Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Nutanix > NCS Professional > NCS-Core

NCS-Core Nutanix Certified Services Core Infrastructure Professional Question and Answers

Question # 4

An administrator is updating disk firmware using LCM and receives the following message:

“there have been 10 or more cluster services restarts within 15 minutes in the Controller VM”

The message appears as each drive is upgraded.

What is the reason this message isbeing generated?

A.

A node has been rebalanced

B.

A drive has been reformatted

C.

A node has been rebooted

D.

A drive has been ejected

Full Access
Question # 5

After imaging the nodes and creating the cluster successfully, the consultant connects the cluster to the customer network. When logging into Prism, the events dashboard is full of errors.

What is causing the issue?

A.

The cluster was not stopped prior to connecting to the customer network.

B.

The Cluster Virtual IP Address (VIP) was not set up during the process.

C.

Foundation did not create the cluster successfully.

D.

The consultant did not run Nutanix Cluster Check (NCC..

Full Access
Question # 6

A consultant needs to verify the make and model of the systems that will be imaged with Foundation. The consultant does not have the Bill of Materials (BOM) available to review.

When should the consultant verify the make and model to prepare for the cluster deployment?

A.

During the Foundation Process

B.

While conducting the Tech Review Call

C.

Upon arriving on-site

D.

When reviewing the Statement of Work (SOW)

Full Access
Question # 7

A three-node cluster has a Nutanix Files instance with three FSVMs.

What happens after a node failure?

A.

The affected FSVMwill get live-migrated to another node.

B.

The affected FSVM will not be restarted on another node due to its agent VM setting.

C.

The affected FSVM will not be restarted on another node due to its VM-to-VM anti-affinity settings.

D.

The affected FSVM willbe restarted on another node.

Full Access
Question # 8

An administrator deletes a large amount of data from a Volume Group presented to a Linux VM. The administrator notices that the deleted data has not been reclaimed as usable storage.

Whataction should be taken to reclaim the storage capacity?

A.

Shrink the Volume Group that is associated with the Linux VM

B.

Unmount the Volume Group and then Remount the Volume Group

C.

Enable the unman operation on the Linux VM

D.

Run Defrag on the Linux VM

Full Access
Question # 9

A consultant creates three storage containers (container-1, container-2, container-3). The customer requires that only container-1, which will be utilized as an NFS datastore, be presented to external hosts.

However, users are able to mount all three containers.

What is causing this problem?

A.

Compression was turned on for all containers.

B.

A Container-level whitelist entry was configured.

C.

Deduplication was turned on for all containers.

D.

A Global whitelist entry was configured.

Full Access
Question # 10

Refer to the exhibits.

A consultant is trying to test port failover on the node shown in the first exhibit. A continuous ping test is performed to the host. The consultant shuts down one of the links, after which the host ping request times out. The consultant tries to troubleshoot the issue with the customer and sees the information shown in the second exhibit on their Cisco Switches:

What is causing the issue?

A.

There is a Native VLAN mismatch on the switchport.

B.

The wrong VLAN is tagged on the host.

C.

Bad SPF+ cables are on the active interface.

D.

PortFast is not enabled on the port connected to the host.

Full Access
Question # 11

An administrator needs to install prism central for their 2550 multi-cluster environment.

How should they deploy the application?

A.

Deploy a large 3-VM Prism Central instance

B.

Deploy a large 1-VM Prism Centralinstance.

C.

Deploy a small 3-VM Prism Central instance.

D.

Deploy a small 1-VM Prism Central instance.

Full Access
Question # 12

A consultant is unable to install virtualization software on a laptop.

Which two versions of Foundation can be used to resolve this issue? (Choose two.)

A.

Foundation VM

B.

Foundation Portable

C.

Foundation Central

D.

Foundation Applet

Full Access
Question # 13

A VM is exhibiting one or more of the following baseline values based on the past 30 days:

• CPU usage < 20%

• CPU ready time < 5%

• Memory usage < 50% (moderately) or < 20% (severely)

• Memory swap rate = 0 Kbps

Which type of VM is being described?

A.

Constrained VM

B.

Inactive VM

C.

Bully VM

D.

Over-Provisioned VM

Full Access
Question # 14

A consultant notices while assigning VLAN tags to hosts and CVMs in a running cluster, that Prism Element displays alerts indicating a node is down.

What should the consultant do to prevent these alerts?

A.

Restart the Nutanix cluster.

B.

Only change the Controller Virtual Machine VLANs.

C.

Only change the hypervisor VLANs.

D.

Stop the Nutanix cluster before changing VLANs.

Full Access
Question # 15

A customer is running out of storage in an ESXi cluster. The customer wants to add storage without paying for an additional hypervisor license.

Which option should the consultant recommend to meet the requirement?

A.

Convert the cluster to AHV to support storage-only node requirements.

B.

Select the storage-only checkbox during Foundation and then expand the cluster in Prism.

C.

Buy a new node to meet the requirements of the storage-only node specifications.

D.

Edit the factory_config.json file to configure the node as storage-only and then expand the cluster in Prism

Full Access
Question # 16

Refer to the exhibit.

A consultant is deploying a cluster using the customer-provided IP addressing information.

Which option in Foundation must be configured to ensure connectivity during the deployment?

A.

Link Aggregation

B.

Range Autofill

C.

Network Segmentation

D.

Multi-homing

Full Access
Question # 17

Refer to the exhibit.

User 1 and User 2 belong to the AAPM group

What are two descriptions of how Files perform quota management? (Choose two.)

A.

User 2 can continue to add another 3GB file butwill receive a daily notification email.

B.

User 1 can continue to add another 5GB file but will receive a daily notification email.

C.

User 1 can add an 8GB file to the share without receiving notification.

D.

User 2 can add an 8GB file without receivinga notification email.

Full Access
Question # 18

A customer wants to run SAP HANA on a Nutanix cluster with the following characteristics:

• AHV nodes

• SAP HANA version 2

• Production database files

Which configuration should be recommended to the customer?

A.

Start with a cluster containing three or more nodes

B.

Enable only compression for the container that contains the Production database

C.

Do not enable compression, deduplication. or erasure coding on the storage container

D.

Plate the SAP HANA Database on the same socket as CVM

Full Access
Question # 19

A guest VM is reported to have poor storage performance. It has an I/O profile of 80%read. 20% write, and the HDDs form more than 50% of the read source.

What should an administrator do to resolve this issue?

A.

Increase SSD capacity

B.

Increase the OPLOG

C.

Increase the write cache

D.

Use HDDs with higher RPM

Full Access
Question # 20

A systems administrator configures a protection domain replication between two Nutanix clusters. After the first successful replication , the administrator tests DR by clicking activate on the remote cluster.

While VMs are active on the remote cluster, the protection domain is marked as active on both clusters.

What steps are required to return both clusters to their original state?

A.

1. On the remote site, deactivate the Protection Domain using ncli

2. On the primary site, select theProtection Domain and dick migrate

B.

1. On the remote site, promote the Protection Domain

2. On the primary site, change the Protection Domain state from Decoupled to Disabled

3 Enable the original primary site as remote site

C.

1. On the prima7 site,suspend replications

2. On the remote site, deactivate the Protection Domain using ncli

3. On the remote site, migrate the protection domain back to the primary site

D.

1 On the remote site, restore the snapshots from the Protection Domain

2. On the remote site, select the Protection Domain and migrate to the primary site

Full Access
Question # 21

Over the period of 2 to 3 weeks, a cluster displays the following:

•Periods where Warning Alerts of memory usage over 75% are asserted

•Periods where Critical Warnings of memory usage over 90% are asserted

•Periods of slow of frozen VDI desktops have caused work stoppage or slowdown

•VDI clones have periodically not powered up when called, causing work stoppage

Which steps should be used toprioritize the administrator’s troubleshooting efforts?

A.

•Assess resource health on Hardware page

•Review the Analysis page for memory usage demand

•Determine the VDI workload-to-host affinity across the cluster

B.

•Analyze Alert Pages for a root cause of memory problem

•Analyze VM table page to access the VM functionality

•Analyze the VDI Clone properties for possible VDI Workload stress

C.

•Check Analysis page for CPU demand

•Verify VDI workload property for memory subscription

•Review theHardware page to determine if the cluster has sufficient RAM

D.

•Review Analysis Page for memory use pattern

•Alert with VDI workload demand

•Analyze current and future workload in the Capacity Runaway tab for sufficient resources

Full Access
Question # 22

The following critical Availability Alert displays in prism Central:

The protection Policy PP-BCA-1HR includes a business critical application with a 1-hour snapshot frequency.

What is causing this issue?

A.

There is a scheduled outage for the Availability Zone referenced in Protection Policy PP-BCA-1HR.

B.

Workloads included in PP-BCA-1HR are no longer within their intended RPO.

C.

Prism Central in the Availability Zone for PP-BCA-1HR is unavailable.

D.

NearSync replication between theAvailability Zones has fallen out of scope.

Full Access
Question # 23

An administrator needs to initiate a new VDI project within a couple of months. Prism Central reports there are no storage resources to accommodate such workloads.

The administrator sees many powered-off VMs and has the authority to delete test VMs powered off at least for 30 days. Test VMs belong to the Test category.

Using Prism Central, which steps are required to identify the correct VMs tobe deleted?

A.

Use Capacity Runway to filter by Test and Powered-off VMs

B.

Filter VMs list, choose Test category and Inactive under Efficiency

C.

Create a new Scenario selecting Test VMs. filter by uptime

D.

Create a new Project selecting Test VMs,sorting by power state

Full Access
Question # 24

An administrator is deploying a three-tier application on a Nutanix Enterprise Cloud consisting of web, application, and database VMs. Traffic between theservers must be limited to specific services/ports. There is an application layer firewall VM deployed on one host in the cluster.

In which way should the administrator meet this requirement?

A.

Create a network for each type of VM, and use policy-based routing to control the traffic flow

B.

Configure a security policy and service chain redirecting the server traffic through the firewall

C.

Separate the web. application and database VMs on to dedicated VLANs

D.

Categorize the VMs in Prism Central and utilize Flow to set a security policy

Full Access
Question # 25

An administrator receives an error indicating that the CVMs in the cluster are not syncing to any NTP servers. An investigation of the issue finds:

• The NTP servers are configured in Prism

• The time on all CVMs is the same

• Both the CVMs and AHV hosts are configured for the UTC time zone

Which two steps can be taken to troubleshoot this issue? (Choose two.)

A.

Confirm that the NTP servers are reachable from the CVMs.

B.

Restart genesis on all CVMs.

C.

On a CVM. run the command a Hash ntpq -pn.

D.

Restart the chronosservice on all CVMs.

Full Access
Question # 26

In a Nutanix cluster, a Protection Domain contains 50 entities that are replicated to a remote Single Node Replication Target.

The current schedule configuration is as follows:

• Repeat every 6 hours

• Local Retention Policy 1

• Remote Retention Policy 8

• Starting time 12 am

At 8 am on Monday, the administrator discovers that a protected VM is corrupted. The latest good state was Sunday 2 pm. The administrator needs to maintain current protection.

Which strategy should the administrator use to meet these requirements?

A.

From the Remote site, activate the Protection Domain, then re-protect the entity.

B.

From the Remote site, restore the VM from the local snapshot by selecting the correct snapshot

C.

From the local site, retrieve the correct remote snapshot, then restore the VM locally.

D.

From the local site, restore the VM from the local snapshot by selecting the correct snapshot.

Full Access
Question # 27

A consultant is using the Foundation applet to create a cluster. During the process the consultant refreshes the progress bar web page and is concerned when nothing loads.

What should the consultant do to verify that Foundation has completed successfully?

A.

Return to the Foundation configuration page and start over.

B.

Update Java on the Foundation VM.

C.

Connect to any CVM IP address from a web browser.

D.

Restart the Foundation process.

Full Access
Question # 28

Anadministrator is notified that a bare metal database server is down. This database server is being served storage using a Nutanix Volume Group. Upon investigating, the administrator finds that the disks in the database server that map to the vDisks in thevolume group have gone offline.

What is causing this issue?

A.

The Volume Group Load Balancer has been disabled.

B.

Port 9443 is blocked in the server firewall.

C.

Port 3260 has been blocked in the server firewall.

D.

A CVM serving the Volume Group has gone offline.

Full Access