How many IP addresses are required for a new Files cluster deployment?
A. Two for each FSVM plus one for the cluster
B. Two for each FSVM plus two for the cluster
C. One for each FSVM plus one for the cluster
D. One for each FSVM plus two for the cluster
An administrator migrates a Windows VM from an ESXi host to a Nutanix AHV cluster. When powered on, the migrated VM fails to start. The VM console shows the error message:
Cannot locate boot device
What should the administrator confirm to identify the reason that the VM fails to boot?
A. The Windows OS is at a supported patch level.
B. Nutanix Virt IO drivers were installed on the VM pre-migration.
C. VM snapshots on the source cluster were consolidated.
D. The ESXi source cluster can ping the destination AHV cluster.
Which feature must be enabled in order to ensure that VMs are restarted on other hosts in the event of a host failure?
A. High Availability
B. VM Snapshots
C. Network Segmentation
D. Live Migration
Which two targets are valid options when selecting a remote site to Prism? (Choose Two)
A. XI Cloud Services
B. Physical Cluster
C. Network attached storage
D. Cloud
E. Tape Library
Which two image types are stored by the Nutanix Image Service? (Choose two)
A. VHDX
B. ISO
C. VMDK
D. Disk
E. QCOW2
what additional features are available with prism pro(prism central with pro license)? (Choose two)
A. centralized upgrades
B. VM right-sizing
C. vm tagging
what is the purpose of the nutanix oplog?
A. aos log files repository
B. sequential read i/o buffer
C. aos services active memory space
D. random write i/o buffer
What is default behavior for VM High Availability for Nutanix AHV?
A. VMs restart on other hosts as available resource allow
B. No VMs restart because HA is not enabled by default
C. All VMs restart because system reservation are already made
D. Only VMs with High Availability explicitly enabled will restart
what is included in, or enabled by, the nutanix NGT bundle? (Choose two)
A. crash consistent snapshot
B. mouse and keyboard emulation
C. mobility drivers
D. application consistent snapshot
An administrator wants to configure key based SSH access for an AOS 5.5 Implementation
Which three components can be secured using this method?
A. The cluster
B. the CVM
C. The hypervisor host
D. Guest virtual machine
E. prism element
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Nutanix exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your NCP-5.15 exam preparations and Nutanix certification application, do not hesitate to visit our Vcedump.com to find your solutions here.