Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

NCP-MCI-6.5 Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) v6.5 exam Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Nutanix NCP-MCI-6.5 Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) v6.5 exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 3
Total 178 questions

Which two predefined views can be added to a report to identify inefficient VMs?

A.

Underprovisioned VMs List

B.

Zombie VMs List

C.

Constrained VMs List

D.

Overprovisioned VMs List

What is the proper sequence to perform a one-click upgrade to a Nutanix cluster?

Item instructions: For each procedure, indicate the order in which that procedure must take place to meet the item requirements. Not all procedures are valid. Identify any invalid procedures using the drop-down option.

An administrator has been alerted to a VM that has high I/O latency and wants to determine if there are any other factors, such as insufficient network or memory resources that correlate, as part of a troubleshooting process.

Which type of chart should the administrator create to allow all relevant data to be easily exported to CSV for later analysis?

A.

A VM entity chart with each of the relevant metrics.

B.

A cluster metric chart for each of the relevant metrics

C.

A cluster entity chart with each of the relevant metrics

D.

A VM metric chart for each of the relevant metrics

Microsegmentation was recently enabled in a Nutanix environment. The administrator wants to leverage Prism Central to create a policy that will block all traffic regardless of direction, between two groups of VMs identified by their category.

Which policy should be used to meet this requirement?

A.

An Application Security Policy

B.

A Quarantine Policy

C.

A Whitelist-Based Policy

D.

An Isolation Environment Policy

When installing Nutanix Guest Tools (NGT) on an ESXi-hosted VM, which port should be enabled on the VM to allow communication with the NGT-Controller VM service?

A.

2000

B.

2074

C.

8080

D.

9943

An administrator recently added new SSDs to a Nutanix cluster and knows the firmware will be out of date, Due to security constraints, the cluster does not have access to the Internet.

Which two steps must be completed to update the firmware? (Choose two.)

A.

Download the disk firmware from the OEM's website.

B.

Download a darksite bundle and deploy an internal webserver,

C.

Select Upgrade Software, then upload the firmware bundle.

D.

update the LCM Source and URL to access the firmware bundle.

An administrator manages an AHV cluster that is dedicated to a dev/test environment. The administrator receiving complaints from users that they are unable to create new VMs on the cluster.

After the reviewing the cluster, the administrator finds that the memory resources are almost fully utilized, with many VMs over-provisioned on memory.

What option is the most efficient resolution to enable additional VMs to be created?

A.

Enable Memory Overcommit on the over-provisioned VMs.

B.

Enable Memory HA on the over-provisioned VMs.

C.

Upgrade the nodes with additional memory DlMMs.

D.

Disable HA Reservation on the cluster.

An administrator notices that most of the VMs in the cluster are on one host. Users report that an application seems to respond slowly. The application server VM has significantly more memory assigned to it than other VMs.

How should the administrator fix this issue?

A.

Reduce the amount of memory assigned to the VM.

B.

Migrate the VM to a different host.

C.

Add more memory to the VM.

D.

Increase the memory on the CVM.

An administrator has a Custom backup application that requires a 2TB disk and runs m Windows. Throughput is considerably lower than expected.

The application was installed on a VM with the following configuration:

• FOU vCPUs with one core/vCPU

• 4GB of Memory

• One 50GB vDisk for the Windows installation

• One 2TB vDisk for the application

What is the recommended configuration change to improve throughput?

A.

Add 4GB of memory to the VM

B.

Increase the vCPUs assigned to the VM

C.

Span the 2TB disk across four vDisks

D.

Increase the number of cores per vCPU

An administrator is reviewing performance of a core banking system that routinely has 20,000 concurrent users. During, business hours, the CPU on the applications servers runs at close to 100%. The administrator needs to determine if there is a performance issue specific to the app servers, the database servers, or all servers on the cluster.

Which metrics should the administrator review in Prism Analysis Graphs?

A.

Cluster IO, Network, Database and App Server CPU

B.

Cluster CPU and Memory Only

C.

Cluster IO, CPU, Memory and Database and App Server CPU

D.

Cluster IO, CPU, Memory, Network, App Server CPU

An administrator is configuring data protection and DR for a multi-tier application. All VMs must be protected at the same time.

What must the administrator do to meet this requirement?

A.

Create a consistency group for each VM with identical schedules

B.

Create a consistency group for the application and place all VMs in it

C.

Create a protection domain for the application and select auto-protect related entities

D.

Create a protection domain for each VM with identical schedules

During an AHV upgrade, an administrator finds that a critical VM was powered off rather than migration to another host.

Which scenario explains this behavior?

A.

NO AHV hosts were able to be scheduled.

B.

The VM OS hung during migration.

C.

The VM was on the same host as the acropolis leader.

D.

The VM was marked as an agent VM.

Which storage policy value can be inherited from a cluster?

A.

IO performance

B.

Storage Container

C.

Compression

D.

QoS

A user running a Computer Aided Design (CAD) application is complaining about slow response time within the VM, particular when moving windows or rendering images.

Which VM metric will guide the administrator toward diagnosing the problem?

A.

Storage Controller Latency

B.

GPU Usage

C.

Swap in Rate

D.

Hypervisor Memory Usage (%)

Where are Leap Availability Zones configured?

A.

Cloud Connect

B.

Controller VM

C.

Prism Element

D.

Prism Central

Refer to Exhibit:

An administrator is trying to put a node into maintenance mode but receives the message shown in the exhibit.

What is a potential reason for this dialog?

A.

LinuxVM1 uses a vDisks stored in a RF1 Datastore

B.

LinuxVM1 uses a Volume Group

C.

LinuxVM1 uses a virtual GPU.

D.

LinuxVM1 uses e vDisks stored in a RF3 Datastore

An administrator wants to have a VM on an AHV cluster with access to multiple VLANs. What is the most efficient way to achieve this?

A.

Update a vNIC on the VM to operate in trunked mode for all desired VLANs.

B.

Create a network in AHV associated with all those VLANs on all hosts.

C.

Use SFPs that allow the needed VLANs.

D.

Use one vNIC per VLAN for the VM.

An administrator is performing validation testing of a new-deploy cluster. During this test, the administrator disconnect each LAN interface from each of the nodes while pinging the hypervisor and guest VMs.

When the first interface is disconnected, pings continue as expected to the hypervisor, but pings stop responding from the guest. Pings continue when the interface is reconnected. When the second interface is disconnected, pings continue to both the hypervisor and guest VMs.

What could be the cause of this error?

A.

This is normal behavior for a LAN Failover

B.

Switch ports are configured with different VLANs

C.

Portfast is not enabled on the switch ports

D.

One of the network interfaces has a bad patch cable.

What is the name of the internal bridge used by AHV nodes and CVMs?

A.

vnet0

B.

br1

C.

br0

D.

virbr0

An administrator is preparing to deploy a new application on an AHV cluster, Security requirements dictate that all virtual servers supporting this application must be prevented from communicating with unauthorized hosts.

Which option would achieve this goal?

A.

Create a new VLAN, create a subnet on the cluster with the VLAN tag, deploy servers with vNlCs in the new subnet.

B.

Create a new Application Security Policy restricting communication to the authorized hosts and apply it to the servers in enforce mode.

C.

Create a new solation Environment policy apply it to the new servers and all authorized hosts.

D.

Create new' subnet and assign to an existing VPC assign the IP prefix and gateway for the subnet, deploy servers with vNlC5 in the new subnet.

Page: 1 / 3
Total 178 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved