NCP-MCI-6.5 Practice Test Questions

176 Questions


Which algorithm do snapshots and clones leverage to maximize efficiency and effectiveness?


A. Continuous Data Protection


B. Copy-on-Write


C. Split-mirror


D. Redirect-On-Write





B.
  Copy-on-Write

Explanation: According to the Dell Unity: Data Reduction Technical White Paper1, snapshots and clones on Dell Unity use the Copy-on-Write (CoW) algorithm to maximize efficiency and effectiveness. CoW is a technique that defers the copying of data until it is modified. This means that snapshots and clones only consume space when changes are made to the source or the clone, respectively. CoW also preserves the original data in case of a rollback or recovery operation.

An administrator is configuring data protection and DR for a multi-tier application. All VMs must be protected at the same time.

What must the administrator do to meet this requirement?


A. Create a consistency group for each VM with identical schedules


B. Create a consistency group for the application and place all VMs in it


C. Create a protection domain for the application and select auto-protect related entities


D. Create a protection domain for each VM with identical schedules





B.
  Create a consistency group for the application and place all VMs in it

Explanation: According to the web search results, a consistency group is a group of related applications or services that must be recovered together in order to work properly, and this means more than being recovered at the same time67. They also typically need to be recovered to the same point in time6. Therefore, to meet the requirement of protecting all VMs of a multi-tier application at the same time, the administrator must create a consistency group for the application and place all VMs in it8. This way, the administrator can apply data protection policies and schedules to the entire consistency group as a single unit8.

The Stargate service becomes unavailable on a single CVM on an AHV node. What is used to maintain I/O operations in the cluster?


A. Route injection


B. iSCSl redirector


C. Hypervisor HA


D. ha.py





A.
  Route injection

Explanation: According to the Nutanix Support & Insights web search result1, route injection is used to maintain I/O operations in the cluster when the Stargate service becomes unavailable on a single CVM on an AHV node. Route injection is a mechanism that allows the CVMs to communicate with each other and redirect the I/O requests to another healthy CVM in the cluster. Route injection uses the Linux kernel routing table to add or delete routes dynamically, based on the availability of the Stargate service on each CVM.

How should an administrator configure a custom alert for a specific VM in Prism?


A. Modify an existing alert to only alert on the specific VM.


B. Modify VM settings to add the custom alert.


C. Modify the alerts to add a new custom alert policy.


D. Modify node settings to add the custom alert.





C.
  Modify the alerts to add a new custom alert policy.

Prism Central will be installed manually on an AHV cluster.

Which three disk images must be downloaded from the portal for the Prism Central VM? (Choose three.)


A. var


B. tmp


C. boot


D. home


E. data





C.
  boot

D.
  home

E.
  data

After logging into Prism Element, an administrator presses the letter A on the Keyboard.
What is the expected outcome of this input?


A. Alerts page will launch


B. Analysis will launch


C. About Nutanix page will launch


D. API Explorer page will launch





D.
  API Explorer page will launch

Explanation: API Explorer page will launch when an administrator presses the letter A on the keyboard after logging into Prism Element. This is one of the keyboard shortcuts that Prism Element provides for accessibility and ease of use1. API Explorer is a tool that allows users to explore and test Nutanix REST APIs within Prism Element1.

An administrator is setting up a Nutanix cluster and needs to configure the default VLAN.

Which configuration should the administrator choose?


A. Vlan.0


B. Vlan.1


C. Vlan.2


D. Vlan.7





A.
  Vlan.0

Which command should an administrator run from the CLI to view the uplink state of all AHV nodes in the cluster?


A. allssh show_uplinks


B. manage_ovs show_uplinks


C. allssh manage_ovs show_uplinks


D. manage ovs show uplinks





C.
  allssh manage_ovs show_uplinks

Explanation: According to section 4 of the exam blueprint guide1, one of the topics covered is AHV networking components and configuration settings. One of these components is Open vSwitch (OVS), which is a software switch that provides network connectivity between VMs and physical networks. OVS has two types of ports:
Uplink ports: These are physical ports that connect to external networks or switches.
Internal ports: These are virtual ports that connect to VMs or other internal networks.
To view the uplink state of all AHV nodes in the cluster, an administrator can use the manage_ovs command with the show_uplinks option. This command displays information such as port name, link state, speed, duplex mode, MTU size, bond mode, and bond status. However, this command only works on a single node. To run the command on all nodes in the cluster, an administrator can use the allssh command, which executes a command on all CVMs in parallel. Therefore, the correct command is:
allssh manage_ovs show_uplinks

An administrator needs to increase bandwidth available to the AHV host and to the CVM.

How should the administrator complete this task?


A. In Prism, update vs0 to change the configuration to Active-Active.


B. Use manage-ovs commands to update br0 change the configuration to Active-Active.


C. In Prism, create a vsl interface and add any remaining uplinks.


D. Use manage-ovs commands to create br1 and add any remaining uplinks





B.
  Use manage-ovs commands to update br0 change the configuration to Active-Active.

Explanation: The default network configuration for AHV hosts and CVMs is a bond named br0-up with two or more uplinks in active-backup mode. This means that only one uplink is active at a time, while the others are in standby mode. This provides high availability, but not load balancing or increased bandwidth. To increase the bandwidth available to the AHV host and the CVM, the administrator can change the bond mode to Active-Active, which allows all uplinks to be used simultaneously. This can be done using the manage-ovs commands on each AHV host. The steps are as follows1:

Log in to the AHV host using SSH.
Enter maintenance mode on the CVM by running allssh 'cluster status | grep -i cvm | grep -i down'.
Change the bond mode to Active-Active by running manage_ovs --bond_mode active-active update_uplinks br0-up , where is a comma-separated list of uplink interfaces (for example, eth0,eth1).
Verify the bond mode by running manage_ovs show_uplinks.
Exit maintenance mode on the CVM by running allssh 'cluster start'.

An administrator has an AHV cluster that is comprised of 4 nodes with the following configuration in each node:

CPU:2 each 2.4GHz, 12 core
Memory: 256GB
Disk: 6 each 1.92 SSD

A VM with 16 vCPUs and 96GB of RAM is being created on the cluster.
How should the administrator configure the VM to assure optimal performance?


A. With an affinity policy


B. With memory overcommit


C. With 2 vNUMA nodes


D. With Flash Mode enabled





C.
  With 2 vNUMA nodes

Explanation: The best way to configure the VM for optimal performance is to set it up with 2 vNUMA nodes. This will ensure that the VM is configured to take advantage of the CPU and memory resources available in each node, and it will also ensure that all of the cores are utilized for the best performance. Additionally, the administrator should ensure that the VM has an affinity policy set up so that the vCPUs are evenly distributed across the four nodes. Finally, Flash Mode should be enabled in order to take advantage of the high-performance SSDs that are available in the cluster.

On a Nutanix cluster, what does Network Segmentation refer to?


A. A distributed firewall for security VM to VM traffic.


B. Physically separating management traffic from guest VM traffic.


C. Isolating intra-cluster traffic from guest VM traffic.


D. Isolating management traffic from storage replication traffic.





C.
  Isolating intra-cluster traffic from guest VM traffic.

Explanation: network segmentation on Nutanix clusters refers to creating a separate network for service-specific communication and isolating different types of traffic over selected VLANs or physical interfaces.

Which scenario would benefit most from Erasure Coding being enabled on a container?


A. Long term storage of data which is written once and read infrequently


B. High performance database where all is relatively hot.


C. VDI use cases where a single VM is cloned 100’s of times


D. WEB and API Servers





A.
  Long term storage of data which is written once and read infrequently

Explanation:
The correct answer is A. Long term storage of data which is written once and read infrequently.
Erasure Coding is a feature that increases the usable capacity on a Nutanix cluster by reducing the amount of data replication. Instead of replicating data, Erasure Coding uses parity information to rebuild data in the event of a disk failure. The capacity savings of Erasure Coding is in addition to deduplication and compression savings1.
Erasure Coding is most beneficial for scenarios where the data is written once and read infrequently, such as long term storage of archival data, backup data, or cold data. This is because Erasure Coding has some trade-offs and limitations that may affect the performance and availability of the cluster. Some of these trade-offs and limitations are2:

Erasure Coding requires more CPU and memory resources than replication, as it involves more complex calculations for encoding and decoding data.
Erasure Coding increases the network bandwidth consumption, as it involves more data transfers between nodes for encoding and decoding data.
Erasure Coding reduces the resiliency of the cluster, as it can tolerate fewer node failures than replication. For example, a cluster with redundancy factor 2 can tolerate one node failure with replication, but only two disk failures with Erasure Coding.
Erasure Coding is not effective for workloads that have many overwrites or random writes, as it involves more overhead for updating the parity information.
Erasure Coding is not supported for some features, such as volume groups, file server VMs, or Metro Availability.

Therefore, if an administrator needs to configure a container on a Nutanix cluster, they should enable Erasure Coding only if the container will store data that is written once and read infrequently. This way, they can maximize the capacity savings of Erasure Coding without compromising the performance and availability of the cluster.


Page 6 out of 15 Pages
Previous