Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the Nutanix NCM-MCI NCP-MCI-6.10 Questions and answers with Dumpstech

Exam NCP-MCI-6.10 Premium Access

View all detail and faqs for the NCP-MCI-6.10 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions
Questions # 31:

An administrator observes an alert in Prism for ahybrid SSD/HDD cluster:

"Storage Pool SSD utilization consistently above 75%."

What is the potential impact of this condition?

Options:

A.

The cluster is unable to sustain an SSD disk failure.

B.

The cluster may be nearly out of storage for metadata.

C.

The cluster is at risk of entering a read-only state.

D.

Average I/O latency in the cluster may increase.

Questions # 32:

An administrator recently attempted to enable Data-in-Transit Encryption on a scale-out Prism Central cluster to ensure service-level traffic is encrypted between cluster nodes. After attempting to enable the feature, it did not function because of firewall restrictions.

Which CVM-specific port must be allowed through the firewall for Data-in-Transit Encryption?

Options:

A.

2009

B.

2010

C.

2020

D.

9440

Questions # 33:

An administrator is tasked with protection of a business critical application. The application is running on a Linux VM and is using a custom DB that require application consistent snapshots for data integrity.

An administrator has written a pre_freeze and post_thaw scripts and placed them under /usr/local/sbin/.

During protection domain scheduled run an alert is generated:

Execution of the PostThaw Script Failed

Which two resolution steps could an administrator conduct to fix the issue? (Choose two.)

Options:

A.

Ensure that scripts have nutanix user ownership and admin access.

B.

Review the NGT logs under /usr/local/sbin/post_thaw.

C.

Ensure NGT service is up and running.

D.

Execute scripts manually and ensure they succeed

Questions # 34:

An administrator is managing an environment based on two different AHV-based and ESXi-based clusters. Workloads are evenly distributed and in a healthy state.

A Linux VM running on ESXi is not performing well at the storage level and is configured as follows:

• VCPU: 8

• VRAM: 32

• vDisk: 3, first 100 GB, second 250 GB, third 250 GB

What is the easiest way to test VM performance, while minimizing downtime?

Options:

A.

Increase the number of vCPUs.

B.

Migrate the VM to the AHV cluster.

C.

Enable vDisk sharding at AOS level.

D.

Collapse the second and the third disk into a single one

Questions # 35:

An administrator needs to apply a firmware upgrade to a host and wants to manually migrate VMs before executing an LCM upgrade. All VMs but one are able to be live migrated.

Which action would fix the issue?

Options:

A.

Configure backplane port groups that are assigned to CVM.

B.

Update Link Layer Discovery Protocol (LLDP).

C.

Disable Agent VM within VM configuration options.

D.

Enable ADS (Acropolis Dynamic Scheduling) at the cluster level.

Questions # 36:

An administrator wants toclean up inactive VMsusingVM Efficiency in Nutanix.

The business requires that VMs must beinactive for 120 daysbefore deletion.

A Playbook was created to deleteDead and Zombie VMswith a99-day wait period after they are marked inactive.

How long will have passed before these VMs are deleted? (Choose two.)

Options:

A.

For Dead VMs, the wait before deletion is 120 days.

B.

For Zombie VMs, the wait before deletion is 129 days.

C.

For Dead VMs, the wait before deletion is 129 days.

D.

For Zombie VMs, the wait before deletion is 120 days.

Questions # 37:

An administrator is configuring Protection Policies to replicate VMs to a new Nutanix Cloud Cluster (NC2) connected via the Internet.

To comply with an organizational security policy, data sent via the Internet must be encrypted.

Which feature should be taken into account to be compliant?

Options:

A.

Configure Data on a self-encrypting drive.

B.

Configure VMs to use UEFI secure boot.

C.

Enable Data at Rest Encryption.

D.

Enable Data-in-Transit Encryption.

Questions # 38:

In a scale-out Prism Central deployment, what additional functionality does configuring an FQDN instead of a Virtual IP provide?

Options:

A.

Segmentation

B.

SSL Certificate

C.

Load balancing

D.

Resiliency

Questions # 39:

An administrator is executing a storage performance test between two Microsoft Windows VMs. The first VM was deployed by using a template, while the second one was created from scratch.

Results show that VMs have very different metrics when using the same performance test. The first VM reaches 8000 IOPS, while the second struggles reaching 500/800 IOPS. Currently the AHV cluster is not under pressure.

How can the administrator determine why these results were produced?

Options:

A.

Verify both VMs have installed Nutanix Guest Tools.

B.

Enable AHV Turbo on the second VM.

C.

Compare vDisk bus type between VMs.

D.

Check number of VCPUs assigned to VMs

Questions # 40:

An administrator is trying todelete a protected snapshotbut is unable to do so.

What is the most likely cause?

Options:

A.

There is an active recovery occurring at that time.

B.

Ransomware has encrypted the snapshot.

C.

There is an approval policy that was denied.

D.

The snapshot has been corrupted.

Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions