Discount Offer
Go Back on NCP-MCI-6.10 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

NCP-MCI-6.10 Practice Test


Page 3 out of 14 Pages

An administrator needs to enableWindows Defender Credential Guardto comply with company policy.
The new VM configurations include:

Legacy BIOS
4 vCPUs
8 GB RAM
Windows Server 2019

What must be changed in order to properly enable Windows Defender Credential Guard?


A. Update vCPU to 8.


B. Enable UEFI with Secure Boot.


C. Use Windows Server 2022.


D. Update Memory to 16GB.





B.
  Enable UEFI with Secure Boot.

An administrator needs tocreate a storage containerforVM disks. The container must meet the following conditions:

10 GiB of the total allocated space must not be used by other containers.
The container must have a maximum storage capacity of 500 GiB.

What settings should the administrator configure while creating the storage container?


A. Set Advertised Capacity to 10 GiB and Reserved Capacity to 500 GiB.


B. Set Advertised Capacity to 10 GiB.


C. Set Reserved Capacity to 500 GiB.


D. Set Reserved Capacity to 10 GiB and Advertised Capacity to 500 GiB.





D.
  Set Reserved Capacity to 10 GiB and Advertised Capacity to 500 GiB.

An administrator is configuringProtection Policiesto replicate VMs to aNutanix Cloud Cluster (NC2)over the internet.
To comply with security policies, how should data be protected during transmission?


A. Configure Data on a self-encrypting drive.


B. Configure VMs to use UEFI Secure Boot.


C. Enable Data-at-Rest Encryption.


D. Enable Data-in-Transit Encryption.





D.
  Enable Data-in-Transit Encryption.

Due toapplication requirements, an administrator needs to support amulticast configurationin anAHV cluster.
Which AHV feature can be used to optimize network traffic so that multicast traffic is only forwarded to the VMs that need to receive it?


A. LACP


B. UDP


C. IGMP Snooping


D. Network Segmentation





C.
  IGMP Snooping

In anRF2 cluster, what is theminimum number of nodes requiredto allow ahost removal?


A. 2


B. 3


C. 4


D. 5





B.
  3


Page 3 out of 14 Pages
Previous