ExamGecko
Home Home / Nutanix / NCA-6.5

Nutanix NCA-6.5 Practice Test - Questions Answers, Page 11

Question list
Search
Search

Which tool provides diagnostic system data for Nutanix to deliver proactive support? (Choose Correct answer and give explanation/References from Nutanix Certified Associate (NCA) v6.5 official study resources)

A.
NCC
A.
NCC
Answers
B.
Cluster Heart
B.
Cluster Heart
Answers
C.
Pulse
C.
Pulse
Answers
D.
D.
Answers
Suggested answer: C

Explanation:

A. NCC

B. Cluster Heart

C. Pulse

D. Cluster health

Answer: C

Explanation:

Pulse is a built-in tool that periodically collects and sends diagnostic data to Nutanix support for proactive monitoring and troubleshooting. This data includes cluster configuration, performance metrics, and error logs, among other things.

Nutanix support can use this data to identify and resolve issues before they become critical, and to provide recommendations for optimizing cluster performance.

NCC (Nutanix Cluster Check) is another tool provided by Nutanix, but it is used for performing manual health checks and diagnostics on the cluster, rather than providing proactive support.

Cluster Heart and Cluster Health are not tools provided by Nutanix, and are not relevant to this question.

Reference: Nutanix Certified Associate (NCA) 6.5 Student Guide, Module 11: Cluster Management,

Topic 11.1: Proactive and Predictive Support.

User are complaining that web application hosted on a Nutanix cluster are running slow. After reviewing the performance metric, it is determined that the CPU Ready time is high in the cluster.

What entity is impacted by CPU ready time?

A.
Oplog
A.
Oplog
Answers
B.
NIC
B.
NIC
Answers
C.
vDisk
C.
vDisk
Answers
D.
VM
D.
VM
Answers
Suggested answer: A

Explanation:

The oplog is a critical component of the Nutanix distributed storage fabric and can be impacted by high CPU Ready time. When the CPU Ready time is high, there can be delays in writing data to the oplog, resulting in slower overall cluster performance. Additionally, high CPU Ready time can also lead to increased write amplification, further reducing I/O performance.

What type of relationship does a VM Affinity policy define?

A.
VM to VM
A.
VM to VM
Answers
B.
VM to Storage tier
B.
VM to Storage tier
Answers
C.
VM to Network VLAN
C.
VM to Network VLAN
Answers
D.
VM to Host
D.
VM to Host
Answers
Suggested answer: D

Explanation:

The type of relationship that a VM Affinity policy defines is VM to Host. A VM Affinity policy is used to specify which host a virtual machine should be placed on. This can be used to ensure that certain VMs are always running on the same host for performance or availability reasons. Additionally, VM Affinity policies can also be used to ensure that VMs are spread across multiple hosts for better load balancing.

Which VM-level feature ensures continuous availability of data?

A.
Replication Factor
A.
Replication Factor
Answers
B.
Data Locality
B.
Data Locality
Answers
C.
Data Protection
C.
Data Protection
Answers
D.
Deduplication
D.
Deduplication
Answers
Suggested answer: C

Explanation:

Data Protection is a feature that ensures that data stored on a VM is protected against data loss in the event of hardware failure, data corruption, or other unexpected events. It typically includes features such as snapshots, replication, and backup, which enable administrators to create multiple copies of data and store them in different locations to provide redundancy and ensure availability.

Replication Factor is a related concept, but it is not a VM-level feature in and of itself. Replication Factor is a setting that can be configured at the storage level to determine how many copies of data are stored on different nodes in a distributed storage system. Data Locality and Deduplication are also related concepts, but they do not directly ensure continuous availability of data.

What happens to images that are imported into Prism Central?

A.
Copied to the Prism Central image repository
A.
Copied to the Prism Central image repository
Answers
B.
Remain in the source duster after import
B.
Remain in the source duster after import
Answers
C.
Copied to all clusters managed by Prism Central
C.
Copied to all clusters managed by Prism Central
Answers
D.
Deleted from the source cluster after import
D.
Deleted from the source cluster after import
Answers
Suggested answer: A

Explanation:

The Prism Central image repository is a centralized location for storing virtual machine images that can be used to deploy VMs to any cluster managed by Prism Central. When an image is imported into Prism Central, a copy of the image is made and stored in the repository, so that it can be easily accessed and deployed to any cluster as needed.

The original image file typically remains in the source cluster after it is imported into Prism Central, unless it is explicitly deleted. Similarly, the image copy in the Prism Central repository is not automatically copied to all clusters managed by Prism Central, but can be used to deploy new VMs on any cluster as needed.

Which cluster configuration is LCM unable to perform firmware upgrades against?

A.
Five-node
A.
Five-node
Answers
B.
Three-node
B.
Three-node
Answers
C.
Two - nodeD. Singleā€"node
C.
Two - nodeD. Singleā€"node
Answers
Suggested answer:

Explanation:

LCM (Lifecycle Manager) is a tool provided by Nutanix to automate software and firmware upgrades for Nutanix clusters. However, LCM is unable to perform firmware upgrades against a (D) Single-node cluster configuration.

This is because a single-node cluster does not have any redundancy, so there is no way to perform an upgrade without taking the entire cluster offline. In contrast, multi-node clusters can typically be upgraded in a rolling fashion, with one or more nodes being upgraded at a time while the rest of the cluster remains online.

LCM is capable of performing firmware upgrades against two-node, three-node, and five-node cluster configurations, as long as they meet the other requirements for LCM support (such as being on a supported AOS release and having the appropriate network connectivity).

How is the destination cluster determined when uploading images from the local workstation to Prism Central?

A.
Selected randomly
A.
Selected randomly
Answers
B.
Selected manually
B.
Selected manually
Answers
C.
Selected alphabetically
C.
Selected alphabetically
Answers
D.
Selected sequentially
D.
Selected sequentially
Answers
Suggested answer: C

Explanation:

When uploading images from a local workstation to Prism Central, the destination cluster is determined based on the alphabetical order of the cluster names. Specifically, the first available cluster in alphabetical order is selected as the destination for the image upload.

This behavior is documented in the Prism Central Admin Guide, which states that when you upload an image to Prism Central, "the image is stored in the first cluster that has sufficient space and starts with the letter that appears first in the image name."

How long does a Nutanix cluster's Recycle Bin retain deleted vDisk and configuration data files?

A.
6 Hours
A.
6 Hours
Answers
B.
12 Hours
B.
12 Hours
Answers
C.
24 Hours
C.
24 Hours
Answers
D.
48 Hours
D.
48 Hours
Answers
Suggested answer: C

Explanation:

The Recycle Bin is a feature that allows administrators to recover data that has been accidentally deleted from the cluster, by storing deleted files in a temporary holding area for a certain period of time. During this time, the deleted files can be restored to their original location, effectively undoing the deletion.

The default retention period for the Recycle Bin is 24 hours, which means that any files that are deleted from the cluster will be retained in the Recycle Bin for a period of 24 hours before they are permanently deleted. This retention period can be customized to suit the needs of a particular environment, but the default value is 24 hours.


What is the maximum transmission units (MTU) supported by Nutanix CVM?

A.
1472 bytes
A.
1472 bytes
Answers
B.
9000 bytes
B.
9000 bytes
Answers
C.
9216 bytes
C.
9216 bytes
Answers
D.
1500 bytes
D.
1500 bytes
Answers
Suggested answer: D

Which storage protocol is used to attach a container to an ESXi host?

A.
CIFS
A.
CIFS
Answers
B.
FCoE
B.
FCoE
Answers
C.
SMB
C.
SMB
Answers
D.
NFS
D.
NFS
Answers
Suggested answer: D
Total 134 questions
Go to page: of 14