March Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

NCS-Core Questions and Answers

Question # 6

An administrator is concerned that Prism will be inaccessible if Active Directory is unable to process logins. Which method should the administrator use to access the cluster in the event of this type of outage?

A.

Manage the cluster by using the "nutanix" user on the Prism leader CVM

B.

Create and use an emergency local account on the cluster

C.

Deploy an Active Directory server locally on the cluster

D.

Manage the cluster remotely by downloading ncli to a remote workstation

Full Access
Question # 7

An administrator is deploying a new application to a Nutanix Enterprise Cloud. The application requires a security to prevent unauthorized access. Theapplication also uses many non-standard ports that are unique to it. Security should not be changed for existing applications.

What should the administrator do to meet these requirement?

A.

Use existing categories for the VMs. and create new security policies to use the existing categories.

B.

Use existing categories for the VMs and modify existing security policies to include the specific port.

C.

Create new categories for the VMs, and create new security policies that include the new categories.

D.

Create new categories for the VMs, and modify existing security policies to include the new categories.

Full Access
Question # 8

A consultant is unable to install virtualization software on a laptop.

Which two versions of Foundation can be used to resolve this issue? (Choose two.)

A.

Foundation VM

B.

Foundation Portable

C.

Foundation Central

D.

Foundation Applet

Full Access
Question # 9

The following critical Availability Alert displays in prism Central:

The protection Policy PP-BCA-1HR includes a business critical application with a 1-hour snapshot frequency.

What is causing this issue?

A.

There is a scheduled outage for the Availability Zone referenced in Protection Policy PP-BCA-1HR.

B.

Workloads included in PP-BCA-1HR are no longer within their intended RPO.

C.

Prism Central in the Availability Zone for PP-BCA-1HR is unavailable.

D.

NearSync replication between theAvailability Zones has fallen out of scope.

Full Access
Question # 10

A three-node cluster has a Nutanix Files instance with three FSVMs.

What happens after a node failure?

A.

The affected FSVMwill get live-migrated to another node.

B.

The affected FSVM will not be restarted on another node due to its agent VM setting.

C.

The affected FSVM will not be restarted on another node due to its VM-to-VM anti-affinity settings.

D.

The affected FSVM willbe restarted on another node.

Full Access
Question # 11

An administrator is deploying several new application VMs to a Nutanix cluster. The application is very transactional with a 28/72 random, read/write ratio.

What should the administrator do?

A.

Add a minimum of four SSDs to each node toensure all writes go to the SSDs.

B.

Add a minimum of four virtual disks to each VM, and aggregate them on guest OS level.

C.

Add one large SSD to each node and enable Flash Mode for the VMs.

D.

Add one large virtual disk to each VM. and use it for all application data.

Full Access
Question # 12

While preparing for a new four-node cluster installation, the consultant has a Tech Review Call with the customer. The hardware is as follows:

* 4 nodes in 1 Block

* 8 x 10 GbE Ports

* 4 x 1 GbE IPMI Ports

* Adequate Ethernet ports are available

* Ethernet cables are correct and available

* Adequate rack space is available

Which remaining item must be confirmed as available onsite?

A.

Crash Cart

B.

Fibre Channel switches

C.

Redundant 208v power

D.

Redundant 110v power

Full Access
Question # 13

A Nutanix cluster is deployed with the following configuration:

• Three four-nodeblocks (A, B, and C)

• All Flash Redundancy Factor 2

What is the effect of simultaneous disk failures on two nodes located in block A?

A.

VMs are migrated off of the nodes with disk failures.

B.

Each node with a failed disk is marked as degraded.

C.

VM read and write operations continue normally.

D.

VMs on the nodes with failed disks are unable to write data

Full Access
Question # 14

A consultant is setting up a new vSphere cluster. Customer requirements are as follows:

* VMs should automatically failover to another host if the host crashes

* Host CPU and Memory resources should be evenly balanced

* New VMs should be placed on the host with the most resources available

Which two settings should be turned on to meet the requirements? (Choose two.)

A.

vShpere DRS

B.

vSphere HA

C.

vSphere vMotion

D.

vSphere Power Management

Full Access
Question # 15

An administrator needs to make sure an RF2 cluster can survive a complete rack failure without negatively effecting workload performance. The current cluster configuration consists of thefollowing:

• 30 nodes: distributed 10 nodes per rack across three 42U rack

• Each nodes is configured with 40TB usable storage all flash (Cluster Total 1.2 PB Usable)

• Current cluster utilization is 900TB storage

Which configuration changes should be made to make sure that the cluster meets the requirements?

A.

Expanse the cluster by adding 3 additional nodes per rack, 9 nodes total.

B.

Expanse the cluster by adding 2 additional nodes per rack, 6 nodes total.

C.

Expanse thecluster by adding 9 nodes to a new 42U rack

D.

Expanse the cluster by adding 8 nodes to a new 42U rack

Full Access
Question # 16

Anadministrator needs to evaluate if the existing configuration of Protection Domains meets the specified corporate recovery policy for SQL Data. The corporate policy requires that all SQL Servers be recoverable at the DR site within 30 minutes, and must result in a maximum of 60 minutes of data loss. SQL data must be required.

The protection domain is configured as follows:

• Application consistent snapshots are enabled

• The SQL server VMs are assigned to the Protection Domain as their own Consistency Group

• The Protection Domain schedule is configured as snapshots taken every 90 minutes from 7 am until 8 pm

What must be changed to meet the required policy?

A.

Revise the schedule tc be 15 minutes

B.

Revise the schedule to be 60 minutes

C.

Revise the schedule to be 30 minutes

D.

Revise the schedule to be 45 minutes

Full Access
Question # 17

Refer to the exhibit.

An administrator logs in to Prism and sees the status shown in the exhibit within the Hardware Diagram section.

What should the administrator do?

A.

Resolve all alerts and re-import the disks to make sure there is no service disruption.

B.

Restart all CVMs for the cluster to check, confirm health and repartition and add the disks.

C.

Reseat all disks immediately. If this does not help, reseat the nodes.

D.

Check status of applications running onthe cluster and call support

Full Access
Question # 18

For a new AHV cluster installation, a customer has 20 NX-8155-G6 nodes with quad port SFP NICs.

The customer wants to meet the following guidelines:

* Take advantage of all available 10GbE links

* Achieve maximum throughput per VM

* Use of redundant ToR switches

* Fastest reconvergence during link failure

How should the load balancing be configured on the host?

A.

ovs-vsctl set port br0-up bond_mode=balance-slb

ovs-vsctl set port br0-up other_config:bond-rebalance-interval=30000

ovs-vsctl set port br0 tag=10

B.

ovs-vsctl set port br0-up bond_mode=active-backup

ovs-vsctl set port br0-up other_config:bond-rebalance-interval=30000

C.

ovs-vsctl set port br0-up bond_mode=balance-slb

D.

ovs-vsctl set port br0-up other_config:lacp-fallback-ab=true

ovs-vsctl set port br0-up lacp=active

ovs-vsctl set port br0-up bond_mode=balance-tcp

Full Access
Question # 19

Anadministrator recently added VLAN 205 CRM in Prism Element. The workloads attached to the associated NICs are unable to establish network connectivity.

Which Layer 2 protocol allows the administrator to troubleshoot this issue from Prism Element?

A.

HDLC

B.

SUP

C.

LACP

D.

LLDP

Full Access
Question # 20

A customer with a four-node RF2 cluster is addingapplication VMs to their system. After adding these VMs, the Prism dashboard shows 81% storage utilization.

What is the consequence of running the cluster at 81% storage utilization?

A.

The customer has the ability to add more VMs up to the 100% storage utilization.

B.

There is available capacity in the storage fabric and the cluster is resilient.

C.

Node failure is imminent due to storage utilization.

D.

The cluster is not resilient in the storage fabric

Full Access
Question # 21

A consultant is performing a Nutanix Cluster installation on Dell XC Core hardware. The consultant decides to use Foundation Portable for Mac to perform the installation. When the consultant arrives onsite, Foundation Portable is unable to locate the new nodes.

Which log should the consultant check to troubleshoot this issue?

A.

/home/nutanix/foundation/log

B.

~/data/logs/foundation.out

C.

foundation.app/contents/resouces/log

D.

~/data/logs/foundation

Full Access
Question # 22

A customer is running out of storage in an ESXi cluster. The customer wants to add storage without paying for an additional hypervisor license.

Which option should the consultant recommend to meet the requirement?

A.

Convert the cluster to AHV to support storage-only node requirements.

B.

Select the storage-only checkbox during Foundation and then expand the cluster in Prism.

C.

Buy a new node to meet the requirements of the storage-only node specifications.

D.

Edit the factory_config.json file to configure the node as storage-only and then expand the cluster in Prism

Full Access
Question # 23

A consultant is deploying a Nutanix cluster at a customer location. The consultant will be deploying the latest AOS along with the latest Nutanix hardware.

Which three references should the consultant review prior to this installation? (Choose three.)

A.

Release Notes

B.

Software Product Interoperability

C.

Field & Security Advisories

D.

End-Of-Life (EOL) Information

E.

Acropolis Advanced Administration Guide

Full Access
Question # 24

To prepare for a new Nutanix installation, a consultant downloads the Foundation VM, imports the VM to their Desktop Virtualization Solution, and powers on the VM. The IPv4 static address on the host workstation and the Foundation VM have been configured, but pings between them fail.

Which two troubleshooting steps should the consultant perform? (Choose two.)

A.

Remove and re-import the Foundation VM to ensure the virtual NIC is set to Host-Only.

B.

Verify the virtual NIC in the Foundation VM is bound to the correct physical Host adapter.

C.

Confirm the IP addresses and subnet masks are correct.

D.

Verify the virtual NIC in the Foundation VM is bound to the correct wireless network adapter.

Full Access
Question # 25

Refer to the exhibits.

An administrator has reported that a new VM is not performing well.

After analyzing the information presented in the exhibits, which option shows the best conclusion regarding this workload?

A.

VM is CPU constrained since the hypervisor cannot provide the required resources.

B.

VM is CPU constrained because more CPU needs to be added to the VM.

C.

VM is Storage constrained, because the workload is waiting for storage access.

D.

VM is not CPU constrained, because the VM is not running, a multithreaded application.

Full Access
Question # 26

A customer has Metro Availability configured in Automatic Resume Mode between Site A and Site B What happens to VMs if Primary Site A has full network failure?

A.

Automatic protection domain promotion in Site B. VMs automatically restart in Site B

B.

VMs continue to run on Site A following an automatic disable of protection domains.

C.

An administrator must unwitness in Site B and promote protectiondomains in Site B for VMs to restart

D.

An administrator must promote protection domains in Site B for VMs to restart.

Full Access
Question # 27

A consultant is running the Foundation VM using desktop virtualization software. No nodes are discovered.

What should the consultant verify first?

A.

NAT

B.

Host-only Adapter

C.

Bridged Adapter

D.

Internal Network

Full Access
Question # 28

A customer has a four-node cluster and is using Volume Groups toprovide storage services to a SQL cluster.

In the event of a CVM failure in the cluster, what is the expected IO path of the volume group’s iSCSI targets?

A.

vDisk directed at failure CVM are redirected to Data Services IP until CVM is reconnected

B.

vDisk directed to CVM that failed to disconnect and will not reconnect without manual intervention

C.

vDisk directed to failed CVM are redirected to another CVM and automatically reconnect

D.

vDisk directed at failed CVM will disconnect and reconnect when thefailed CVM comes back online

Full Access