Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75
Pass the Nutanix NCM-MCI NCP-MCI-6.10 Questions and answers with Dumpstech
An administrator has been tasked with performingfirmware upgradesfor all Nutanix sites.
When attempting to performfirmware upgrades via Life Cycle Manager (LCM)at aremote site with a single-node cluster, no firmware updates are listed as available. The administrator confirmed that the currently installed firmware isseveral revisions behind.
Why are no firmware upgrades listed in LCM for this cluster?
The administrator sees an alert stating that the “nutanix” user should not be allowed to SSH to the CVM using a password.
What should the administrator do to ensure the nutanix user can no longer SSH to a CVM using a password?
An administrator wants todisable password-based SSH accessfor thenutanix useron aCVMto improve security.
What action should the administrator take?
Which storage attributes do Storage Policies manage?
What additional step is required for LCM to upgrade an AHV host that has GPUs?
Which predefined view should be leveraged in Prism Central Intelligent Operations to determine which VM is consuming too many resources and causing other VMs to starve?
An administrator started anLCM upgrade of the AHV hostsbut realized that theupgrade would exceed the planned maintenance window.
Which feature should be leveraged to prevent additional updates from occurring?
An administrator is planning for an upcoming maintenance window. The administrator would like to minimize the chance of an upgrade failure during the maintenance window to ensure the updates will complete without issue.
What action should the administrator take to reduce the risk of any potential failures during an upgrade?
A company is evaluatingNutanix Disaster Recovery (DR)to protect multiplebusiness-critical applications. Some applications are built using a3-tier architectureand have interdependencies.
Afterfailover, the VM'sstatic IP address is retained, butDNS configuration is lost.
How should an administrator proceed to resolve this issue?
A security team asks an administrator toset up port mirroringof aspecific source VMto atarget VM.
What must the administrator ensure for this configuration to be possible?