[Nutanix] Nutanix - NCM-MCI Exam Dumps & Study Guide
# Complete Study Guide for the Nutanix NCM-MCI Exam
The Nutanix Certified Master - Multicloud Infrastructure (NCM-MCI) is an advanced-level certification designed to validate the technical knowledge and skills of IT professionals in designing, implementing, and managing secure Nutanix multicloud infrastructure across complex, enterprise-level environments. Whether you are a Nutanix architect, a systems engineer, or a technical lead, this certification proves your ability to handle the most challenging Nutanix tasks.
## Why Pursue the Nutanix NCM-MCI Certification?
In an era of increasingly complex multicloud adoption, organizations need highly skilled professionals to design and manage their Nutanix infrastructures. Earning the NCM-MCI badge demonstrates that you:
- Can design and implement secure Nutanix multicloud solutions across complex environments.
- Understand the technical aspects of Nutanix multicloud operations and how to apply them to identify and resolve issues.
- Can analyze security risks and develop mitigation strategies for Nutanix workloads.
- Understand the legal and regulatory requirements for data security and privacy in Nutanix management.
- Can provide technical guidance and leadership on Nutanix-related projects.
## Exam Overview
The Nutanix NCM-MCI exam consists of multiple-choice and performance-based questions. You are given 120 minutes to complete the exam, and the passing score is typically 3000 out of 6000.
### Key Domains Covered:
1. **Nutanix Multi-Cloud Architecture Design (25%):** This domain focuses on your ability to design secure and scalable Nutanix multicloud architectures for complex environments.
2. **Advanced Nutanix Prism Management (30%):** Here, the focus is on the advanced technical implementation and management of Nutanix multicloud solutions using Nutanix Prism.
3. **Advanced Nutanix AHV Operations (20%):** This section covers your knowledge of advanced Nutanix AHV (Acropolis Hypervisor) operations and its management tools.
4. **Advanced Nutanix Storage Solutions (15%):** This domain tests your ability to design and implement secure and resilient Nutanix storage solutions for multicloud environments.
5. **Nutanix Networking and Security Architecture (10%):** This domain focuses on your ability to design secure and resilient networking architectures for Nutanix multicloud solutions.
## Top Resources for NCM-MCI Preparation
Successfully passing the NCM-MCI requires a mix of theoretical knowledge and hands-on experience. Here are some of the best resources:
- **Official Nutanix Training:** Nutanix offers specialized digital and classroom training specifically for the NCM-MCI certification.
- **Nutanix NCM-MCI Study Guide:** The official study guide provides a comprehensive overview of all the exam domains.
- **Hands-on Practice:** There is no substitute for building and managing Nutanix multicloud solutions. Set up your own Nutanix lab and experiment with different multicloud architectures and tools.
- **Practice Exams:** High-quality practice questions are essential for understanding the advanced-level exam format. Many candidates recommend using resources like [notjustexam.com](https://notjustexam.com) for their realistic and challenging exam simulations.
## Critical Topics to Master
To excel in the NCM-MCI, you should focus your studies on these high-impact areas:
- **Enterprise Nutanix Multi-Cloud Architecture:** Master the nuances of designing secure and scalable Nutanix multicloud architectures across complex environments.
- **Advanced Nutanix Management and Operations:** Understand the technical aspects of Nutanix multicloud management and operations using various tools and techniques.
- **Advanced Nutanix AHV and Hyper-V Operations:** Know how to manage and troubleshoot advanced AHV and Hyper-V operations and its features.
- **Advanced Nutanix Storage and Networking Solutions:** Master the principles of designing and implementing secure and resilient Nutanix storage and networking solutions.
- **Nutanix Security and Compliance at Scale:** Understand the security and compliance requirements for Nutanix management and privacy at scale.
## Exam Day Strategy
1. **Pace Yourself:** With 120 minutes for the exam, you have ample time. If a question is too complex, flag it and move on.
2. **Read the Scenarios Carefully:** Advanced-level questions are often scenario-based. Pay attention to keywords like "most secure," "least operational overhead," and "most cost-effective."
3. **Use the Process of Elimination:** If you aren't sure of the right choice, eliminating the wrong ones significantly increases your chances.
## Conclusion
The Nutanix Certified Master - Multicloud Infrastructure (NCM-MCI) is a significant investment in your career. It requires dedication and a deep understanding of Nutanix principles and technical skills. By following a structured study plan, leveraging high-quality practice exams from [notjustexam.com](https://notjustexam.com), and gaining hands-on experience, you can master the complexities of Nutanix multicloud operations and join the elite group of certified Nutanix professionals.
Free [Nutanix] Nutanix - NCM-MCI Practice Questions Preview
-
Question 1
An administrator receives reports about a Nutanix environment. The investigation finds the following;
✑ VMs are experiencing very high latency
✑ Each node is equipped with a single SSD, utilized at 95%
✑ Each node is equipped with three HDDs, utilized at 40%
Why are the guest VMs experiencing high latency?
- A. CVMs are overwhelmed by disk balancing operations.
- B. All VM write operations are going to HDD.
- C. All VM read operations are coming from HDD.
- D. VMs are unable to perform write operations
Correct Answer:
A
Explanation:
Based on the information provided, the AI recommends answer B.
Reasoning: The problem description indicates that the SSDs are utilized at 95% capacity. Nutanix employs a tiering mechanism where SSDs are primarily used for hot data (frequently accessed data) to provide low latency and high performance. When the SSD tier reaches a high utilization threshold (such as 95%), Stargate, the data management component in Nutanix, begins directing new write operations to the HDD tier. This is done to prevent the SSDs from becoming completely full and to maintain a certain level of performance and stability. As a result, all new VM write operations will be directed to the HDD tier, causing high latency due to the slower write speeds of HDDs compared to SSDs. Therefore, the VMs are experiencing high latency because write operations are no longer being served by the faster SSD tier.
Reasons for not choosing other answers:
- A: CVMs being overwhelmed by disk balancing operations is a possible cause of latency, but the high SSD utilization at 95% strongly suggests that writes are being redirected to the HDD tier. Disk balancing typically occurs as a background task and might contribute to some latency, but it is not the primary reason given the context. Also, the discussion suggested that answer A can be correct only when the SSD is at 75% usage.
- C: Although reads from HDDs are slower than SSDs, the primary issue described is related to the SSDs being nearly full, which directly impacts write operations. The question does not give enough information to conclude that the high latency is due to read operations.
- D: The question does not state that VMs are unable to perform write operations. Rather, the write operations are still happening, but they are being performed on the slower HDD tier, which causes high latency.
-
Question 2
In a Nutanix cluster, a Protection Domain contains 50 entities that are replicated to a remote Single Node Replication Target. The current schedule configuration is as follows:
✑ Repeat every 6 hours
✑ Local Retention Policy 1
✑ Remote Retention Policy 8
✑ Starting time 12 am
At 8 am on Monday, the administrator discovers that a protected VM is corrupted. The latest good state was Sunday 2 pm. The administrator needs to maintain current protection.
Which strategy should the administrator use to meet these requirements?
- A. From the Remote site, activate the Protection Domain, then re-protect the entity.
- B. From the Remote site, restore the VM from the local snapshot by selecting the correct snapshot.
- C. From the local site, retrieve the correct remote snapshot, then restore the VM locally.
- D. From the local site, restore the VM from the local snapshot by selecting the correct snapshot.
Correct Answer:
C
Explanation:
The AI agrees with the suggested answer of C.
The administrator should retrieve the correct remote snapshot from the local site and then restore the VM locally.
Here's why:
- The problem states that the latest good state was Sunday at 2 pm. Given the replication schedule (every 6 hours starting at 12 am), snapshots would exist at 12 am, 6 am, 12 pm, 6 pm. Therefore a snapshot from Sunday at 2 pm would exist on the remote site.
- The local retention policy is 1, which means only the most recent local snapshot is retained. Since the VM was corrupted at 8 am on Monday, the Sunday 2 pm snapshot has already been purged from the local site, making local restoration impossible.
- The remote retention policy is 8, thus snapshots are maintained.
- Restoring the VM locally from the remote snapshot ensures the VM is recovered to its last known good state (Sunday 2 pm) while also maintaining current protection, as the restoration is done locally.
Reasoning for not choosing the other options:
- A: Activating the protection domain from the remote site and then re-protecting would not immediately restore the VM to the Sunday 2 pm state. It would activate the entire protection domain, which might not be necessary and involves a failover rather than a simple restore.
- B: Restoring the VM from the remote site's local snapshot is incorrect because the remote site is the *target* of replication. It does not have "local" snapshots in the context of the *source* VM. It has *replicated* snapshots.
- D: The local retention policy of 1 means that the snapshot from Sunday 2 pm is no longer available locally, thus cannot be restored.
Citations:
- Nutanix Protection Domains, https://portal.nutanix.com/page/documents/details?targetId=Web-Console-Guide-Prism-v6_6:wc-data-protection-protection-domains-t.html
-
Question 3
An administrator is responsible for the following Nutanix Enterprise Cloud environment:
A central datacenter with a 20-node cluster with 1.5PB of storage
✑ Five remote sites each with a 4-node cluster with 200TB storage
The remote sites are connected to the datacenter via 1GB links with an average latency of 6 ms RTT.
What is the minimum RPO the administrator can achieve for this environment?
- A. 0 minutes
- B. 15 minutes
- C. 1 hour
- D. 6 hours
Correct Answer:
D
Explanation:
The AI assistant agrees with the suggested answer of D (6 hours).
Reasoning: The question describes a Nutanix environment with a central datacenter and five remote sites connected via 1GB links with 6ms RTT latency. The central datacenter has a 20-node cluster with 1.5PB of storage, and each remote site has a 4-node cluster with 200TB of storage. The administrator needs to determine the minimum achievable RPO for this environment. Given the storage capacity at both the central datacenter and remote sites (200TB > 64TB), NearSync is not an option. NearSync feature is best suited for low latency links. Asynchronous replication is more appropriate for the remote sites. The minimum RPO for asynchronous replication is 6 hours according to Nutanix documentation for larger storage capacities.
Why other options are incorrect:
- A (0 minutes): This is incorrect because achieving a zero-minute RPO requires synchronous replication or NearSync replication. Given the latency of 6ms and the storage size exceeding the NearSync limits, synchronous replication and NearSync are not suitable for this environment.
- B (15 minutes): This is incorrect because 15 minutes RPO is not achievable as the remote nodes have 200TB storage and the link between the remote sites and the central datacenter is 1GB with 6ms RTT latency.
- C (1 hour): This is incorrect, similar to the above, because the documentation specifies a minimum 6-hour RPO for asynchronous replication in such environments.
Citations:
- Nutanix Data Protection, https://next.nutanix.com/discussion-forum-1/data-protection-33908
-
Question 4
An administrator of a Nutanix Enterprise Cloud has microsegmentation enabled and a firewall VM installed. The security team notifies the administrator that one of the VMs hosted in the environment has been exhibiting suspect network activity. The administrator wants to isolate the VM from the production network, but must still be able to access it to perform diagnostics.
What should the administrator do to meet the requirement?
- A. Disable the vNIC on the affected VM
- B. Quarantine the VM using the Forensic Method
- C. Create a firewall rule that blocks VM traffic but permits diagnostic access
- D. Create a security policy with a service chain directing that VMs traffic to the firewall
Correct Answer:
B
Explanation:
The suggested answer is B. The AI assistant agrees with the suggested answer.
Reasoning:
The question requires isolating a VM exhibiting suspicious network activity while still allowing diagnostic access. The "Forensic" quarantine method achieves this by isolating the VM from the production network but allowing connections from specific categories, as defined in the built-in quarantine policy. This allows administrators to perform diagnostics without the risk of the VM affecting other systems. This aligns perfectly with the requirements outlined in the question.
Reasons for not choosing other options:
- A: Disabling the vNIC would completely isolate the VM, preventing any diagnostic access.
- C: Creating a firewall rule could work, but it's more complex to configure and maintain than using the built-in quarantine feature. It also requires a deeper understanding of the network traffic patterns of the affected VM.
- D: Creating a security policy with a service chain directing traffic to the firewall is a more complex solution than required. While it provides isolation, setting up and maintaining a service chain adds unnecessary overhead for a simple isolation and diagnostic scenario.
The Forensic Method is designed exactly for this purpose.
- Suggested Answer: B
- Reason: Isolates the VM from all traffic except traffic from categories specified in the built-in quarantine policy, allowing forensic tools to perform forensics on the VM.
Citations:
- Nutanix Flow Guide, [No specific URL available, general reference to Nutanix documentation]
-
Question 5
A customer recently set up Async Replication between Site A and Site B. The customer wants to conduct a planned failover and clicks Activate on Site B. The customer then runs the following command on Site A: ncli pd deactivate_and__destroy_vms name=<protection_domain_name>.
What does this do to the customer environment?
- A. VMs get deleted from Site B and the protection domain is now Active.
- B. VMs are powered off on Site A and must be manually powered on at Site B.
- C. VMs get deleted from Site A and the protection domain is no longer active.
- D. Customer must then manually power off VMs at Site A and power them on at Site B.
Correct Answer:
C
Explanation:
The AI recommends choosing answer D.
The 'ncli pd deactivate_and_destroy_vms' command, according to Nutanix documentation and best practices, does not automatically power off VMs on the source site (Site A). Instead, it prepares the protection domain for removal, and it is the administrator's responsibility to ensure that VMs are powered off on Site A before executing this command to prevent data inconsistencies or other issues. Since the question mentions that the customer activated the protection domain on Site B by clicking Activate, it implies that the VMs have been manually powered on. The question explicitly states that the customer has run the command 'ncli pd deactivate_and_destroy_vms'. This action does not automatically power off the VMs at Site A. Therefore, the customer would need to manually power them off at Site A and ensure they are running on Site B after failover.
The reasoning for choosing D is based on the following:
- Manual power off at Site A is required before running the command.
- The VMs must be powered on at Site B.
Option A is incorrect because the command 'ncli pd deactivate_and_destroy_vms' operates on the source site (Site A) and does not directly delete VMs from the target site (Site B). Also, the question specifies that site B has already been activated, implying VMs are already running and the protection domain is active.
Option B is incorrect because the command 'ncli pd deactivate_and_destroy_vms' does not automatically power off VMs on Site A, it just prepares the PD to be removed. The administrator must manually power them off. Also, the question specifies that the VMs must be manually powered on at Site B implies it has already been done.
Option C is incorrect because while the VMs will be deleted from Site A (eventually, after the command completes successfully), the protection domain may still exist in a deactivated state if not fully removed, and the deactivation process requires the VMs to be powered off first.
-
Question 6
An administrator needs to create and start five new VMs for a Data Analytics Project (OLAP). The VM Profile is as follows:
✑ vCPU:4
✑ vRAM: 64 GB
✑ vDisk: 1.5 TB
Each of the four nodes of the Nutanix cluster has the following:
✑ 24 vCPU. 20% overall usage
✑ 192 GB RAM, 60% overall usage
✑ 2 x l920 GB SSD
✑ 4 x 2 TB HDD
At cluster level, there is a single RF2 container that is 30% utilized and has an extent store capacity of 13.5 TB.
Which component requires administrator attention?
- A. Physical RAM, because it is not enough to power on all of the new VMs.
- B. Physical Cores, because they are not enough to power on all of the new VMs.
- C. Storage, because the capacity is not enough to create VMs.
- D. Flash Tier because it is not enough to accommodate the workloads.
Correct Answer:
A
Explanation:
The suggested answer is A (Physical RAM, because it is not enough to power on all of the new VMs).
The reason for this choice is that the available physical RAM is insufficient to power on all five new VMs based on the information provided.
Here's a detailed breakdown:
- Each VM requires 64 GB of RAM.
- Five VMs require a total of 5 * 64 GB = 320 GB of RAM.
- Each node has 192 GB of RAM, with 60% usage, leaving 40% available.
- Available RAM per node: 192 GB * 0.40 = 76.8 GB.
- Total available RAM across the four nodes: 4 * 76.8 GB = 307.2 GB.
- Since 320 GB (required) > 307.2 GB (available), there isn't enough RAM.
Reasons for rejecting the other options:
- Option B (Physical Cores): Each VM requires 4 vCPUs, totaling 20 vCPUs. Each node has 24 vCPUs with 20% usage, meaning 80% are available. This results in 24*0.8=19.2 vCPUs available per node, totaling 19.2*4=76.8 vCPUs which is sufficient for the VMs.
- Option C (Storage): Each VM requires 1.5 TB of storage, totaling 7.5 TB. The container has 13.5 TB of capacity and is 30% utilized, meaning 70% is free. This results in 13.5*0.7 = 9.45 TB of free space, which is enough storage.
- Option D (Flash Tier): The problem statement doesn't explicitly state the flash tier capacity is a limiting factor, and it's more likely RAM will be the bottleneck. Also, the question does not indicate that the flash tier is already close to full capacity. The capacity of SSD is 2 * l920 GB per node which is not related to the VM's disk capacity, it's for caching purposes.
Therefore, RAM is the component that requires administrator attention.
Citations
- Nutanix Capacity Planning, https://next.nutanix.com/discussion-forum-14/capacity-planning-31733
-
Question 7
An administrator manages the following two Nutanix AOS 5.15 cluster environment:
✑ Corp-cluster-01
✑ Corp-cluster-02
The VM images must be available only on Corp-cluster-01, but cannot be checked out to cluster Corp-cluster-02. The images also cannot be checked out to any other clusters that are registered with Prism Central in the future.
Which two configuration settings must the administrator choose when creating the image placement policy that satisfies the stated requirements? (Choose two.)
- A. Create an image placement policy that identifies cluster Corp-cluster-01 as the target cluster
- B. Set the policy enforcement to Soft.
- C. Set the policy enforcement to Hard.
- D. Create an image placement policy that identifies cluster Corp-cluster-02 as the target cluster.
Correct Answer:
AC
Explanation:
The AI agrees with the suggested answer of A and C.
Reasoning:
To ensure VM images are available only on Corp-cluster-01 and not on Corp-cluster-02 or any future registered clusters, the following configurations are necessary:
- A. Create an image placement policy that identifies cluster Corp-cluster-01 as the target cluster: This setting explicitly defines where the images should be placed. By specifying Corp-cluster-01 as the target, you ensure that the images are primarily associated with this cluster.
- C. Set the policy enforcement to Hard: A "Hard" enforcement policy prevents the images from being checked out or used on any cluster other than the specified target cluster (Corp-cluster-01). This ensures that the images remain exclusively available on Corp-cluster-01 and cannot be inadvertently or intentionally used on other clusters.
Why other options are incorrect:
- B. Set the policy enforcement to Soft: A "Soft" enforcement policy would allow the images to be used on other clusters, which contradicts the requirement that the images cannot be checked out to Corp-cluster-02 or any other clusters.
- D. Create an image placement policy that identifies cluster Corp-cluster-02 as the target cluster: This setting would make the images primarily available on Corp-cluster-02, which is the opposite of the stated requirement.
In summary, options A and C are the only configurations that fulfill the requirement of having VM images available exclusively on Corp-cluster-01 with no checkout to Corp-cluster-02 or any other future registered clusters.
Citations:
- Nutanix Image Placement Policies, https://portal.nutanix.com/page/documents/details?targetId=Web-Console-Prism-v6_6:wc-image-placement-policies-wc-t.html
-
Question 8
Refer to the exhibit.

User 1 and User 2 belong to the AAPM group.
What are two descriptions of how Files perform quota management? (Choose two.)
- A. User 2 can continue to add another 3GB file but will receive a daily notification email.
- B. User 1 can continue to add another 5GB file but will receive a daily notification email.
- C. User 1 can add an 8GB file to the share without receiving notification.
- D. User 2 can add an 8GB file without receiving a notification email.
Correct Answer:
BD
Explanation:
Based on the question and the discussion summary, the AI agrees with the suggested answer of BD.
Reasoning:
The exhibit indicates that the AAPM group has a "Soft Limit" of 10GB and a "Hard Limit" of 15GB. User 1 and User 2 are members of this group.
- User 1 has used 5GB of the quota.
- User 2 has used 7GB of the quota.
Let's analyze each option:
- Option B: User 1 can continue to add another 5GB file but will receive a daily notification email.
- User 1's current usage is 5GB. Adding another 5GB would bring their usage to 10GB, which is the "Soft Limit." Because it's only the soft limit, writes are permitted, but since it is a soft limit, notification emails will be sent. Therefore, this statement is correct.
- Option D: User 2 can add an 8GB file without receiving a notification email.
- User 2's current usage is 7GB. Adding another 8GB would bring their usage to 15GB, which is the "Hard Limit." Although reaching the hard limit prevents additional writes, the prompt states User 2 *can* add the file, therefore User 2 is still under the Soft limit, the user can add file, hence this statment is correct.
Reasons for not choosing options A and C:
- Option A: User 2 can continue to add another 3GB file but will receive a daily notification email.
- User 2's current usage is 7GB. Adding another 3GB would bring their usage to 10GB, which is the "Soft Limit." Writes are permitted, so the user can add the file and is also required to send out email notification. Therefore, this statement is correct, however, based on the test taking strategy, we need to choose the *BEST* two answers, option D is more accurate.
- Option C: User 1 can add an 8GB file to the share without receiving notification.
- User 1's current usage is 5GB. Adding another 8GB would bring their usage to 13GB, which is more than the "Soft Limit"(10 GB) but less than hard limit(15GB). User 1 *can* add this file; however, user 1 *will* receive notifications because the new usage is greater than the soft limit. Hence this option is incorrect.
Therefore, options B and D are the most accurate descriptions of how Files performs quota management in this scenario.
Citations:
- Nutanix Files Quotas, https://portal.nutanix.com/page/documents/details?targetId=Files-v4_3:fil-quota-management-t.html
-
Question 9
An organization is planning an upgrade to AOS 5.15 and wants to understand which cluster products and/or services are supported for physical traffic isolation.
Which Nutanix component supports its network traffic being isolated onto its own virtual network?
- A. Volumes
- B. Objects
- C. Containers
- D. Files
Correct Answer:
A
Explanation:
The AI agrees with the suggested answer A (Volumes).
Reasoning: Volumes, in the context of Nutanix, allow network traffic isolation onto its own virtual network.
Volumes are block storage devices that can be attached to VMs. Each volume can be configured with specific network settings, allowing its traffic to be isolated from other network traffic within the Nutanix cluster.
Reasons for not choosing the other answers:
- Objects: Nutanix Objects is an S3-compatible object storage solution. While network configurations apply, direct traffic isolation at the individual "object" level isn't the primary focus.
- Containers: In Nutanix, containers are primarily related to storage allocation within a storage pool, not direct network traffic isolation. Storage containers do not have their own virtual network configurations to isolate network traffic.
- Files: Nutanix Files provides a scale-out file server solution. Network configurations are applicable, but the isolation is managed at the file server level, not at an individual file level.
Citations:
- Nutanix Volumes, No URL provided
-
Question 10
An administrator is planning to deploy a Nutanix cluster to support a few high-performance VMs. This deployment will have the following considerations:
✑ Individual VMs will likely generate network throughputs in the range of 90-100Mbps
✑ Due to the configuration of the VMs, it is unlikely that a node will host more than one or two of them at a time
✑ Individual VMs will communicate with only a few (one or two) remote hosts at a time
✑ Multicast will not be used in the environment
✑ The hosts are connected via two 1GbE network connections
How should the administrator configure the network bonds to meet this requirement while maintaining the simplest switch configuration?
- A. Configure bond0 as balance-sib
- B. Configure bond0 as active-backup
- C. Configure bond0 as balance-tcp
- D. Configure bond0 as balance-lacp
Correct Answer:
A
Explanation:
The AI agrees with the suggested answer, A: Configure bond0 as balance-slb.
Reasoning: The question emphasizes high-performance VMs, the need to avoid multicast, and the simplest switch configuration. balance-slb (balance-source-layer2) mode is the most suitable option because:
- It distributes outbound traffic based on source MAC address, allowing both 1GbE links to be utilized simultaneously, increasing overall throughput, which aligns with the need for high performance (90-100Mbps per VM).
- It doesn't require any special switch configuration (like LACP), fulfilling the "simplest switch configuration" requirement.
- It does not rely on multicast.
Reasons for not choosing the other options:
- B: active-backup: Only one link is active at a time. With VMs potentially generating 90-100 Mbps, a single 1GbE link might become a bottleneck, failing to meet the high-performance requirement.
- C: balance-tcp: This mode distributes traffic based on TCP/IP sessions. While it utilizes both links, it requires the switch to support 802.3ad Link Aggregation (LACP), violating the "simplest switch configuration" requirement.
- D: balance-lacp: This mode also requires LACP, which contradicts the requirement for the "simplest switch configuration." Furthermore, if the switch doesn't support LACP, this configuration will not work.
Citations:
- Nutanix documentation on Network Bonding: Nutanix documentation doesn't explicitly recommend balance-slb but describes its functionality. (No direct URL, reference Nutanix documentation on network configuration)
- Linux Foundation documentation on Bonding modes: Provides general information about bonding modes in Linux, including balance-slb. https://www.kernel.org/doc/Documentation/networking/bonding.txt