Question 25

The Linux administration team has requested access rights to any current or future Linux
VM in the environment
What entity should be selected when assigning this new role?

Correct Answer:C
Categories are key-value pairs that can be used to tag entities such as VMs, images, networks, and projects in Prism Central. Categories can be used to create dynamic groups of entities based on their attributes, and assign roles and permissions to those groups3. In this case, a category such as OS=Linux can be used to group all Linux VMs and grant access rights to the Linux administration team.

Question 26

An administrator is reviewing performance of a core banking system that routinely has 20,000 concurrent users. During, business hours, the CPU on the applications servers runs at close to 100%. The administrator needs to determine if there is a performance issue specific to the app servers, the database servers, or all servers on the cluster.
NCP-MCI-6.5 dumps exhibit
Which metrics should the administrator review in Prism Analysis Graphs?

Correct Answer:D
In this case, the administrator wants to investigate the performance of a core banking system that consists of application servers and database servers. The application servers have high CPU utilization during business hours, which may indicate a bottleneck or a resource contention issue. The administrator needs to review multiple metrics in Prism Analysis Graphs to identify the root cause and determine if there is a problem with the app servers only, or with other components as well.
The metrics that are relevant for this analysis are:
✑ Cluster IO: This metric shows the input/output operations per second (IOPS) and throughput (MBps) of the cluster. It can help to understand if there is a high demand for disk IO from the VMs or if there is any latency or congestion in the storage layer.
✑ Cluster CPU: This metric shows the CPU utilization (%) and load average of the cluster. It can help to understand if there is enough CPU capacity in the cluster to handle the workload or if there is any imbalance or contention among hosts.
✑ Cluster Memory: This metric shows the memory utilization (%) and available memory (GB) of the cluster. It can help to understand if there is enough memory capacity in the cluster to support the VMs or if there is any pressure or swapping in the memory layer.
✑ Network: This metric shows the network throughput (MBps) and packets per second (pps) of the cluster. It can help to understand if there is enough network bandwidth in the cluster to transfer data between hosts and VMs or if there is any congestion or packet loss in the network layer.
✑ App Server CPU: This metric shows the CPU utilization (%) and load average of each application server VM. It can help to understand if there is any variation or anomaly in the performance of each app server or if there is any correlation with other metrics.
✑ Database Server CPU: This metric shows the CPU utilization (%) and load average of each database server VM. It can help to understand if there is any variation or anomaly in the performance of each database server or if there is any correlation with other metrics.

Question 27

An administrator needs to limit the amount of storage space that data stored in single container can consume.
Which action should the administrator take?

Correct Answer:B
The best way for the administrator to limit the amount of storage space that data stored in a single container can consume is to set an advertised capacity for the container. This will ensure that the data stored in the container doesn't exceed the set limit, and it will also help prevent any potential performance issues due to resource contention. Additionally, the administrator should consider thick provisioning the container, which will pre-allocate the amount of storage space that can be used by the container. This will help ensure that the data stored in the container doesn't exceed the advertised capacity.

Question 28

An administrator recently added new SSDs to a Nutanix cluster and knows the firmware will be out of date, Due to security constraints, the cluster does not have access to the Internet.
Which two steps must be completed to update the firmware? (Choose two.)

Correct Answer:AB

Question 29

A customer has a newly-deployed AHV cluster with nodes that have 2.x 10 GBE and 2.x interface. The customer wants to use all available network interfaces to provide connectivity to the VMs.
Which option should the administrator use to achieve this while remaining consistent with Nutanix recommendations?

Correct Answer:D
According to the web search results, one of the best practices for Nutanix AHV networking is to create a second bridge on each host and assign the 1GbE interfaces to it3. This way, the customer can use both 10GbE and 1GbE interfaces for VM traffic, and also benefit from network isolation and redundancy.

Question 30

An administrator wants to receive an environment summary report when a host failure occurs.
Which action would address the administrator??s need?

Correct Answer:D
"Playbook allows you to define a trigger that results in the execution of an action or a series of actions. A trigger may be an event that occurs in the system, such as an alert or a request made by you. The resultant actions that you configure can be VM actions, communication actions, alert actions, or report actions." https://portal.nutanix.com/page/documents/details?targetId=Intelligent-Operations-Guide- vpc_2023_3:ssp-report-management-ssp-pc- c.html#:~:text=The%20environment%20summary%20report%20provides,is%20registered
%20to%20Prism%20Central.

START NCP-MCI-6.5 EXAM