Nutanix NCP-MCI Exam (page: 1)
Nutanix Certified Professional - Multicloud Infrastructure v6.5
Updated on: 28-Sep-2025

Viewing Page 1 of 37

An administrator is setting up a Nutanix cluster and needs to configure the default VLAN.

Which configuration should the administrator choose?

  1. Vlan.0
  2. Vlan.1
  3. Vlan.2
  4. Vlan.7

Answer(s): A

Explanation:

https://next.nutanix.com/installation-configuration-23/nutanix-vlan-34170



An administrator has been tasked with increasing security on Nutanix cluster by disabling password authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH.

What is the easiest way for the administrator to meet these needs?

  1. Configure LDAP authentication through a secure server,
  2. Enable STIES vie commend line on SSH to CVM.
  3. Enable Cluster Lockdown and provide an RSA key.
  4. Restrict access with User Management in Prism.

Answer(s): C

Explanation:

"An administrator has been tasked with increasing security on Nutanix cluster by disabling password authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH, What is the easiest way for the administrator to meet these needs? Enable Cluster Lockdown and provide an RSA key."

Cluster Lockdown mode disables password authentication when accessing the CVM and AHV hosts and instead requires key-based SSH. To enable Cluster Lockdown mode, you need to provide an RSA key.

Therefore, by enabling Cluster Lockdown mode and providing an RSA key, you can increase security on Nutanix cluster by disabling password authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH with minimal effort.

https://next.nutanix.com/how-it-works-22/streamlined-login-and-increase-security-key-based-ssh- login-37397



A user is complaining about slowness of a mission-critical MSSQL Server. The administrator logs into Prism Element to investigate the VM performance and observes what is shown in the diagram.



Which action would best improve VM performance?

  1. Disable hyperthreading in the BIOS.
  2. Add additional RAM to the user VM.
  3. Add additional RAM to the host on which the VM is running.
  4. Ensure the host's CPUs ere not excessively overcommitted.

Answer(s): B

Explanation:

Prism Element is a graphical user interface that allows you to manage Nutanix clusters1. You can use Prism Element charts to understand Nutanix cluster workloads and troubleshoot performance related issues2.

memory optimized virtual machine sizes offer the best performance for SQL Server workloads on Azure VMs. Adding more RAM to the user VM can help reduce paging and improve query execution times.

SQL Server performance can be affected by disk latency and throughput. By creating separate virtual disks for data and logs, you can spread activity across multiple spindles and reduce disk contention.

https://next.nutanix.com/how-it-works-22/differences-between-prism-element-prism-central-and- prism-pro-37137



Refer to exhibit:



Why has an anomaly been triggered?

  1. Controller reached 2500 IOPS.
  2. Observed IOPS exceed normal values.
  3. Normal Controller behavior has increased.
  4. Observed values do not match predicted values.

Answer(s): B



Refer to Exhibit:



Why has an anomaly been triggered?

  1. Because the CPU usage crossed the blue band.
  2. Because the blue band range increased over the last 2 days
  3. Because the CPU usage dropped belon' 20%
  4. Because the CPU usage reached 100%

Answer(s): A

Explanation:

Nutanix leverages a method for determining the bands called `Generalized Extreme Studentized Deviate Test'. A simple way to think about this is similar to a confidence interval where the values are between the lower and upper limits established by the algorithm.

Another web source3 shows an example of how anomaly detection works in Nutanix Prism Central. In the video, you can see that when the observed value of a metric deviates significantly from the predicted value based on historical data, an anomaly event is triggered and displayed on a chart.

Therefore, by comparing the observed values with the predicted values based on historical data, Nutanix anomaly detection can identify abnormal behavior and alert you accordingly.



Viewing Page 1 of 37



Share your comments for Nutanix NCP-MCI exam with other users:

Khalid Javid 11/17/2023 3:46:00 PM

kindly share the dump
Anonymous


Na 8/9/2023 8:39:00 AM

could you please upload cfe fraud prevention and deterrence questions? it will be very much helpful.
Anonymous


shime 10/23/2023 10:03:00 AM

this is really very very helpful for mcd level 1
ETHIOPIA


Vnu 6/3/2023 2:39:00 AM

very helpful!
Anonymous


Steve 8/17/2023 2:19:00 PM

question #18s answer should be a, not d. this should be corrected. it should be minvalidityperiod
CANADA


RITEISH 12/24/2023 4:33:00 AM

thanks for the exact solution
Anonymous


SB 10/15/2023 7:58:00 AM

need to refer the questions and have to give the exam
INDIA


Mike Derfalem 7/16/2023 7:59:00 PM

i need it right now if it was possible please
Anonymous


Isak 7/6/2023 3:21:00 AM

i need it very much please share it in the fastest time.
Anonymous


Maria 6/23/2023 11:40:00 AM

correct answer is d for student.java program
IRELAND


Nagendra Pedipina 7/12/2023 9:10:00 AM

q:37 c is correct
INDIA


John 9/16/2023 9:37:00 PM

q6 exam topic: terramearth, c: correct answer: copy 1petabyte to encrypted usb device ???
GERMANY


SAM 12/4/2023 12:56:00 AM

explained answers
INDIA


Andy 12/26/2023 9:35:00 PM

plan to take theaws certified developer - associate dva-c02 in the next few weeks
SINGAPORE


siva 5/17/2023 12:32:00 AM

very helpfull
Anonymous


mouna 9/27/2023 8:53:00 AM

good questions
Anonymous


Bhavya 9/12/2023 7:18:00 AM

help to practice csa exam
Anonymous


Malik 9/28/2023 1:09:00 PM

nice tip and well documented
Anonymous


rodrigo 6/22/2023 7:55:00 AM

i need the exam
Anonymous


Dan 6/29/2023 1:53:00 PM

please upload
Anonymous


Ale M 11/22/2023 6:38:00 PM

prepping for fsc exam
AUSTRALIA


ahmad hassan 9/6/2023 3:26:00 AM

pd1 with great experience
Anonymous


Žarko 9/5/2023 3:35:00 AM

@t it seems like azure service bus message quesues could be the best solution
UNITED KINGDOM


Shiji 10/15/2023 1:08:00 PM

helpful to check your understanding.
INDIA


Da Costa 8/27/2023 11:43:00 AM

question 128 the answer should be static not auto
Anonymous


bot 7/26/2023 6:45:00 PM

more comments here
UNITED STATES


Kaleemullah 12/31/2023 1:35:00 AM

great support to appear for exams
Anonymous


Bsmaind 8/20/2023 9:26:00 AM

useful dumps
Anonymous


Blessious Phiri 8/13/2023 8:37:00 AM

making progress
Anonymous


Nabla 9/17/2023 10:20:00 AM

q31 answer should be d i think
FRANCE


vladputin 7/20/2023 5:00:00 AM

is this real?
UNITED STATES


Nick W 9/29/2023 7:32:00 AM

q10: c and f are also true. q11: this is outdated. you no longer need ownership on a pipe to operate it
Anonymous


Naveed 8/28/2023 2:48:00 AM

good questions with simple explanation
UNITED STATES


cert 9/24/2023 4:53:00 PM

admin guide (windows) respond to malicious causality chains. when the cortex xdr agent identifies a remote network connection that attempts to perform malicious activity—such as encrypting endpoint files—the agent can automatically block the ip address to close all existing communication and block new connections from this ip address to the endpoint. when cortex xdrblocks an ip address per endpoint, that address remains blocked throughout all agent profiles and policies, including any host-firewall policy rules. you can view the list of all blocked ip addresses per endpoint from the action center, as well as unblock them to re-enable communication as appropriate. this module is supported with cortex xdr agent 7.3.0 and later. select the action mode to take when the cortex xdr agent detects remote malicious causality chains: enabled (default)—terminate connection and block ip address of the remote connection. disabled—do not block remote ip addresses. to allow specific and known s
Anonymous