Nutanix NCP-MCI v6.5 - Nutanix Certified Professional - Multicloud Infrastructure v6.5 Exam

Page:    1 / 16   
Total 77 questions

After logging into Prism Element, an administrator presses the letter A on the keyboard.
What is the expected outcome of this input?

  • A. Analysis page will launch.
  • B. Alerts page will launch.
  • C. About Nutanix page will launch.
  • D. API Explorer page will launch.


Answer : B

Refer to the exhibit.

The Update Source for LCM has been configured as shown in the exhibit. Inventory is failing consistently.
What is the likely cause of this issue?

  • A. Port 80 is blocked by a firewall.
  • B. The administrator does not have a valid portal account.
  • C. The license assigned to the cluster has expired.
  • D. Port 443 is blocked by a firewall.


Answer : D

An administrator has created a Nutanix managed network, and assigned it a VLAN ID of 512.
Several VMs have been created, and the administrator notices that the VMs can successfully communicate with other VMs on that VLAN, provided they are on the same host, but cannot communicate with VMs that reside on different hosts in the cluster.
What is most likely the cause of this issue?

  • A. There is a firewall rule blocking VLAN512 traffic.
  • B. The VLAN was not created on the upstream switches.
  • C. The administrator did not create the VLAN on all hosts.
  • D. VLAN512 is a reserved VLAN ID, and not usable for guest VMs.


Answer : B

An administrator logs into the Nutanix Support Portal and notices there is a new version of the LCM Framework available. In an effort to ensure LCM is providing the latest features, the administrator would like to upgrade LCM.
How can the LCM Framework be upgraded?

  • A. Upload the latest LCM Framework bundle via Upgrade Software in Prism
  • B. Upload the latest LCM Framework as an image in the Image Configuration in Prism
  • C. Upgrade AOS
  • D. Perform an LCM inventory


Answer : D

On a Nutanix cluster, what does Network Segmentation refer to?

  • A. Isolating management traffic from storage replication traffic.
  • B. Physically separating management traffic from guest VM traffic.
  • C. Isolating intra-cluster traffic from guest VM traffic.
  • D. A distributed firewall for securing VM to VM traffic.


Answer : A

Page:    1 / 16   
Total 77 questions