls and load balancers. Flow Networking is built on top of the
microservices infrastructure (MSP) in Prism Central, which provides the platform for running various Nutanix
services such as Calm, Karbon, and Objects. Therefore, to enable Flow Networking, the MSP must be enabled
first on Prism Central1. The MSP can be enabled from the Prism Central settings page or from the command
line interface (CLI) of the Prism Central VM2. Enabling the MSP will also enable Flow Microsegmentation,
which is another feature that provides network security and visibility for AHV clusters.

Question #:99

Which two access protocols are supported by Files? (Choose two.)

A. ISCSI

B. SMB

C. FCOE

D. NFS

Answer: B D

Explanation
According to the Network File System web search result3, NFS (Network File System) is a distributed file

Verified Solution - 100% Result 67 of 112


Pass Exam Nutanix - NCP-MCI-6.5

system protocol that allows a user on a client computer to access files over a network in a manner similar to
how local storage is accessed. NFS is one of the access protocols supported by Files. According to the
[MS-WPO]: File Access Services Protocols web search result4, SMB (Server Message Block) is a Windows
file sharing protocol that enables applications to discover, access, and share files that are hosted on or made
available by a file server, using a network between them, in a secure and managed environment. SMB is
another access protocol supported by Files. Therefore, SMB and NFS are two access protocols supported by
Files.

Question #:100

Which component can be associated with a storage policy?

A. Subnet

B. Catalog

C. Vm

D. Category

Answer: C

Explanation
A storage policy can be associated with a VM. A storage policy is a set of rules that define how data objects
are stored and protected. It specifies the characteristics of storage, data protection, and data placement for
virtual disks that are assigned to a VM. Subnets, catalogs, and categories are not associated with storage
policies.https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-vpc_2022_6:mul-cluster-stor

Question #:101

What are two minimum prerequisites for live migration to succeed? (Choose two.)

A. All AHV hosts have IP addresses in the same subnet

B. All AHV hosts must be configured on the same VLAN

C. All VMs have an IP address in the same subnet

D. All VMs are configured for the same VLAN

Answer: A D

Explanation
According to section 5 of the exam blueprint guide1, one of the topics covered is live migration. Live
migration is the process of moving a running VM from one host to another without any downtime or
interruption of service. To perform live migration, there are some prerequisites that must be met, such as:

All AHV hosts have IP addresses in the same subnet

Verified Solution - 100% Result 68 of 112


Pass Exam Nutanix - NCP-MCI-6.5

All VMs are configured for the same VLAN

The source and destination hosts have enough resources to accommodate the VM

The VM does not have any PCI devices attached

Question #:102

When creating a VM on an AHV cluster, how is the initial placement of the VM determined?

A. AHV uses a round robin algorithm, placing new VMs onto hosts based on the numerical order of their
UUID

B. The administrator right clicks on the desired host and selects Power on VM from the dropdown menu

C. The Acropolis Dynamic Scheduler selects a host which provides adequate resources for the VMs
configuration

D. Placement is determined by the host that holds the new_VM token at the time of VM creation

Answer: C

Explanation
According to section 6 of the exam blueprint guide1, one of the topics covered is VM placement options.
When creating a new VM on an AHV cluster, there are two ways to determine its initial placement:

Automatic placement: The Acropolis Dynamic Scheduler (ADS) selects a host that provides adequate
resources for the VM’s configuration, such as CPU, memory, disk space, and network bandwidth. ADS
also considers factors such as host load, power state, availability domains, and affinity rules.

Manual placement: The administrator can specify a host or a host group where they want to place the
VM.

Question #:103

AHV IPAM assigns an IP address from the address pool when creating a managed VM NIC.

At which two instances does the address release back to the pool? (Choose two)

A. The IP address lease expires

B. The VM NIC is deleted.

C. The IP address is changed to static.

D. The VM is deleted.

Verified Solution - 100% Result 69 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Answer: B D

Explanation
https://portal.nutanix.com/page/documents/solutions/details/?targetId=BP-2029_AHV:BP-2029_AHV

Administrators can use Acropolis with IPAM to deliver a complete virtualization deployment, including
network management, from the unified Prism interface. This capability radically simplifies the traditionally
complex network management associated with provisioning VMs and assigning network addresses. To avoid
address overlap, be sure to work with your network team to reserve a range of addresses for VMs before
enabling the IPAM feature.

The Acropolis master assigns an IP address from the address pool when creating a managed VM NIC; the
address releases back to the pool when the VM NIC or VM is deleted.

Question #:104

An administrator is working with Nutanix Support and needs to provide logs for troubleshooting an issue. The
cluster is located in a secure environment. Data such as IP addresses and VM names cannot be shared.

Which method should be used to anonymize the log data sent to Nutanix Support?

A)

B)

C)

D)

A. Option A

B. Option B

C.

Verified Solution - 100% Result 70 of 112


Pass Exam Nutanix - NCP-MCI-6.5

C. Option C

D. Option D

Answer: D

Question #:105

An administrator needs to report on any alerts generated by a Nutanix cluster that affected the cluster's
availability over the past 10 days.

Which method should be used to locate these events?

A. On the Health dashboard, use the Log Collector to export data based on time stamp.

B. Export the cluster event log to a CSV on the Alerts dashboard.

C. On the Alerts dashboard, filter based on Impact Type and the desired Time Range.

D. Configure an Alert Policy to generate an email with the data on the Health dashboard.

Answer: C
Question #:106

An administrator has been asked to enable block awareness and increase the fault tolerance to FT2 on a
Nutanix AHV cluster with the following configuration:

Four blocks

One node per block

Will the administrator be able to accomplish these tasks?

A. No-Fault tolerance changes are not supported.

B. Yes-FT2 requires a minimum of three nodes.

C. Yes-Block awareness requires a minimum of three blocks.

D. No-FT2 requires a minimum of five nodes.

Answer: D

Explanation
Fault tolerance (FT) is the ability of a cluster to withstand node failures and maintain data availability. FT is
determined by the replication factor (RF) of the data, which is the number of copies of each data block stored
on different nodes. FT = RF - 1, meaning that the cluster can tolerate as many node failures as one less than
the RF. Block awareness is a feature that enhances fault tolerance by ensuring that data copies are distributed

Verified Solution - 100% Result 71 of 112


Pass Exam Nutanix - NCP-MCI-6.5

across different blocks, which are groups of nodes that share a power source and network switch. Block
awareness requires a minimum of three blocks and a minimum of six nodes in the cluster.

In this scenario, the administrator has been asked to enable block awareness and increase the fault tolerance to
FT2 on a Nutanix AHV cluster with the following configuration: Four blocks, One node per block. The
administrator will not be able to accomplish these tasks because:

To enable block awareness, the cluster needs at least six nodes, but it only has four nodes.

To increase the fault tolerance to FT2, the cluster needs at least five nodes per RF3 or seven nodes per
RF4, but it only has four nodes.

Therefore, the administrator will need to add more nodes to the cluster before enabling block awareness and
increasing the fault tolerance to FT2.

Question #:107

An administrator recently added new SSDs to a Nutanix cluster and knows the firmware will be out of date,
Due to security constraints, the cluster does not have access to the Internet.

Which two steps must be completed to update the firmware? (Choose two.)

A. Download the disk firmware from the OEM's website.

B. Download a darksite bundle and deploy an internal webserver,

C. Select Upgrade Software, then upload the firmware bundle.

D. update the LCM Source and URL to access the firmware bundle.

Answer: B C

Download a dark site bundle and deploy an internal web server123.

Select Upgrade Software, then upload the firmware bundle using the Direct Upload option in LCM1.

Question #:108

An administrator logs in to Prism Element goes to the Network view, and sees the output shown in the exhibit.

Verified Solution - 100% Result 72 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Which three steps must the administrator take to increase throughput to the host? (Choose three.)

A. Connect the 10Gb interfaces to the physical switch.

B. Change the bond mode to balance-slb or balance—tcp.

C. Remove any 1Gb interfaces still connected from the default bond.

D. Add a new switch to the network and connect 1Gb interfaces to it.

E. Change the VLAN ID to a higher priority ID.

Answer: A B C

Explanation
These are the three steps that the administrator must take to increase throughput to the host. According to the
network diagram, the host has two 10Gb interfaces and two 1Gb interfaces in the default bond, but only one of
the 10Gb interfaces is connected to a switch. The other 10Gb interface is disconnected and has a red “X” on it.
The two 1Gb interfaces are also disconnected and have dotted lines. This means that the host is using only one
10Gb interface for all its network traffic, which limits its maximum bandwidth to 10 Gbps.

To increase the throughput, the administrator should connect both 10Gb interfaces to the physical switch,
preferably to different switches for redundancy and high availability. This will allow the host to use both 10Gb
interfaces for network traffic, which can increase its maximum bandwidth to 20 Gbps. However, this also
requires changing the bond mode from active-backup to balance-slb or balance-tcp, which are load balancing
modes that distribute network traffic across multiple interfaces based on source MAC address or TCP
session1. The default bond mode of active-backup only uses one interface at a time and switches to another
interface only when the active one fails2.

Finally, the administrator should remove any 1Gb interfaces still connected from the default bond, as they are
not needed and may cause performance issues or conflicts with the load balancing modes. The 1Gb interfaces
can be used for other purposes, such as management or backup networks, by creating separate bonds or
bridges for them3. Alternatively, they can be left disconnected if they are not required.

Verified Solution - 100% Result 73 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Question #:109

A customer wants to isolate a group of VMs within their Nutanix environment for security reasons. The
customer creates a VM with two NICs to act as a firewall and installs the appropriate software and certificates.

However, no one from the outside can access the application.

What is the likely cause of this problem?

A. A shared volume group must be used by all isolated VMs

B. More than one NIC cannot be added to a VM

C. One of the NICs needs to be configured on the internal VLAN

D. Wireshark is installed on the NAT VM

Answer: C

Explanation
One of the NICs needs to be configured on the internal VLAN. This is because the VMs that are isolated need
to communicate with the firewall VM through a private network, and the firewall VM needs to communicate
with the external network through a public network. The internal VLAN is a logical network that can be
created and managed by AHV1. If the firewall VM does not have a NIC on the internal VLAN, it will not be
able to route traffic between the isolated VMs and the outside world.

Question #:110

During an AHV upgrade, an administrator finds that a critical VM was powered off rather than migration to
another host.

Which scenario explains this behavior?

A. NO AHV hosts were able to be scheduled.

B. The VM OS hung during migration.

C. The VM was on the same host as the acropolis leader.

D. The VM was marked as an agent VM.

Answer: D

Explanation
An agent VM is a special type of VM that is used for running services or applications that are not affected by
high availability (HA) events or host maintenance. An agent VM is never migrated to any other host in the
cluster. If an HA event occurs or the host is put in maintenance mode, agent VMs are powered off and are

Verified Solution - 100% Result 74 of 112


Pass Exam Nutanix - NCP-MCI-6.5

powered on on the same host once that host returns to a normal state. This behavior is different from regular
VMs, which are migrated to another host in the cluster if possible, or restarted on the same host if not
possible1.

Therefore, during an AHV upgrade, an administrator may find that a critical VM was powered off rather than
migrated to another host if the VM was marked as an agent VM. This can be done either from the Prism web
console by selecting the Use this VM as an agent VM option in the Update VM dialog box, or from the aCLI
by using the vm.create or vm.update commands with the agent_vm=true parameter2. To avoid this situation,
the administrator should ensure that any critical VMs are not marked as agent VMs before starting the AHV
upgrade.

Question #:111

A recently configured cluster is leveraging NearSync with a recovery schedule of 15 minutes. It is noticed that
the cluster is consistently transitioning in an Out of NearSyne.

What action should be taken to potentially address this issue?

A. Increase network bandwidth

B. Change the NearSync schedule to 30 minutes.

C. Add a vCPUs to the user VMs.

D. Configure a secondary schedule in the same Protection Domain.

Answer: A

Explanation
One of the possible reasons for a cluster to transition out of NearSync is insufficient network bandwidth
between the source and target clusters. NearSync requires a minimum network bandwidth of 10 Mbps per VM
for replication3. If the network bandwidth is lower than the required amount, the replication of recovery points
may take longer than the configured RPO, resulting in an Out of NearSync condition. To address this issue,
you can increase the network bandwidth between the clusters or reduce the number of VMs protected by
NearSync4.

References: 1: Stargate - Nutanix Bible 2: Nutanix Cluster Architecture Overview - Nutanix


Bible 3: NearSync Disaster Recovery (RPO <= 15 minutes) - Nutanix Support & Insights 4: Transitioning in
and out of NearSync - Nutanix Support & Insights

Question #:112

A two-node ROBO cluster is configured with a witness VM.

Verified Solution - 100% Result 75 of 112


Pass Exam Nutanix - NCP-MCI-6.5

What happens when Node A goes down?

A. The- cluster becomes unavailable and goes into read-only mode.

B. All operations and services on the Node B are shut down and go into a waiting state.

C. The cluster is unaffected and no administrator intervention is required.

D. Node B sends a leadership request to the Witness VM and goes into single-node mode.

Answer: D

Explanation
According to the Nutanix Support & Insights, in a two-node ROBO cluster with a witness VM, if one node
goes down, the other node sends a leadership request to the witness VM and goes into single-node mode. The
cluster remains available and can tolerate another failure of either the witness VM or the network link.

Question #:113

How many Prism Central instances are required to deploy Leap:'

A.

Verified Solution - 100% Result 76 of 112


Pass Exam Nutanix - NCP-MCI-6.5

A. One per availability zone

B. One per customer environment

C. One per physical site

D. One per AHV cluster

Answer: B

Explanation
The number of Prism Central instances required to deploy Leap is one per customer environment. Prism
Central is a multi-cluster manager that provides a single, centralized management interface for Nutanix
environments3. Leap is a native cloud extension that provides disaster recovery as a service (DRaaS) for
Nutanix environments4. To use Leap, customers need to have one Prism Central instance deployed in their
primary site, and register it with their Xi Cloud Services account5. This Prism Central instance can manage
multiple Nutanix clusters across different physical sites or availability zones6.

Question #:114

What is the name of the internal bridge used by AHV nodes and CVMs?

A. vnet0

B. br1

C. br0

D. virbr0

Answer: C

Explanation
According to the Nutanix Support & Insights web search result1, the name of the internal bridge used by
AHV nodes and CVMs is br0. The internal bridge is an Open vSwitch (OVS) bridge that connects the AHV
host management interface, the CVM interface, and the VM vNICs. The internal bridge also acts as a gateway
for the CVM and VM traffic to reach the external network through the host physical NICs.

Question #:115

Where can an administrator change a CVM password?

A. KMS Server Terminal

B. CVM setting in Prism Element

C. CVM setting in Prism Central

D.

Verified Solution - 100% Result 77 of 112


Pass Exam Nutanix - NCP-MCI-6.5

D. Prism CVM VM Console

Answer: D
Question #:116

Which three configuration scenarios are valid for the deployment of Prism Central? (Choose three.)

A. Environments use Network Address Translation.

B. Prism Elements and Prism Central art in different subnets.

C. Environments do not have Internet access.

D. Prism Elements and Prism Central have proxy configured.

E. Environments use the 192.168.5.0/24 CVM management network.

Answer: A B C

Explanation
Prism Central is a multi-cluster manager that provides a single, centralized management interface for Nutanix
environments1. Prism Central can be deployed in different configuration scenarios, depending on the network
and security requirements of the environment. Some of the valid scenarios are:

Environments use Network Address Translation (NAT): NAT is a method of mapping one IP address
space to another by modifying network address information in IP datagram packet headers while they
are in transit across a traffic routing device2. NAT can be used to enable communication between Prism
Central and Prism Elements that are in different networks or subnets3. For example, Prism Central can
be deployed in a public cloud and use NAT to access Prism Elements that are in a private data center3.

Prism Elements and Prism Central are in different subnets: A subnet is a logical subdivision of an IP
network that allows multiple networks to share a single physical network4. Prism Elements and Prism
Central can be in different subnets as long as they can communicate with each other through routing or
NAT3. For example, Prism Central can be deployed in a management subnet and access Prism Elements
that are in different application subnets3.

Environments do not have Internet access: Internet access is not required for the deployment of Prism
Central, as long as the environment meets the prerequisites and considerations for installing or
upgrading Prism Central. For example, Prism Central can be deployed in a dark site, which is an
environment that does not have Internet access or has restricted Internet access. In this case, the
administrator needs to manually enable microservices infrastructure and download the required software
packages from another source.

Question #:117

When configuring Prism Central, which two log modules are able to forward messages to an external syslog
server? (Choose two.

A. API Audit

Verified Solution - 100% Result 78 of 112


Pass Exam Nutanix - NCP-MCI-6.5

B. Flow

C. DNS

D. NTP Synchronization

Answer: A B

Question #:118

Which two methods are available when migrating a VM from a legacy 3-tier solution using VMware ESXi to
AHV? (Choose two.)

A. Deploy the Move appliance.

B. Use Cross-Hypervisor DR.

C. Import the .vmdk into the Image Service.

D. Use shared nothing live migration.

Answer: A C

Explanation
Deploy the Move appliance and Import the .vmdk into the Image Service. These are two methods that can be
used to migrate a VM from VMware ESXi to AHV2. The Move appliance is a tool that automates the
migration process by converting the VM disks and configuration to AHV format and transferring them to the
Nutanix cluster3. The Image Service is a feature that allows users to upload and manage disk images that can
be used to create or clone VMs on AHV4. By importing the .vmdk file of the VMware VM into the Image
Service, users can create a new AHV VM from that image.

Question #:119

A configuration is single domain, single forest, and does not use SSL.

Which port number should be used to configure LDAP?

A. 389

B. 3269

C. 636

D. 3268

Answer: A

Verified Solution - 100% Result 79 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Explanation
Port 389 is the default port for LDAP without SSL encryption. Port 636 is used for LDAP over SSL
(LDAPS). Port 3268 and 3269 are used for Global Catalog (GC) and Global Catalog over SSL (GCSSL),
respectively2.

Question #:120

Which baseline is used to identify a Zombie VM?

A. VM is powered off for the past 21 days.

B. Memory usage is less than 1% and memory swap rate is equal to 0 Kbps for the past 21 days.

VM has no logins for the past 21 days

C. VM has no logins for the past 21 days

D. Fewer than 30 1/Os and less than 1000 bytes per day of network traffic for the past 21 days

Answer: D

Explanation
The correct answer is D. Fewer than 30 I/Os and less than 1000 bytes per day of network traffic for the past 21
days.

A zombie VM is a type of inactive VM that is powered on but does very little activity. A zombie VM wastes
host resources such as CPU, memory, disk, and network that could be used by other VMs. A zombie VM can
be identified by using the VM Profile feature in Prism Central. The VM Profile feature analyzes the resource
utilization of each VM and assigns it a profile based on its efficiency and impact on other VMs. The profiles
are as follows1:

Efficient: The VM is well-provisioned and has optimal resource utilization.

Over-provisioned: The VM has more resources than it needs and has low resource utilization.

Constrained: The VM has less resources than it needs and has high resource utilization.

Inactive: The VM has no resource utilization and is idle or powered off.

Bully: The VM has high resource utilization and causes contention for other VMs.

A zombie VM is a subtype of an inactive VM that meets the following criteria2:

The VM is powered on for the past 21 days.

The VM does fewer than 30 read or write I/Os (total) per day for the past 21 days.

The VM receives or transfers fewer than 1000 bytes per day of network traffic for the past 21 days.

Verified Solution - 100% Result 80 of 112


Pass Exam Nutanix - NCP-MCI-6.5

To identify a zombie VM, the administrator can use Prism Central to view the VM Profile dashboard and filter
by profile type. The dashboard shows the number of VMs in each profile type, as well as their resource
consumption and efficiency score. The administrator can also drill down into each VM to see its detailed
metrics and recommendations for optimization.

Question #:121

Which data savings technique utilizes stripes and parity calculation in a Nutanix cluster?

A. Compression

B. Parity strip

C. Erasure coding

D. Deduplication

Answer: C

Explanation
According to the Nutanix Support & Insights web search result1, erasure coding is a data savings technique
that utilizes stripes and parity calculation in a Nutanix cluster. Erasure coding increases the usable capacity on
a cluster by reducing the replication factor of data blocks. Instead of replicating data, erasure coding uses
parity information to rebuild data in the event of a disk or node failure. Erasure coding can save up to 50% of
storage space compared to replication factor 2, and up to 75% compared to replication factor 32.

Question #:122

An administrator notices that most of the VMs in the cluster are on one host. Users report that an application
seems to respond slowly. The application server VM has significantly more memory assigned to it than other
VMs.

How should the administrator fix this issue?

A. Reduce the amount of memory assigned to the VM.

B. Migrate the VM to a different host.

C. Add more memory to the VM.

D. Increase the memory on the CVM.

Answer: A

Explanation
According to the Troubleshoot high memory issues on Azure virtual machines web search result2, one of the
common factors in a low memory situation is over-provisioning memory for a VM. Over-provisioning
memory can cause memory pressure, which leads to swapping and degraded performance. Therefore, to fix

Verified Solution - 100% Result 81 of 112


Pass Exam Nutanix - NCP-MCI-6.5

this issue, the administrator should reduce the amount of memory assigned to the VM, based on the average
hardware requirements for that operating system and application load.

Question #:123

An administrator logs into the Nutanix Support Portal and notices there is a new version of the LCM
Framework available. In an effort ensure LCM is providing the latest features, the administrator would like to
upgrade LCM.

How can the LCM Framework be upgraded?

A. Perform an LCM inventory

B. Upload the latest LCM Framework as an image in the image Configuration in Prism

C. Upload the latest LCM Framework bundle via Upgrade Software in Prism

D. Upgrade AOS

Answer: A

Explanation
LCM (Life Cycle Manager) is a feature that allows Nutanix administrators to perform one-click firmware and
software upgrades for Nutanix clusters and components. LCM fetches inventory and update information from
a pre-configured URL that contains the latest versions of firmware and software packages. However,
upgrading Nutanix AOS does not automatically update the fetch URL. To update the fetch URL, the
administrator needs to update the LCM framework. The LCM framework is the core component of LCM that
provides the logic and functionality for inventory, download, and upgrade operations1.

To upgrade the LCM framework, the administrator needs to perform an LCM inventory. An LCM inventory is
a process that scans the cluster and its components for their current firmware and software versions and
compares them with the available versions from the fetch URL. If there is a newer version of the LCM
framework available, it will be shown as an update option under Cluster Software Component in the Available
Updates page. The administrator can then select and apply the LCM framework update to upgrade it to the
latest version2.

The administrator can perform an LCM inventory using Prism Element or Prism Central. The steps are as
follows3:

In Prism Element, go to the Network Configuration page and click Life Cycle Management.

In Prism Central, go to the Services page and click Life Cycle Management.

Click Inventory in the toolbar and select Perform Inventory from the drop-down menu.

Wait for the inventory process to complete and check for any available updates.

Question #:124

After configuring Active Directory as the desired authentication service, an administrator is not able to login

Verified Solution - 100% Result 82 of 112


Pass Exam Nutanix - NCP-MCI-6.5

into Prism Central using privileged account.

Which configuration must be checked first?

A. Account lock status

B. Role Mapping

C. Local user account

D. Cluster Lockdown

Answer: B

Explanation
According to the Nutanix Community1, users can authenticate using their Active Directory credentials when
Active Directory support is enabled for Prism Central. To enable Active Directory support, you need to
configure Role Mapping12, which defines how Active Directory groups map to Prism Central roles.

https://next.nutanix.com/ncm-intelligent-operations-formerly-prism-pro-ultimate-26/configuring-authentication-38051

Question #:125

Which inefficient VM Profile can be used to identify a VM that consumes too many resources and causes
other VMs to starve?

A. Over-provisioned VM

B. Inactive VM

C. Bully VM

D. Constrained VM

Answer: C

Explanation
A bully VM is a VM that consumes too many resources and causes other VMs to starve. A bully VM can
affect the performance and availability of other VMs on the same host or cluster by hogging CPU, memory,
disk, or network resources. A bully VM can be identified by using the VM Profile feature in Prism Central2.
The VM Profile feature analyzes the resource utilization of each VM and assigns it a profile based on its
efficiency and impact on other VMs. The profiles are as follows3:

Efficient: The VM is well-provisioned and has optimal resource utilization.

Over-provisioned: The VM has more resources than it needs and has low resource utilization.

Constrained: The VM has less resources than it needs and has high resource utilization.

Verified Solution - 100% Result 83 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Inactive: The VM has no resource utilization and is idle or powered off.

Bully: The VM has high resource utilization and causes contention for other VMs.

To identify a bully VM, the administrator can use Prism Central to view the VM Profile dashboard and filter
by profile type. The dashboard shows the number of VMs in each profile type, as well as their resource
consumption and efficiency score. The administrator can also drill down into each VM to see its detailed
metrics and recommendations for optimization.

Question #:126

An administrator receives complaints of poor performance in a particular VM.

Based on the VM performance metric, what is the most likely cause of this behavior?

A. Oplog is full cannot serve IO request from this VM.

B. The host’s CPU is severely overloaded.

C. SSD tier is not big enough to serve workloads’ IOPS demand.

D. The VM needs more vCPUs

Answer: C

Explanation
one of the key metrics to consider for VM performance is IOPS (Input/Output Operations Per Second), which
is a measure of the number of input/output requests a device processes per second3. Another metric
is throughput, which is a measure of how much data a device transfers per second3.

Question #:127

An administrator needs to bring down a host in a Nutanix Cluster for maintenance reasons. The administrator
puts the host in maintenance mode.

What should the administrator do to perform an orderly shutdown of the CVM?

A. Execute the cvm_shutdown -P new command from the CVM.

B. Enter Fever off Server - immediate from the IPMI console.

C. Enter Fewer off Server-orderly Shutdown from the IPMI console.

D. Execute the cvm_shutdown -P now command from the host.

Answer: A

Explanation

Verified Solution - 100% Result 84 of 112


Pass Exam Nutanix - NCP-MCI-6.5

According to the How to use the cvm_shutdown script web search result3, the cvm_shutdown script signals
HA when shutting down the CVM (Controller VM) to forward the storage traffic to another healthy CVM.
Instead of using sudo shutdown or sudo reboot commands, this script should be used to minimize I/O hits in
user VMs running on the present hypervisor host. The cvm_shutdown -P now command will initiate the
shutdown process on the CVM immediately. Therefore, if the administrator needs to perform an orderly
shutdown of the CVM, they should execute this command from the CVM.

Question #:128

Which capability refers to the storage of VM data on the node where the VM is running and ensure that the
read I/O does not have to traverse the network?

A. Intelligent Locally

B. Data Locality

C. Intelligent Tiering

D. Data Tiering

Answer: B

Explanation
Data locality is the capability of storing VM data on the node where the VM is running and ensuring that the
read I/O does not have to traverse the network. Data locality is a unique feature of Nutanix that provides high
performance and low latency for VMs by minimizing network traffic and crosstalk. Data locality works by
writing one copy of the data local to the VM and the other copy (or copies) on other nodes. When a VM
migrates to another node, Nutanix also moves its data to the new node and serves all I/O requests locally. Data
locality also adapts to changing workloads and access patterns by dynamically moving data to where it is
needed most1.

Question #:129

The Update Source for LCM has been configured as shown in the exhibit. Inventory is failing consistently.

Verified Solution - 100% Result 85 of 112


Pass Exam Nutanix - NCP-MCI-6.5

What is the likely cause of this issue?

A. Port 433 Is blocked by a firewall.

B. Port 80 is blocked by a firewall.

C. The administrator does not have a valid portal account.

D. The license assigned to the cluster has expired.

Answer: B

Explanation
Answer: B. Port 80 is blocked by a firewall.

According to the image description, the update source for LCM is configured to use the Nutanix Portal URL,
which is a web address that requires internet access. The LCM inventory operation needs to download the
latest manifest file and module files from the Nutanix Portal URL using port 801. If port 80 is blocked by a
firewall, the LCM inventory will fail with an error message such as “Failed to get size of file at 5” or “The
requested URL returned error: 403 Forbidden” as shown in the web search results23. To resolve this issue, the
firewall rules need to be updated to allow port 80 traffic from the CVMs to the Nutanix Portal URL1.

References: 1: LCM Requirements - Nutanix Support & Insights 2: LCM Operation failed. Reason: Inventory
setup failed. - Mastering Nutanix 3: LCM: Perform Inventory Fails with error: Pre-check test_cluster_status
failed - Nutanix Support & Insights

Question #:130

An administrator is concerned about the amount of data that a VM reading and writing to the storage fabric.

Which metric will provide that data?

A. Host Hypervisor IO Bandwidth

B. Host Disk IOPS

C. VM Storage Controller IOPS

D. VM Storage Controller Bandwidth

Answer: D

Explanation
The correct answer is D. VM Storage Controller Bandwidth.

VM Storage Controller Bandwidth is a metric that measures the amount of data that a VM is reading and
writing to the storage fabric. The storage fabric is the network of storage controllers (CVMs) that provide

Verified Solution - 100% Result 86 of 112


Pass Exam Nutanix - NCP-MCI-6.5

distributed and fault-tolerant storage services to the VMs on the Nutanix cluster. The VM Storage Controller
Bandwidth metric shows the read and write bandwidth in megabytes per second (MBps) for each VM. The
higher the bandwidth, the more data the VM is transferring to and from the storage fabric1.

The administrator can use Prism Central to view the VM Storage Controller Bandwidth metric for each VM in
a chart or a widget. The administrator can also use Prism Central to view other metrics related to the VM’s
storage performance, such as VM Storage Controller IOPS, VM Storage Controller Latency, and VM Disk
Usage2.

Question #:131

Which three upgrades should an administrator be able to perform using Lifecycle Management? (Choose
Three)

A. AOS

B. BMC

C. BIOS

D. Hypervisor

E. HBA Firmware

Answer: B C E
Question #:132

What is Prism Central primarily used for?

A. Multi-cluster network configuration

B. Container creation

C. Multi-cluster Single Sign On

D. Data reduction configuration

Answer: C

Explanation
According to the web search results, Prism Central is a multi-cluster manager that provides a single,
centralized management interface for Nutanix environments12. One of the features of Prism Central is
multi-cluster Single Sign On (SSO), which allows users to log in once and access multiple clusters without
re-entering credentials3.

Question #:133

Refer to the exhibit.

Verified Solution - 100% Result 87 of 112


Pass Exam Nutanix - NCP-MCI-6.5

An administrator is trying to implement the solution that is shown in the exhibit, but has been unsuccessful.

Based on the diagram, what is causing the issue?

A. A remote Witness VM

B. Active containers in both sites

C. Network latency

Verified Solution - 100% Result 88 of 112


Pass Exam Nutanix - NCP-MCI-6.5

D. Unsupported hypervisor

Answer: C

Explanation
The correct answer is C. Network latency.

The diagram shows a solution that uses synchronous replication between two remote protection domains,
cluster site A and cluster site B. Synchronous replication is a feature that allows near-zero RPO (recovery
point objective) by replicating data to the remote site before acknowledging writes to the local site. However,
synchronous replication has some requirements and limitations that must be met for it to work properly. One
of these requirements is that the network latency between the two sites must be less than or equal to 5 ms1. If
the network latency is higher than 5 ms, the synchronous replication will fail and the protection policy will be
suspended2.

Therefore, based on the diagram, the most likely cause of the issue is that the network latency between cluster
site A and cluster site B is higher than 5 ms, which prevents the synchronous replication from working. To
verify this, the administrator can use the “ncli cluster ping” command to measure the network latency between
the two sites3. If the network latency is indeed higher than 5 ms, the administrator can either improve the
network performance or switch to a different replication mode, such as near-synchronous or asynchronous.

Question #:134

The customer is seeing high memory utilization on a mission critical VM. Users report that the application is
unavailable. The guest OS does not support hot add components.

How should the administrator fix this issue?

A. Access the CVM on the host that is running the VM:

*Open acli

*Run a command to increase the amount of RAM assigned to the VM

B. From the Prism web console:

*Go to the VM dashboard

*Select the VM from the VMs list

*Choose Update

*Adjust the amount of memory assigned to the VM

C. Go to Control Panel in the VM:

*Select the Computer Properties

*Increase the amount of RAM assigned

Verified Solution - 100% Result 89 of 112


Pass Exam Nutanix - NCP-MCI-6.5

D. During the next maintenance window:

*Select the VM from the VMs list

*Perform a graceful shutdown

Answer: B

Explanation
The best way to fix this issue is to increase the amount of memory assigned to the VM from the Prism web
console. This option allows the administrator to modify the VM configuration without accessing the CVM or
shutting down the VM. The Prism web console provides a simple and intuitive interface for managing Nutanix
clusters and VMs1. To change the memory allocation for a VM, the administrator can follow these steps2:

Go to the VM dashboard

Select the VM from the VMs list

Choose Update

Adjust the amount of memory assigned to the VM

Click Save

Question #:135

An administrator needs to deploy an application with a large amount of data connected via Nutanix volumes.

Which two actions should the administrator take when designing the Volume Group? (Choose two.)

A. Distribute workload across multiple virtual disks

B. Enable RSS (Receive Side Scaling)

C. Use multiple subnets for iSCSI traffic

D. Enable thick provisioning on the Volume Group(s)

Answer: A B

Explanation
According to the Nutanix Volumes - Recommendations And Best Practices web search result3, two actions
that the administrator should take when designing the Volume Group are:

Distribute workload across multiple virtual disks: Use multiple disks rather than a single large disk for
an application. Consider using a minimum of one disk per Nutanix node to distribute the workload
across all nodes in a cluster. Multiple disks per Nutanix node may also improve an application’s

Verified Solution - 100% Result 90 of 112


Pass Exam Nutanix - NCP-MCI-6.5

performance. For performance-intensive environments, we recommend using between four and eight
disks per CVM for a given workload.

Enable RSS (Receive Side Scaling): Receive-side scaling (RSS) allows the system to use multiple CPUs
for network activity. With RSS enabled, multiple CPU cores process network traffic, preventing a single
CPU core from becoming a bottleneck. Enabling RSS within hosts can be beneficial for heavy iSCSI
workloads. For VMs running in ESXi environments, RSS requires VMXNET3 VNICs. For Hyper-V
environments, enable VMQ to take full advantage of Virtual RSS.

Question #:136

Which command should an administrator run from the CLI to view the uplink state of all AHV nodes in the

cluster?

A. allssh show_uplinks

B. manage_ovs show_uplinks

C. allssh manage_ovs show_uplinks

D. manage ovs show uplinks

Answer: C

Explanation
According to section 4 of the exam blueprint guide1, one of the topics covered is AHV networking
components and configuration settings. One of these components is Open vSwitch (OVS), which is a software
switch that provides network connectivity between VMs and physical networks. OVS has two types of ports:

Uplink ports: These are physical ports that connect to external networks or switches.

Internal ports: These are virtual ports that connect to VMs or other internal networks.

To view the uplink state of all AHV nodes in the cluster, an administrator can use the manage_ovs command
with the show_uplinks option. This command displays information such as port name, link state, speed, duplex
mode, MTU size, bond mode, and bond status. However, this command only works on a single node. To run
the command on all nodes in the cluster, an administrator can use the allssh command, which executes a
command on all CVMs in parallel. Therefore, the correct command is:

allssh manage_ovs show_uplinks

Question #:137

An administrator needs to increase bandwidth available to the AHV host and to the CVM.

How should the administrator complete this task?

A.

Verified Solution - 100% Result 91 of 112


Pass Exam Nutanix - NCP-MCI-6.5

A. In Prism, update vs0 to change the configuration to Active-Active.

B. Use manage-ovs commands to update br0 change the configuration to Active-Active.

C. In Prism, create a vsl interface and add any remaining uplinks.

D. Use manage-ovs commands to create br1 and add any remaining uplinks

Answer: B

Explanation
The default network configuration for AHV hosts and CVMs is a bond named br0-up with two or more
uplinks in active-backup mode. This means that only one uplink is active at a time, while the others are in
standby mode. This provides high availability, but not load balancing or increased bandwidth. To increase the
bandwidth available to the AHV host and the CVM, the administrator can change the bond mode to
Active-Active, which allows all uplinks to be used simultaneously. This can be done using the manage-ovs
commands on each AHV host. The steps are as follows1:

Log in to the AHV host using SSH.

Enter maintenance mode on the CVM by running allssh 'cluster status | grep -i cvm | grep -i down'.

Change the bond mode to Active-Active by running manage_ovs --bond_mode active-active


update_uplinks br0-up <uplink_list>, where <uplink_list> is a comma-separated list of uplink interfaces
(for example, eth0,eth1).

Verify the bond mode by running manage_ovs show_uplinks.

Exit maintenance mode on the CVM by running allssh 'cluster start'.

Question #:138

An administrator is tasked with configuring network on an AHV cluster and wants to maximize throughput for
the host with many small VMs while minimizing network switch configuration.

Which bond mode should the administrator select?

A. Active-active

B. Active-Active with Mac Pinning

C. Active-Backup

D. No-Uplink Bond

Answer: A

Explanation
According to the Nutanix AHV Networking Guide, active-active bond mode provides load balancing and fault

Verified Solution - 100% Result 92 of 112


Pass Exam Nutanix - NCP-MCI-6.5

tolerance for network traffic by distributing packets across multiple interfaces using a hashing algorithm based
on source and destination MAC addresses, IP addresses, and TCP/UDP ports. This mode does not require any
special configuration on the network switch and can improve throughput for hosts with many small VMs.

Question #:139

What is he recommended approach for a constrained VM?

A. Reboot the VM

B. Delete the VM.

C. Increase the VM resources.

D. Decrease the VM resources

Answer: C

Explanation
A constrained VM is one that does not have enough resources for the demand and can lead to performance
bottlenecks. A VM is considered constrained when it exhibits one or more of the following baseline values,
based on the past 21 days: CPU usage > 90% (moderate), 95% (severe) CPU ready time > 5%, 10% Memory
usage > 90%, 95% Memory swap rate > 0 Kbps1. To provide adequate host resources, resize (increase) the
constrained VMs1.

Question #:140

What is the default network bond setting for an AHV host configuration?

A. active-backup

B. active-active

C. balance-slb

D. balance-tcp

Answer: A

Explanation
https://next.nutanix.com/blog-40/network-load-balancing-with-acropolis-hypervisor-6463

Question #:141

While installing Windows 2019 on a new VM on an AHV cluster, an administrator notices there aren’t any
drives listed for the install.

What might the problem be?

Verified Solution - 100% Result 93 of 112


Pass Exam Nutanix - NCP-MCI-6.5

A. VirtIO drivers have not yet been installed and the disks are IDE disks.

B. VirtIO drivers have not yet been installed and the disks are SCSI disks.

C. VirtIO drivers must be installed on AHV for installations of Windows.

D. VirtIO drivers aren’t supported on this version of Windows 2019.

Answer: B

Explanation
VirtIO drivers are device drivers that are specifically designed for virtualized environments. They allow the
guest operating system to communicate directly with the underlying hardware, bypassing the emulation layer.
This improves the performance and efficiency of the virtual machines. VirtIO drivers are supported by various
hypervisors, including Nutanix AHV1.

Nutanix AHV uses SCSI disks for VMs by default. However, Windows does not have native support for SCSI
disks and requires VirtIO drivers to recognize them. Therefore, if an administrator is installing Windows 2019
on a new VM on an AHV cluster, they need to install the VirtIO drivers before selecting the destination disk
for the installation. Otherwise, they will not see any drives listed for the install2.

To install the VirtIO drivers during Windows installation, the administrator can use one of the following
methods3:

Use a VirtIO ISO image that contains the driver files. The administrator can download the VirtIO ISO
image from the Nutanix support portal and upload it to the AHV image service. Then, they can attach
the VirtIO ISO image to the VM as a CD-ROM device and load the driver from it during Windows
installation.

Use a Nutanix Guest Tools (NGT) ISO image that contains the driver files and other tools. The
administrator can download the NGT ISO image from Prism Element or Prism Central and attach it to
the VM as a CD-ROM device. Then, they can load the driver from it during Windows installation.

Use a floppy disk image that contains only the driver files. The administrator can create a floppy disk
image using tools such as WinImage or WinRAR and upload it to the AHV image service. Then, they
can attach the floppy disk image to the VM as a floppy device and load the driver from it during
Windows installation.

Question #:142

An administrator has an AHV cluster that is comprised of 4 nodes with the following configuration in each
node:

CPU:2 each 2.4GHz, 12 core

Memory: 256GB

Disk: 6 each 1.92 SSD

Verified Solution - 100% Result 94 of 112


Pass Exam Nutanix - NCP-MCI-6.5

A VM with 16 vCPUs and 96GB of RAM is being created on the cluster.

How should the administrator configure the VM to assure optimal performance?

A. With an affinity policy

B. With memory overcommit

C. With 2 vNUMA nodes

D. With Flash Mode enabled

Answer: C

Explanation
The best way to configure the VM for optimal performance is to set it up with 2 vNUMA nodes. This will
ensure that the VM is configured to take advantage of the CPU and memory resources available in each node,
and it will also ensure that all of the cores are utilized for the best performance. Additionally, the administrator
should ensure that the VM has an affinity policy set up so that the vCPUs are evenly distributed across the four
nodes. Finally, Flash Mode should be enabled in order to take advantage of the high-performance SSDs that
are available in the cluster

Question #:143

A node with Erasure Coding fails.

What is the impact?

A. The node stops utilizing Erasure Coding.

B. Potentially increased amount of data stored in the SSD tier.

C. Increased Controller VM CPU Load.

D. AQS unable to do deduplication during the Erasure Coding failure.

Answer: B

Explanation
When a node with Erasure Coding fails, the cluster will automatically rebuild the missing data using
replication factor (RF) 2 or 3, depending on the cluster configuration. This means that the data that was
previously stored using Erasure Coding will now be stored using full copies, which may increase the amount
of data stored in the SSD tier1.

Question #:144

After logging into Prism Element, an administrator presses the letter A on the Keyboard.

Verified Solution - 100% Result 95 of 112


Pass Exam Nutanix - NCP-MCI-6.5

What is the expected outcome of this input?

A. Alerts page will launch

B. Analysis will launch

C. About Nutanix page will launch

D. API Explorer page will launch

Answer: D

Explanation
API Explorer page will launch when an administrator presses the letter A on the keyboard after logging into
Prism Element. This is one of the keyboard shortcuts that Prism Element provides for accessibility and ease of
use1. API Explorer is a tool that allows users to explore and test Nutanix REST APIs within Prism Element1.

https://www.nutanixbible.com/3b-book-of-prism-navigation.html

Question #:145

A guest VM should be able to tolerate simultaneous failure of two nodes or drives.

What are the minimum requirements for the Nutanix cluster?

A. 3 nodes with cluster RF 3 and container RF 3

B. 3 nodes with cluster RF 3 and container RF 2

C. 5 nodes with cluster RF 2 and container RF 3

D. 5 nodes with cluster RF 3 and container RF 3

Answer: D

Question #:146

An administrator adds a node with older generation processors to an existing AHV cluster with newer
generation processors. What is the effect on live migration?

A. Live migration continues to function as expected and VMs can move to any AHV host.

B. Live migration is prevented until the administrator enables the legacy migration option.

C. Live migration is prevented until the administrator manually changes the newer processor level.

D. Live migration of VMs is prevented between newer and older processors.

Verified Solution - 100% Result 96 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Answer: D

Explanation
According to the Migration to a different processor web search result2, live migration of VMs depends on the
source and destination hosts having the same CPU functions (CPU flags). Live migration requires the source
and destination hosts to have CPUs from the same manufacturer, and only CPU functions which both hosts
support are provided (same CPU generation, or by using VMware Enhanced vMotion Compatibility (EVC)).
If the administrator adds a node with older generation processors to an existing AHV cluster with newer
generation processors, then live migration of VMs is prevented between newer and older processors, unless
EVC is enabled.

Question #:147

What requires iSCSI initiator configuration in the guest OS to use Volumes?

A. SQL Server Always On Availability Group

B. Microsoft Windows Failover Cluster

C. Oracle RAC

D. Exchange DAG

Answer: B

Explanation
The only option that requires iSCSI initiator configuration in the guest OS to use Volumes is Microsoft
Windows Failover Cluster. Volumes is an enterprise-class, software-defined block storage solution that
exposes storage resources directly to virtualized guest operating systems or physical hosts using the iSCSI
protocol7. To use Volumes, customers need to configure iSCSI initiators on their hosts or guest OSes.
However, some applications or services can use native storage adapters instead of iSCSI initiators when
running on AHV VMs. These include:

SQL Server Always On Availability Group: This is a high availability and disaster recovery solution for
SQL Server databases that uses Windows Server Failover Clustering (WSFC) and Availability Groups
(AGs) as its core components. When running on AHV VMs, SQL Server Always On Availability Group
can use native storage adapters instead of iSCSI initiators.

Oracle RAC: This is a clustered database system that provides high availability and scalability for
Oracle databases. When running on AHV VMs, Oracle RAC can use native storage adapters instead of
iSCSI initiators.

Exchange DAG: This is a group of up to 16 mailbox servers that hosts a set of databases and provides
automatic database-level recovery from failures that affect individual servers or databases. When
running on AHV VMs, Exchange DAG can use native storage adapters instead of iSCSI initiators.

Question #:148

Verified Solution - 100% Result 97 of 112


Pass Exam Nutanix - NCP-MCI-6.5

An administrator has created a Nutanix managed it a VLAN ID of 512.

Several VMs have been created, and the administrator notices that the can successfully communicate with
other VMs on that VLAN.

Provided they are on the host, but cannot communicate with VMs that reside on different hosts in the cluster.

What is most likely thee cause of this issue?

A. There is a firewall rule blockingVLAN512 traffic.

B. VLANS12 is a reserved VLAN ID, and not usable for guest VMs.

C. The VLAN was not created on the upstream switches.

D. The administrator did not create the VLAN on all hosts

Answer: C

Explanation
The correct answer is C. The VLAN was not created on the upstream switches.

A VLAN (virtual local area network) is a logical segmentation of a physical network that allows devices on
the same VLAN to communicate with each other, regardless of their physical location. A VLAN also isolates
the devices on different VLANs from each other, unless there is a router or a layer 3 switch that can route
traffic between VLANs. To create a VLAN, the administrator needs to configure the network devices that are
involved in the VLAN, such as switches, routers, and hosts. The administrator also needs to assign a unique
VLAN ID to each VLAN, which is a number between 1 and 4094 that identifies the VLAN1.

In Nutanix AHV, the administrator can create a Nutanix managed network with a specific VLAN ID for guest
VMs. This network can be assigned to VM NICs using Prism Element or Prism Central. However, creating a
Nutanix managed network does not automatically create the VLAN on the upstream switches that connect the
AHV hosts. The administrator needs to manually configure the upstream switches to allow the VLAN traffic
on the ports that connect to the AHV hosts. The administrator also needs to ensure that the upstream switches
are interconnected physically or virtually and can forward traffic between different VLANs if needed2.

Therefore, if an administrator has created a Nutanix managed network with a VLAN ID of 512 and notices
that the VMs on that network can only communicate with other VMs on the same host, but not with VMs on
different hosts in the cluster, the most likely cause of this issue is that the VLAN was not created on the
upstream switches. This means that the switches are dropping or blocking the traffic with VLAN ID 512 and
preventing it from reaching other hosts or VMs. To resolve this issue, the administrator should create the
VLAN on the upstream switches and allow it on the ports that connect to the AHV hosts3.

Question #:149

An administrator has set up a local web server accessible to the Nutanix clusters.

Which two steps are required to set up LCM for an environment without Internet access? (Choose two.)

A.

Verified Solution - 100% Result 98 of 112


Pass Exam Nutanix - NCP-MCI-6.5

A. Download the lcai_disconnecced_version. tar.gz LCM bundle from the support portal.

B. Edit LCM Advanced Settings in Prism Element and enter the address of the web server.

C. Edit LCM Advanced Settings m Prism Central and enter the address of the web server.

D. Download the lcm_dark_site_version. tar . gz LCM bundle from the support portal.

Answer: B D

Question #:150

Which component ensures uniform distribution of data throughout the cluster to eliminate hot spots and speed
up rebuilds?

A. Cassandra

B. Distributed Storage Fabric

C. High Availability

D. Acropolis App Mobility Fabric

Answer: B

Explanation
According to the web search results, Distributed Storage Fabric (DSF) is the scale-out storage technology that
makes HCI and cloud possible45. DSF pools the storage devices that are directly attached to a cluster of
servers and presents them to applications across a variety of storage protocols4. DSF also manages and
protects data by a fine-grained, distributed metadata system that ensures uniform distribution of data
throughout the cluster to eliminate hot spots and speed up rebuilds

Question #:151

An administrator is preparing to deploy a new application on an AHV cluster, Security requirements dictate
that all virtual servers supporting this application must be prevented from communicating with unauthorized
hosts.

Which option would achieve this goal?

A. Create a new VLAN, create a subnet on the cluster with the VLAN tag, deploy servers with vNlCs in the
new subnet.

B. Create a new Application Security Policy restricting communication to the authorized hosts and apply it
to the servers in enforce mode.

C. Create a new solation Environment policy apply it to the new servers and all authorized hosts.

D. Create new' subnet and assign to an existing VPC assign the IP prefix and gateway for the subnet,

Verified Solution - 100% Result 99 of 112


Pass Exam Nutanix - NCP-MCI-6.5
D.
deploy servers with vNlC5 in the new subnet.

Answer: B

Explanation
An Application Security Policy is a security feature in Nutanix AHV that can be used to restrict network
communication between virtual servers based on a variety of criteria, such as IP address, port, and protocol.
By creating a policy that restricts communication to authorized hosts and applying it to the servers in enforce
mode, the administrator can prevent unauthorized communication between virtual servers.

https://www.nutanix.com/products/ahv

Question #:152

A customer has a newly-deployed AHV cluster with nodes that have 2.x 10 GBE and 2.x interface. The
customer wants to use all available network interfaces to provide connectivity to the VMs.

Which option should the administrator use to achieve this while remaining consistent with Nutanix
recommendations?

A. Create separate VLANs that map 10GbE and 1GbE interfaces.

B. Createbond1 on virbr0 and add the 1GbE interfaces to it for VM use.

C. Create a second bond on br0 on each host and assign the 1 GbE interfaces to it.

D. Create a second bridge on each host and assign the 1GbE interfaces to it.

Answer: D

Explanation
According to the web search results, one of the best practices for Nutanix AHV networking is to create a
second bridge on each host and assign the 1GbE interfaces to it3. This way, the customer can use both 10GbE
and 1GbE interfaces for VM traffic, and also benefit from network isolation and redundancy.

Question #:153

Which component is supported by Prism Central storage policies?

A. Virtual Machines

B. Volume Groups

C. VM Templates

D. Storage Containers

Answer: A

Verified Solution - 100% Result 100 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Explanation
According to the Nutanix Prism Central Guide, Prism Central allows you to apply storage policies on a per
VM basis using Category, so that the VM uses the storage configuration defined in the storage policy. Using a
storage policy, you can manage parameters of VMs, such as encryption, type of or lack of data compression,
and IOPS or Throughput throttling values to be applied to the entities.

Question #:154

An administrator manages an AHV cluster that is dedicated to a dev/test environment. The administrator
receiving complaints from users that they are unable to create new VMs on the cluster.

After the reviewing the cluster, the administrator finds that the memory resources are almost fully utilized,
with many VMs over-provisioned on memory.

What option is the most efficient resolution to enable additional VMs to be created?

A. Enable Memory Overcommit on the over-provisioned VMs.

B. Enable Memory HA on the over-provisioned VMs.

C. Upgrade the nodes with additional memory DlMMs.

D. Disable HA Reservation on the cluster.

Answer: A

Explanation
Enable Memory Overcommit on the over-provisioned VMs is the most efficient resolution to enable additional
VMs to be created. Memory overcommit allows VMs to use more memory than physically available on a host
by compressing and swapping memory pages to storage1. This can improve memory utilization and increase
VM density on a cluster1. However, memory overcommit is not supported when HA is configured to use
reserved hosts, so you may need to disable HA reservation on the cluster before enabling memory overcommit
1.

Question #:155

Prism Central will be installed manually on an AHV cluster.

Which three disk images must be downloaded from the portal for the Prism Central VM? (Choose three.)

A. var

B. tmp

C. boot

D. home

E.

Verified Solution - 100% Result 101 of 112


Pass Exam Nutanix - NCP-MCI-6.5

E. data

Answer: C D E

Explanation
https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-Prism-v5_10:mul-pc-install-scratch-c

According to the Nutanix Support & Insights web search result4, Prism Central can be installed manually on
an AHV cluster by using three disk images: boot, home, and data. These disk images must be downloaded
from the portal for the Prism Central VM and uploaded to an image service on the AHV cluster. The boot
image contains the operating system and kernel for Prism Central. The home image contains the configuration
files and logs for Prism Central. The data image contains the database and application files for Prism Central.

Question #:156

The administrator wants a container to be displayed and limited to 1TB in the hypervisor.

What advanced container setting must the administrator set?

A. Advertised Capacity

B. Reserved Capacity

C. Advertised Quota

D. Reserved Quota

Answer: A

Explanation
According to the Nutanix Support & Insights web search result3, advertised capacity is an advanced container
setting that allows the administrator to reserve an advertised storage space for a storage container. An
advertised capacity setting gives the hypervisor a maximum storage size that the storage container can use.
This setting can be any arbitrary value greater than or equal to the resiliency required. The hypervisor ensures
that the storage container storage doesn’t go beyond the advertised capacity. If the administrator wants a
container to be displayed and limited to 1TB in the hypervisor, they should set the advertised capacity to 1TB.

Question #:157

An administrator is configuring cross-hypervisor DR from an ESXi cluster to a new AHV cluster. When the
administrator migrates a protection domain to the AHV cluster, the VMs fail to boot.

What should the administrator do to correct this problem?

A. Increase the snapshot frequency to more than 6 hours.

B. Uninstall VMware Tools from the VMs.

C. Install Nutanix Guest Tools in the protected VMs.

Verified Solution - 100% Result 102 of 112


Pass Exam Nutanix - NCP-MCI-6.5

D. Add all VMs into a single consistency group.

Answer: C

Explanation
According to the web search results, one of the requirements for cross-hypervisor disaster recovery (CHDR) is
to install and configure Nutanix Guest Tools (NGT) on all the VMs2. NGT configures the VM with all the
required drivers for VM portability. Without NGT, the VMs may fail to boot after being migrated to a
different hypervisor type.

Question #:158

A system administrator needs to add more VMs to their Nutanix cluster.

Which two actions should the administrator perform to determine if the current cluster can accommodate the
new VMs? (Choose two)

A. Enable Deduplication and Ensure Coding

B. Utilize Optimize Resources for VM efficiency

C. Determine utilization with Cluster Runway

D. Perform an inventory with Life Cycle Management

Answer: B C

Explanation
According to the web search results, the two actions that the administrator should perform to determine if the
current cluster can accommodate the new VMs are:

Utilize Optimize Resources for VM efficiency: Optimize Resources is a feature in Prism Central that
helps the administrator improve the efficiency and performance of their VMs by identifying and
resolving issues such as overprovisioning, inactivity, constraints, or bullying3. By using Optimize
Resources, the administrator can reclaim unused resources and optimize the resource allocation for their
VMs3.

Determine utilization with Cluster Runway: Cluster Runway is a feature in Prism Central that helps the
administrator estimate how long their cluster can continue to run normally based on the current
consumption rate of CPU, memory, and storage resources4. By using Cluster Runway, the administrator
can see how adding more VMs will affect the resource utilization and capacity of their cluster4.

Question #:159

A user is complaining about slowness of a mission-critical MSSQL Server. The administrator logs into Prism
Element to investigate the VM performance and observes what is shown in the diagram.

Verified Solution - 100% Result 103 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Which action would best improve VM performance?

A. Disable hyperthreading in the BIOS.

B. Add additional RAM to the user VM.

C. Add additional RAM to the host on which the VM is running.

D. Ensure the host's CPUs ere not excessively overcommitted.

Answer: B

Explanation
Prism Element is a graphical user interface that allows you to manage Nutanix clusters1. You can use Prism
Element charts to understand Nutanix cluster workloads and troubleshoot performance related issues2.

memory optimized virtual machine sizes offer the best performance for SQL Server workloads on Azure VMs.
Adding more RAM to the user VM can help reduce paging and improve query execution times.

SQL Server performance can be affected by disk latency and throughput. By creating separate virtual disks for
data and logs, you can spread activity across multiple spindles and reduce disk contention.

https://next.nutanix.com/how-it-works-22/differences-between-prism-element-prism-central-and-prism-pro-37137

Verified Solution - 100% Result 104 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Question #:160

When installing Nutanix Guest Tools (NGT) on an ESXi-hosted VM, which port should be enabled on the VM
to allow communication with the NGT-Controller VM service?

A. 2000

B. 2074

C. 8080

D. 9943

Answer: D

Explanation
NGT is a software package that enables advanced VM management features provided by Nutanix, such as
file-level restore, VM mobility, and application-consistent snapshots12. To use NGT, you need to enable the
NGT feature for a VM in the Prism Element web console, mount the NGT installer (ISO disk file) in the VM,
and install NGT in the VM1. However, before installing NGT, you need to ensure that the VM can
communicate with the NGT-Controller VM service, which runs on the Controller VM (CVM) of each Nutanix
node3. The NGT-Controller VM service listens on port 9943 for incoming requests from the guest VMs3.
Therefore, you need to enable port 9943 on the ESXi-hosted VM to allow communication with the
NGT-Controller VM service.

Question #:161

Refer to the exhibit.

An administrator is adding a new node to a cluster. The node has been imaged to the same versions of AHV
and AOS that the cluster running, configured with appropriate IP addresses, and br0-up has been configured
the same the existing uplink bonds

Verified Solution - 100% Result 105 of 112


Pass Exam Nutanix - NCP-MCI-6.5

When attempting to add the node to the cluster with the Expand Cluster function in Prism , the cluster is
unable to find the new node.

Based on the above output from the new node, what is most likely the cause of this issue?

A. The ports on the upstream switch are not configured for LACP.

B. The existing and the expansion node are on different VLANs.

C. There is a firewall blocking the discovery traffic from the tlu

D. LACP configuration must be completed after cluster expansion

Answer: B

Explanation
The correct answer is B. The existing and the expansion node are on different VLANs.

The output shows that the new node has a br0-up bond with four interfaces: eth0, eth1, eth2, and eth3. The
bond is configured with LACP active and LACP fallback set to false. This means that the bond will only work
if the upstream switch supports LACP and is configured to form an LACP group with the four interfaces.
However, the output also shows that the bond has no IP address assigned to it, which indicates that the bond is
not operational. One possible reason for this is that the existing and the expansion node are on different
VLANs, and the upstream switch is not configured to allow the VLAN traffic on the LACP group. This would
prevent the new node from communicating with the cluster and being discovered by the Expand Cluster
function in Prism.

To verify this, the administrator can check the VLAN configuration on the upstream switch and compare it
with the existing nodes. Alternatively, the administrator can use the “manage_ovs show_uplinks” command on
an existing node and compare the output with the new node. If there is a VLAN mismatch, the administrator
can either change the VLAN configuration on the switch or on the new node to match the existing nodes.

Question #:162

An administrator needs to provide access for a user to view real-time performance metric for all VMs on all
clusters across the datacenter.

Which method accomplishes this with the least effort and ongoing maintenance?

A. Configure IDP authentication and assign the user to the Cluster Admin role in Prism Central.

B. Configure AD authentication and assign the user to the Viewer role in Prism Element.

C. Configure AD authentication create a custom role, assign the user to the role, and apply the role to all
clusters and VMs

Answer: C

Explanation

Verified Solution - 100% Result 106 of 112


Pass Exam Nutanix - NCP-MCI-6.5

The best method to provide access for a user to view real-time performance metrics for all VMs on all clusters
across the datacenter is to configure AD authentication create a custom role, assign the user to the role, and
apply the role to all clusters and VMs. This method accomplishes this with the least effort and ongoing
maintenance because:

AD authentication allows Nutanix Prism Central to integrate with an existing Active Directory (AD)
domain and use AD users and groups for authentication and authorization5. This simplifies user
management and avoids creating local users on Prism Central.

Creating a custom role allows Nutanix Prism Central to define granular permissions for different actions
and entities based on specific needs6. This ensures that users only have access to what they need and
nothing more.

Assigning the user to the custom role allows Nutanix Prism Central to grant access rights for that user
based on the role definition7. This avoids assigning permissions individually for each user.

Applying the role to all clusters and VMs allows Nutanix Prism Central to propagate the access rights
for that role across all entities in scope8. This ensures that users can view real-time performance metrics
for all VMs on all clusters without having to configure each entity separately.

References: 1: Health Dashboard - Prism Element Guide 2: Understanding Native VLANs - Cisco 3: VMs
may lose network connectivity if connected to virtual network with … - Nutanix Support & Insights 4: VLAN
Configuration - AHV Networking Guide 5: Active Directory Authentication - Prism Central Guide 6: Create
Custom Roles - Prism Central Guide 7: Assign Roles - Prism Central Guide 8: Apply Roles - Prism Central
Guide

Question #:163

Refer to the exhibit.

System Non-Root Partition Usage shows a warning or critical alert The administrator needs to change the
frequency of checks and alerts to respond more quickly.

Where in Prism Element should the administrator change the frequency of checks and alerts?

A. Health Dashboard > Manage Crocks > Frequency

B.

Verified Solution - 100% Result 107 of 112


Pass Exam Nutanix - NCP-MCI-6.5

B. Alerts Dashboard > Manage Checks > Schedule

C. Health Dashboard > Manage Checks > Schedule

D. Alerts Dashboard > Manage Checks > Frequency

Answer: C

Explanation
According to the Nutanix Support & Insights web search result1, the administrator can change the frequency
of checks and alerts for the System Non-Root Partition Usage in Prism Element by going to the Health
Dashboard > Manage Checks > Schedule. The administrator can select the check name, such as
disk_usage_check, and click on Edit Schedule. The administrator can then choose the desired frequency, such
as every 15 minutes, every hour, or every day, and click on Save. This will change how often the check runs
and alerts are generated.

Question #:164

What is the minimum time a newly created Deduplication storage policy takes to apply to the VMs in the
container?

A. 5 Minutes

B. 10 minutes

C. 30 minutes

D. 60 minutes

Answer: D

Explanation
Deduplication is a feature that reduces space usage by consolidating duplicate data blocks on Nutanix storage.
Deduplication can be enabled on a storage container for either cache or capacity, or both. Cache deduplication
is performed on the data in memory and SSD, while capacity deduplication is performed on the data in
HDD. Capacity deduplication is not enabled by default and is available if you have purchased a Pro or higher
license2. When you enable capacity deduplication on a storage container, it takes effect after 60 minutes3.
This delay allows the system to identify the best candidates for deduplication and avoid unnecessary overhead.

Question #:165

Microsegmentation was recently enabled in a Nutanix environment. The administrator wants to leverage Prism
Central to create a policy that will block all traffic regardless of direction, between two groups of VMs
identified by their category.

Which policy should be used to meet this requirement?

A. An Application Security Policy

Verified Solution - 100% Result 108 of 112


Pass Exam Nutanix - NCP-MCI-6.5

B. A Quarantine Policy

C. A Whitelist-Based Policy

D. An Isolation Environment Policy

Answer: D

Explanation
According to the web search results, the policy that should be used to meet this requirement is an Isolation
Environment Policy. An Isolation Environment Policy is a type of security policy that can be created in Prism
Central using Flow Network Security, which is a feature that provides microsegmentation and network
security for Nutanix environments1. An Isolation Environment Policy allows the administrator to isolate a
group of VMs from another group of VMs based on their categories, and block all traffic between them
regardless of direction2. This policy can be useful for creating isolated environments for testing, development,
or compliance purposes2.

Question #:166

An administrator has been notified by a user that a Microsoft SQL Server instance is not performing well.

When reviewing the utilization metrics, the following concerns are noted:

Memory consumption has been above 95% for several months

Memory consumption has been spiking to 100% for the last five days

Storage latency is 2ms.

When logging into Prism Central, how could the administrator quickly verify if this VM has performance
bottlenecks?

A. See Capacity Runway.

B. Filter VM by Efficiency.

C. Update Capacity Configurations.

D. Perform Entity Sync

Answer: B

Explanation
This will allow the administrator to quickly identify VMs that are overprovisioned or underutilized based on
their performance metrics.

https://www.nutanix.com/support-services/training-certification/certifications/certification-details-nutanix-certified-pro

Verified Solution - 100% Result 109 of 112


Pass Exam Nutanix - NCP-MCI-6.5

Question #:167

How should an administrator configure a custom alert for a specific VM in Prism?

A. Modify an existing alert to only alert on the specific VM.

B. Modify VM settings to add the custom alert.

C. Modify the alerts to add a new custom alert policy.

D. Modify node settings to add the custom alert.

Answer: C

Explanation
https://portal.nutanix.com/page/documents/details/?targetId=Prism-Central-Guide-Prism-v510:mul-alert-policies-user-d

Question #:168

An administrator wants to receive an environment summary report when a host failure occurs.

Which action would address the administrator’s need?

A. Enable App Discovery

B. Edit report schedule

C. Configure an alert policy

D. Create a playbook

Answer: C

Explanation
An alert policy can be configured to send out an environment summary report when a host failure occurs. This
can be done by creating a policy that triggers an alert whenever a host fails and then configuring the policy to
send out a report that provides a summary of the environment in which the failure occurred. This will allow
the administrator to quickly get a view of the environment after a failure occurs, allowing them to take the
necessary steps to address the issue.

https://www.nutanix.com/support-services/training-certification/certifications/certification-details-nutanix-certified-pro

Question #:169

In which two scenarios is an automated live migration likely to occur? (Choose two)

A. Cluster resource hotspot

Verified Solution - 100% Result 110 of 112


Pass Exam Nutanix - NCP-MCI-6.5

B. AOS upgrade

C. Network upgrade

D. Hypervisor upgrade

Answer: A B

Explanation
Automated live migration is a feature of Nutanix that allows the cluster to automatically move VMs from one
host to another without any downtime, in order to optimize the performance and availability of the
cluster. According to the Nutanix documentation1, automated live migration can occur in the following
scenarios:

Cluster resource hotspot: When a host or a group of hosts experience high resource utilization, such as
CPU, memory, or network, the cluster can automatically migrate some VMs to other hosts with lower
utilization, in order to balance the load and avoid performance degradation.

AOS upgrade: When upgrading the Nutanix software (AOS), the cluster can automatically migrate the
VMs from the host that is being upgraded to another host in the same availability zone, in order to
maintain the VM availability and minimize the impact of the upgrade process.

AHV host maintenance mode: When putting an AHV host into maintenance mode, the cluster can
automatically migrate all the VMs from that host to another host in the same availability zone, in order
to prepare the host for maintenance operations such as hardware replacement or firmware update.

Question #:170

A customer has a 24-node cluster with all containers configured with RF3. Two different nodes have incurred
a simultaneous HDD failure.

What is the result?

A. The cluster runs in a degraded state until the failed drives are replaced and the data has been restored to
three replicas.

B. Sixty minutes after the failures a rebuild of the lost data can remaining HDDs begins to restore to three
replicas.

C. The VMs with data on those drives crash, and an HA event occurs, restarting them on a remaining
healthy node.

D. The Nutanix cluster recognizes the failures and immediately begins to rebuild lost data to three replicas.

Answer: D

Explanation

Verified Solution - 100% Result 111 of 112


Pass Exam Nutanix - NCP-MCI-6.5

This is because Nutanix uses a distributed storage fabric (DSF) that replicates data across multiple nodes and
drives to ensure data resiliency. When a drive fails, the cluster detects the failure and initiates a data rebuild
process to restore the replication factor (RF) of the affected containers. The data rebuild process does not
affect the availability or performance of the VMs, as they can still access their data from other replicas on
other nodes or drives. Therefore, there is no need to wait for 60 minutes, use a shared volume group, or trigger
an HA event.

Question #:171

The administrator recently had a node fail in an AHV Nutanix cluster. All of the VMs restarted on other nodes
in the cluster, but they discovered that the VMs that make up a SQL cluster were running on the failed host.
The administrator has been asked to take measures to prevent a SQL outage in the future.

What affinity option will prevent the SQL VMs from running on the same hos?

A. VM-VM anti-Affinity policy

B. Create Affinity Category

C. VM-Most Affinity policy

D. Create Affinity Project

Answer: A

Explanation
Answer: A. VM-VM anti-Affinity policy

A VM-VM anti-Affinity policy is a rule that ensures that two or more VMs don’t run on the same AHV host.
It’s useful when an application provides HA and an AHV host can’t be an application’s single point of
failure1. In this case, the SQL cluster VMs should have a VM-VM anti-Affinity policy configured to prevent
them from running on the same host and causing an outage if that host fails. A VM-VM anti-Affinity policy
can be created using the aCLI commands2. The other options are not relevant for this scenario.

References: 1: Affinity Policies - Nutanix Support & Insights 2: Affinity Policies Help | Nutanix Community

Verified Solution - 100% Result 112 of 112


About dumpscafe.com
dumpscafe.com was founded in 2007. We provide latest & high quality IT / Business Certification Training Exam
Questions, Study Guides, Practice Tests.

We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially
Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on.

View list of all certification exams: All vendors

We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses listed
below.

Sales: sales@dumpscafe.com
Feedback: feedback@dumpscafe.com
Support: support@dumpscafe.com

Any problems about IT certification or our products, You can write us back and we will get back to you within 24
hours.

You might also like